Enjoying the Wiz Journey
Overall Satisfaction with Wiz
* Brings together 2-3 cloud environments into a single pane of glass
* Supports (although we would like to see better support) segmentation of cloud resources based on tags or resource tag enrichment. This allows our product teams in the organization to focus on the resources they are responsible for.
* It will help our ISO focus on what matters through Wiz's issue generation through toxic combinations. Right now, it is hard for our ISO to focus on what matters. They squirrel away whenever there is an audit or some perceived security threat. I am hoping Wiz will help our office reach a maturity level that takes a more pragmatic approach to security, one that allows us to make steady gains and push the security forward in the organization.
* Supports (although we would like to see better support) segmentation of cloud resources based on tags or resource tag enrichment. This allows our product teams in the organization to focus on the resources they are responsible for.
* It will help our ISO focus on what matters through Wiz's issue generation through toxic combinations. Right now, it is hard for our ISO to focus on what matters. They squirrel away whenever there is an audit or some perceived security threat. I am hoping Wiz will help our office reach a maturity level that takes a more pragmatic approach to security, one that allows us to make steady gains and push the security forward in the organization.
Pros
- It seems to be a very open. The platform exposes as little or as much detail you want. Most things can be boiled down to a security graph query. So a user of Wiz can see how the graph data is really the nucleus of the platform.
- The API console and the API explorer are super valuable for API integrators like ourselves.
- The role/permission based controls are pretty robust and has allows us to define the workflows that we want our end users to engage with.
Cons
- I would like to see the modification of the issue status to be wrapped in some form of a permission
- I would like to be able to show filtered queries on the Identity Entitlements screen also on the security graph.
- I wish I didn't have to create an automation rule (when the rule does just about the same thing in each) for each project (in Wiz).
- We haven't completed a full rollout yet, but the goal is to shift left security to all of our product teams so that security is a shared effort across the organization.
- We want to be able to demonstrate fast remediations, corrective action plans with tangibles from Wiz in response to audits or red team findings.
- We would like to also use information from Wiz to substantiate answers to security questionnaires that customers requires us to fill out in order to do business with them.
As someone relatively new to the security space, coming from a software engineering background in identity, I don’t have deep experience across a wide range of security tools. That said, based on the products I have used—such as Palo Alto’s Cortex XDR, Panorama, GlobalProtect, and their related tenant tooling—the user experience feels quite dated. These tools often fall short in guiding users to what matters most. The interfaces tend to be complex, and it's not always clear where attention should be focused or what actions should be prioritized. In contrast, platforms like Wiz really stand out for their intuitive design and data-driven clarity, helping users focus on the most impactful security concerns.
Do you think Wiz delivers good value for the price?
Yes
Are you happy with Wiz's feature set?
Yes
Did Wiz live up to sales and marketing promises?
I wasn't involved with the selection/purchase process
Did implementation of Wiz go as expected?
Yes
Would you buy Wiz again?
Yes


Comments
Please log in to join the conversation