We performed a comparison between CloudCheckr and Prisma Cloud by Palo Alto Networks based on real PeerSpot user reviews.
Find out in this report how the two Cloud Management solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The initial setup is straightforward."
"The best feature I like about CloudCheckr CMx High Security is its simplicity. I love that it's not rocket science to use the solution. Even if you're not familiar with the cloud, you can easily figure out how to use CloudCheckr CMx High Security. You can use AWS, you can use Azure, and you can use GCP with the solution because the integration is quite simple. You can also use multi-cloud with it, and you could see the billing part. You'll have complete visibility into your cost which I love about the solution. I also love that data on any security issues and vulnerabilities are available on the go with CloudCheckr CMx High Security. You don't need to do anything different. Just run the scan and you'll have all these open findings in the tool, in terms of the priority level, so if it's critical, it will tell you, "It's critical," and you need to fix it right away."
"The solution is mostly stable."
"The recommendation section is pretty helpful."
"The most valuable feature of CloudCheckr CMx High Security is granular reporting. Additionally, the user interface is easy to use."
"It's one of the leading players for cloud optimization. It's hard to find anything better."
"It will automatically suggest areas for optimization."
"The solution is scalable for our purposes."
"As a pure-play CSPM, it is pretty good. From the data exposure perspective, Prisma Cloud does a fairly good job. Purely from the perspective of reading the conflicts, it is able to highlight any data exposures that I might be having."
"It supports the multi-cloud environment beautifully."
"The most valuable feature is the continuous cloud compliance monitoring and alerting."
"The most valuable feature is that the rule set is managed and that it can be run on a regularly scheduled basis."
"The policies that come prepackaged in the tool have been very valuable to us. They're accurate and they provide good guidance as to why the policy was created, as well as how to remediate anything that violates the policy."
"It has improved the overall collaboration between SecOps and DevOps. Now, instead of asking people to do something, it is a default offering in the CI/CD. There is less manual intervention and more seamless integration. It is why we don't have many dependencies across many teams, which is definitely a better state."
"It scans our containers in real time. Also, as they're built, it's looking into the container repository where the images are built, telling us ahead of time, "You have vulnerabilities here, and you should update this code before you deploy." And once it's deployed, it's scanning for vulnerabilities that are in production as the container is running."
"Configuration monitoring and alerting is the most valuable feature; it happens at the cloud's speed, allowing our development team to respond quickly. If a configuration goes against our security best practices, we're alerted promptly and can act to resolve the issue. As cloud security staff, we're not staring at the cloud all the time, and we want to let the developers do their jobs so that our company is protected and work is proceeding within our security controls."
"What needs to be improved in CloudCheckr CMx High Security is integration. All the clouds are going quite fast, for example, all the cloud providers: Microsoft, Google, etc. CloudCheckr CMx High Security is good with AWS, no doubt about it, but with Azure and Google Cloud, I find that the solution is slow in that direction. If the vendor planned for CloudCheckr CMx High Security to be automated just for AWS, then it does make sense. If not, if the vendor is also targeting good integration with Google and Microsoft, then CloudCheckr CMx High Security integration needs improvement, in particular, it has to be faster. At the moment, its integration with Azure is not as good as its integration with AWS. With GCP, integration is nowhere."
"Many features still need to be implemented in this tool."
"The reporting and analytic capabilities are very limited."
"CloudCheckr CMx High Security is complex. There are a lot of menus, and if you do not know what you are looking for you can get lost. However, the interface is self-explanatory. It's easy to understand where to go to get what you want."
"The solution must improve its user interface."
"The performance of the tool really needs to be improved."
"Self-healing could be a bit smoother and a bit cleaner, easier to access and more functional. That would help."
"The solution needs to work better with larger capacities of data."
"The UI could use some improvement; we usually find the information we're looking for, but what fields can be clicked on and what workflow to follow to get the required information is not always evident. Sometimes we're all over the place, clicking around to drill in and uncover the alert and investigation details we're looking for."
"They need to improve the API gateway."
"The integration of the Compute function into the cloud monitoring function—because those are two different tools that are being combined together—could use some more work. It still feels a little bit disjointed."
"We identified two things that we felt would be great to have, but they are under NDA. So, I can't disclose them. Other than those two things, we identified a generic bug in the secret key management service on AWS that needs to be fixed. We reported it to them, and we want them to fix it."
"In terms of improvement, there are some small things like hardening and making sure the Linux resources are deployed well but that's more at an operational level."
"Prisma Cloud supports generating CSV files, but I would also like it to generate PDF files for reporting."
"Areas like the deployment of their defenders and their central control need manual intervention. They should focus more on automation. They have a very generic case for small companies. However, for bigger companies to work, we have to do a lot of changes to our system to accommodate it. Therefore, they should change their system or deployment models so it can be easy to integrate into existing architectures."
"This solution is more AWS and Azure-centric. It needs to be more specific on the GCP side, which they are working on."
More Prisma Cloud by Palo Alto Networks Pricing and Cost Advice →
CloudCheckr is ranked 24th in Cloud Management with 8 reviews while Prisma Cloud by Palo Alto Networks is ranked 1st in Cloud Security Posture Management (CSPM) with 81 reviews. CloudCheckr is rated 7.6, while Prisma Cloud by Palo Alto Networks is rated 8.4. The top reviewer of CloudCheckr writes "Beneficial granular reporting, highly stable, and excellent support". On the other hand, the top reviewer of Prisma Cloud by Palo Alto Networks writes "The dashboard is very user-friendly and can be used to generate custom RQL based on user requirements". CloudCheckr is most compared with Azure Cost Management, AWS Trusted Advisor, Apptio One, VMware Aria Cost powered by CloudHealth and Cloudability, whereas Prisma Cloud by Palo Alto Networks is most compared with Wiz, Microsoft Defender for Cloud, Aqua Cloud Security Platform, AWS Security Hub and CrowdStrike Falcon Cloud Security. See our CloudCheckr vs. Prisma Cloud by Palo Alto Networks report.
We monitor all Cloud Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.