

Wiz and Vulcan Cyber compete in the cybersecurity domain. Wiz appears to have the upper hand in cloud-centric environments, while Vulcan Cyber is preferred for traditional setups.
Features: Wiz offers proactive cloud security, real-time threat detection, and flexible integration into cloud environments. Vulcan Cyber provides detailed vulnerability management, remediation orchestration, and comprehensive risk assessment capabilities.
Room for Improvement: Wiz could enhance its on-premise support, expand its threat management features, and improve user interface customization. Vulcan Cyber might benefit from refining its cloud-security capabilities, increasing scalability, and reducing complexity in deployment procedures.
Ease of Deployment and Customer Service: Wiz provides seamless cloud-based deployment and customer service centered on cloud dynamics. Vulcan Cyber offers on-premise and hybrid deployment options with strong support geared toward vulnerability management.
Pricing and ROI: Wiz has a moderate setup cost with promising ROI, particularly for cloud infrastructure. Vulcan Cyber may involve higher initial costs but offers substantial ROI through comprehensive risk mitigation.
With our vulnerability management platform, I used to get reports weekly, but with Vulcan Cyber, I get them daily.
Our security team probably spends 15 minutes instead of two hours daily notifying the teams.
We have seen ROI from Wiz and we continued to see value in Wiz.
We estimate a cost reduction of around 35% to 50%, or even more, due to consolidating our security management into one platform.
I have seen a return on investment with Wiz by reducing our budget spent on other tools, saving time, and needing fewer employees.
We do not necessarily have visibility of when those feature requests are going into the development pipeline.
It would enhance my experience if Vulcan informed customers of forthcoming maintenance or changes that might cause website downtime.
Their technical support team is very good, knowledgeable, and helpful.
On a scale from 1 to 10, I would give Wiz's support a 10.
The vendor was readily available to assist us over calls, clarifying both technical aspects and theoretical insights.
We have also surfaced feature requests or changes, and they have implemented those and rolled those out within a few weeks.
We have a lot of assets under management, and it effectively scales up to accommodate hundreds or even thousands of assets.
I'd rate the scalability ten out of ten.
I would rate it ten out of ten for scalability, as integration with multiple connectors is possible without exceeding licensing limits.
We have deployed Wiz in three organizations on AWS, each with approximately 70 to 80 accounts, totaling more than 120 accounts.
Scalability-wise, I rate the solution a ten out of ten.
Our environment quadrupled in size. We didn’t have to make any adjustments or configuration changes; it just accommodated the growth.
It would be better if Vulcan notified me, the customer, about upcoming maintenance or changes, indicating when the website might be down.
The product's stability is commendable, with no noticeable lags or slowness.
I would rate it a nine out of ten in terms of stability.
The stability of Wiz has been good, with no downtime, bugs, or glitches.
Stability-wise, I rate the solution an eight to nine out of ten.
The solution is very stable.
It would be beneficial if the platform allowed remote access to devices for immediate remedies.
Providing real-world examples of how to construct a ticket format for Jira, Azure DevOps, or ServiceNow with specific examples would help us understand how it might work in our environment.
Having it more customized or providing more customization options for me would be beneficial.
We would like to see preventive controls that can be applied through Wiz to protect against vulnerabilities that we're not going to be able to remediate immediately.
One significant area for improvement would be increasing automation. While they excel at identifying issues, we need assistance in minimizing the human hours required for tasks.
We need an agent that can be installed, or that can overview all the containers and Kubernetes so that it can detect malicious activities that are happening in them.
For our use case, the solution is lacking some features, and the cost savings don't make it worth it.
We are paying 250k per year.
In some cases, it has a very aggressive price, so very cheap.
I don’t think there’s anyone else out there offering the same level, scale, or efficiency.
It offers a comprehensive view of the assets and their associated vulnerabilities, which aids in assessing and mitigating threats.
The automation capabilities using the Vulcan API platform or the API feature allow me to easily automate scripts and reports and schedule them.
Instead of having 100 vulnerabilities and not knowing how to prioritize and assign all your FTEs there, you now have only ten that you know you need to fix, and you're assigning the right number of FTEs.
The feature leads to minimal false positives and a low volume of alerts, which is highly valuable for our operations.
It's highly customizable, allowing us to manage many custom features effectively.
Regarding compliance and governance, Wiz streamlines our vulnerability management to meet specific needs effectively.
| Product | Market Share (%) |
|---|---|
| Wiz | 6.6% |
| Vulcan Cyber | 0.6% |
| Other | 92.8% |

| Company Size | Count |
|---|---|
| Small Business | 1 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 8 |
| Large Enterprise | 20 |
Vulcan Cyber is used by leading cyber security organizations to manage exposure risk created by unmitigated infrastructure, application, code and cloud vulnerabilities.
The Vulcan Cyber ExposureOS starts by correlating and normalizing risk and asset data aggregated from hundreds of vulnerability scanners, asset repositories and threat intelligence feeds. These signals are then used to create a singular view of your organization's attack surfaces to make exposure risk and vulnerability prioritization accurate and actionable.
Vulcan Cyber ExposureOS reduces mean time to remediation by fostering efficient collaboration among security teams, asset and remediation owners through orchestrated workflows and automated remediation tasks.
Use Vulcan Cyber to measure security posture improvement, efficacy of vulnerability risk mitigation campaigns, and compliance with SLAs and regulatory frameworks such as PCI DSS, DORA, NIS2 and HIPPA.
Vulcan Cyber is the only vulnerability risk management solution provider to be named a "Leader" in both the Forrester Wave and Omdia Universe evaluations in 2023.
Wiz is a highly efficient solution for data security posture management (DSPM), with a 100% API-based approach that provides quick connectivity and comprehensive scans of platform configurations and workloads. The solution allows companies to automatically correlate sensitive data with relevant cloud context, such as public exposure, user identities, entitlements, and vulnerabilities.This integration enables them to understand data accessibility, configuration, usage, and movement within their internal environments.
Wiz's Security Graph delivers automated alerts whenever risks emerge, allowing teams to prioritize and address the most critical issues before they escalate into breaches. Furthermore, Wiz ensures rapid and agentless visibility into critical data across various repositories, enabling organizations to easily determine the location of their data assets.
Wiz provides various features in the following categories:
Agentless Scanning: The solution can scan every layer of a cloud environment without requiring agents, managing the entire process and providing comprehensive visibility.
Workflow Integration: Users can create customized workflows within Wiz to identify and assign actions based on urgency, integrating them with ticketing systems for quick and efficient remediation.
Vulnerability Management: Wiz's vulnerability management modules provide detailed analytics and visibility across cloud systems, streamlining the manual process of vulnerability discovery. The automated attack path analysis helps identify risks and trace potential points of exposure, allowing users to understand and mitigate them effectively and proactively.
CSPM (Cloud Security Posture Management): Wiz's CSPM module offers instant visibility into high-level risks to an enterprise’s cloud environment, covering all accounts without the need for agents.
Out-of-the-Box Reporting and Custom Queries: The service supports comprehensive reporting with asset context, allowing users to perform complex custom queries on the solution’s user-friendly interface.
Automation Roles and Dashboards: The solution facilitates automation by providing essential roles and dedicated dashboards that enable teams to understand security information quickly, even those with limited expertise.
Contextual Risk Evaluation: The service contextualizes the various components contributing to an issue, providing a risk evaluation framework that helps prioritize remediation efforts.
Security Graph and Visibility: Wiz's security graph offers visibility across the entire organization, even with multiple accounts, enabling users to understand their environment and assets effectively.
Wiz offers the following benefits:
Comprehensive agentless scanning
Effective identification and mitigation of vulnerabilities
Streamlined vulnerability management
Robust reporting capabilities and customizable queries
Enhanced automation and role-based access control
Prioritized risk evaluation for efficient remediation
Security posture across multiple accounts
Kamran Siddique, VP Information Security at boxed.com, remarks his company has seen a ROI while using Wiz, as it simplifies the process by integrating multiple useful tools into one solution.
According to a Senior Security Architect at Deliveroo, Wiz has given their company a fresh approach to vulnerability management, as Wiz's native integrations are extremely useful and paramount to the operational success of their platform.
We monitor all Vulnerability Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.