


Veracode and CrowdStrike Falcon Cloud Security are two prominent products in cloud security. CrowdStrike Falcon Cloud Security has the upper hand due to its advanced features and perceived value for its price.
Features: Veracode is praised for its automated scanning, comprehensive reporting, and ease of use. CrowdStrike Falcon Cloud Security stands out with advanced threat detection, real-time visibility, and robust endpoint protection.
Room for Improvement: Veracode users suggest improving integration with more development tools, enhancing scan speed, and refining the user interface. CrowdStrike Falcon Cloud Security users seek better data visualization, more frequent updates, and enhanced user experience for reporting features.
Ease of Deployment and Customer Service: Veracode customers find deployment manageable but complex without support, with positive feedback for customer service responsiveness. CrowdStrike Falcon Cloud Security users find deployment streamlined and benefit from a strong support system.
Pricing and ROI: Veracode offers competitive pricing and good ROI. CrowdStrike Falcon Cloud Security is perceived as expensive but justifiable due to its advanced capabilities, delivering high ROI. Users find the investment worthwhile for the enhanced security provided.
The solution provides a good ROI, especially for regular customers, offering discounts for three-year licenses.
I don't think the tool in itself is very capable of doing that, but we have XSOAR and other tool integrations done on the platform, so this can be accomplished.
More than 12 million vulnerabilities have been identified and resolved while working with CrowdStrike Falcon Cloud Security over the past 10 years.
We have seen a return on investment through time saved and managed employee workload.
It is an expense we are willing to pay to conform to Cyber Essentials Plus and demonstrate responsibility in protecting our data and that of our partners.
The scanners of Veracode bring status of the weaknesses in the current infrastructure. It scans and provides reports regarding the servers, the network, and the applications running on those servers.
Regarding price, the evaluation should focus on how efficiently they will recover their investment, considering the time saved through the use of Veracode Fix, for example, and the ability to fix code at dev time compared to the problems faced when fixing after the product is already deployed.
We did see a return on investment with Veracode, as we segregated our remediation efforts, which reduced our time to delivery as well as the number of engineers needed to help us in delivering a secure solution.
If I make it a high priority, they have resolved one query within 20 minutes.
If local Indian support cannot resolve an issue, global tech support aligns promptly within the agreed SLA.
Fast response times and knowledgeable staff who understand the intricacies of the system.
Based on my experience with CrowdStrike Falcon Cloud Security's technical support, I would rate them a solid 10 out of 10.
Technical support is quite good.
I have contacted customer service, and they are fast.
Access to the engineering team is crucial for faster feedback on the product fix process.
I have communicated with the technical support of Veracode a couple of times, and this was a really great experience because these professionals know their material.
They share detailed information via email, including screenshots or further clarification about the issue.
For stability, scalability, mean time to response, and potential incident investigation improvements, I would give it a nine or probably even a ten.
Onboarding endpoints and assets on Cortex Cloud by Palo Alto Networks is very easy.
The platform is able to auto-shut certain resources that are not in use through the agentless scan feature.
It is deployed across multiple departments and multiple locations.
CrowdStrike Falcon Cloud Security is indeed highly scalable, ideally for enterprises with a minimum of 2,000 servers to ensure cost efficiency and easier setup.
The scalability of CrowdStrike Falcon Cloud Security is good, and it can easily scale up to over 20,000 or 30,000 endpoints.
Cloud solutions are easier to scale than on-premise solutions.
It has a good capacity to scale effectively.
Implementing these features into our normal CI/CD was good, so I can say that scalability is really good.
My impression of Cloud Runtime Security in stopping attacks in real-time is that I have never had an issue where it has let something through, causing an outage or concerns to the customer.
However, now in Cortex Cloud, I have not seen any lag or buffer.
My evaluation of how stable and reliable Cortex Cloud by Palo Alto Networks is very positive.
Occasionally, when the workload increases, it slows down considerably and sometimes becomes unresponsive.
When evaluating the stability of CrowdStrike Falcon Cloud Security, their partnerships with all major cloud service providers ensure their servers are optimally positioned.
If the Veracode server is down, we experience many issues during the scan.
I have observed that it is not that reliable in terms of security because Veracode was not able to find some security threats in our application that existed since the product was developed.
It's not that easy to onboard, but once they have been onboarded on the platform, and the pipeline configured alongside the product configured, it works effectively.
Regarding the generative AI security tool, I know for sure it's Agentic.
The solution is quite premium in cost compared to alternatives such as Wiz.
There is not a clear MSP model compared to other vendors such as CrowdStrike.
If CrowdStrike Falcon Cloud Security could implement pushing out remediation from the sensor installed on machines, that would be beneficial.
The user interface needs improvement as it's sometimes difficult to locate specific dashboards or reports.
Another issue is the lack of proper documentation.
If it could be integrated directly with code repositories such as Bitbucket or GitHub, without the need to create a pipeline to upload and decode code, it would simplify the code scan process significantly.
We had issues with scanning large applications. Scanning took a lot of time, so we kept it outside the DevOps pipeline to avoid delaying deployments.
A nice addition would be if it could be extended for scenarios with custom cleansers.
The solution is costly, with high-end capabilities suitable for enterprises.
Today, it is smart and easy to calculate the licenses.
The pricing for CrowdStrike Falcon Cloud Security is reasonable, especially for small companies with limited budgets.
No additional cost for maintenance or support; it's all included in the quotation.
However, the main point is that even though it is expensive, it provides a huge capability to the organization.
It's not the most expensive solution.
Overall, Veracode's pricing is lower and more scalable than many alternatives in the market.
If there's a security gap, you'll never know the cost or effect.
AI/ML aids in anticipating remediation for misconfigurations and vulnerabilities, and automatic remediation can be easily configured.
Cortex Cloud by Palo Alto Networks has reduced the time spent on incident investigations, and if I had to estimate, I would say it has cut our investigation time in half.
This simplifies the management of shared responsibility among different people and entities, allowing you to use one single tool instead of having dozens of different tools to orchestrate and integrate.
It automatically blocks duplication and activities that could result in data loss, effectively preventing unintended copying of data to personal devices.
The threat detection capability of CrowdStrike Falcon Cloud Security has always been the major seller, and it works effectively.
CrowdStrike Falcon plays a crucial role in our environment and gives us a clear point where we can focus our efforts rather than hunting down what is happening.
It offers confidence by preventing exposure to vulnerabilities and helps ensure that we are not deploying vulnerable code into production.
The best features in Veracode include static analysis and the early detection of vulnerable libraries; it integrates with tools such as Jenkins.
It fixes issues directly in the IDE while you're doing it.

| Company Size | Count |
|---|---|
| Small Business | 6 |
| Midsize Enterprise | 1 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 13 |
| Midsize Enterprise | 6 |
| Large Enterprise | 15 |
| Company Size | Count |
|---|---|
| Small Business | 69 |
| Midsize Enterprise | 45 |
| Large Enterprise | 114 |
Cortex Cloud by Palo Alto Networks provides comprehensive cybersecurity management, focusing on enhancing security operations with advanced automation and threat intelligence, addressing complex security challenges efficiently.
Cortex Cloud by Palo Alto Networks integrates cloud-scale data analytics and automation to streamline security operations, enabling faster threat detection and response. It leverages AI and machine learning to provide real-time threat intelligence and automate routine tasks, reducing the burden on security teams. Users benefit from improved visibility across networks and greater operational efficiency, making it crucial for enterprises aiming to secure their digital assets against evolving cyber threats.
What are the key features of Cortex Cloud by Palo Alto Networks?
What benefits or ROI should you expect from Cortex Cloud by Palo Alto Networks reviews?
Cortex Cloud by Palo Alto Networks is favored in sectors like finance, healthcare, and telecommunications, where data security is paramount. Its ability to integrate with existing infrastructure and provide real-time insights makes it a preferred choice for securing sensitive information and ensuring compliance within industry regulations.
CrowdStrike Falcon Cloud Security is a platform of cloud security solutions aimed at protecting organizations from breaches while simplifying cloud security management. The unified platform combines several cloud security functionalities for comprehensive protection. Built on the CrowdStrike Falcon Platform, it leverages the powerful agent and technology used in CrowdStrike's renowned endpoint protection solutions, extending its capabilities seamlessly to cloud environments.
CrowdStrike Falcon Cloud Security is designed to be a shield for the cloud infrastructure. One of its key strengths is its ability to monitor cloud workloads for potential breaches and attacks. It doesn't matter if you're running virtual machines, containers, or a combination of both across different cloud providers – Falcon Cloud Security offers visibility and protection. Additionally, it works tirelessly to pinpoint misconfigurations or vulnerabilities in your cloud setup, proactively stopping issues before they become full-blown security incidents. Compliance becomes easier too, as it can check if your deployments meet the requirements of various industry standards and regulations.
If you heavily utilize containers and Kubernetes, Falcon Cloud Security has you covered. It delves deep into container images and running containers to spot weaknesses and potential threats, helping you secure your containerized applications from the moment they're developed to when they're up and running. Finally, it tackles the often messy world of permissions in the cloud. Falcon Cloud Security analyzes identities and their attached permissions, ensuring that the principle of least privilege is followed and sensitive data isn't exposed due to overly broad access rights.
In essence, CrowdStrike Falcon Cloud Security aims to simplify the complexities of cloud security by consolidating tools, providing a centralized view of your risks and threats, and delivering advanced protection that blends seamlessly with your development processes.
Based on the interviews we conducted with CrowdStrike Falcon Cloud Security users, overall, the sentiment is positive. Users praise the solution's efficacy in detecting and preventing threats, its ease of use, scalability, stability, and integration with existing systems. There were also mentions of areas for improvement, such as the pricing, the user interface, and customer support.
Veracode is a leading provider of application security solutions, offering tools to identify, mitigate, and prevent vulnerabilities across the software development lifecycle. Its cloud-based platform integrates security into DevOps workflows, helping organizations ensure that their code remains secure and compliant with industry standards.
Veracode supports multiple application security testing types, including static analysis (SAST), dynamic analysis (DAST), software composition analysis (SCA), and manual penetration testing. These tools are designed to help developers detect vulnerabilities early in development while maintaining speed in deployment. Veracode also emphasizes scalability, offering features for enterprises that manage a large number of applications across different teams. Its robust reporting and analytics capabilities allow organizations to continuously monitor their security posture and track progress toward remediation.
What are the key features of Veracode?
What benefits should users consider in Veracode reviews?
Veracode is widely adopted in industries like finance, healthcare, and government, where compliance and security are critical. It helps these organizations maintain strict security standards while enabling rapid development through its integration with Agile and DevOps methodologies.
Veracode helps businesses secure their applications efficiently, ensuring they can deliver safe and compliant software at scale.
We monitor all Application Security Tools reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.