We just raised a $30M Series A: Read our story

Top 8 Cloud Workload Security Tools

Prisma Cloud by Palo Alto NetworksCheck Point CloudGuard Posture ManagementMicrosoft Defender for CloudMorphisec Breach Prevention PlatformCheck Point Harmony Email & OfficeGuardicore CentraOrca SecurityCisco Secure Workload
  1. leader badge
    As a pure-play CSPM, it is pretty good. From the data exposure perspective, Prisma Cloud does a fairly good job. Purely from the perspective of reading the conflicts, it is able to highlight any data exposures that I might be having.
  2. leader badge
    The dashboard is intuitive. You know if you're compliant or not, and then it gives you a remediation plan. Auto remediation is a very effective feature that helps ensure less manual intervention.
  3. Find out what your peers are saying about Palo Alto Networks, Check Point, Microsoft and others in Cloud Workload Security. Updated: November 2021.
    553,954 professionals have used our research since 2012.
  4. leader badge
    One of the features that I like about the solution is it is both a hybrid cloud and also multi-cloud. We never know what company we're going to buy, and therefore we are ready to go. If they have GCP or AWS, we have support for that as well. It offers a single-panel blast across multiple clouds.
  5. leader badge
    Morphisec Guard enables us to see at a glance whether our users have device control and disk encryption enabled properly. This is important because we are a global company operating with multiple entities. Previously, we didn't have that visibility. Now, we have visibility so we can pinpoint some locations where there are machines that are not really protected, offline, etc. It gives us visibility, which is good.
  6. leader badge
    We are able to protect sensitive business data and maintain regulatory compliance with advanced data leak prevention (DLP).The first most remarkable thing is the integration with the Office 365 solution, which is easy, fast, and totally transparent for the user.
  7. The most valuable feature is the visibility of processes and connections.From day one, you get threat intelligence. It will immediately block active threats, which has been useful.
  8. report
    Use our free recommendation engine to learn which Cloud Workload Security solutions are best for your needs.
    553,954 professionals have used our research since 2012.
  9. With its Cloud Security Posture Management capability, we have the ability to read across all of our cloud-based environments, which includes AWS and Azure. We have visibility into those environments. Seeing all vulnerabilities and configurations is really powerful for us, but ultimately, the ability to use the API to query across the fleet to understand what is the current state, what is the patch level, which ones are potentially exposed for a new CVE that just came out is even more valuable. It allows us to gather really specific intelligence through simple queries.
  10. The most valuable feature is micro-segmentation, which is the most important with respect to visibility.The most valuable feature of this solution is security.
Find out what your peers are saying about Palo Alto Networks, Check Point, Microsoft and others in Cloud Workload Security. Updated: November 2021.
553,954 professionals have used our research since 2012.