We performed a comparison between Prisma Access by Palo Alto Networks and Symantec Endpoint Protection Mobile based on real PeerSpot user reviews.
Find out what your peers are saying about Palo Alto Networks, Cisco, Zscaler and others in Secure Access Service Edge (SASE)."The solution is stable."
"The protection offered by the product is the most valuable feature. It detects vulnerabilities or traps on our users' phones and then prompts them to clean up their devices. Tools we used previously would only discover, which required us to gather information on the backend, so Lookout is a welcome upgrade."
"On the outside, the main differentiation is because Lookout ingest. They have ingested basically all of the apps for the last ten years and all the versions of all the apps, and we have that in a corporate database that allows us to do very large-scale machine learning and analysis on that data set. That's not something that any of the competitors really have the capability to do because they don't have access to the data set. A lot of the apps you can no longer get them because that version of the app is five or six years old, and it just doesn't exist anywhere anymore, except within our infrastructure. So, the ability to have that very rich dataset and learn from that dataset is a real differentiator."
"The most valuable features are the antivirus as a whole, the anti-malware, and all of the protection features that scan our enterprise devices."
"The solution is not very complex and is easy to manage for people who may or may not have knowledge about Palo Alto Networks."
"It has predefined or preconfigured rules, which are getting periodically updated. They are providing continuous improvements and periodically updating all search queries that they are looking for. That is one thing that helps us to stay vigilant and focused. If we query our AWS account for any breaches or vulnerabilities with any of the cloud tests, and it alerts us based on these predefined rules. It also provides an option to configure our own rules, and based on these rules, it can query the cloud trail logs, pull the information, and trigger alerts in real-time. I haven't explored this feature much because there are multiple accounts, and we don't have enough time to explore this feature. It also provides multiple integrations. When vulnerabilities or breaches are happening, you should be aware of them immediately. It provides integration with tools such as Slack, PagerDuty so that you can get alerted as soon as the high severity stuff comes up. For example, you have a security group that has allowed public traffic on port 22. As TechOps, you should be aware of this immediately. You cannot scan each machine or look into all security groups to identify it. So, Prisma helps us and alerts us when this kind of high-priority stuff comes up. It has different statistics, analytics, and graphs for data. The description of alerts is also pretty good. They describe what are the possible causes for this and what are the solutions. From Prisma Cloud, you can directly go to the AWS account. When you click on an alert, a resource, or a resource ID, it takes you to the AWS console where you need to log in. If you are already logged in, it will take you to that instance directly, and you can fix the issue there. I have found this feature very useful."
"The scalability of the solution is excellent."
"Prisma Access by Palo Alto Networks is a seamless solution."
"The visibility perspective is pretty cool. If I want to know how much data is being used for a specific project, I can look at how much data has been used, from which region, and which users have been connected. That visibility is very good so that I can see how many licenses we have and how many are used."
"The initial setup is very straightforward."
"The most valuable feature is the ability to change the gateway. For example, if there's a problem with a specific region or vendor, we can make modifications. The solution is scalable, and there are different gateways that can be created depending on the demand."
"The tool's consolidation is pretty quick."
"The most valuable feature is to be able to power up a device and wipe the data remotely."
"Symantec Endpoint Protection Mobile is very easy to deploy, and it is really easy to set up the policies."
"Integration is good. You can integrate them with an off-brand endpoint solution. It has quite a few integration features you can use."
"The biggest advantage it has is the VPN product that is incorporated into the solution."
"Your endpoint protection depends on the signature piece, so it's mainly for virus and malware protection, as well as also to control devices and applications."
"The user interface is good. Managing and monitoring tools are also good."
"One of the features I found very nice in Symantec Endpoint Protection Mobile is that it's good at scanning and fixing issues on its own. The solution is very good at finding a lot of applications and notifying you about systems that have issues. Symantec Endpoint Protection Mobile can run headless without having to report back which I found very nice about it. I also like that the solution would create alerts when a certain amount of time lapsed for systems, and it would recommend going through and scanning the systems. As an actual endpoint protection product, Symantec Endpoint Protection Mobile is good."
"The stability depends on the service from where you access it. Because sometimes, the place you are in, you have Gateway. You don't have Gateway. The gateway is overutilized. At the end, you need to go through their gateways. And this is the key point here. You have a tracking point. If it's not well orchestrated, and it scales up as you add more to the existing team, you will suffer"
"Lookout was moving into the SSE space. And so their work on SecureWeb Gateway and SD-WAN is still sort of evolving."
"From the analysis that we've done, they do seem to be maybe a step behind in trying to enter the market with a new solution. But when they do pick up, they do come out with some good products."
"We just submitted an enhancement request reflecting the main area we want to see improvement in; the APIs. Currently, we're able to build dashboards, but it's somewhat backward because we use our MDM API to create them. Lookout should provide API to customers so we can query our data and use it in our cloud, and this is the only outstanding area for improvement with the product right now."
"The frequency of updates could be reduced."
"Prisma Access by Palo Alto Networks should consolidate the portals into a single portal. It is slow and takes more than ten seconds to load a page."
"It's not really Prisma's fault, but when you try to create exceptions you don't really have those abilities. You cannot say, on the management platform, "Hey, for these users I want to create these exceptions." That is one thing that I have gotten some complaints about, and we have faced some challenges there."
"One area for improvement is for them to stay on top of keeping their CVEs on their platform up to date."
"We've run into some challenges, having hit a lot of bugs over the past year in the deployment of GlobalProtect. We've had our fair share of issues that I haven't been happy with. We're working with the support organization to remediate them and waiting for updated releases. The response on getting the bugs fixed has not been what I would consider adequate for a product like this."
"Palo Alto Prisma 10 came out over a year ago. Palo Alto added this identity management feature. The legacy way Palo Alto selected which user is sitting on an IP address it passes through has been clunky."
"There is some particular traffic that the security team wants to filter out and apply their own policies and they cannot."
"Sometimes, you have these notifications sent out about changes in App-IDs, modifications in App-IDs, or even the introduction of entirely new App-IDs to replace. Sometimes, the recommendations are followed, but even then, when the package is installed on the firewall, it gets messed up. I remember a particular one was with Tableau, and suddenly, people weren't able to use Tableau, which is an analytics tool for business."
"It would be nice to have more flexibility regarding deployment."
"I'm not sure if there's anything lacking; I personally don't use the solution too much, so I'd have to look at it a bit and do some more research. I'm more on the operation side of things."
"Having better, real-time support would be an improvement over having to send an email."
"Application and device control needs to be improved. We also need to enhance login features for management to have good visibility of the events."
"For a lot of the issues my team experienced from Symantec Endpoint Protection Mobile, Symantec said that getting the issues resolved would mean going through the partner that sold the product and creating an incident report to get the team to work on the actual company environment. A lot of the problems my team has been having from Symantec Endpoint Protection Mobile were associated with Outlook for endpoint users who were being locked out of the Outlook application. Another area for improvement in Symantec Endpoint Protection Mobile is its central web hub, where you're supposed to be able to update all of the endpoints because it wasn't reaching the endpoints. For example, even if the central web hub was able to see the endpoints and do the required scans, whenever you'd go to do a policy change, the policy change wouldn't propagate down to the endpoints. The central web hub allows you to monitor all of your endpoints and allows you to choose actions you'd want to do to each of the endpoints such as pushing down on updates or scanning the system. The problem my team usually gets is that majority of the time, whenever my team would do policy updates, the updates won't propagate down to the users, so it was very inconsistent. Needing to manually go through and scan systems is also an area for improvement in Symantec Endpoint Protection Mobile. Currently, there's no way to automate its scanning process. A lot of the other issues started appearing in Symantec Endpoint Protection Mobile during situations when people wanted to customize different applications. Symantec doesn't like people doing a lot of customizations. For example, the main problem in my company is users losing access to Outlook, but then my team discovered that there was a specific policy set that you could disable, and it would fix a lot of the Outlook issues. However, when you'd go to change that policy set and attach that to a user to overwrite policies on the user side, it just wouldn't do anything for that user. It wouldn't even show that the policy was updated, so this is what needs to be improved in Symantec Endpoint Protection Mobile."
"When there is an attack attempt on mobile, there doesn't seem to be much of a notification."
"The price is too expensive for the Egyptian market here. Compared to other products or the other competition here in the local market, they need to be more competitive cost-wise."
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
More Symantec Endpoint Protection Mobile Pricing and Cost Advice →
Prisma Access by Palo Alto Networks is ranked 1st in Secure Access Service Edge (SASE) with 57 reviews while Symantec Endpoint Protection Mobile is ranked 5th in Mobile Threat Defense with 7 reviews. Prisma Access by Palo Alto Networks is rated 8.2, while Symantec Endpoint Protection Mobile is rated 7.2. The top reviewer of Prisma Access by Palo Alto Networks writes "Integration with Palo Alto platforms such as Cortex Data Lake and Autofocus gives us visibility into our attack surface". On the other hand, the top reviewer of Symantec Endpoint Protection Mobile writes "An easy-to-deploy solution for mobile devices that has high stability and scalability". Prisma Access by Palo Alto Networks is most compared with Zscaler Zero Trust Exchange, Netskope , Cisco Umbrella, Zscaler Internet Access and Prisma SD-WAN, whereas Symantec Endpoint Protection Mobile is most compared with VMware Workspace ONE.
We monitor all Secure Access Service Edge (SASE) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.