www.peerspot.com
Open in
urlscan Pro
13.224.167.30
Public Scan
Submitted URL: http://peerspot.com/
Effective URL: https://www.peerspot.com/
Submission: On August 04 via manual from AU — Scanned from AU
Effective URL: https://www.peerspot.com/
Submission: On August 04 via manual from AU — Scanned from AU
Form analysis
2 forms found in the DOMGET /search
<form action="/search" accept-charset="UTF-8" method="get">
<div class="search-close"><i class="far fa-times"></i></div><input id="search" name="search" placeholder="Search products or topics" value="" autocomplete="off"><input type="hidden" name="page" id="search-page" value="1" autocomplete="off">
<div class="search-submit"><i class="submit-form far fa-search"></i></div>
</form>
GET /search
<form action="/search" accept-charset="UTF-8" method="get">
<div class="search-close"><i class="far fa-times"></i></div><input id="search" name="search" placeholder="Search products or topics" value="" autocomplete="off"><input type="hidden" name="page" id="search-page" value="1" autocomplete="off">
<div class="search-submit"><i class="submit-form far fa-search"></i></div>
</form>
Text Content
height="0" width="0" style="display:none;visibility:hidden"> * * Home * Categories All-Flash Storage Vendors Application Security Tools Backup and Recovery Software EDR Tools Endpoint Protection Software Firewalls Hyper Converged Infrastructure Vendors RPA Tools SD-WAN Vendors SIEM Tools Featured Categories All Categories * Comparisons OPNsense vs. pfSense Cisco Secure Firewall vs. Fortinet FortiGate Cloudflare DNS vs. Quad9 Checkmarx vs. SonarQube Jira vs. Microsoft Azure DevOps Hyper-V vs. VMware vSphere Figma vs. Miro Microsoft Intune vs. VMware Workspace ONE Aruba Wireless vs. Cisco Wireless Microsoft Power Automate vs. UiPath More Comparisons * For Vendors Learn More Get Listed Sign In BUYING INTELLIGENCE FOR ENTERPRISE TECHNOLOGY Reviews, Discussions, and Advice from Real Users RECENT REVIEWS Real users share their stories. No fake reviews. Prisma Access by Palo Alto Networks Nikolay Dimitrov Cyber Security Engineer at C-Serv Supports auto-scaling for mobile users and provides the ability to create custom threat signatures It can be improved if some customers want to use Prisma Access only for web traffic. Currently, it is a bit limited. Zscaler works better for web traffic. Zscaler's agent application on your computer can configure the proxy settings automatically, whereas Palo Alto's GlobalProtect agent is only a VPN solution. You can't use it also as a secure gateway agent to force the computer to have the settings to send the data to Prisma Access. They suggest using other techniques to force the computer to use Prisma Access for a secure web gateway solution. So, Zscaler is more like a secure web gateway, and Prisma Access is more like a full VPN solution. I see the limitations of both vendors. Palo Alto needs to improve the GlobalProtect agent to work as a secure web gateway agent, not only as a VPN agent because some companies would want only a secure gateway. They wouldn't want a full VPN. So, Palo Alto has to make the VPN agent work as a secure web gateway agent for those customers who want only the secure web gateway solution. Other vendors' agents, including ForcePoint which I don't like at all, can do that. One feature that I find missing in Prisma Access, as well as Palo Alto firewalls, is that they can't insert the 644 header. I want to be able to see the IP address of the users basically. My understanding is that almost no firewall can do this. It is not only Palo Alto, but it would be good to have this feature. The only vendor that I know can insert it is FortiGate, but with them, many other things don't work. Read full review Cisco Umbrella Drake Kapler Network Planning Associate at a manufacturing company with 1,001-5,000 employees We can see all of our locations in one place and only have to make changes once for all our locations One of the coolest features, for me at least, is to be able to type in a website and have it give an overall summary of how safe that website appears. Part of that is just so that we can investigate. And if there's any sort of confusion between our cyber team and us, we can look further into that site and dive more into that risk score that Umbrella gives us. We can just analyze [those sites] and make sure that we're unblocking safe sites and blocking sites that we deem could be harmful for our employees. I would say it provides single-pane-of-glass management. We still, of course, use those old WSAs, but in the long run, our plan is to get those replaced with Umbrella. We have locations in Japan, Korea, China. So it's a little bit more difficult to go through one proxy for all of those, especially because it's a bit slower. What's nice is, [with] Umbrella being in the cloud, we can just go into the site, see everything from the management console in that page. Nothing is slow [and] nothing is hosted by us so that we don't have to worry about network issues or management issues. Everything is just laid out right in front of us from the Umbrella dashboard on the internet, in the cloud. And that makes it super helpful for us to just manage all that from one spot across all of our locations across the world. We aren't a very big team, so that's the main thing. Going through filtering web traffic or blocking sites or unblocking sites, whatever we need to do, can be a bit tedious, especially when we have all these different locations and we would have to go into each location specifically to perform these tasks. Umbrella, being one pane for managing, being all-encompassing, allows us to quickly go in, make a change, and it applies to either every location, if we want it to, or we can have policies in place that only apply to certain users or certain computers. And that makes it super useful for us because we're not messing around with jumping into all these different locations and manually doing each and every one individually. It is extremely helpful for us and it improves efficiency exponentially. Read full review CyberArk Privileged Access Manager SatishIyer Assistant Vice President at a financial services firm with 10,001+ employees Lets you ensure relevant, compliant access in good time and with an audit trail, yet lacks clarity on MITRE ATT&CK When I was a component owner for PAM's Privileged Threat Analytics (PTA) component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a framework which has a comprehensive list of use cases. We reached out to the vendor and asked them how much coverage they have of the uses cases found on MITRE, which would have given us a better view of things while I was the product owner. Unfortunately they did not have the capability of mapping onto MITRE's framework at that time. PTA is essentially the monitoring interface of the broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's where you can capture your broker bypass and perform related actions. For this reason, we thought that this kind of mapping would be required, but CyberArk informed us that they did not have the capability we had in mind with regard to MITRE ATT&CK. I am not sure what the situation is now, but it would definitely help to have that kind of alignment with one of the more well-known frameworks like MITRE. For CyberArk as a vendor, it would also help them to clearly spell out in which areas they have full functionality and in which ares they have partial or none. Of course, it also greatly benefits the customers when they're evaluating the product. Read full review WANT TO SHARE YOUR OWN FEEDBACK ON TECH PRODUCTS? Add a review COMPARE SOLUTIONS Browse over 80,000 comparisons with reviews, buyer's guides, and more. Popular Comparisons OPNsense 16 Reviews pfSense 26 Reviews Cisco Secure Firewall 120 Reviews Fortinet FortiGate 109 Reviews Cloudflare DNS 11 Reviews Quad9 2 Reviews Checkmarx 24 Reviews SonarQube 31 Reviews Jira 89 Reviews Microsoft Azure DevOps 47 Reviews Hyper-V 39 Reviews VMware vSphere 64 Reviews Figma 2 Reviews Miro 2 Reviews Microsoft Intune 76 Reviews VMware Workspace ONE 33 Reviews Aruba Wireless 50 Reviews Cisco Wireless 39 Reviews Microsoft Power Automate 50 Reviews UiPath 255 Reviews See all comparisons JOIN 724,000 ENTERPRISE TECH PROFESSIONALS SHARING ADVICE WITH PEERS Sign Up REAL, RELEVANT REVIEWS Every reviewer is verified as a real user of the product within the last 12 months. If we aren’t sure it’s real, we won’t publish it. THE FULL PICTURE At an average of 600 words per review, our reviews are in-depth and will always include both pros and cons so that buyers can make an informed decision. A COMMUNITY OF EXPERTS PeerSpot is about more than reviews - users can ask for and share advice with peers throughout their buying process. WE ALSO BRIDGE THE GAP BETWEEN VENDORS AND BUYERS PeerSpot helps vendors reach buyers through the voice of their customers. We help vendors capture and leverage the authentic product feedback that users want to see when they’re conducting product research and due diligence. Find out more POPULAR CATEGORIES * APM * SIEM * Firewalls * Business Intelligence * All-Flash Storage * Endpoint Protection for Business * HCI * PaaS Clouds * Backup and Recovery Software * Network Monitoring Software Datadog 103 Reviews 2,632 Followers Datadog Cloud Monitoring Software Dynatrace 25 Reviews 6,223 Followers Dynatrace Application Performance Monitoring (APM) and Observability New Relic 33 Reviews 6,178 Followers New Relic Application Performance Monitoring (APM) and Observability AppDynamics 28 Reviews 6,269 Followers AppDynamics Application Performance Monitoring (APM) and Observability Azure Monitor 26 Reviews 157 Followers Azure Monitor Application Performance Monitoring (APM) and Observability ITRS Geneos 10 Reviews 1,854 Followers ITRS Geneos Application Performance Monitoring (APM) and Observability Grafana 30 Reviews 171 Followers Grafana Application Performance Monitoring (APM) and Observability Elastic Observability 9 Reviews 44 Followers Elastic Observability Application Performance Monitoring (APM) and Observability Splunk ITSI (IT Service Int... 12 Reviews 34 Followers Splunk ITSI (IT Service Intellig... Application Performance Monitoring (APM) and Observability Splunk Enterprise Security 58 Reviews 9,420 Followers Splunk Enterprise Security Security Information and Event Management (SIEM) Microsoft Sentinel 56 Reviews 214 Followers Microsoft Sentinel Security Information and Event Management (SIEM) IBM Security QRadar 54 Reviews 6,735 Followers IBM Security QRadar Security Information and Event Management (SIEM) Elastic Security 23 Reviews 735 Followers Elastic Security Log Management Wazuh 25 Reviews 57 Followers Wazuh Log Management LogRhythm SIEM 28 Reviews 6,436 Followers LogRhythm SIEM Security Information and Event Management (SIEM) Securonix Next-Gen SIEM 15 Reviews 1,850 Followers Securonix Next-Gen SIEM Security Information and Event Management (SIEM) Devo 12 Reviews 401 Followers Devo Log Management Fortinet FortiSIEM 28 Reviews 2,322 Followers Fortinet FortiSIEM Security Information and Event Management (SIEM) Fortinet FortiGate 109 Reviews 16K Followers Fortinet FortiGate Firewalls pfSense 26 Reviews 12K Followers pfSense Firewalls Cisco Secure Firewall 120 Reviews 14K Followers Cisco Secure Firewall Firewalls OPNsense 16 Reviews 1,537 Followers OPNsense Firewalls Check Point NGFW 128 Reviews 1,053 Followers Check Point NGFW Firewalls Palo Alto Networks NG Firew... 82 Reviews 1,472 Followers Palo Alto Networks NG Firewalls Firewalls Sophos XG 62 Reviews 2,528 Followers Sophos XG Firewalls Fortinet FortiGate-VM 38 Reviews 513 Followers Fortinet FortiGate-VM Firewalls Perimeter 81 18 Reviews 82 Followers Perimeter 81 ZTNA as a Service Microsoft BI 113 Reviews 12K Followers Microsoft BI BI (Business Intelligence) Tools Tableau 65 Reviews 13K Followers Tableau BI (Business Intelligence) Tools Amazon QuickSight 14 Reviews 518 Followers Amazon QuickSight BI (Business Intelligence) Tools Oracle OBIEE 29 Reviews 10K Followers Oracle OBIEE Legacy BI Tools SAP Analytics Cloud 29 Reviews 373 Followers SAP Analytics Cloud BI (Business Intelligence) Tools SAP BusinessObjects Busines... 31 Reviews 6,543 Followers SAP BusinessObjects Business Int... Legacy BI Tools IBM Cognos 18 Reviews 6,175 Followers IBM Cognos Legacy BI Tools MicroStrategy 11 Reviews 6,243 Followers MicroStrategy BI (Business Intelligence) Tools Oracle Analytics Cloud 11 Reviews 391 Followers Oracle Analytics Cloud BI (Business Intelligence) Tools Dell PowerStore 35 Reviews 272 Followers Dell PowerStore NVMe All-Flash Storage Arrays Dell Unity XT 45 Reviews 2,768 Followers Dell Unity XT All-Flash Storage Pure Storage FlashArray 41 Reviews 4,708 Followers Pure Storage FlashArray All-Flash Storage NetApp AFF 30 Reviews 4,775 Followers NetApp AFF All-Flash Storage HPE Nimble Storage 25 Reviews 4,396 Followers HPE Nimble Storage All-Flash Storage IBM FlashSystem 35 Reviews 2,337 Followers IBM FlashSystem NAS Dell PowerMax NVMe 23 Reviews 357 Followers Dell PowerMax NVMe NVMe All-Flash Storage Arrays HPE 3PAR StoreServ 24 Reviews 5,878 Followers HPE 3PAR StoreServ All-Flash Storage HPE Primera 18 Reviews 63 Followers HPE Primera All-Flash Storage Microsoft Defender for Endp... 99 Reviews 3,983 Followers Microsoft Defender for Endpoint EPP (Endpoint Protection for Business) CrowdStrike Falcon 50 Reviews 4,156 Followers CrowdStrike Falcon EDR (Endpoint Detection and Response) SentinelOne Singularity Com... 57 Reviews 2,902 Followers SentinelOne Singularity Complete Anti-Malware Tools Cortex XDR by Palo Alto Net... 40 Reviews 984 Followers Cortex XDR by Palo Alto Networks EPP (Endpoint Protection for Business) Intercept X Endpoint 35 Reviews 290 Followers Intercept X Endpoint EPP (Endpoint Protection for Business) Symantec Endpoint Security 42 Reviews 4,567 Followers Symantec Endpoint Security EPP (Endpoint Protection for Business) Check Point Harmony Endpoint 48 Reviews 973 Followers Check Point Harmony Endpoint EPP (Endpoint Protection for Business) Kaspersky Endpoint Security... 32 Reviews 1,303 Followers Kaspersky Endpoint Security for ... EPP (Endpoint Protection for Business) Cisco Secure Endpoint 17 Reviews 273 Followers Cisco Secure Endpoint EPP (Endpoint Protection for Business) VxRail 47 Reviews 4,347 Followers VxRail HCI Nutanix Cloud Infrastructur... 88 Reviews 7,916 Followers Nutanix Cloud Infrastructure (NCI) HCI VMware vSAN 58 Reviews 7,348 Followers VMware vSAN HCI HPE SimpliVity 39 Reviews 6,425 Followers HPE SimpliVity HCI StarWind Virtual SAN 88 Reviews 665 Followers StarWind Virtual SAN Software Defined Storage (SDS) StarWind HyperConverged App... 40 Reviews 361 Followers StarWind HyperConverged Appliance Software Defined Storage (SDS) Cisco HyperFlex HX-Series 24 Reviews 2,521 Followers Cisco HyperFlex HX-Series HCI DataCore SANsymphony 13 Reviews 493 Followers DataCore SANsymphony Software Defined Storage (SDS) Sangfor HCI - Hyper Converg... 17 Reviews 116 Followers Sangfor HCI - Hyper Converged In... Cloud Management Microsoft Azure 88 Reviews 5,540 Followers Microsoft Azure Infrastructure as a Service Clouds (IaaS) Amazon AWS 93 Reviews 5,743 Followers Amazon AWS Infrastructure as a Service Clouds (IaaS) OpenShift 28 Reviews 1,331 Followers OpenShift PaaS Clouds Oracle Cloud Platform 18 Reviews 3,387 Followers Oracle Cloud Platform PaaS Clouds SAP Cloud Platform 20 Reviews 1,115 Followers SAP Cloud Platform PaaS Clouds Google Cloud 46 Reviews 229 Followers Google Cloud Infrastructure as a Service Clouds (IaaS) Salesforce Platform 39 Reviews 2,685 Followers Salesforce Platform PaaS Clouds IBM Public Cloud 5 Reviews 1,540 Followers IBM Public Cloud PaaS Clouds Pivotal Cloud Foundry 9 Reviews 548 Followers Pivotal Cloud Foundry PaaS Clouds Veeam Backup & Replication 102 Reviews 7,808 Followers Veeam Backup & Replication Backup and Recovery Zerto 103 Reviews 2,443 Followers Zerto Disaster Recovery (DR) Software Commvault Complete Data Pro... 39 Reviews 4,975 Followers Commvault Complete Data Protection Backup and Recovery Rubrik 21 Reviews 3,597 Followers Rubrik Backup and Recovery Cohesity DataProtect 19 Reviews 2,226 Followers Cohesity DataProtect Backup and Recovery Nakivo 38 Reviews 187 Followers Nakivo Backup and Recovery Veritas NetBackup 30 Reviews 3,794 Followers Veritas NetBackup Backup and Recovery Azure Backup 22 Reviews 122 Followers Azure Backup Backup and Recovery Acronis Cyber Protect 35 Reviews 4,134 Followers Acronis Cyber Protect Cloud Backup Zabbix 34 Reviews 4,856 Followers Zabbix Network Monitoring Software Datadog 103 Reviews 2,632 Followers Datadog Cloud Monitoring Software SolarWinds NPM 45 Reviews 4,673 Followers SolarWinds NPM Network Monitoring Software Auvik 97 Reviews 147 Followers Auvik Network Monitoring Software PRTG Network Monitor 40 Reviews 4,183 Followers PRTG Network Monitor Network Monitoring Software Nagios XI 13 Reviews 6,474 Followers Nagios XI IT Infrastructure Monitoring New Relic 33 Reviews 6,178 Followers New Relic Application Performance Monitoring (APM) and Observability Nagios Core 15 Reviews 441 Followers Nagios Core Network Monitoring Software Meraki Dashboard 28 Reviews 299 Followers Meraki Dashboard Network Monitoring Software See all categories POPULAR QUESTIONS IN OUR COMMUNITY it_user453030 User Vendor PaaS Clouds Aug 02, 2023 Looking for a cost comparison evaluation for PaaS platforms 19 3 167 it_user732480 Storage and Backup Engineer at a energy/utilities company with 10,001+ employees Real User Enterprise Architecture Management Jul 26, 2023 Tools to Develop and Manage IT Infrastructure Road-maps 17 14 44 SS Sujit Sharma Information Security Engineer at a tech services company with 1,001-5,000 employees MSP Web Application Firewall (WAF) SiteLock ImmuniWeb Jul 27, 2023 What do you recommend for a securing Web Application? 14 10 158 JN JayN User at NCG User Firewalls Jul 27, 2023 Which firewall solution would you recommend for an SMB with 50 employees and around 100 devices? 14 6 217 As seen in: Popular Categories APMSIEMFirewallsBusiness IntelligenceAll-Flash StorageEndpoint Protection for BusinessHCIPaaS CloudsBackup and Recovery SoftwareNetwork Monitoring SoftwareSee more Solutions DatadogSplunk Enterprise SecurityFortinet FortiGateMicrosoft BIDell PowerStoreMicrosoft Defender for EndpointVxRailMicrosoft AzureVeeam Backup & ReplicationZabbixSee more Common Comparisons OPNsense vs. pfSenseCisco Secure Firewall vs. Fortinet FortiGateCloudflare DNS vs. Quad9Checkmarx vs. SonarQubeJira vs. Microsoft Azure DevOpsHyper-V vs. VMware vSphereFigma vs. MiroMicrosoft Intune vs. VMware Workspace ONEAruba Wireless vs. Cisco WirelessMicrosoft Power Automate vs. UiPathSee more Users Provide a ReviewInfo for VendorsAdd a ProductHelp & FAQ Company About UsBlogNewsCareersContact Policies PrivacyCookiesTerms of UseGuidelines © 2023 PeerSpot, All Rights Reserved. TwitterFacebookLinkedInYouTube PRIVACY PREFERENCE CENTER This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. ANALYTICAL COOKIES Always Active These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. FUNCTIONAL COOKIES Always Active These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. TARGETING COOKIES Always Active These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Back Button PERFORMANCE COOKIES Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Confirm My Choices