Attribute
|
Essential
|
Advanced
|
Prisma
Cloud
|
Focus
|
Cloud Native Application Product
Platform (CNAPP)
|
||
Extras
|
None
|
None
|
AI Security Posture
Management (AI-SPM), Cloud Discovery and
Exposure Management, Cloud Infrastructure
Entitlement Management (CIEM), Cloud Network
Security, Cloud Security
Posture Management (CSPM), Cloud Workload
Protection, Data Security Posture Management (DSPM), Web Application &
API Security
|
Headcount
|
|||
Headcount distribution
|
|||
Headcount growth
|
|||
Headquarters
|
|||
Countries
|
|||
Reputation
|
Same
|
||
Followers
|
Same
|
||
Research Firms
|
None
|
None
|
|
Founded
|
2001 | ||
Funding
|
Bootstrapped
|
Same
|
$65M
USD in 5 rounds from 7 investors
|
Acquisitions
|
None
|
None
|
Acquired 0 times and made 23 acquisitions
|
Revenue
|
|||
CVE
|
284 CVEs reported to MITRE
|
||
Compliance
|
SOC 2 Type
II and SOC
3
|
CSA STAR Level 1, CSA STAR Level 2, Cyber Essentials, Cyber Essentials Plus, FedRAMP Authorized, FIPS 140, IRAP, ISMAP, ISO 27001, ISO 27017, ISO 27018, ISO 27032, ISO 27701, PCI DSS, SOC2+, StateRAMP Authorized and TISAX | |
Bug bounty
|
Yes | ||
Visits
|
|||
Authority
|
|||
Vulnerability database
|
|||
Content
|
Same
|
||
Knowledge base
|
13 KB sections, 7
in common and 6 additional
|
||
Community
|
|||
Sync training
|
No
|
No
|
No
|
Async training
|
Security education
platform
(subscription-based)
|
||
Distribution
|
Same
|
||
Marketplaces | AWS, Azure, GCP and GitHub | ||
Freemium
|
No
|
No
|
No
|
Free trial
|
|||
Demo
|
|||
Pricing
|
|||
Pricing tiers
|
1 plan
|
1 plan
|
2 plans (Business, enterprise). All transparent
|
Minimum commit
|
|||
Minimum payment period
|
|||
Minimum capabilities
|
No information available
|
||
Minimum scope
|
1 group
|
1 author
|
100 credits
|
Pricing drivers
|
|||
Minimum monthly
payment
|
Attribute
|
Essential
|
Advanced
|
Prisma Cloud
|
PTaaS
|
No
|
No
|
|
Reverse engineering
|
No
|
Yes | No |
Secure code review
|
No
|
No
|
|
Pivoting
|
No
|
No
|
|
Exploitation
|
No
|
No
|
|
Manual reattacks
|
Not applicable
|
Not applicable
|
|
Zero-day
vulnerabilities
|
None
|
Continuous
zero-day vulnerability
research
|
|
SLA
|
Availability | ||
Min availability
|
>=99.95%
per minute LTM
|
>=99.9% unknown per month
|
|
After-sale guarantees
|
No
|
No
|
|
Accreditations
|
|||
Hacker certifications
|
Not applicable
|
Not applicable
|
|
Type of contract
|
Employee
|
Same
|
|
Endpoint control
|
Not applicable
|
Total
|
Not applicable
|
Channel control
|
Not applicable
|
Total
|
Not applicable
|
Standards
|
Some requirements
from 65
standards, 17 in common and
48
additional
|
All requirements from the same standards
|
40
standards, 17 in common and 23 additional
|
Detection method
|
Automated
tools and AI
|
||
Remediation
|
5,
3 in common and 2 additional
|
Same, plus 1
|
3,
all in common
|
Outputs
|
5,
3 in common and 2 additional
|
Same, plus 2
|
4,
3 in common and 1 additional
|
Attribute
|
Essential |
Advanced
|
Prisma Cloud
|
ASPM
|
Yes |
No
|
|
API
|
|||
IDE
|
5 functionalities,
3 in common and 1 additional
|
Same,
plus 1 functionality
|
3 functionalities,
all in common
|
CLI
|
|||
CI/CD
|
|||
Vulnerability sources
|
4 sources
|
No information available
|
|
Priority criteria
|
|||
Custom prioritization
|
Priority score | Same |
No
|
Scanner origin
|
|||
SCA
|
|||
AI security
|
No
|
||
Reachability
|
12 languages
|
No
|
|
Reachability type
|
Not applicable
|
||
SBOM
|
|||
Malware detection
|
Yes
|
Yes
|
|
Autofix on components
|
No
|
No
|
No
|
Containers
|
|
||
Source SAST (languages)
|
12,
8 in common and 4 additional
|
12, 8 in common and 4
additional
|
|
Source SAST (frameworks)
|
1, none in common |
||
Custom rules
|
No
|
No
|
|
IaC
|
6,
3 in common and 3 additional
|
4,
2 in common and 2 additional
|
6, 5 in common and 1 additional
|
Binary SAST
|
1 type of
binary
|
Same,
plus 2 types of binaries
|
|
DAST
|
No |
||
API security testing
|
No
|
4 types
of APIs, 3 in common and 1 additional
|
3 types of APIs, all in common
|
IAST
|
No
|
No
|
No
|
CSPM
|
Yes | ||
Environments
|
Left & Right (included)
|
Same
|
|
ASM
|
No
|
No
|
No
|
Secrets
|
Same, plus verify other attack
vectors and secrets exploitability
|
||
AI
|
|||
Open-source
|
Not applicable
|
No
|
|
Provisioning as Code
|
No
|
||
Deployment
|
SaaS
and on-premises
|
||
Regions | |||
Status
|
|||
Incidents
|
Attribute
|
Essential
|
Advanced
|
Prisma Cloud
|
SCM
|
4
|
4, all in
common
|
|
Binary repositories
|
None
|
None
|
None
|
Ticketing
|
3, 1 in common and 2 additional
|
1 in common |
|
ChatOps
|
None |
None
|
|
IDE
|
3, 2 in common and 1 additional
|
15, 2 in common and 14 additional |
|
CI/CD
|
20, 5 in common and 15
additional
|
6,
5 in common and 1 additional
|
|
SCA
|
Native and 1 integration |
||
Container
|
Native and 1 integration |
||
SAST
|
Native and 1 integration |
||
DAST
|
None |
||
IAST
|
None |
None
|
None
|
Cloud
|
3, all in common
|
4, 3 in common
and 1 additional
|
|
CSPM
|
Native and 5 integrations | ||
Secrets
|
|||
Remediation
|
None
|
None
|
Native and 1 integration
|
Bug bounty
|
None
|
None
|
None
|
Vulnerability management
|
None
|
None
|
|
Compliance
|
None
|
None
|
None
|