www.peerspot.com Open in urlscan Pro
13.224.167.30  Public Scan

Submitted URL: http://peerspot.com/
Effective URL: https://www.peerspot.com/
Submission: On August 04 via manual from AU — Scanned from AU

Form analysis 2 forms found in the DOM

GET /search

<form action="/search" accept-charset="UTF-8" method="get">
  <div class="search-close"><i class="far fa-times"></i></div><input id="search" name="search" placeholder="Search products or topics" value="" autocomplete="off"><input type="hidden" name="page" id="search-page" value="1" autocomplete="off">
  <div class="search-submit"><i class="submit-form far fa-search"></i></div>
</form>

GET /search

<form action="/search" accept-charset="UTF-8" method="get">
  <div class="search-close"><i class="far fa-times"></i></div><input id="search" name="search" placeholder="Search products or topics" value="" autocomplete="off"><input type="hidden" name="page" id="search-page" value="1" autocomplete="off">
  <div class="search-submit"><i class="submit-form far fa-search"></i></div>
</form>

Text Content

height="0" width="0" style="display:none;visibility:hidden">
 * 
 * Home
 * Categories
   All-Flash Storage Vendors
   Application Security Tools
   Backup and Recovery Software
   EDR Tools
   Endpoint Protection Software
   Firewalls
   Hyper Converged Infrastructure Vendors
   RPA Tools
   SD-WAN Vendors
   SIEM Tools
   Featured Categories
   All Categories
 * Comparisons
   OPNsense vs. pfSense
   Cisco Secure Firewall vs. Fortinet FortiGate
   Cloudflare DNS vs. Quad9
   Checkmarx vs. SonarQube
   Jira vs. Microsoft Azure DevOps
   Hyper-V vs. VMware vSphere
   Figma vs. Miro
   Microsoft Intune vs. VMware Workspace ONE
   Aruba Wireless vs. Cisco Wireless
   Microsoft Power Automate vs. UiPath
   More Comparisons
 * For Vendors
   Learn More
   Get Listed

Sign In


BUYING INTELLIGENCE
FOR ENTERPRISE TECHNOLOGY

Reviews, Discussions, and Advice from Real Users



RECENT REVIEWS

Real users share their stories. No fake reviews.
Prisma Access by Palo Alto Networks
Nikolay Dimitrov
Cyber Security Engineer at C-Serv

Supports auto-scaling for mobile users and provides the ability to create custom
threat signatures
It can be improved if some customers want to use Prisma Access only for web
traffic. Currently, it is a bit limited. Zscaler works better for web traffic.
Zscaler's agent application on your computer can configure the proxy settings
automatically, whereas Palo Alto's GlobalProtect agent is only a VPN solution.
You can't use it also as a secure gateway agent to force the computer to have
the settings to send the data to Prisma Access. They suggest using other
techniques to force the computer to use Prisma Access for a secure web gateway
solution. So, Zscaler is more like a secure web gateway, and Prisma Access is
more like a full VPN solution. I see the limitations of both vendors. Palo Alto
needs to improve the GlobalProtect agent to work as a secure web gateway agent,
not only as a VPN agent because some companies would want only a secure gateway.
They wouldn't want a full VPN. So, Palo Alto has to make the VPN agent work as a
secure web gateway agent for those customers who want only the secure web
gateway solution. Other vendors' agents, including ForcePoint which I don't like
at all, can do that. One feature that I find missing in Prisma Access, as well
as Palo Alto firewalls, is that they can't insert the 644 header. I want to be
able to see the IP address of the users basically. My understanding is that
almost no firewall can do this. It is not only Palo Alto, but it would be good
to have this feature. The only vendor that I know can insert it is FortiGate,
but with them, many other things don't work.
Read full review
Cisco Umbrella
Drake Kapler
Network Planning Associate at a manufacturing company with 1,001-5,000 employees

We can see all of our locations in one place and only have to make changes once
for all our locations
One of the coolest features, for me at least, is to be able to type in a website
and have it give an overall summary of how safe that website appears. Part of
that is just so that we can investigate. And if there's any sort of confusion
between our cyber team and us, we can look further into that site and dive more
into that risk score that Umbrella gives us. We can just analyze [those sites]
and make sure that we're unblocking safe sites and blocking sites that we deem
could be harmful for our employees. I would say it provides single-pane-of-glass
management. We still, of course, use those old WSAs, but in the long run, our
plan is to get those replaced with Umbrella. We have locations in Japan, Korea,
China. So it's a little bit more difficult to go through one proxy for all of
those, especially because it's a bit slower. What's nice is, [with] Umbrella
being in the cloud, we can just go into the site, see everything from the
management console in that page. Nothing is slow [and] nothing is hosted by us
so that we don't have to worry about network issues or management issues.
Everything is just laid out right in front of us from the Umbrella dashboard on
the internet, in the cloud. And that makes it super helpful for us to just
manage all that from one spot across all of our locations across the world. We
aren't a very big team, so that's the main thing. Going through filtering web
traffic or blocking sites or unblocking sites, whatever we need to do, can be a
bit tedious, especially when we have all these different locations and we would
have to go into each location specifically to perform these tasks. Umbrella,
being one pane for managing, being all-encompassing, allows us to quickly go in,
make a change, and it applies to either every location, if we want it to, or we
can have policies in place that only apply to certain users or certain
computers. And that makes it super useful for us because we're not messing
around with jumping into all these different locations and manually doing each
and every one individually. It is extremely helpful for us and it improves
efficiency exponentially.
Read full review
CyberArk Privileged Access Manager
SatishIyer
Assistant Vice President at a financial services firm with 10,001+ employees

Lets you ensure relevant, compliant access in good time and with an audit trail,
yet lacks clarity on MITRE ATT&CK
When I was a component owner for PAM's Privileged Threat Analytics (PTA)
component, what I wanted was a clear mapping to the MITRE ATT&CK framework, a
framework which has a comprehensive list of use cases. We reached out to the
vendor and asked them how much coverage they have of the uses cases found on
MITRE, which would have given us a better view of things while I was the product
owner. Unfortunately they did not have the capability of mapping onto MITRE's
framework at that time. PTA is essentially the monitoring interface of the
broker (e.g. Privileged Access Management, the Vault, CPM, PSM, etc.), and it's
where you can capture your broker bypass and perform related actions. For this
reason, we thought that this kind of mapping would be required, but CyberArk
informed us that they did not have the capability we had in mind with regard to
MITRE ATT&CK. I am not sure what the situation is now, but it would definitely
help to have that kind of alignment with one of the more well-known frameworks
like MITRE. For CyberArk as a vendor, it would also help them to clearly spell
out in which areas they have full functionality and in which ares they have
partial or none. Of course, it also greatly benefits the customers when they're
evaluating the product.
Read full review


WANT TO SHARE YOUR OWN FEEDBACK ON TECH PRODUCTS?

Add a review


COMPARE SOLUTIONS

Browse over 80,000 comparisons with reviews, buyer's guides, and more.
Popular Comparisons
OPNsense

16 Reviews
pfSense

26 Reviews
Cisco Secure Firewall

120 Reviews
Fortinet FortiGate

109 Reviews
Cloudflare DNS

11 Reviews
Quad9

2 Reviews
Checkmarx

24 Reviews
SonarQube

31 Reviews
Jira

89 Reviews
Microsoft Azure DevOps

47 Reviews
Hyper-V

39 Reviews
VMware vSphere

64 Reviews
Figma

2 Reviews
Miro

2 Reviews
Microsoft Intune

76 Reviews
VMware Workspace ONE

33 Reviews
Aruba Wireless

50 Reviews
Cisco Wireless

39 Reviews
Microsoft Power Automate

50 Reviews
UiPath

255 Reviews
See all comparisons


JOIN 724,000 ENTERPRISE TECH PROFESSIONALS SHARING ADVICE WITH PEERS

Sign Up


REAL, RELEVANT REVIEWS

Every reviewer is verified as a real user of the product within the last 12
months. If we aren’t sure it’s real, we won’t publish it.


THE FULL PICTURE

At an average of 600 words per review, our reviews are in-depth and will always
include both pros and cons so that buyers can make an informed decision.


A COMMUNITY OF EXPERTS

PeerSpot is about more than reviews - users can ask for and share advice with
peers throughout their buying process.


WE ALSO BRIDGE THE GAP BETWEEN VENDORS AND BUYERS

PeerSpot helps vendors reach buyers through the voice of their customers. We
help vendors capture and leverage the authentic product feedback that users want
to see when they’re conducting product research and due diligence.
Find out more


POPULAR CATEGORIES

 * APM
 * SIEM
 * Firewalls
 * Business Intelligence
 * All-Flash Storage
 * Endpoint Protection for Business
 * HCI
 * PaaS Clouds
 * Backup and Recovery Software
 * Network Monitoring Software

Datadog

103 Reviews
2,632 Followers
Datadog
Cloud Monitoring Software
Dynatrace

25 Reviews
6,223 Followers
Dynatrace
Application Performance Monitoring (APM) and Observability
New Relic

33 Reviews
6,178 Followers
New Relic
Application Performance Monitoring (APM) and Observability
AppDynamics

28 Reviews
6,269 Followers
AppDynamics
Application Performance Monitoring (APM) and Observability
Azure Monitor

26 Reviews
157 Followers
Azure Monitor
Application Performance Monitoring (APM) and Observability
ITRS Geneos

10 Reviews
1,854 Followers
ITRS Geneos
Application Performance Monitoring (APM) and Observability
Grafana

30 Reviews
171 Followers
Grafana
Application Performance Monitoring (APM) and Observability
Elastic Observability

9 Reviews
44 Followers
Elastic Observability
Application Performance Monitoring (APM) and Observability
Splunk ITSI (IT Service Int...

12 Reviews
34 Followers
Splunk ITSI (IT Service Intellig...
Application Performance Monitoring (APM) and Observability
Splunk Enterprise Security

58 Reviews
9,420 Followers
Splunk Enterprise Security
Security Information and Event Management (SIEM)
Microsoft Sentinel

56 Reviews
214 Followers
Microsoft Sentinel
Security Information and Event Management (SIEM)
IBM Security QRadar

54 Reviews
6,735 Followers
IBM Security QRadar
Security Information and Event Management (SIEM)
Elastic Security

23 Reviews
735 Followers
Elastic Security
Log Management
Wazuh

25 Reviews
57 Followers
Wazuh
Log Management
LogRhythm SIEM

28 Reviews
6,436 Followers
LogRhythm SIEM
Security Information and Event Management (SIEM)
Securonix Next-Gen SIEM

15 Reviews
1,850 Followers
Securonix Next-Gen SIEM
Security Information and Event Management (SIEM)
Devo

12 Reviews
401 Followers
Devo
Log Management
Fortinet FortiSIEM

28 Reviews
2,322 Followers
Fortinet FortiSIEM
Security Information and Event Management (SIEM)
Fortinet FortiGate

109 Reviews
16K Followers
Fortinet FortiGate
Firewalls
pfSense

26 Reviews
12K Followers
pfSense
Firewalls
Cisco Secure Firewall

120 Reviews
14K Followers
Cisco Secure Firewall
Firewalls
OPNsense

16 Reviews
1,537 Followers
OPNsense
Firewalls
Check Point NGFW

128 Reviews
1,053 Followers
Check Point NGFW
Firewalls
Palo Alto Networks NG Firew...

82 Reviews
1,472 Followers
Palo Alto Networks NG Firewalls
Firewalls
Sophos XG

62 Reviews
2,528 Followers
Sophos XG
Firewalls
Fortinet FortiGate-VM

38 Reviews
513 Followers
Fortinet FortiGate-VM
Firewalls
Perimeter 81

18 Reviews
82 Followers
Perimeter 81
ZTNA as a Service
Microsoft BI

113 Reviews
12K Followers
Microsoft BI
BI (Business Intelligence) Tools
Tableau

65 Reviews
13K Followers
Tableau
BI (Business Intelligence) Tools
Amazon QuickSight

14 Reviews
518 Followers
Amazon QuickSight
BI (Business Intelligence) Tools
Oracle OBIEE

29 Reviews
10K Followers
Oracle OBIEE
Legacy BI Tools
SAP Analytics Cloud

29 Reviews
373 Followers
SAP Analytics Cloud
BI (Business Intelligence) Tools
SAP BusinessObjects Busines...

31 Reviews
6,543 Followers
SAP BusinessObjects Business Int...
Legacy BI Tools
IBM Cognos

18 Reviews
6,175 Followers
IBM Cognos
Legacy BI Tools
MicroStrategy

11 Reviews
6,243 Followers
MicroStrategy
BI (Business Intelligence) Tools
Oracle Analytics Cloud

11 Reviews
391 Followers
Oracle Analytics Cloud
BI (Business Intelligence) Tools
Dell PowerStore

35 Reviews
272 Followers
Dell PowerStore
NVMe All-Flash Storage Arrays
Dell Unity XT

45 Reviews
2,768 Followers
Dell Unity XT
All-Flash Storage
Pure Storage FlashArray

41 Reviews
4,708 Followers
Pure Storage FlashArray
All-Flash Storage
NetApp AFF

30 Reviews
4,775 Followers
NetApp AFF
All-Flash Storage
HPE Nimble Storage

25 Reviews
4,396 Followers
HPE Nimble Storage
All-Flash Storage
IBM FlashSystem

35 Reviews
2,337 Followers
IBM FlashSystem
NAS
Dell PowerMax NVMe

23 Reviews
357 Followers
Dell PowerMax NVMe
NVMe All-Flash Storage Arrays
HPE 3PAR StoreServ

24 Reviews
5,878 Followers
HPE 3PAR StoreServ
All-Flash Storage
HPE Primera

18 Reviews
63 Followers
HPE Primera
All-Flash Storage
Microsoft Defender for Endp...

99 Reviews
3,983 Followers
Microsoft Defender for Endpoint
EPP (Endpoint Protection for Business)
CrowdStrike Falcon

50 Reviews
4,156 Followers
CrowdStrike Falcon
EDR (Endpoint Detection and Response)
SentinelOne Singularity Com...

57 Reviews
2,902 Followers
SentinelOne Singularity Complete
Anti-Malware Tools
Cortex XDR by Palo Alto Net...

40 Reviews
984 Followers
Cortex XDR by Palo Alto Networks
EPP (Endpoint Protection for Business)
Intercept X Endpoint

35 Reviews
290 Followers
Intercept X Endpoint
EPP (Endpoint Protection for Business)
Symantec Endpoint Security

42 Reviews
4,567 Followers
Symantec Endpoint Security
EPP (Endpoint Protection for Business)
Check Point Harmony Endpoint

48 Reviews
973 Followers
Check Point Harmony Endpoint
EPP (Endpoint Protection for Business)
Kaspersky Endpoint Security...

32 Reviews
1,303 Followers
Kaspersky Endpoint Security for ...
EPP (Endpoint Protection for Business)
Cisco Secure Endpoint

17 Reviews
273 Followers
Cisco Secure Endpoint
EPP (Endpoint Protection for Business)
VxRail

47 Reviews
4,347 Followers
VxRail
HCI
Nutanix Cloud Infrastructur...

88 Reviews
7,916 Followers
Nutanix Cloud Infrastructure (NCI)
HCI
VMware vSAN

58 Reviews
7,348 Followers
VMware vSAN
HCI
HPE SimpliVity

39 Reviews
6,425 Followers
HPE SimpliVity
HCI
StarWind Virtual SAN

88 Reviews
665 Followers
StarWind Virtual SAN
Software Defined Storage (SDS)
StarWind HyperConverged App...

40 Reviews
361 Followers
StarWind HyperConverged Appliance
Software Defined Storage (SDS)
Cisco HyperFlex HX-Series

24 Reviews
2,521 Followers
Cisco HyperFlex HX-Series
HCI
DataCore SANsymphony

13 Reviews
493 Followers
DataCore SANsymphony
Software Defined Storage (SDS)
Sangfor HCI - Hyper Converg...

17 Reviews
116 Followers
Sangfor HCI - Hyper Converged In...
Cloud Management
Microsoft Azure

88 Reviews
5,540 Followers
Microsoft Azure
Infrastructure as a Service Clouds (IaaS)
Amazon AWS

93 Reviews
5,743 Followers
Amazon AWS
Infrastructure as a Service Clouds (IaaS)
OpenShift

28 Reviews
1,331 Followers
OpenShift
PaaS Clouds
Oracle Cloud Platform

18 Reviews
3,387 Followers
Oracle Cloud Platform
PaaS Clouds
SAP Cloud Platform

20 Reviews
1,115 Followers
SAP Cloud Platform
PaaS Clouds
Google Cloud

46 Reviews
229 Followers
Google Cloud
Infrastructure as a Service Clouds (IaaS)
Salesforce Platform

39 Reviews
2,685 Followers
Salesforce Platform
PaaS Clouds
IBM Public Cloud

5 Reviews
1,540 Followers
IBM Public Cloud
PaaS Clouds
Pivotal Cloud Foundry

9 Reviews
548 Followers
Pivotal Cloud Foundry
PaaS Clouds
Veeam Backup & Replication

102 Reviews
7,808 Followers
Veeam Backup & Replication
Backup and Recovery
Zerto

103 Reviews
2,443 Followers
Zerto
Disaster Recovery (DR) Software
Commvault Complete Data Pro...

39 Reviews
4,975 Followers
Commvault Complete Data Protection
Backup and Recovery
Rubrik

21 Reviews
3,597 Followers
Rubrik
Backup and Recovery
Cohesity DataProtect

19 Reviews
2,226 Followers
Cohesity DataProtect
Backup and Recovery
Nakivo

38 Reviews
187 Followers
Nakivo
Backup and Recovery
Veritas NetBackup

30 Reviews
3,794 Followers
Veritas NetBackup
Backup and Recovery
Azure Backup

22 Reviews
122 Followers
Azure Backup
Backup and Recovery
Acronis Cyber Protect

35 Reviews
4,134 Followers
Acronis Cyber Protect
Cloud Backup
Zabbix

34 Reviews
4,856 Followers
Zabbix
Network Monitoring Software
Datadog

103 Reviews
2,632 Followers
Datadog
Cloud Monitoring Software
SolarWinds NPM

45 Reviews
4,673 Followers
SolarWinds NPM
Network Monitoring Software
Auvik

97 Reviews
147 Followers
Auvik
Network Monitoring Software
PRTG Network Monitor

40 Reviews
4,183 Followers
PRTG Network Monitor
Network Monitoring Software
Nagios XI

13 Reviews
6,474 Followers
Nagios XI
IT Infrastructure Monitoring
New Relic

33 Reviews
6,178 Followers
New Relic
Application Performance Monitoring (APM) and Observability
Nagios Core

15 Reviews
441 Followers
Nagios Core
Network Monitoring Software
Meraki Dashboard

28 Reviews
299 Followers
Meraki Dashboard
Network Monitoring Software
See all categories


POPULAR QUESTIONS IN OUR COMMUNITY

it_user453030
User
Vendor
PaaS Clouds
Aug 02, 2023
Looking for a cost comparison evaluation for PaaS platforms
19
3
167
it_user732480
Storage and Backup Engineer at a energy/utilities company with 10,001+ employees
Real User
Enterprise Architecture Management
Jul 26, 2023
Tools to Develop and Manage IT Infrastructure Road-maps
17
14
44
SS
Sujit Sharma
Information Security Engineer at a tech services company with 1,001-5,000
employees
MSP
Web Application Firewall (WAF)
SiteLock
ImmuniWeb
Jul 27, 2023
What do you recommend for a securing Web Application?
14
10
158
JN
JayN
User at NCG
User
Firewalls
Jul 27, 2023
Which firewall solution would you recommend for an SMB with 50 employees and
around 100 devices?
14
6
217
As seen in:

Popular Categories
APMSIEMFirewallsBusiness IntelligenceAll-Flash StorageEndpoint Protection for
BusinessHCIPaaS CloudsBackup and Recovery SoftwareNetwork Monitoring SoftwareSee
more
Solutions
DatadogSplunk Enterprise SecurityFortinet FortiGateMicrosoft BIDell
PowerStoreMicrosoft Defender for EndpointVxRailMicrosoft AzureVeeam Backup &
ReplicationZabbixSee more
Common Comparisons
OPNsense vs. pfSenseCisco Secure Firewall vs. Fortinet FortiGateCloudflare DNS
vs. Quad9Checkmarx vs. SonarQubeJira vs. Microsoft Azure DevOpsHyper-V vs.
VMware vSphereFigma vs. MiroMicrosoft Intune vs. VMware Workspace ONEAruba
Wireless vs. Cisco WirelessMicrosoft Power Automate vs. UiPathSee more
Users
Provide a ReviewInfo for VendorsAdd a ProductHelp & FAQ
Company
About UsBlogNewsCareersContact
Policies
PrivacyCookiesTerms of UseGuidelines
© 2023 PeerSpot, All Rights Reserved.
TwitterFacebookLinkedInYouTube






PRIVACY PREFERENCE CENTER

This website uses cookies to enhance user experience and to analyze performance
and traffic on our website. We also share information about your use of our site
with our social media, advertising and analytics partners.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

ANALYTICAL COOKIES

Always Active

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

FUNCTIONAL COOKIES

Always Active

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

TARGETING COOKIES

Always Active

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


PERFORMANCE COOKIES



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Confirm My Choices