This review does not include a rating.
This review does not include a rating.
16 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener'>trScore algorithm: Learn more.</a>
Score 8.4 out of 100

Attribute Ratings

    Likelihood to Recommend

    MobileIron Access

    N/A
    0 Ratings
    8.3

    Palo Alto Networks Prisma Cloud

    83%
    2 Ratings

    Likelihood to Recommend

    Ivanti

    No answers on this topic

    Palo Alto Networks

    Vulnerability assessment is a requirement within the solution. Where Organization has on-prem and cloud workload and on-prem workload has to connect locally (on-Prem). Primsa Provide capability of hosting solution on-prem or on cloud-based on organization requirement and license can be shared between both On-Prem/Cloud workload. Where organizations want to have the flexibility of using Twistlock or Redlock (Vulnerability assessment for OS or Monitoring/remediation of cloud workload) with a single license. Prisma Enterprise license provides the capability of using Twistlock or Redlock on a need basis
    Read full review

    Pros

    Ivanti

    No answers on this topic

    Palo Alto Networks

    • Efficient and real-time--Palo Alto Networks Prisma Cloud monitors the multi-cloud environment in real time without any lag. The radar in the tool is a single pane of glass for all the containers and images in all your environments. Radar gives a 50,000 foot view at a glance and lets you know what the pain points are in the environment and where more focus is required.
    • Serverless functions and static repositories are supported out of the box. The user needs to make a successful connection, and after that, the tool continuously monitors the functions and repositories at all times and provides alerts and incidents in case something major is happening in the environment.
    • Minimalistic Graphical User Interface--Lets the user do a lot with fewer clicks. You can easily navigate through the tool with relatively few clicks and get your work done.
    • A number of authentication mechnisms are supported out of the box, one of which--AD authentication--is the most popular.
    Read full review

    Cons

    Ivanti

    No answers on this topic

    Palo Alto Networks

    • IAM control need enhancement as there are few features missing
    • Support on all Container solution such as Pivotal PCF
    • Number of Security Policy for scanning is less and required more policy to identify a security issue
    • Cloud is not hosted in India
    • Firewall Policy on Container required some enhancement for blocking communication between workload
    • Enabling Proxy for connecting on-prem workload container to cloud
    • Solution should not require write access to a cloud account. It should have capabilities of using existing cloud API for remediation or making changes on Cloud
    Read full review

    Pricing Details

    MobileIron Access

    Starting Price

    Editions & Modules

    MobileIron Access editions and modules pricing
    EditionModules

    Footnotes

      Offerings

      Free Trial
      Free/Freemium Version
      Premium Consulting/Integration Services

      Entry-level set up fee?

      No setup fee

      Additional Details

      Palo Alto Networks Prisma Cloud

      Starting Price

      Editions & Modules

      Palo Alto Networks Prisma Cloud editions and modules pricing
      EditionModules

      Footnotes

        Offerings

        Free Trial
        Free/Freemium Version
        Premium Consulting/Integration Services

        Entry-level set up fee?

        No setup fee

        Additional Details

        Alternatives Considered

        Ivanti

        No answers on this topic

        Palo Alto Networks

        Palo Alto Networks Prisma Cloud was the first choice made by our organization so far for enhancing security in a multi-cloud environment.
        Read full review

        Return on Investment

        Ivanti

        No answers on this topic

        Palo Alto Networks

        • Provide visibility of workload or services running within our cloud environment. This also help us to decommissioned/disconnect workload which is no more required
        • Enhanced security posture for API OPEN/Closed based on application requirement
        • Identify Services/Workload hosted on a different account or Cloud and which are not Meeting compliance requirement
        Read full review

        Add comparison