Try our new research platform with insights from 80,000+ expert users

Azure Confidential Computing vs Wiz comparison

 

Comparison Buyer's Guide

Executive Summary

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Azure Confidential Computing
Ranking in Compliance Management
20th
Average Rating
0.0
Reviews Sentiment
8.5
Number of Reviews
1
Ranking in other categories
Data Privacy Management Software (12th)
Wiz
Ranking in Compliance Management
1st
Average Rating
9.0
Reviews Sentiment
7.1
Number of Reviews
33
Ranking in other categories
Vulnerability Management (1st), Container Security (2nd), Cloud Workload Protection Platforms (CWPP) (3rd), Cloud Security Posture Management (CSPM) (1st), Cloud-Native Application Protection Platforms (CNAPP) (1st), Data Security Posture Management (DSPM) (1st), Cloud Detection and Response (CDR) (1st)
 

Mindshare comparison

As of January 2026, in the Compliance Management category, the mindshare of Azure Confidential Computing is 1.3%, up from 0.1% compared to the previous year. The mindshare of Wiz is 19.4%, down from 27.8% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Compliance Management Market Share Distribution
ProductMarket Share (%)
Wiz19.4%
Azure Confidential Computing1.3%
Other79.3%
Compliance Management
 

Featured Reviews

Cuneyt-Gurses - PeerSpot reviewer
Director of Cloud Solution Group at DTech Cloud Corporation
Improves confidential data protection but needs improved efficiency in encryption algorithms
I have private data and want to prevent others, including Microsoft, from seeing it, I have control. By setting up a landing zone for sovereignty, the data is stored in MCFS landing zones. This data is encrypted in use, at rest, and in transit. While the data is in use, no third-party user or Microsoft can view, capture, or read it. These landing zones are for specific customers. When I enter an MCFS zone, my data remains strictly confidential, and unauthorized users cannot see it. This is the basic principle. Confidential computing is used for data in use. There are three types of data: in-use, in-transit, and at-rest data. At rest means the stored data is encrypted. In-use data means when the data is in memory, it remains confidential to other users, cloud users, or hackers, preventing data leakage or hacking. None can capture my data. Confidential computing involves data in use. This serves as a reference architecture, not just a unique service. Compliance and governance are core concepts of sovereignty. Sovereignty combines compliance rules with local compliance regulations. Each country can develop its compliance rules and integrate them into Azure. Globally, countries have developed their compliance rules and sovereignty compliance packs for Azure. For example, GDPR is implemented in some countries. In Turkey, there is a regulation named Kaveh Kaka. In Italy, there are specific data classification and compliance rules. They package their computing and compliance rules for Azure, allowing access to Italian compliance rules in Azure. If I implement Microsoft Cloud for Sovereignty landing zones, I see specialized and customized computing packages.
Marcel Velica - PeerSpot reviewer
Senior Program Manager, Security at Eventbrite
Unified cloud visibility has transformed our risk prioritization and reduced alert fatigue while improving collaboration across security and DevSecOps teams
The standout features of Wiz that make it valuable for me include good multi-cloud environment support, data governance, shadow IT detection, DevSecOps governance, automation, level reporting, threat detection, and good infrastructure detection. Wiz has positively impacted my organization by implementing zero trust authorization, providing good reporting that shows the top attack path, critical assets, overall risk posture, and demonstrating AI and ML workload capabilities towards my team, as well as good infrastructure detection and vulnerability detection accuracy with security posture management at massive scale and identity exposure. There is a massive reduction in risk exposure, immediate visibility across the entire cloud estate, reduced noise and better prioritization, stronger DevSecOps collaboration, continuous compliance instead of ad hoc panic, faster incident response with real context, significant cost savings through tool consolidation, and stronger AI and data governance.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"When I enter an MCFS zone, my data remains strictly confidential, and unauthorized users cannot see it."
"The benefit of Microsoft Cloud for sovereignty is boundless."
"The first thing that stood out was the ease of installation and the quick value we got out of the solution."
"If anyone wants to secure their infrastructure, cloud environment, or Kubernetes cluster, I would strongly recommend Wiz as a tool because it is easy to use and user-friendly."
"The product supports out-of-the-box reporting with context about the asset and allows us to perform complex custom queries on UI."
"I like Wiz's reporting, and it's easy to do queries. For example, it's pretty simple to find out how many servers we have and the applications installed on each. I like Wiz's security graph because you can use it to see the whole organization even if you have multiple accounts."
"With Wiz, we get timely alerts for leaked data or any vulnerabilities already existing in our environment."
"The security baseline and vulnerability assessments is the valuable feature."
"The product's most valuable feature combines different contexts and attributes to produce highly confident alerts."
"The solution is very user-friendly."
 

Cons

"There is an improvement area for data in use. It is still a research subject globally."
"Scientists are still working to improve the efficiency and latency of data in use algorithms."
"In Brazil, the cost is a significant issue due to the currency exchange rate."
"I cannot recommend Wiz to others until I have a clear understanding of its full capacity and benefits."
"In Wiz, if there is one vulnerability that occurs multiple times, it is listed only once. However, even if it is a single vulnerability in the same category, it repeats multiple times. This feature can be time-consuming as it requires continuous scrolling."
"Not having an on-prem version can be an obstacle for customers who have a large workload in an on-prem environment."
"Wiz can be improved with better maturity in code scanning and developer workflows, expanding secret detection to full lifecycle management, stronger IAM across multi-account environments, more transparent attack path scoring and risk modeling, improved AI and ML security scanning, reduced false positives in runtime threat detection, more fine-grained access control and tenant separation, and better integration for serverless workloads."
"There is room for improvement in Wiz, particularly in operator management, as general operators may lack the necessary knowledge, requiring an easier-to-understand tool."
"Given the level of visibility into all the cloud environments Wiz provides, it would be nice if they could integrate some kind of mechanism to better manage tenants on multiple platforms. For example, let's say that some servers don't have an application they need, such as an antivirus. Wiz could include an API or something to push those applications out to the servers. It would be great if you could remedy these issues directly from the Wiz platform."
"They could improve the product's visibility in the internal network topology."
 

Pricing and Cost Advice

Information not available
"I wish the pricing was more transparent."
"The pricing is fair. Some of the more advanced features and functionalities and how the tiers are split can be somewhat confusing."
"If one is cheap and ten is expensive, I rate the tool's price as a five out of ten."
"The pricing seems pretty simple. We don't have to do a lot of calculations to figure out what the components are. They do it by enabling specific features, either basics or advanced, which makes it easy to select."
"Based on the features and capabilities, the product pricing seems reasonable."
"The pricing is fair and comparable to their competitors. The cost seems to be going up, which is a concern. There are potential savings from consolidating tools, but we're uncertain how Wiz's pricing will change over time."
"Wiz is a moderately priced solution, where it is neither cheap nor costly."
"The cost of the other solutions is comparable to Wiz."
report
Use our free recommendation engine to learn which Compliance Management solutions are best for your needs.
881,082 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
No data available
Financial Services Firm
15%
Computer Software Company
12%
Manufacturing Company
9%
Healthcare Company
5%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
No data available
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise8
Large Enterprise20
 

Questions from the Community

What is your experience regarding pricing and costs for Azure Confidential Computing?
The setup contains an overhead, especially for the nodes used in implementing a landing zone, MCFS landing zone. These nodes are specialized for confidential computing, resulting in some overhead. ...
What needs improvement with Azure Confidential Computing?
There is an improvement area for data in use. It is still a research subject globally. Scientists are working to improve the efficiency and latency of data in use algorithms. For example, they are ...
What is your primary use case for Azure Confidential Computing?
I have utilized Amazon MQ for my Python automation projects. It serves as a middleware layer service for my projects, particularly when using Amazon MQ. I can state that it is one of the essential ...
What do you like most about Wiz?
With Wiz, we get timely alerts for leaked data or any vulnerabilities already existing in our environment.
What is your experience regarding pricing and costs for Wiz?
My experience with pricing, setup cost, and licensing for Wiz was through an RFP where they offered us a good price, and the licensing was a flexible solution based on our business.
What needs improvement with Wiz?
I feel there is a delay in detection, though I am uncertain whether this is due to our implementation disadvantage. Wiz can detect all the issues, threats, and security vulnerabilities, but the del...
 

Overview

 

Sample Customers

Information Not Available
Wiz is the fastest growing software company ever - $100M ARR in 18 months: Wiz becomes the fastest-growing software company ever | Wiz Blog  Discover why companies, including Salesforce, Morgan Stanley, Fox, and Bridgewater choose Wiz as their cloud security partner. Read their success stories here: Customers | Wiz
Find out what your peers are saying about Wiz, SentinelOne, Vanta and others in Compliance Management. Updated: January 2026.
881,082 professionals have used our research since 2012.