

Prisma Cloud by Palo Alto Networks and Microsoft Azure Application Gateway compete in cloud network security and traffic management solutions. Based on feature comprehensiveness and integration capabilities, Prisma Cloud has the upper hand, offering more versatile cloud security deployment across multi-cloud environments.
Features: Prisma Cloud provides dynamic workload identity creation, automated forensics, and versatile network security. It integrates well with AWS and supports complex DevOps environments with CI/CD integration. Microsoft Azure Application Gateway focuses on robust load balancing and web application firewall capabilities, autoscaling, URL-based routing, and efficient Azure ecosystem integration.
Room for Improvement: Prisma Cloud needs to enhance its user interface, automate compliance reporting, and improve on API security. Integration between components like Compute and cloud security posture management can be challenging. Azure Application Gateway should focus on performance stability, IP blocking functionality, and simplifying the configuration process while enhancing DDoS protection capabilities.
Ease of Deployment and Customer Service: Prisma Cloud supports hybrid, on-premises, and public cloud environments with varying technical support reviews. Some users praise its responsiveness, while others report inconsistencies. Azure Application Gateway primarily supports hybrid and public cloud models with reliable support and a robust network of Azure specialists, though initial setup can be complex.
Pricing and ROI: Prisma Cloud offers a flexible workload-based pricing model, which may be costly for smaller organizations but provides comprehensive security features for improved security posture and reduced manual workloads. Azure Application Gateway prices itself competitively within the Azure suite with a pay-as-you-use model, resulting in operational efficiency benefits, especially for organizations heavily invested in Azure.
Microsoft Azure Application Gateway significantly impacts our cost savings while maintaining higher performance.
If we can use a shared resource, then the return on investment is really nice.
We have seen a return on investment in terms of time-saving and cost-saving by not creating our own infrastructure.
It eliminates the need for additional hardware, making it a financially and technically sound investment.
Reputation and data security are the two most important things to a financial institution.
We may have prevented a security breach with remediation of the findings.
I would say they provide the best support for Application Gateway because they own the product, so their support is top-notch.
There is room for improvement, specifically in paid support, by providing more direct contact.
I would rate Microsoft support as good because they have a very skilled technical support team in the background
They can respond with technical documentation or pass on the case to the next level because it requires the development of a new feature or changing a feature due to a bug.
Anywhere we raise a tech case, they revert back within an hour.
I would rate them a nine out of ten because whenever there are issues, they are able to resolve them within the timelines and SLAs.
Microsoft Azure Application Gateway is a very scalable product.
It has the autoscaling feature, so there is not much concern around performance; it can scale significantly.
Microsoft Azure Application Gateway is a scalable solution.
Scalability-wise, I rate the solution a nine out of ten.
We haven't had any issues scaling the solution.
There aren't any limits to Prisma Cloud's scalability.
We have been using it for the past two to three years, and there have been good results with no problems so far.
The stability is good, and except for a few instances, I don't see the non-availability of Azure Cloud services.
I would rate it a ten out of ten for stability.
Most of the time, when the client requires data, it is not available.
The cloud environment is dynamic, so the tool must be dynamic.
One feature I mentioned is the support for non-HTTPS protocols such as TCP, which could allow one endpoint for all kinds of protocols.
There is room for improvement in terms of support, such as assigning agents directly for more straightforward engagement.
In future releases of Microsoft Azure Application Gateway, I would like to see more AI functionalities and a better dashboard as well as some customizations.
Prisma Cloud is an excellent tool.
We could have deployed the runtime monitoring with Prisma Cloud by Palo Alto Networks, but within our organization at our company, it was very difficult to find who would be the owner for the alerts.
Even though documentation was available, it took a while for a new person to understand what integration meant, what will be achieved after the integration, or how the integration needed to be done on the Azure or AWS side.
We would prefer to have it cheaper, but it is still expensive.
Azure solutions are quite expensive.
When it comes to pricing for Microsoft Azure Application Gateway, I would rate it a seven out of ten.
The cost was not on the higher side.
If you are using a single tool like Prisma Cloud, with a single license, you can monitor all environments, such as Google Cloud, Azure, AWS, and Oracle Cloud.
It is an expensive tool.
We are using it for some of the security features for our applications, particularly for securing traffic in transit with SSL.
The Web Application Firewall (WAF) in Microsoft Azure Application Gateway has been very effective in protecting applications from security threats.
The gateway's Web Application Firewall feature enhances security as it is the first entry point to your network from the outside world.
It provides a single pane of glass.
If I want to check how many of my S3s have encryption, I can write a Lambda function in Prisma Cloud and get that report.
Overall, the most valuable features for us in Prisma Cloud are those that provide visibility, ensure compliance with regulations, and help us align our on-premises servers and cloud environments with mandated security standards.
| Product | Market Share (%) |
|---|---|
| Microsoft Azure Application Gateway | 5.4% |
| Prisma Cloud by Palo Alto Networks | 2.0% |
| Other | 92.6% |
| Company Size | Count |
|---|---|
| Small Business | 22 |
| Midsize Enterprise | 6 |
| Large Enterprise | 24 |
| Company Size | Count |
|---|---|
| Small Business | 36 |
| Midsize Enterprise | 22 |
| Large Enterprise | 56 |
Azure Application Gateway is a web traffic load balancer that enables you to manage traffic to your web applications. Traditional load balancers operate at the transport layer (OSI layer 4 - TCP and UDP) and route traffic based on source IP address and port, to a destination IP address and port.
To learn more about our solution, ask questions, and share feedback, join our Microsoft Security, Compliance and Identity Community.
Prisma Cloud by Palo Alto Networks provides comprehensive cloud-native security solutions. It covers dynamic workload identity, automated forensics, and multi-cloud protection, ensuring robust security across diverse cloud platforms.
Prisma Cloud delivers advanced capabilities for managing cloud security across AWS, Azure, and GCP platforms. It offers dynamic workload identity creation, real-time monitoring, and seamless integration into CI/CD pipelines. With automation, centralized dashboards, and enhanced visibility, users effectively manage security misconfigurations and vulnerabilities. While optimizing cloud environments through runtime protection and compliance, Prisma Cloud faces challenges with its navigation, pricing, and limited automation capabilities. Users seek improvements in API security, role-based access controls, and documentation quality, emphasizing the need for enhanced customization and reporting features.
What are the important features of Prisma Cloud?
What benefits or ROI should users consider in reviews?
Industries like finance and telecom rely on Prisma Cloud for managing cloud security posture and container security. Teams utilize its capabilities across hybrid and multi-cloud settings to ensure compliance and robust threat protection. Features like misconfiguration detection and runtime monitoring are critical in promoting security objectives in these sectors.
We monitor all Web Application Firewall (WAF) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.