We performed a comparison between Ivanti Connect Secure and Prisma Access by Palo Alto Networks based on real PeerSpot user reviews.
Find out in this report how the two Enterprise Infrastructure VPN solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The solution has good performance."
"It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled."
"I can safely say this is one of the best solutions I have seen for VPN access. It can achieve what other vendors may not be able to. This product will train you about exactly what an SSL should be. You can leverage it to do whatever you wish, the way you wish to do it. This is the solution if you want a perfectly scalable product for your enterprise that can help your mobile users and integrate with the latest technologies."
"The most valuable features of Pulse Connect Secure are multi-factor authentications, and VPNs and SSL VPNs we are using."
"It's a very convenient and user-friendly application."
"From an end-user perspective, the setup phase is easy."
"The initial setup is straightforward."
"It is customer-friendly. It is quite easy for our users to connect. There is also the flexibility of the features."
"The best feature of Pulse Connect Secure is the good security it provides. It gives a secure connection to your network."
"The tool's most valuable feature is remote access."
"Its hands-off security and the fact that we don't have to maintain it are the most valuable features."
"The remediation process is easy compared to other platforms."
"Security is absolutely spot-on, really top-notch. It's the result of all the components that come together, such as the HIP [Host Information Profile] and components like Forcepoint, providing end-user content inspection, and antivirus. It incorporates DLP features and that's fantastic because Prisma Access makes sure that all of the essential prerequisites are in place before a user can log in or can be tunneled into."
"The solution's most valuable features were the model's reduced complexity on the client side and its capability to provide security."
"The solution is not very complex and is easy to manage for people who may or may not have knowledge about Palo Alto Networks."
"The performance is good."
"Being able to use the user ID or Active Directory Group is one of the great features for control and providing more flexibility without worrying about IP addresses."
"We have an application called ADEM that helps us troubleshoot network-related issues. It helps us to isolate an issue whether it is on the ISP level, endpoint level, or system access level."
"There must be a more easy-to-use GUI."
"User experience and after-sales support could be better. For example, over the last couple of years, when this COVID scenario was going on, there were multiple attacks on these types of solutions. SQL has been attacked numerous times, and there were a lot of vulnerabilities, and our customers had to update and upgrade the devices every two weeks or every month. This was a headache. It could also be more scalable."
"Pulse Connect Secure could improve the reporting, it is lacking in detail and should take the report automatically."
"An area for improvement in Pulse Connect Secure is the concurrent connections, particularly needing a license if you want to use Pulse Connect Secure with your Microsoft or Windows machine."
"The solution can be improved by addressing the failure to connect on public 2-step networks."
"Zero test FDP (Fraud Protection and Prevention) should be improved."
"The solution must be more user-friendly."
"The most valuable features of Pulse Connect Secure are the user-friendly connection and interconnecting."
"Connection-wise, Pulse Connect Secure could be faster, and this is its area for improvement."
"Its security is good. Everything is good, but the way the dashboard responds can be improved. It takes time to implement a policy. If you change only two or three lines and push the policy to make the change work, it takes 20 to 30 minutes even for a small change. That is something very irritating from the implementation perspective."
"It would be nice to manage Prisma Access through the cloud instead of through Panorama. You can use the cloud version to monitor Prisma Access, but it doesn't have all the features yet, and it's not 100% done."
"It is a managed firewall. When you run into issues and have to troubleshoot, there is a fair amount of restriction. You run into a couple of restrictions where you don't have any visibility on what is happening on the Palo Alto managed infrastructure, and you need to get on a call to get technical assistance from Palo Alto's technical support. You have to get them to work with you to fix the problem. I would definitely like them to work on the visibility into what happens inside Palo Alto's infrastructure. It is not about getting our hands onto their infrastructure to do troubleshooting or fixing problems; it is just about getting more visibility. This will help us in guiding technical support folks to the area where they need to work."
"The tools' scalability is subject to some limitations when done on-premise due to the need for additional licenses. However, in other scenarios, increasing scalability involves expanding infrastructure to accommodate more third-party VPN access. It is scalable as long as you pay the money. Also, it needs to improve security."
"The documentation is generally good, but they could provide a more detailed description of all the configuration steps. I have to search for information or call support. Palo Alto could add more knowledge base articles about configuration with screenshots and walkthroughs. That would be helpful. When configuring a product, you want to see examples of how it is done."
"We are using the SaaS offering. We use our applications for microservices. We use Twistlock to scan containers, and it displays these results in Prisma, which is a good feature because we can see vulnerabilities with respect to these containers. We can see everything in a very detailed manner. However, when you have different environments for a single application, such as DEV, QA, PROD, and TEST, all these environments run multiple containers, which can lead to a very high number of containers. In such a scenario, it shows you the alerts for all those containers that have vulnerabilities. If you show the results of all the containers that share the same image, it is not going to add any value. Therefore, they should narrow down the alerts based on a container. It should show information for a single container. Otherwise, the person who is looking at the results gets the impression that he has to fix all these issues. This is something that they can improve."
"When it comes to integration mechanisms, Prisma SaaS does not support reverse proxy type of integrations."
"The user interface could be better. They need to work a little bit on the console. It is similar to their firewalls but not exactly. They need to clean it up a bit."
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
Ivanti Connect Secure is ranked 7th in Enterprise Infrastructure VPN with 26 reviews while Prisma Access by Palo Alto Networks is ranked 5th in Enterprise Infrastructure VPN with 59 reviews. Ivanti Connect Secure is rated 7.8, while Prisma Access by Palo Alto Networks is rated 8.2. The top reviewer of Ivanti Connect Secure writes "Beneficial multi-factor authentications, useful SSL VPNs, and simple initial setup". On the other hand, the top reviewer of Prisma Access by Palo Alto Networks writes "Integration with Palo Alto platforms such as Cortex Data Lake and Autofocus gives us visibility into our attack surface". Ivanti Connect Secure is most compared with Fortinet FortiClient, Cisco AnyConnect Secure Mobility Client, OpenVPN Access Server, Ivanti Tunnel and F5 BIG-IP Access Policy Manager (APM), whereas Prisma Access by Palo Alto Networks is most compared with Netskope , Zscaler Zero Trust Exchange, Cisco Umbrella, Zscaler Internet Access and Prisma SD-WAN. See our Ivanti Connect Secure vs. Prisma Access by Palo Alto Networks report.
See our list of best Enterprise Infrastructure VPN vendors.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.