We compared Netskope and Prisma Access by Palo Alto Networks based on our users' reviews across four parameters. After reading all of the collected data, you can find our conclusion below.
Users prefer Netskope for its advanced analytics and granular policy enforcement, while Prisma Access may be a better choice for its scalability and ease of use. Users praise Netskope for its comprehensive data protection capabilities, advanced analytics, and granular policy enforcement. However, they have expressed a desire for a more intuitive interface, better customer support, improved performance during high-traffic periods, and more comprehensive reporting capabilities. Users appreciate Prisma Access for its ease of use, scalability, and flexibility but have concerns about speed and performance, compatibility with certain applications and platforms, and customer support.
Features: Netskope offers comprehensive data protection, advanced threat protection, advanced analytics, and granular policy enforcement. Prisma Access by Palo Alto Networks focuses on robust security measures, advanced threat prevention, secure connectivity, scalability, and flexibility.
Pricing and ROI: Netskope is praised for its competitive pricing options and straightforward setup process, ensuring a smooth customer experience. Prisma Access by Palo Alto Networks is affordable and provides good value for money. The setup cost is reasonable, and the licensing process is user-friendly for both products. Netskope users reported significant value and cost savings, emphasizing its effectiveness in data protection. Prisma Access users also experienced positive results, indicating a significant ROI.
Room for Improvement: Netskope could improve its interface, customer support, performance during high-traffic periods, and reporting capabilities. Prisma Access could enhance its speed and performance, compatibility with certain applications and platforms, and customer support.
Deployment and customer support: Some Netskope users found the initial setup to be simple and quick, as it only involves rolling out an agent and can be deployed on the cloud. However, others mentioned that the implementation phase can be complex and time-consuming, requiring coordination and effort. The deployment process was generally considered easy, especially for those with a networking background. Palo Alto Networks has a setup that varies in terms of ease and complexity. Some users found the initial setup to be straightforward, while others mentioned it was more complex and required help from Palo Alto or a partner. The deployment durations range from a few hours to several months, depending on factors such as the size of the environment and the number of branch offices. Users praise Netskope for their knowledge and expertise in addressing queries and concerns, emphasizing the excellent level of assistance received. Prisma Access received positive feedback for its knowledgeable and friendly staff, who efficiently address concerns and provide valuable guidance.
The summary above is based on 38 interviews we conducted with Netskope and Prisma Access by Palo Alto Networks users. To access the review's full transcripts, download our report.
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The solution is stable."
"It's one of the top-ranking solutions in the market, and it's very responsive. We are using Netskope, and Netskope provides a load of features for SQL, STP, and traffic control."
"Amazing reporting and tracking mechanisms."
"A very straightforward interface."
"The product's analytics part is pretty fine."
"The detection capability is very nice and lightweight."
"Their technical support is very good."
"Its deployment is very easy and quick. Their technical support is also very good."
"It's a comprehensive security portfolio solution."
"The Autonomous Digital Experience Management (ADEM) offered by Palo Alto is a good reporting tool. It gives insights into how things are going within the network. It takes all the data from the users' endpoints and does an analysis, and it suggests changes as well."
"The visibility perspective is pretty cool. If I want to know how much data is being used for a specific project, I can look at how much data has been used, from which region, and which users have been connected. That visibility is very good so that I can see how many licenses we have and how many are used."
"The scalability of the solution is excellent."
"Prisma's most valuable feature would be its ability to identify bad or risky configurations."
"It protects all app traffic so that users can gain access to all apps. Unlike other solutions that only work from ports 80 and 443, which are predominantly for web traffic, Prisma Access covers all protocols and works on all traffic patterns... The most sophisticated attacks can arise from sources that are not behind 80/443."
"Prisma Access gives us security from a single point. It controls mobile users and determines how secure their networks will be, including from where they will get internet access. We can optimize things and add security profiles centrally."
"A feature I've found very helpful is run time security because most of the products on the market will look at security during the build time, and they don't really look at what happens once you're going into production."
"The solution also provides traffic analysis, threat prevention, URL filtering, and segmentation. That combination is important because it enhances the protection and makes the traffic more secure. It also keeps things more up-to-date, enabling us to deal with more of the current threats."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"The dashboard performance could be much better and faster, but because it is a complicated product, it takes time for the dashboard to process."
"Setting up policies is something that we having been doing, and if the vendor were to provide example use cases that included different implementation options then it would be very useful for us."
"There could be better integration with other solutions."
"Compatibility with other proxy polars would be helpful."
"If we need to allow a process that is blocked by Netskope, we have to manually check the logs to see why it is blocked. This can be time-consuming and inefficient"
"It should have user behavior analysis and diverse analysis."
"There should be some granular custom roles that are not available. However, this is on the road map. There are many devices that do not have the Zero Trust feature and other enhancements available which they should have."
"They could improve their mobile agents as they have some limitations."
"It applies commits to the firewalls slowly. There isn't an API you can use for anything. We've previously had trouble with the egress IP addresses though we expressed to engineering that those mustn't change. They changed several times without warning, causing a lot of headaches."
"One area for improvement is for them to stay on top of keeping their CVEs on their platform up to date."
"My clients would like to see a more feature-rich product."
"Their next release should provide solutions for the mobile environment."
"The Cloud Management application has room for improvement. There are a lot of things on the roadmap for that application; things are going to happen soon."
"Though the monitoring is fine, the solution should improve its application graphs and interface monitoring."
"We are using the SaaS offering. We use our applications for microservices. We use Twistlock to scan containers, and it displays these results in Prisma, which is a good feature because we can see vulnerabilities with respect to these containers. We can see everything in a very detailed manner. However, when you have different environments for a single application, such as DEV, QA, PROD, and TEST, all these environments run multiple containers, which can lead to a very high number of containers. In such a scenario, it shows you the alerts for all those containers that have vulnerabilities. If you show the results of all the containers that share the same image, it is not going to add any value. Therefore, they should narrow down the alerts based on a container. It should show information for a single container. Otherwise, the person who is looking at the results gets the impression that he has to fix all these issues. This is something that they can improve."
"While Palo Alto has understood the essence of building capabilities around cloud technology and have come up with a CASB offering, that is a very new product. There are other companies that have better offerings for understanding cloud applications and have more graceful controls. That's something that Palo Alto needs to work on."
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
Netskope is ranked 4th in Secure Access Service Edge (SASE) with 35 reviews while Prisma Access by Palo Alto Networks is ranked 1st in Secure Access Service Edge (SASE) with 58 reviews. Netskope is rated 8.4, while Prisma Access by Palo Alto Networks is rated 8.2. The top reviewer of Netskope writes "Network proxy that provides visibility during deployment and allows you to control PII". On the other hand, the top reviewer of Prisma Access by Palo Alto Networks writes "Integration with Palo Alto platforms such as Cortex Data Lake and Autofocus gives us visibility into our attack surface". Netskope is most compared with Zscaler Internet Access, Microsoft Defender for Cloud Apps, Cisco Umbrella, Skyhigh Security and Forcepoint ONE, whereas Prisma Access by Palo Alto Networks is most compared with Zscaler Zero Trust Exchange, Cisco Umbrella, Zscaler Internet Access, Prisma SD-WAN and Microsoft Defender for Cloud Apps. See our Netskope vs. Prisma Access by Palo Alto Networks report.
See our list of best Secure Access Service Edge (SASE) vendors and best Cloud Access Security Brokers (CASB) vendors.
We monitor all Secure Access Service Edge (SASE) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.