Attribute
|
Essential
|
Advanced
|
Prisma
Cloud
|
|
Focus
|
Cloud Native Application Product
Platform (CNAPP)
|
|||
Extras
|
None
|
None
|
AI Security Posture
Management (AI-SPM), Cloud Discovery and
Exposure Management, Cloud Infrastructure
Entitlement Management (CIEM), Cloud Network
Security, Cloud Security
Posture Management (CSPM), Cloud Workload
Protection, Data Security Posture Management (DSPM), Web Application &
API Security
|
|
Headcount
|
||||
Headcount distribution
|
||||
Headcount growth
|
||||
Headquarters
|
||||
Countries
|
||||
Reputation
|
Same
|
|||
Followers
|
Same
|
|||
Research Firms
|
None
|
None
|
||
Founded
|
2001 | |||
Funding
|
Bootstrapped
|
Same
|
$65M
USD in 5 rounds from 7 investors
|
|
Acquisitions
|
None
|
None
|
Acquired 0 times and made 23
acquisitions
|
|
Revenue
|
||||
CVE
|
284 CVEs reported to MITRE
|
|||
Compliance
|
SOC 2 Type
II and SOC
3
|
CSA STAR Level 1, CSA STAR Level 2, Cyber Essentials, Cyber Essentials Plus, FedRAMP Authorized, FIPS 140, IRAP, ISMAP, ISO 27001, ISO 27017, ISO 27018, ISO 27032, ISO 27701, PCI DSS, SOC2+, StateRAMP Authorized and TISAX | ||
Bug bounty
|
Yes | |||
Visits
|
||||
Authority
|
||||
Vulnerability database
|
||||
Content
|
||||
Knowledge base
|
13 KB sections, 7
in common and 6 additional
|
|||
Community
|
||||
Sync training
|
1 workshop
|
No
|
||
Async training
|
Security education
platform
(subscription-based)
|
|||
Distribution
|
Same
|
|||
Marketplaces | AWS, Azure, GCP and GitHub | |||
Freemium
|
No
|
No
|
No
|
|
Free trial
|
||||
Demo
|
||||
Open Demo
|
No
|
No |
No
|
|
Pricing
|
||||
Pricing tiers
|
1 plan
|
1 plan
|
2 plans (Business,
enterprise). All transparent
|
|
Minimum term
|
||||
Minimum payment period
|
||||
Minimum capabilities
|
No information available
|
|||
Minimum
scope
|
1 group
|
1 author
|
100 credits
|
|
Pricing drivers
|
||||
Minimum monthly
payment
|
Attribute
|
Essential
|
Advanced
|
Prisma Cloud
|
PTaaS
|
No
|
No
|
|
Reverse engineering
|
No
|
Yes | No |
Secure code review
|
No
|
No
|
|
Pivoting
|
No
|
No
|
|
Exploitation
|
No
|
No
|
|
Manual reattacks
|
Not applicable
|
Not applicable
|
|
Zero-day
vulnerabilities
|
None
|
Continuous
zero-day vulnerability
research
|
|
SLA
|
Availability | ||
Min availability
|
>=99.95%
per minute LTM
|
>=99.9% per
month
|
|
After-sale guarantees
|
No
|
No
|
|
Accreditations
|
|||
Hacker certifications
|
Not applicable
|
Not applicable
|
|
Type of contract
|
Employee
|
Same
|
|
Endpoint control
|
Not applicable
|
Total
|
Not applicable
|
Channel control
|
Not applicable
|
Total
|
Not applicable
|
Standards
|
Some requirements
from 67 standards, 17 in common and 50 additional
|
All requirements from the same standards
|
40 standards,
17 in common and 23 additional
|
Detection method
|
Automated
tools and AI
|
||
Remediation
|
5,
3 in common and 2 additional
|
Same, plus 1
|
3,
all in common
|
Outputs
|
5,
3 in common and 2 additional
|
Same, plus 2
|
4,
3 in common and 1 additional
|
Attribute
|
Essential |
Advanced
|
Prisma Cloud
|
ASPM
|
Yes |
No
|
|
API
|
|||
IDE
|
5 functionalities,
3 in common and 1 additional
|
Same,
plus 1 functionality
|
3 functionalities,
all in common
|
CLI
|
|||
CI/CD
|
|||
Vulnerability sources
|
4 sources
|
No information available
|
|
Priority criteria
|
|||
Custom prioritization
|
Priority score | Same |
No
|
Scanner origin
|
|||
SCA
|
|||
AI security
|
No
|
||
Reachability
|
12 languages
|
No
|
|
Reachability type
|
Not applicable
|
||
SBOM
|
|||
Malware detection
|
Yes
|
Yes
|
|
Autofix on components
|
No
|
No
|
No
|
Containers
|
|
||
Source SAST
(languages)
|
12,
8 in common and 4 additional
|
12, 8 in common and 4
additional
|
|
Source SAST
(frameworks)
|
1, none in common |
||
Custom rules
|
No
|
No
|
|
IaC
|
6,
3 in common and 3 additional
|
4,
2 in common and 2 additional
|
6,
5 in common and 1 additional
|
Binary SAST
|
1 type of
binary
|
Same,
plus 2 types of binaries
|
|
DAST
|
No |
||
API security testing
|
No
|
4 types
of APIs, 3 in common and 1 additional
|
3 types
of APIs, all in common
|
IAST
|
No
|
No
|
No
|
CSPM
|
Yes | ||
ASM
|
No
|
No
|
No
|
Secrets
|
Same, plus verify other attack
vectors and secrets exploitability
|
||
AI
|
3 functions, 2 in common and 1
additional
|
||
MCP
|
|||
Open-source
|
Not applicable
|
No
|
|
Provisioning as Code
|
No
|
||
Deployment
|
SaaS
and on-premises
|
||
Regions | |||
Status
|
|||
Incidents
|
Attribute
|
Essential
|
Advanced
|
Prisma Cloud
|
SCM
|
6,
4 in common and 2 additional
|
4, all in
common
|
|
Binary repositories
|
None
|
None
|
None
|
Ticketing
|
3, 1 in common and 2 additional
|
1 in common |
|
ChatOps
|
None |
None
|
|
IDE
|
3, 2 in common and 1 additional
|
15, 2 in common and 14 additional |
|
CI/CD
|
20, 5 in common and 15
additional
|
6,
5 in common and 1 additional
|
|
SCA
|
Native and 1 integration |
||
Container
|
Native and 1 integration |
||
SAST
|
|||
DAST
|
None |
||
IAST
|
None |
None
|
None
|
Cloud
|
3, all in common
|
4, 3 in common
and 1 additional
|
|
CSPM
|
Native and 4 integrations | ||
Secrets
|
|||
Remediation
|
None
|
None
|
Native and 1 integration
|
Bug bounty
|
None
|
None
|
None
|
Vulnerability management
|
None
|
None
|
|
Compliance
|
None
|
None
|
None
|