Our primary use case for this solution is for container security and monitoring.
Works
Has provided us with insight into the dynamic topology of our containers
Pros and Cons
- "It has helped us understand the dynamic topology of our containers, and manage security through the application of policies that our pipelines apply straight from Git."
- "It has helped us understand the dynamic topology of our containers and manage security through the application of policies that our pipelines apply straight from Git."
- "I would like to see the inclusion of automated counter-attack, although this is probably illegal."
- "I would like to see the inclusion of automated counter-attack, although this is probably illegal."
What is our primary use case?
How has it helped my organization?
It has helped us understand the dynamic topology of our containers and manage security through the application of policies that our pipelines apply straight from Git.
What is most valuable?
The most valuable feature is the automated forensics.
What needs improvement?
I would like to see the inclusion of automated counter-attack, although this is probably illegal.
Buyer's Guide
Prisma Cloud by Palo Alto Networks
March 2026
Learn what your peers think about Prisma Cloud by Palo Alto Networks. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,286 professionals have used our research since 2012.
For how long have I used the solution?
More than one year.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cloud Architect, Oracle ACE, Oracle DBA at Pythian
Helps secure our client's Linux workloads on any infrastructure, with end-to-end encryption
Pros and Cons
- "The dynamic workload identity creation, attestation, and assignment is the best feature. In addition, the application dependency map across heterogeneous environments for compliance is a striking feature."
- "Aporeto has accelerated our client's expansion to the cloud, securing their Linux workloads on any infrastructure with end-to-end encryption and providing a path for modernizing with a security layer that is future-proofed."
- "More documentation with real-world use cases would be helpful."
- "More documentation with real-world use cases would be helpful."
What is our primary use case?
Our client needed a solution which would be a true implementation of the concept "Trust, but verify," and Aporeto fulfills that notion as it decouples security from network and infrastructure. It services microservices in a nifty and seamless way.
How has it helped my organization?
Aporeto has accelerated our client's expansion to the cloud. With Aporeto, they have secured their Linux workloads on any infrastructure with end-to-end encryption and have a path for modernizing with a security layer that is future-proofed.
What is most valuable?
The dynamic workload identity creation, attestation, and assignment is the best feature. In addition, the application dependency map across heterogeneous environments for compliance is a striking feature.
It integrates quite well with the AWS products as it uniquely fingerprints each workload. Aporeto is designed to combine metadata from the orchestration layer, the container, the operating system, and the AWS instance identity document. By combining these information sources, along with dynamic attributes such as image scanner inputs, Aporeto is designed to create a strong cryptographic identity for each workload. It authenticates and authorizes all network communications within a virtual private cloud (VPC), across VPCs independent of their region or availability zone, and across cloud environments.
What needs improvement?
More documentation with real-world use cases would be helpful. Another useful feature would be greater transparency and visibility into the security checks being implemented.
What do I think about the stability of the solution?
In AWS, it scales with the cloud and we have found no issues at all with the stability.
What do I think about the scalability of the solution?
Aporeto is now available in AWS where it efficiently deploys, manages, and secures applications at scale on various platforms including Kubernetes, Docker, Linux, and Mesos, among others.
What's my experience with pricing, setup cost, and licensing?
The purchasing process was easy and quick. It is a very economical solution.
We chose to procure this solution via AWS Marketplace because that's where we get all other solutions and to make sure it's supported by AWS.
What other advice do I have?
I would rate it as a nine out of ten, due to its cloud-facing features which fit in nicely with the whole cloud ecosystem.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Prisma Cloud by Palo Alto Networks Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Product Categories
Cloud-Native Application Protection Platforms (CNAPP) Web Application Firewall (WAF) Container Security Cloud Security Posture Management (CSPM) Data Security Posture Management (DSPM)Popular Comparisons
SentinelOne Singularity Cloud Security
Microsoft Defender for Cloud
Checkmarx One
Varonis Platform
Imperva Application Security Platform
CrowdStrike Falcon Cloud Security
Orca Security
Buyer's Guide
Download our free Prisma Cloud by Palo Alto Networks Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the biggest difference between Aqua Security and Twistlock?
- What do you think of Aqua Security vs Prisma Cloud?
- How is Prisma Cloud vs Azure Security Center for security?
- When evaluating Cloud-Native Application Protection Platforms (CNAPP), what aspect do you think is the most important to look for?
- Why is a CNAPP (Cloud-Native Application Protection Platform) important?
- What CNAPP solution do you recommend for a hybrid cloud?
- Why are Cloud-Native Application Protection Platforms (CNAPP) tools important for companies?
- When evaluating Cloud-Native Application Protection Platforms (CNAPP) solutions, what aspect do you think is the most important to look for?
- Why is Cloud-Native Application Protection Platforms (CNAPP) important for companies?
- What Cloud-Native Application Protection Platform do you recommend?
















