We performed a comparison between Prisma Access by Palo Alto Networks and Symantec Endpoint Protection Mobile based on real PeerSpot user reviews.
Find out what your peers are saying about Palo Alto Networks, Cisco, Zscaler and others in Secure Access Service Edge (SASE)."The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"The solution is stable."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"Prisma integrates well with Cortex XDR and Cortex Data Lake. My company has been also using Prisma Access in-house for nearly a year, and it integrates seamlessly."
"It protects all app traffic so that users can gain access to all apps. Unlike other solutions that only work from ports 80 and 443, which are predominantly for web traffic, Prisma Access covers all protocols and works on all traffic patterns... The most sophisticated attacks can arise from sources that are not behind 80/443."
"A feature I've found very helpful is run time security because most of the products on the market will look at security during the build time, and they don't really look at what happens once you're going into production."
"The protection for web-based applications was helpful for my colleagues who didn't want a particular application on their devices. And the non-web access protection was more for our developers because they were writing and building code on their computers. Prisma Access was able to protect them."
"It has predefined or preconfigured rules, which are getting periodically updated. They are providing continuous improvements and periodically updating all search queries that they are looking for. That is one thing that helps us to stay vigilant and focused. If we query our AWS account for any breaches or vulnerabilities with any of the cloud tests, and it alerts us based on these predefined rules. It also provides an option to configure our own rules, and based on these rules, it can query the cloud trail logs, pull the information, and trigger alerts in real-time. I haven't explored this feature much because there are multiple accounts, and we don't have enough time to explore this feature. It also provides multiple integrations. When vulnerabilities or breaches are happening, you should be aware of them immediately. It provides integration with tools such as Slack, PagerDuty so that you can get alerted as soon as the high severity stuff comes up. For example, you have a security group that has allowed public traffic on port 22. As TechOps, you should be aware of this immediately. You cannot scan each machine or look into all security groups to identify it. So, Prisma helps us and alerts us when this kind of high-priority stuff comes up. It has different statistics, analytics, and graphs for data. The description of alerts is also pretty good. They describe what are the possible causes for this and what are the solutions. From Prisma Cloud, you can directly go to the AWS account. When you click on an alert, a resource, or a resource ID, it takes you to the AWS console where you need to log in. If you are already logged in, it will take you to that instance directly, and you can fix the issue there. I have found this feature very useful."
"Monitoring is the most valuable feature because we can easily monitor all kinds of stuff coming over the network. We can check the dashboard and work accordingly."
"There is a system for monitoring the traffic. You can monitor the traffic of the connected people and point out any issues on the connection part."
"It is easy to use, easy to integrate, and is stable. It's scalable as well."
"Integration is good. You can integrate them with an off-brand endpoint solution. It has quite a few integration features you can use."
"The user interface is good. Managing and monitoring tools are also good."
"The biggest advantage it has is the VPN product that is incorporated into the solution."
"One of the features I found very nice in Symantec Endpoint Protection Mobile is that it's good at scanning and fixing issues on its own. The solution is very good at finding a lot of applications and notifying you about systems that have issues. Symantec Endpoint Protection Mobile can run headless without having to report back which I found very nice about it. I also like that the solution would create alerts when a certain amount of time lapsed for systems, and it would recommend going through and scanning the systems. As an actual endpoint protection product, Symantec Endpoint Protection Mobile is good."
"The most valuable feature is to be able to power up a device and wipe the data remotely."
"Your endpoint protection depends on the signature piece, so it's mainly for virus and malware protection, as well as also to control devices and applications."
"Symantec Endpoint Protection Mobile is very easy to deploy, and it is really easy to set up the policies."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"From any improvement perspective, the product's compatibility issues with Linux need to be resolved."
"I would like to see better pricing and an easier logging process. Also, if there was a way to log a global log, everything could go onto the system. It would be better if there was a third log, otherwise one would have to do everything manually."
"It's not really Prisma's fault, but when you try to create exceptions you don't really have those abilities. You cannot say, on the management platform, "Hey, for these users I want to create these exceptions." That is one thing that I have gotten some complaints about, and we have faced some challenges there."
"The initial support team is not very good. Most of the time, I have found that they are one to three years experienced only. They don't have network expertise. They know about Palo Alto products but don't know how to troubleshoot the issues. We have to guide them most of the time to troubleshoot correctly since their approach is not developed."
"The tools' scalability is subject to some limitations when done on-premise due to the need for additional licenses. However, in other scenarios, increasing scalability involves expanding infrastructure to accommodate more third-party VPN access. It is scalable as long as you pay the money. Also, it needs to improve security."
"When we deploy firewall rules via Panorama, we find it's a little bit slow. We have a global environment and might have 100 gateways or VPNs in the cloud. When we deploy something, it tries to deploy it one-by-one, and that can be slow."
"While Palo Alto has understood the essence of building capabilities around cloud technology and have come up with a CASB offering, that is a very new product. There are other companies that have better offerings for understanding cloud applications and have more graceful controls. That's something that Palo Alto needs to work on."
"The user interface could be better. They need to work a little bit on the console. It is similar to their firewalls but not exactly. They need to clean it up a bit."
"When there is an attack attempt on mobile, there doesn't seem to be much of a notification."
"Application and device control needs to be improved. We also need to enhance login features for management to have good visibility of the events."
"Having better, real-time support would be an improvement over having to send an email."
"It would be nice to have more flexibility regarding deployment."
"I'm not sure if there's anything lacking; I personally don't use the solution too much, so I'd have to look at it a bit and do some more research. I'm more on the operation side of things."
"The price is too expensive for the Egyptian market here. Compared to other products or the other competition here in the local market, they need to be more competitive cost-wise."
"For a lot of the issues my team experienced from Symantec Endpoint Protection Mobile, Symantec said that getting the issues resolved would mean going through the partner that sold the product and creating an incident report to get the team to work on the actual company environment. A lot of the problems my team has been having from Symantec Endpoint Protection Mobile were associated with Outlook for endpoint users who were being locked out of the Outlook application. Another area for improvement in Symantec Endpoint Protection Mobile is its central web hub, where you're supposed to be able to update all of the endpoints because it wasn't reaching the endpoints. For example, even if the central web hub was able to see the endpoints and do the required scans, whenever you'd go to do a policy change, the policy change wouldn't propagate down to the endpoints. The central web hub allows you to monitor all of your endpoints and allows you to choose actions you'd want to do to each of the endpoints such as pushing down on updates or scanning the system. The problem my team usually gets is that majority of the time, whenever my team would do policy updates, the updates won't propagate down to the users, so it was very inconsistent. Needing to manually go through and scan systems is also an area for improvement in Symantec Endpoint Protection Mobile. Currently, there's no way to automate its scanning process. A lot of the other issues started appearing in Symantec Endpoint Protection Mobile during situations when people wanted to customize different applications. Symantec doesn't like people doing a lot of customizations. For example, the main problem in my company is users losing access to Outlook, but then my team discovered that there was a specific policy set that you could disable, and it would fix a lot of the Outlook issues. However, when you'd go to change that policy set and attach that to a user to overwrite policies on the user side, it just wouldn't do anything for that user. It wouldn't even show that the policy was updated, so this is what needs to be improved in Symantec Endpoint Protection Mobile."
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
More Symantec Endpoint Protection Mobile Pricing and Cost Advice →
Prisma Access by Palo Alto Networks is ranked 1st in Secure Access Service Edge (SASE) with 59 reviews while Symantec Endpoint Protection Mobile is ranked 5th in Mobile Threat Defense with 7 reviews. Prisma Access by Palo Alto Networks is rated 8.2, while Symantec Endpoint Protection Mobile is rated 7.2. The top reviewer of Prisma Access by Palo Alto Networks writes "Integration with Palo Alto platforms such as Cortex Data Lake and Autofocus gives us visibility into our attack surface". On the other hand, the top reviewer of Symantec Endpoint Protection Mobile writes "An easy-to-deploy solution for mobile devices that has high stability and scalability". Prisma Access by Palo Alto Networks is most compared with Netskope , Zscaler Zero Trust Exchange, Cisco Umbrella, Zscaler Internet Access and Prisma SD-WAN, whereas Symantec Endpoint Protection Mobile is most compared with VMware Workspace ONE.
We monitor all Secure Access Service Edge (SASE) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.