We performed a comparison between AWS Security Hub and Prisma Cloud by Palo Alto Networks based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Ease of Deployment: Prisma Cloud by Palo Alto Networks' initial setup was straightforward and aided by helpful engineers and clear instructions. Deployment time differed but was uncomplicated. On the other hand, AWS Security Hub's setup is simple and straightforward, though policies must be set up. It necessitates minimal upkeep.
Features: Prisma Cloud provides a management console, continuous compliance monitoring, auto-remediation, and identity-based micro-segmentation. On the other hand, AWS Security Hub is commended for its integration capabilities, real-time alerts, and compliance monitoring. Prisma Cloud could benefit from more personalized dashboard options, enhanced automation capabilities, and better integration with ticketing systems. On the other hand, AWS Security Hub might benefit from greater integration possibilities with open-source solutions and upgrades to its user interface and dashboards.
Pricing: Prisma Cloud is perceived as having a complex credit-based pricing system, leading to a general perception of being expensive. However, it provides good value for securing multi-cloud environments. In contrast, AWS Security Hub is considered to have reasonable pricing, but there is some uncertainty surrounding it for those outside of the central team.
Service and Support: Prisma Cloud's customer service has been a bit inconsistent, with some customers appreciating the technical assistance and account managers, while others have encountered slow response times and unhelpful solutions. On the other hand, AWS Security Hub's technical support has been commended by contented customers for being prompt and efficient.
ROI: Prisma Cloud by Palo Alto Networks offers benefits such as risk transparency, enhanced compliance and security, and quicker issue resolution, resulting in improved productivity and cost savings. Although the exact ROI is hard to quantify, it reduces risks and enhances resource utilization. On the other hand, AWS Security Hub has been well-received with a positive outcome.
Comparison Results: Prisma Cloud by Palo Alto Networks is the better option when compared to AWS Security Hub. Its features are more comprehensive and effective in protecting the entire cloud-native stack, including cloud compliance monitoring and alerting, network security, and micro-segmentation. While AWS Security Hub is praised for its integration capabilities, it falls short in terms of comprehensive features and auto-remediation capabilities.
"Our most important features are those around entitlement, external exposure, vulnerabilities, and container security."
"The automation roles are essential because we ultimately want to do less work and automate more. The dashboards are easy to read and visually pleasing. You can understand things quickly, which makes it easy for our other teams. The network and infrastructure teams don't know as much about security as we do, so it helps to have a tool that's accessible and nice to look at."
"The security baseline and vulnerability assessments is the valuable feature."
"Out of all the features, the one item that has been most valuable is the fact that Wiz puts into context all the pieces that create an issue, and applies a particular risk evaluation that helps us prioritize when we need to address a misconfiguration, vulnerability, or any issue that would put our environment into risk."
"The vulnerability management modules and the discovery and inventory are the most valuable features. Before using Wiz, it was a very manual process for both. After implementing it, we're able to get all of the analytics into a single platform that gives us visibility across all the systems in our cloud. We're able to correspond and understand what the vulnerability landscape looks like a lot faster."
"The CSPM module has been the most effective. It was easy to deploy and covered all our accounts through APIs, requiring no agents. Wiz provides instant visibility into high-level risks that we need to address."
"The solution is very user-friendly."
"The first thing that stood out was the ease of installation and the quick value we got out of the solution."
"Currently, our organization utilizes AWS for various purposes, including SaaS (Software as a Service), PaaS (Platform as a Service), and hosting applications in the cloud. We develop our applications and use AWS services as a platform for basic functions and secondary development needs. Additionally, we rely on PaaS for accounting services. Approximately, 50% of our applications are hosted in the cloud environment, making it a significant part of our current setup."
"The most valuable feature of AWS Security Hub is the ability to track when monitoring is not enabled on any of my resources."
"The solution shows us our compliance score."
"Finding out if your infrastructure is secure is a valuable feature."
"The platform has valuable features for security."
"Easily integrates with third-party tools"
"The best feature of AWS Security Hub is that you can get compliance or your cloud's current security posture."
"The most valuable features of the solution are the scanning of all the cloud environments and most of the compliances available in the cloud."
"Prisma Cloud provides the needed visibility and control regardless of how complex and distributed the cloud environments become."
"It supports the multi-cloud environment beautifully."
"Visibility is a key feature. Integration with other technologies across the board, whether they are Palo Alto technologies, Windows technologies, or cloud technologies, is probably the biggest thing."
"It helps to identify the misconfigurations by monitoring regularly which helps to secure the organization's cloud environment."
"The CSPM and CWPP functionalities are pretty good."
"It scans our containers in real time. Also, as they're built, it's looking into the container repository where the images are built, telling us ahead of time, "You have vulnerabilities here, and you should update this code before you deploy." And once it's deployed, it's scanning for vulnerabilities that are in production as the container is running."
"The most valuable feature is its cloud security posture management."
"The most valuable feature is that the rule set is managed and that it can be run on a regularly scheduled basis."
"We wish there were a way, beyond providing visibility and automated remediation, to wait on a given remediation, due to a critical aspect, such as the cost associated with a particular upgrade... We would like to see preventive controls that can be applied through Wiz to protect against vulnerabilities that we're not going to be able to remediate immediately."
"One significant issue is that the searches are case-sensitive, so finding a misconfigured resource can become very challenging."
"We would like to see improvements to executive-level reporting and data reporting in general, which we understand is being rolled out to the platform."
"The only small pain point has been around some of the logging integrations. Some of the complexities of the script integrations aren't supported with some of the more automated infrastructure components. So, it's not as universal. For example, they have great support for cloud formation and other services, but if you're using another type of management utility or governance language for your infrastructure-as-code automation components, it becomes a little bit trickier to navigate that."
"Wiz's reporting capabilities could be refined a bit. They are making headway on that, but more executive-style dashboards would be nice. They just implemented a community aspect where you can share documents and feedback. This was something users had been requesting for a while. They are listening to customer feedback and making changes."
"The remediation workflow within the Wiz could be improved."
"The reporting isn't that great. They have executive summaries, but it's only a compliance report that maps all current issues to specific controls. Whether you look at one subscription or project, regardless of the size, you will get a multipage report on how the issues in that account map to that control. Our CSO isn't going to read through that. He won't filter that out or show that to his leadership and say, "Here's what we're doing." It isn't a helpful report. They're working on it, but it's a poor executive summary."
"We're looking at some of the data compliance stuff that they've got Jon offer. I know they're looking at container security, which we gonna be looking at next."
"We need more granular-level customizations to enable or disable the rules in AWS Security Hub."
"The solution will only give you insight if you have configure rule enabled. It should work more like Prisma Cloud and Dome9 which have a better approach."
"The support must be quicker."
"The solution should be easier to learn and use"
"Security needs to be measured based on their own criteria. We can't add custom criteria specific to our organization. For example, having an S3 bucket publicly available might be flagged as a critical alert, but it might not be critical in a sandbox environment. So, it gets flagged as critical, which becomes a false positive. So, customization options and creating custom dashboards would be areas for improvement."
"AWS Security Hub should improve the time it takes to update. It takes a long period of time when updating. It can take 24 hours sometimes to update. Additionally, when integrating this solution with more security tools, takes time."
"AWS Security Hub's configuration and integration are areas where it lacks and needs to improve."
"Adding SIEM features would be beneficial because of the limited customization of AWS Security Hub."
"There needs to be a mechanism that allows me to manually configure compliance more easily."
"Support is an area that needs improvement."
"Prisma Cloud's dashboards should be customizable. That's very important. Other similar solutions are more elastic so you have the power to create customized dashboards. In Prisma Cloud, you cannot do that."
"They could improve more features for the enterprise version of the solution."
"This solution is more AWS and Azure-centric. It needs to be more specific on the GCP side, which they are working on."
"More documentation with real-world use cases would be helpful."
"The first time I looked at Prisma Cloud, it took me a while to understand how to implement the integration or how to enable features by using the interface for integration. That portion can probably be improved."
"Palo Alto should work on ease-of-use and the user-friendliness to be more competitive with some competing products."
More Prisma Cloud by Palo Alto Networks Pricing and Cost Advice →
AWS Security Hub is ranked 13th in Cloud Security Posture Management (CSPM) with 17 reviews while Prisma Cloud by Palo Alto Networks is ranked 1st in Cloud Security Posture Management (CSPM) with 82 reviews. AWS Security Hub is rated 7.6, while Prisma Cloud by Palo Alto Networks is rated 8.4. The top reviewer of AWS Security Hub writes "A centralized dashboard that enables efficient monitoring and management of possible security issues". On the other hand, the top reviewer of Prisma Cloud by Palo Alto Networks writes "The dashboard is very user-friendly and can be used to generate custom RQL based on user requirements". AWS Security Hub is most compared with Microsoft Sentinel, Microsoft Defender for Cloud, Google Chronicle Suite, Oracle Security Monitoring and Analytics Cloud Service and Splunk Enterprise Security, whereas Prisma Cloud by Palo Alto Networks is most compared with Microsoft Defender for Cloud, Aqua Cloud Security Platform, CrowdStrike Falcon Cloud Security, AWS GuardDuty and Snyk. See our AWS Security Hub vs. Prisma Cloud by Palo Alto Networks report.
See our list of best Cloud Security Posture Management (CSPM) vendors.
We monitor all Cloud Security Posture Management (CSPM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.