We performed a comparison between BMC Helix Cloud Security and Netskope based on real PeerSpot user reviews.
Find out what your peers are saying about Palo Alto Networks, Wiz, Microsoft and others in Cloud Workload Protection Platforms (CWPP)."We use the infrastructure as code scanning, which is good."
"I did a lot of research before signing up and doing the demo. They have a good reputation as far as catching threats early on."
"The UI is very good."
"They're responsive to feature requests. If I suggest a feature for Prisma, I will need to wait until the next release on their roadmap. Cloud Native Security will add it right away."
"The solution helped free other staff to work on other projects or other tasks. We basically just had to do a bunch of upfront configuring. With it, we do not have to spend as much time in the console."
"The agentless vulnerability scanning is great."
"The dashboard gives me an overview of all the things happening in the product, making it one of the tool's best features."
"PingSafe offers comprehensive security posture management."
"The features that I've found most valuable are its container security aspect. I also like its vulnerability management tools."
"The best feature is time to value. With very minimal effort, you are able to have a cohesive view into your security posture on one or multiple cloud accounts, particularly if you are dealing with multicloud. If you have Azure and AWS deployments, you might have multiple subscriptions in Azure and usually multiple accounts in AWS. You may even be doing some GCP work (around Google Cloud Platform). It's very difficult to manage a common set of policies, even less reporting, across multiple subscriptions, accounts, and cloud environments. What BMC Helix Cloud Security does is provide a unified view or single pane of glass as to your baseline. Then, it also facilitates the ability for Level 1 or 2 operations support to take action and report on security vulnerabilities."
"The cool feature of Helix Cloud Security is that you can do all that — understand and remediate issues — in one dashboard, based on the different policies that are available for security, out-of-the-box."
"It's also multi-cloud. You can look at several cloud providers: AWS, Azure, or GCP."
"The most valuable aspects of BMC Helix Cloud Security are its security features and regulatory compliance capabilities."
"Role-based security is a valuable feature."
"I have found the most useful features to be the Web Secure Gateway, CASB, infrastructural service scanning, and Zero Trust."
"A very straightforward interface."
"The feature that I like best is the GUI."
"Netskope is a really good product. I cannot segregate which features are the most valuable. We find most of the features to be valuable. It gives us what we are looking for."
"The solution offers a better understanding of the real scenario and identifies the cloud apps that are being utilized."
"The most valuable feature of Netskope is protection."
"In Azure, we have multiple subscriptions and with every subscription, we add some kind of instance ID. We can work with the instance ID so that we allow all of the instances containing nodules. Everything else, we block. This way, if you go to outlook.com and check your email, if you log in with your company account, the instance ID will show. The network will take action according to the instance ID and say, "You are using the enterprise email. I'll let you surf. I'll let you see your email." But when you try to log in with your own email address, like Hotmail or Gmail, the instance ID will be different. This way we are not completely blocking Outlook, but we are blocking people from accessing their Outlook. We are only allowing the enterprise-level emails, and we are not allowing user-based emails."
"It's a comprehensive security portfolio solution."
"here is a bit of a learning curve. However, you only need two to three days to identify options and get accustomed."
"There's an array of upcoming versions with numerous features to be incorporated into the roadmap. Customers particularly appreciate the service's emphasis on intensive security, especially the secret scanning aspect. During the proof of concept (POC) phase, the system is required to gather logs from the customer's environment. This process entails obtaining specific permissions, especially in terms of gateway access. While most permissions for POC are manageable, the need for various permissions may need improvement, especially in the context of security."
"They need more experienced support personnel."
"There is no break-glass account feature. They should implement this as soon as possible because we can't implement SSO without a break-glass feature."
"Currently, we would have to export our vulnerability report to an .xlsx file, and review it in an Excel spreadsheet, and then we sort of compile a list from there. It would be cool if there was a way to actually toggle multiple applications for review and then see those file paths on multiple users rather than only one user at a time or only one application at a time."
"One of our use cases was setting up a firewall for our endpoints, specifically for our remote users... We were hoping to utilize SentinelOne's firewall capabilities, but there were limitations on how many URLs we could implement. Because of those limitations on the number of URLs, we weren't able to utilize that feature in the way we had hoped to."
"It does not bring much threat intel from the outside world. All it does is scan. If it can also correlate things, it will be better."
"We recently adopted a new ticket management solution, so we've asked them to include a connector to integrate that tool with Cloud Native Security directly. We'd also like to see Cloud Native Security add a scan for personally identifying information. We're looking at other tools for this capability, but having that functionality built into Cloud Native Security would be nice. Monitoring PII data is critical to us as an organization."
"We've had some with issues connectors. The connectors have seemed to have caused a little bit of trouble, perhaps with the APIs trying to scan the environment. The only time I've had to reach out to tech support was for that. It seems it may not have been scanning correctly or I wasn't seeing data within a specific time. But we've set up a couple of connectors in the past couple of weeks and they actually scanned the AWS environment and we had data within about 10 minutes. It's working a lot faster and I think they're making improvements as they go."
"I want the role-based security feature to be improved."
"The UI could be more user-friendly."
"BMC Helix Cloud Security has room for improvement in terms of integrating its various features."
"Every organization out there doesn't rely on just one control body. They use FISMA control. They may use HIPAA, CIS, PCI, or SOX, then blend them. One of the things that is now in big demand for BMC Helix Cloud Security is content. That's the next journey in its lifespan, making it easier for the community to share and collaborate on content for security controls that can be measured and remediated."
"There could be room for improvement in the subscription process."
"The configuration and user behaviour analytics can be improved."
"I deduced two points: one for their feature modification and one for the feature maturity of the solution."
"There could be better integration with other solutions."
"In some cases, when you have a lot of policies, it can get confusing for users and you can get lost in the GUI."
"Setting up policies is something that we having been doing, and if the vendor were to provide example use cases that included different implementation options then it would be very useful for us."
"The initial setup is complex and should be simplified."
"The configuration in the cloud model could be improved upon."
More SentinelOne Singularity Cloud Security Pricing and Cost Advice →
BMC Helix Cloud Security is ranked 25th in Cloud Workload Protection Platforms (CWPP) with 5 reviews while Netskope is ranked 4th in Cloud Access Security Brokers (CASB) with 35 reviews. BMC Helix Cloud Security is rated 8.0, while Netskope is rated 8.4. The top reviewer of BMC Helix Cloud Security writes "A highly scalable and straightforward solution with a knowledgeable support team". On the other hand, the top reviewer of Netskope writes "Network proxy that provides visibility during deployment and allows you to control PII". BMC Helix Cloud Security is most compared with Red Hat Advanced Cluster Security for Kubernetes, VMware Aria Operations, Threat Stack Cloud Security Platform and CloudBolt, whereas Netskope is most compared with Prisma Access by Palo Alto Networks, Zscaler Internet Access, Microsoft Defender for Cloud Apps, Cisco Umbrella and Forcepoint ONE.
We monitor all Cloud Workload Protection Platforms (CWPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.