We performed a comparison between Google Cloud Platform Cloud Identity-Aware Proxy and Prisma Access by Palo Alto Networks based on real PeerSpot user reviews.
Find out in this report how the two ZTNA as a Service solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Functions well and has good features."
"The initial setup wasn't too difficult."
"The most valuable feature of the solution is the ease with which one can use it."
"Google Cloud Platform Cloud Identity-Aware Proxy is an easy-to-use solution."
"I can access the information whenever I want. It's integration is easy. The tool's GUI is easy to use with an IT background. The value benefits of using it include the ability to avoid storing data on local machines, reducing the risk of data loss"
"It is easy to integrate, especially if I consider the fact that it gives me a single dashboard where I have all the applications or apps displayed."
"Google Cloud Platform Cloud Identity-Aware Proxy is a scalable solution."
"The product's initial setup phase was straightforward."
More Google Cloud Platform Cloud Identity-Aware Proxy Pros →
"It has predefined or preconfigured rules, which are getting periodically updated. They are providing continuous improvements and periodically updating all search queries that they are looking for. That is one thing that helps us to stay vigilant and focused. If we query our AWS account for any breaches or vulnerabilities with any of the cloud tests, and it alerts us based on these predefined rules. It also provides an option to configure our own rules, and based on these rules, it can query the cloud trail logs, pull the information, and trigger alerts in real-time. I haven't explored this feature much because there are multiple accounts, and we don't have enough time to explore this feature. It also provides multiple integrations. When vulnerabilities or breaches are happening, you should be aware of them immediately. It provides integration with tools such as Slack, PagerDuty so that you can get alerted as soon as the high severity stuff comes up. For example, you have a security group that has allowed public traffic on port 22. As TechOps, you should be aware of this immediately. You cannot scan each machine or look into all security groups to identify it. So, Prisma helps us and alerts us when this kind of high-priority stuff comes up. It has different statistics, analytics, and graphs for data. The description of alerts is also pretty good. They describe what are the possible causes for this and what are the solutions. From Prisma Cloud, you can directly go to the AWS account. When you click on an alert, a resource, or a resource ID, it takes you to the AWS console where you need to log in. If you are already logged in, it will take you to that instance directly, and you can fix the issue there. I have found this feature very useful."
"It is geographically dispersed, and it sits on top of Google and AWS platforms. Therefore, you don't face the standard issues, such as latency or bandwidth issues, that you usually face in the case of on-prem data centers."
"Prisma Access provides comprehensive security. It provides URL filtering, application control, SSL, DLP, etc. It provides complete security for the cloud environment."
"The most valuable features of the solution stem from the fact that it offers stability and scalability while being a very secure product."
"It protects all app traffic so that users can gain access to all apps. Unlike other solutions that only work from ports 80 and 443, which are predominantly for web traffic, Prisma Access covers all protocols and works on all traffic patterns... The most sophisticated attacks can arise from sources that are not behind 80/443."
"The features I find most valuable is WildFire, user integration, and the basic technology features."
"Monitoring is the most valuable feature because we can easily monitor all kinds of stuff coming over the network. We can check the dashboard and work accordingly."
"The users can securely access any cloud data centers or cloud platforms. In terms of the features, it has all the features that Palo Alto Next-Generation Firewall has. It is also very stable and scalable."
"The solution could be more reasonably priced. We find it to be a bit expensive right now."
"The product’s user interface must be more user-friendly and detailed."
"Despite using GCP for all the resources, potential clusters on GCP caused difficulties."
"The storage capacity of the product is an area that can be improved if it is made possible to increase it whenever you want."
"They should include case studies to learn about the use cases."
"The solution is a bit complex and could be made easier to use."
"The cost of licenses could be better."
"The solution should have better integration."
More Google Cloud Platform Cloud Identity-Aware Proxy Cons →
"The price can be reduced to make it more competitive."
"The product's current price is an area of shortcoming where improvements are required."
"The user interface could be better. They need to work a little bit on the console. It is similar to their firewalls but not exactly. They need to clean it up a bit."
"Prisma's integration between operational technology and IT should be more seamless. Right now, it requires additional setup and maintenance."
"There is some particular traffic that the security team wants to filter out and apply their own policies and they cannot."
"Prisma Access by Palo Alto Networks should consolidate the portals into a single portal. It is slow and takes more than ten seconds to load a page."
"There is room for improvement in the multi-environment visibility, especially around containers."
"One thing that would help is if we could get a guide. With Cisco, for example, you can just type the problem regarding your Cisco product and you will easily get your solution. In Palo Alto, however, it's not easy to find the solutions."
More Google Cloud Platform Cloud Identity-Aware Proxy Pricing and Cost Advice →
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
Google Cloud Platform Cloud Identity-Aware Proxy is ranked 5th in ZTNA with 44 reviews while Prisma Access by Palo Alto Networks is ranked 2nd in ZTNA as a Service with 59 reviews. Google Cloud Platform Cloud Identity-Aware Proxy is rated 8.4, while Prisma Access by Palo Alto Networks is rated 8.2. The top reviewer of Google Cloud Platform Cloud Identity-Aware Proxy writes "User-friendly, easy to navigate, and intuitive interface". On the other hand, the top reviewer of Prisma Access by Palo Alto Networks writes "Integration with Palo Alto platforms such as Cortex Data Lake and Autofocus gives us visibility into our attack surface". Google Cloud Platform Cloud Identity-Aware Proxy is most compared with Cloudflare Access, Okta Workforce Identity, Zscaler Zero Trust Exchange, Cato SASE Cloud Platform and Cisco Duo, whereas Prisma Access by Palo Alto Networks is most compared with Netskope , Zscaler Zero Trust Exchange, Cisco Umbrella, Zscaler Internet Access and Prisma SD-WAN. See our Google Cloud Platform Cloud Identity-Aware Proxy vs. Prisma Access by Palo Alto Networks report.
See our list of best ZTNA as a Service vendors.
We monitor all ZTNA as a Service reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.