3/7 in Cloud Access Security Broker

Response
Distribution
15Reviews

Palo Alto Networks

Prisma Cloud

By offering advanced data protection and consistency across clouds, Palo Alto Networks reins in the risks. Our products address your cloud access security broker, or CASB, needs and provide advanced capabilities in risk discovery, data loss prevention and advanced threat protection. Now, you can maintain compliance while preventing data leaks and business disruption through a fully cloud-delivered CASB deployment.

8.4

Composite Score

Composite
Score

8.4

CX Score

CX
Score

+87

Emotional Footprint

Emotional
Footprint

84%

Likeliness to Recommend

Likeliness
to Recommend

3/7 in Cloud Access Security Broker

Response
Distribution
15Reviews

This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us: 1-888-670-8889 (US) or 1-844-618-3192 (CAN)
Category Features
  • Access Control
  • |
  • Analytics and Reporting
  • |
  • Cloud Discovery
  • |
  • Cloud Security Posture Management
  • |
  • Data Loss Prevention
  • |
  • Encryption/Tokenization
  • |
  • IAM Integration
  • |
  • Inspect Data in Authorized App
  • |
  • Policy Management
  • |
  • Record Management
  • |
  • Threat Integration
  • |
  • User Behaviour Analytics
  • |
  • Web Content Filtering
  • |
  • Zero Trust

Report

Product Scorecard

A comprehensive report on a specific software product, aggregating feedback from real IT professionals and business leaders.

  • Net Promoter Score and Planned Renewal Rates
  • Feature and Vendor Capability Breakdown
  • Version and Module Satisfaction Levels
  • Comparisons by Organization Size, Usage, and Role

Word Cloud

As organizations become more and more dependent on software to automate and streamline operations, users are developing strong emotional connections to their applications and vendors. The SoftwareReviews word cloud aggregates the most commonly experienced pain points and prevailing opinions held by its users. Use this at-a-glance summary to evaluate the vendor-client relationship and product effectiveness.

Word Cloud legend

Product Scorecard

Dive Into Data

Explore every product feature, vendor capability, and so much more in our comprehensive Product Scorecard, giving you unparalleled insight into the software.

See Full Report

Product Reviews

  • -
  • 1
  • 2
  • 3
  • 4
Neutral
7 / 10

Information Technology

It just seems more user friendly than others

Vendor Capability Satisfaction

  • 3
  • Breadth of Features
  • 3
  • Quality of Features
  • 4
  • Product Strategy and Rate of Improvement
  • 3
  • Usability and Intuitiveness
  • 3
  • Vendor Support
  • 3
  • Ease of Data Integration
  • 3
  • Ease of IT Administration
  • 2
  • Ease of Customization
  • 3
  • Availability and Quality of Training
  • 3
  • Business Value Created
  • 3
  • Ease of Implementation

Product Feature Satisfaction

  • 3
  • Policy Management
  • 3
  • Encryption/Tokenization
  • 3
  • Record Management
  • 3
  • Access Control
  • 3
  • Inspect Data in Authorized App
  • 4
  • IAM Integration
  • 4
  • Analytics and Reporting
  • 4
  • Threat Integration
  • -
  • Data Loss Prevention
Recommends
9 / 10

Operations

fast and simple a good tool

Vendor Capability Satisfaction

  • 4
  • Business Value Created
  • 3
  • Breadth of Features
  • 4
  • Quality of Features
  • 4
  • Product Strategy and Rate of Improvement
  • 4
  • Usability and Intuitiveness
  • 3
  • Vendor Support
  • 3
  • Ease of Data Integration
  • 4
  • Ease of IT Administration
  • 4
  • Ease of Customization
  • 4
  • Availability and Quality of Training
  • 4
  • Ease of Implementation

Product Feature Satisfaction

  • 3
  • Policy Management
  • 4
  • Access Control
  • 4
  • Analytics and Reporting
  • 4
  • Data Loss Prevention
  • 4
  • Encryption/Tokenization
  • 4
  • IAM Integration
  • 4
  • Inspect Data in Authorized App
  • 4
  • Record Management
  • 4
  • Threat Integration
Neutral
8 / 10

Information Technology

Security throughout the lifecycle of a software

Vendor Capability Satisfaction

  • 3
  • Business Value Created
  • 4
  • Breadth of Features
  • 3
  • Quality of Features
  • 2
  • Product Strategy and Rate of Improvement
  • 3
  • Usability and Intuitiveness
  • 3
  • Vendor Support
  • 4
  • Ease of Data Integration
  • 4
  • Ease of IT Administration
  • 3
  • Ease of Customization
  • 3
  • Availability and Quality of Training
  • 4
  • Ease of Implementation

Product Feature Satisfaction

  • 3
  • Analytics and Reporting
  • 3
  • Cloud Discovery
  • 3
  • Policy Management
  • 3
  • Record Management
  • 3
  • Threat Integration
  • 3
  • User Behaviour Analytics
  • 3
  • Web Content Filtering
  • 4
  • Access Control
  • 4
  • Cloud Security Posture Management
  • 4
  • Data Loss Prevention
  • 4
  • Encryption/Tokenization
  • 4
  • IAM Integration
  • 4
  • Inspect Data in Authorized App
  • 4
  • Zero Trust
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019