


Wiz and CrowdStrike Falcon Cloud Security compete in the cloud security sector. Wiz appears to have an edge in analytics and visibility, whereas CrowdStrike excels in threat hunting and endpoint security.
Features: Wiz provides superior visibility with features like Security Graph and agentless scanning. Its ability to correlate security elements aids in prioritizing cloud risks effectively. CrowdStrike Falcon Cloud Security offers extensive threat detection and response capabilities, focusing on vulnerability and endpoint security with cloud-based efficiency. It is renowned for its robust threat-hunting abilities and resource-efficient protection.
Room for Improvement: Wiz could enhance its reporting features and prioritization mechanisms. Users want better executive dashboards and risk assessment metrics, as well as improvements in API support and on-demand scanning flexibility. CrowdStrike Falcon Cloud Security could benefit from better integration support and an expanded suite of forensic analysis tools. Users seek improvements in customer service and cloud storage scanning, and challenges remain with its cost structure and dashboard usability.
Ease of Deployment and Customer Service: Wiz is known for its versatility across public and hybrid cloud environments, earning high praise for customer support and agentless deployment. CrowdStrike Falcon Cloud Security supports a broad range of cloud environments but faces challenges with its interface and customer support. While its documentation is thorough, it needs improvement in ease of operation for non-experts.
Pricing and ROI: Wiz's pricing is considered moderate with potential cost efficiency through tool consolidation, offering immediate ROI through asset management and patching improvements. CrowdStrike Falcon Cloud Security is deemed expensive, but its pricing is justified by its comprehensive security capabilities and endpoint protection, reflecting its extensive features with streamlined security management.
The detailed information PingSafe gives about how to fix vulnerabilities reduces the time spent on remediation by about 70 to 80 percent.
After implementing SentinelOne, it takes about five to seven minutes.
Our ability to get in and review our vulnerability stance, whether daily, monthly, weekly, or whatever it might be, has drastically improved over our prior provider.
More than 12 million vulnerabilities have been identified and resolved while working with CrowdStrike Falcon Cloud Security over the past 10 years.
We have seen a return on investment through time saved and managed employee workload.
It is an expense we are willing to pay to conform to Cyber Essentials Plus and demonstrate responsibility in protecting our data and that of our partners.
We have seen ROI from Wiz and we continued to see value in Wiz.
We estimate a cost reduction of around 35% to 50%, or even more, due to consolidating our security management into one platform.
I have seen a return on investment with Wiz by reducing our budget spent on other tools, saving time, and needing fewer employees.
When we send an email, they respond quickly and proactively provide solutions.
They took direct responsibility for the system and could solve queries quickly.
Having a reliable team ready and willing to assist with any issues is essential.
Based on my experience with CrowdStrike Falcon Cloud Security's technical support, I would rate them a solid 10 out of 10.
Technical support is quite good.
I have contacted customer service, and they are fast.
On a scale from 1 to 10, I would give Wiz's support a 10.
The vendor was readily available to assist us over calls, clarifying both technical aspects and theoretical insights.
We have a dedicated channel with Wiz and are always in communication with them.
I would rate it a 10 out of 10 for scalability.
Scalability is no longer a concern because Cloud Native Security is a fully cloud-based resource.
I would rate the scalability of PingSafe 10 out of 10.
It is deployed across multiple departments and multiple locations.
CrowdStrike Falcon Cloud Security is indeed highly scalable, ideally for enterprises with a minimum of 2,000 servers to ensure cost efficiency and easier setup.
The scalability of CrowdStrike Falcon Cloud Security is good, and it can easily scale up to over 20,000 or 30,000 endpoints.
We have deployed Wiz in three organizations on AWS, each with approximately 70 to 80 accounts, totaling more than 120 accounts.
Scalability-wise, I rate the solution a ten out of ten.
Our environment quadrupled in size. We didn’t have to make any adjustments or configuration changes; it just accommodated the growth.
SentinelOne Singularity Cloud is incredibly reliable.
We contacted Cloud Native Security, and they addressed it in a day.
The only downtime we had was when switching from V1 to V2 but it was smooth.
Occasionally, when the workload increases, it slows down considerably and sometimes becomes unresponsive.
When evaluating the stability of CrowdStrike Falcon Cloud Security, their partnerships with all major cloud service providers ensure their servers are optimally positioned.
The stability of Wiz has been good, with no downtime, bugs, or glitches.
Stability-wise, I rate the solution an eight to nine out of ten.
The solution is very stable.
If they can merge Kubernetes Security with other modules related to Kubernetes, that would help us to get more modules in the current subscription.
As organizations move to the cloud, a cloud posture management tool that offers complete cloud visibility becomes crucial for maintaining compliance.
I would also like to see Cloud Native Security offer APIs that allow us to directly build dashboards within the platform.
If CrowdStrike Falcon Cloud Security could implement pushing out remediation from the sensor installed on machines, that would be beneficial.
The user interface needs improvement as it's sometimes difficult to locate specific dashboards or reports.
Another issue is the lack of proper documentation.
We would like to see preventive controls that can be applied through Wiz to protect against vulnerabilities that we're not going to be able to remediate immediately.
One significant area for improvement would be increasing automation. While they excel at identifying issues, we need assistance in minimizing the human hours required for tasks.
We need an agent that can be installed, or that can overview all the containers and Kubernetes so that it can detect malicious activities that are happening in them.
With very little negotiation involved, we just let them know what we could pay and they were willing to meet us at slightly above what we paid with Sophos, which was still very fair for what we were looking at.
There are some tools that are double the cost of Cloud Native Security.
I recall Cloud Native Security charging a slightly higher premium previously.
The pricing for CrowdStrike Falcon Cloud Security is reasonable, especially for small companies with limited budgets.
No additional cost for maintenance or support; it's all included in the quotation.
However, the main point is that even though it is expensive, it provides a huge capability to the organization.
We are paying 250k per year.
In some cases, it has a very aggressive price, so very cheap.
I don’t think there’s anyone else out there offering the same level, scale, or efficiency.
This helps visualize potential attack paths and even suggests attack paths a malicious actor might take.
The infrastructure-as-code feature is helpful for discovering open ports in some of the modules.
This tool has been helpful for us. It allows us to search for vulnerabilities and provides evidence directly on the screen.
It automatically blocks duplication and activities that could result in data loss, effectively preventing unintended copying of data to personal devices.
The threat detection capability of CrowdStrike Falcon Cloud Security has always been the major seller, and it works effectively.
CrowdStrike Falcon plays a crucial role in our environment and gives us a clear point where we can focus our efforts rather than hunting down what is happening.
The feature leads to minimal false positives and a low volume of alerts, which is highly valuable for our operations.
It's highly customizable, allowing us to manage many custom features effectively.
Regarding compliance and governance, Wiz streamlines our vulnerability management to meet specific needs effectively.
| Product | Market Share (%) |
|---|---|
| Wiz | 20.2% |
| SentinelOne Singularity Cloud Security | 5.3% |
| CrowdStrike Falcon Cloud Security | 4.9% |
| Other | 69.6% |


| Company Size | Count |
|---|---|
| Small Business | 48 |
| Midsize Enterprise | 21 |
| Large Enterprise | 54 |
| Company Size | Count |
|---|---|
| Small Business | 13 |
| Midsize Enterprise | 6 |
| Large Enterprise | 15 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 8 |
| Large Enterprise | 20 |
SentinelOne Singularity Cloud Security offers a streamlined approach to cloud security with intuitive operation and strong integration capabilities for heightened threat detection and remediation efficiency.
Singularity Cloud Security stands out for its real-time detection and response, effectively minimizing detection and remediation timelines. Its automated remediation integrates smoothly with third-party tools enhancing operational efficiency. The comprehensive console ensures visibility and support for forensic investigations. Seamless platform integration and robust support for innovation are notable advantages. Areas for development include improved search functionality, affordability, better firewall capabilities for remote users, stable agents, comprehensive reporting, and efficient third-party integrations. Clarity in the interface, responsive support, and real-time alerting need enhancement, with a call for more automation and customization. Better scalability and cost-effective integration without compromising capabilities are desired.
What are SentinelOne Singularity Cloud Security's standout features?SentinelOne Singularity Cloud Security is deployed in industries needing robust cloud security posture management, endpoint protection, and threat hunting. Utilized frequently across AWS and Azure, it assists in monitoring, threat detection, and maintaining compliance in diverse environments while providing real-time alerts and recommendations for proactive threat management.
CrowdStrike Falcon Cloud Security is a platform of cloud security solutions aimed at protecting organizations from breaches while simplifying cloud security management. The unified platform combines several cloud security functionalities for comprehensive protection. Built on the CrowdStrike Falcon Platform, it leverages the powerful agent and technology used in CrowdStrike's renowned endpoint protection solutions, extending its capabilities seamlessly to cloud environments.
CrowdStrike Falcon Cloud Security is designed to be a shield for the cloud infrastructure. One of its key strengths is its ability to monitor cloud workloads for potential breaches and attacks. It doesn't matter if you're running virtual machines, containers, or a combination of both across different cloud providers – Falcon Cloud Security offers visibility and protection. Additionally, it works tirelessly to pinpoint misconfigurations or vulnerabilities in your cloud setup, proactively stopping issues before they become full-blown security incidents. Compliance becomes easier too, as it can check if your deployments meet the requirements of various industry standards and regulations.
If you heavily utilize containers and Kubernetes, Falcon Cloud Security has you covered. It delves deep into container images and running containers to spot weaknesses and potential threats, helping you secure your containerized applications from the moment they're developed to when they're up and running. Finally, it tackles the often messy world of permissions in the cloud. Falcon Cloud Security analyzes identities and their attached permissions, ensuring that the principle of least privilege is followed and sensitive data isn't exposed due to overly broad access rights.
In essence, CrowdStrike Falcon Cloud Security aims to simplify the complexities of cloud security by consolidating tools, providing a centralized view of your risks and threats, and delivering advanced protection that blends seamlessly with your development processes.
Based on the interviews we conducted with CrowdStrike Falcon Cloud Security users, overall, the sentiment is positive. Users praise the solution's efficacy in detecting and preventing threats, its ease of use, scalability, stability, and integration with existing systems. There were also mentions of areas for improvement, such as the pricing, the user interface, and customer support.
Wiz is a highly efficient solution for data security posture management (DSPM), with a 100% API-based approach that provides quick connectivity and comprehensive scans of platform configurations and workloads. The solution allows companies to automatically correlate sensitive data with relevant cloud context, such as public exposure, user identities, entitlements, and vulnerabilities.This integration enables them to understand data accessibility, configuration, usage, and movement within their internal environments.
Wiz's Security Graph delivers automated alerts whenever risks emerge, allowing teams to prioritize and address the most critical issues before they escalate into breaches. Furthermore, Wiz ensures rapid and agentless visibility into critical data across various repositories, enabling organizations to easily determine the location of their data assets.
Wiz provides various features in the following categories:
Agentless Scanning: The solution can scan every layer of a cloud environment without requiring agents, managing the entire process and providing comprehensive visibility.
Workflow Integration: Users can create customized workflows within Wiz to identify and assign actions based on urgency, integrating them with ticketing systems for quick and efficient remediation.
Vulnerability Management: Wiz's vulnerability management modules provide detailed analytics and visibility across cloud systems, streamlining the manual process of vulnerability discovery. The automated attack path analysis helps identify risks and trace potential points of exposure, allowing users to understand and mitigate them effectively and proactively.
CSPM (Cloud Security Posture Management): Wiz's CSPM module offers instant visibility into high-level risks to an enterprise’s cloud environment, covering all accounts without the need for agents.
Out-of-the-Box Reporting and Custom Queries: The service supports comprehensive reporting with asset context, allowing users to perform complex custom queries on the solution’s user-friendly interface.
Automation Roles and Dashboards: The solution facilitates automation by providing essential roles and dedicated dashboards that enable teams to understand security information quickly, even those with limited expertise.
Contextual Risk Evaluation: The service contextualizes the various components contributing to an issue, providing a risk evaluation framework that helps prioritize remediation efforts.
Security Graph and Visibility: Wiz's security graph offers visibility across the entire organization, even with multiple accounts, enabling users to understand their environment and assets effectively.
Wiz offers the following benefits:
Comprehensive agentless scanning
Effective identification and mitigation of vulnerabilities
Streamlined vulnerability management
Robust reporting capabilities and customizable queries
Enhanced automation and role-based access control
Prioritized risk evaluation for efficient remediation
Security posture across multiple accounts
Kamran Siddique, VP Information Security at boxed.com, remarks his company has seen a ROI while using Wiz, as it simplifies the process by integrating multiple useful tools into one solution.
According to a Senior Security Architect at Deliveroo, Wiz has given their company a fresh approach to vulnerability management, as Wiz's native integrations are extremely useful and paramount to the operational success of their platform.
We monitor all Cloud-Native Application Protection Platforms (CNAPP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.