scratching the surface on cloud security
What do you like best about the product?
WIZ Security visibility has changed the way we manage security events. Using a risk based approach we are able to evaluate the configuration and its association with all resources to prioritize response. The threat center provides a great starting point to understand the most critical events to focus on.
What do you dislike about the product?
Wiz has a lot of opportunity to scale the platform and provide a single pane of glass for all layers of cloud infrastructure. Recent capabilities for Data, identity and recently announced security lake are just the beginning of the possibilities I would like to see in the platform. In the near future I would like to see runtime protection for servers, containers and serverless.
What problems is the product solving and how is that benefiting you?
WIZ provides a single pane of glass to see all of the risk in our environment. Not having to maintain an agent allows us to focus our efforts on security events and should be the model for other security and observability tools to follow. Daily, we use WIZ to manage our vulnerability management program and standardize remediation of CVE across Server and containers.
Essential for our security teams visibility into all things infrastructure and orchestration
What do you like best about the product?
Wiz has enabled our security team to work more independently and with a greater context of our internal infrastructure. Before we implemented Wiz, we were completely dependent on our infrastructure team to follow our standards and best practices. Now, we can validate these practices and get alerts when Wiz detects any deviations.
What do you dislike about the product?
Wiz will take some tuning (as is true with all security tools) with both severity and types of alerts. It inflated many out-of-the-box alerts because the agent reported that our VPC wasn't private because certain ports were open for specific services. This was a bit of a nuisance to correct but a minor thing in the grand scheme of the value it provides.
What problems is the product solving and how is that benefiting you?
Our team can work more efficiently and intelligently with our infrastructure team and has also reduced a lot of dependencies that we once had. It also provides alerting and monitoring that would otherwise not be available to us.
Review of Wiz Cloud Security
What do you like best about the product?
I like the fact that Wiz shows you new issues when vulnerabilities are released. It's helpful to understand when new risk is introduced to our network. I also like the breakdown of where the risk resides with the diagram.
What do you dislike about the product?
In the cloud environment, it can be difficult to track down who is responsible for a host. The identification of hosts based on ARNs in AWS can be tedious, I wish mapping to a responsible party was easier.
What problems is the product solving and how is that benefiting you?
Wiz helps us find publicly exposed S3 buckets, EC2 instances, containers, etc and not only identify the issues but also help prioritize the issues for remediation so that we focus on the most critical issues first.
Excellent Visibility to our Environment
What do you like best about the product?
For a smaller organization, we were able to get use from the tool immediately. It showed us some misconfigurations that we weren't aware of and gave us good direction to put us on a path to clean up. Being able to see why a misconfiguration is a risk is really nice to see. Also the ability to separate my cloud space into "projects" allows for quick viewing of problems and allows for easier triage.
What do you dislike about the product?
There is a learning curve to the syntax for gathering things that are not considered default and using the graph feature. Though getting much better in the container space, it isn't their strong point yet but it is still strong overall.
What problems is the product solving and how is that benefiting you?
Better visibility than the native tools in the cloud. Connectivity to our ticketing system is nice and allows us to decide which ones to create tickets on and pass them on to the developers.
Simplifies security configuration reviews
What do you like best about the product?
Wiz has made our monthly cloud security reviews much simpler and more thorough at the same time. The easy to understand layout of findings make it approachable to everyone rather than needing a cloud configuration engineer for everything.
The ability to create custom controls and frameworks is incredibly helpful as we work to exceed industry standards and hold ourselves to a higher bar. The built-in frameworks are excellent measuring tools to see where you stack up to common certifications and regulations.
What do you dislike about the product?
Out-of-the-box Wiz is a great tool to help ensure security. There are times when it becomes a rabbit hole which has the potential for someone to become concerned with all of the findings and devices and paths and all the other available information. It can become overwhelming pretty easily.
What problems is the product solving and how is that benefiting you?
Cloud providers can very often give you all the information you'd ever want, but in a way that makes you dig for it to find the useful bits. Wiz makes everything easy to find, easy to understand, and easy to take action on.
Must have technology for CSPM
What do you like best about the product?
The correlated visulaization and context provided around the misconfiguration helps to prioritize the remediations.
What do you dislike about the product?
Case sensitive searches, it becomes difficult to find the asset specially when using fqdns.
What problems is the product solving and how is that benefiting you?
Visibility, remediation prioritisation and single pane of glass for cloud platforms.
It was a great learning experience. Learned a lot of new things
What do you like best about the product?
I like the flexibility of having compliance to pick from and inventory list
What do you dislike about the product?
The reports are hard to read and understand. It requires some time to read through the json file to find out what issues are there
What problems is the product solving and how is that benefiting you?
Wiz is a great security scanning platform. We have wiz cli integrated, which helps in having a governance around what can and cannot be deployed
Multiple features help us prioritize remediation, and agentless implementation reduces overhead
What is our primary use case?
The Primary use cases are within cloud security posture management, in which we identify misconfigurations and any type of what they call "toxic combinations" of risk and vulnerabilities that are affecting our cloud deployments.
In the last year we have enabled DSPM and expanded on CIEM use cases.
In addition to the agentless functionality, we have deployed the Wiz Sensor and enabled Admission Controller in our Kubernetes workloads.
How has it helped my organization?
We don't consider Wiz just a cyber security tool. What we have done is opened up the visibility to our cloud users. Now, our cloud users are able to see for themselves what is affecting their assets. It helps enable a shared model of responsibility for security. With the visibility that Wiz enables, our users are no longer receiving a report in the form of a spreadsheet. They're able to quickly see and navigate, and drill into anything, if they need to, to see what is affecting their environments.
Now that we have given them visibility into what's running in production, through some of the capabilities available in Wiz, we are investing in how we can shift things and identify some of those issues earlier in the pipeline so that they don't have to worry about things after going to production.
In addition, the fact that Wiz is agentless and that it's leveraging APIs to give us visibility at the organizational or the account level, are factors that have definitely reduced some of the overhead that come with other technologies that use agents to attain the same results.
Another benefit is that it consolidates tools. We now have one tool that is capable of giving us vulnerabilities, not just on modern services or cloud-ready services, but also on traditional instances in which we would have been using an agent to be able to pull the information we need. The fact that Wiz is agentless and is capable of looking at traditional compute as well as modern compute has reduced the need for additional tools that are agent-based.
What is most valuable?
Out of all the features, the one item that has been most valuable is the fact that Wiz puts into context all the pieces that create an issue, and applies a particular risk evaluation that helps us prioritize when we need to address a misconfiguration, vulnerability, or any issue that would put our environment into risk. The fact that it's able to reveal those toxic combinations has been really key for us in prioritizing what to fix first.
Having visibility with a contextual view for prioritizing potentially critical risks has been quite important. Especially in the cloud, it's no longer about applying a particular patch or applying particular updates to address a CVE. It's more about, for example, how a combination of a misconfiguration with the fact that it's externally facing allows us to prioritize that to be addressed first. There's a higher risk for an externally facing asset that has a vulnerability with, potentially, a service account that has high privileges. We're able to say, "Hey, we need to fix that first," and not worry so much about a compute engine that might be vulnerable, but is still protected by some other security controls that are in place. Knowing where we gain the most value, from a security perspective, and where we can reduce the most risk, has been a critical piece of our adoption of Wiz.
The solution's Security Graph has been key as well. One of the things that Wiz provides is out-of-the-box dashboards, but the Security Graph allows us to pinpoint things by creating custom reports to target specific vulnerabilities. We have multiple use cases in which we can target, for example
- a subscription ID that we are after, and that we are trying to prioritize for remediation
- if a particular CVE is part of our environment.
Through the Security Graph, we're able to quickly determine those types of things. It also enables us to start looking at our assets and our inventory. It's almost human-readable. I don't have to write any type of RQL code. Rather, it allows me to quickly select, through the UI, the pieces that I'm interested in and build a report or query for it.
In addition, the automated attack path analysis is one of the factors that we use when we're prioritizing where we should focus first in our remediation. Understanding any type of lateral movement within an attack path helps us determine the type of urgency involved, as we try to prioritize what to address first. It has been very important in detecting assets that we consider valuable and quickly identifying if they are well protected.
What needs improvement?
Something that we're starting to look into is identifying vulnerabilities for which we potentially need to delay the remediation. We wish there were a way, beyond providing visibility and automated remediation, to wait on a given remediation, due to a critical aspect, such as the cost associated with a particular upgrade. We don't have remediation prevention capabilities available through Wiz. We would like to see preventive controls that can be applied through Wiz to protect against vulnerabilities that we're not going to be able to remediate immediately.
For how long have I used the solution?
We've been using Wiz for almost 4 years.
What do I think about the stability of the solution?
It is pretty stable. We initially had some problems with timeouts, but they addressed them and the platform has been quite stable.
What do I think about the scalability of the solution?
We have not had any problems with being able to scale to meet our demands.
Which solution did I use previously and why did I switch?
We did not have a previous solution for the cloud.
How was the initial setup?
It was straightforward. We did it in partnership with Wiz.
We have it deployed across multiple public clouds and it's deployed at the organization level. All of our application teams and our 250-plus cloud users are able to see the data through Wiz.
We started with one FTE on Wiz and, since then, we have grown the team to three FTEs.
In terms of maintenance, no solution is perfect. We have been able to identify issues on the platform and to engage support to either address the bugs and issues that we see, or to enable a feature enhancement for a particular use case.
What was our ROI?
We have seen ROI from Wiz and we continued to see value in Wiz. Although we have been using Wiz for close to two years, one of the key items that we are still driving is adoption. The more cloud users that adopt the tool, the more value we gain from it. We still continue to see value added.
In terms of immediate benefits, the first major benefit was asset management. We got a better understanding of the type of workloads or services that were being run in our cloud. The second benefit was around vulnerabilities. Wiz quickly proved that a lot of our application teams were not following best practices related to patching. We were able to quickly tell a story: although you are using a modern service in the form of a container, you are not maintaining the container image in a way that prevents vulnerabilities.
One of the main values that we see is that as a SaaS platform, Wiz continues to deploy new features. As those new features are enabled, more value is being gained by us and by our community.
What's my experience with pricing, setup cost, and licensing?
I believe they're moving to a different licensing model. We are still grandfathered to the initial pricing models. What I do like is that the pricing seems pretty simple. We don't have to do a lot of calculations to figure out what the components are. They do it by enabling specific features, either basics or advanced, which makes it easy to select. But I'll have to see how the new pricing model will work for us.
Which other solutions did I evaluate?
We evaluated Aqua Cloud Security Posture Management, Prisma Cloud, and Orca Security. Wiz seems to be more user-friendly. It enables a user to quickly identify risks with minimal intervention. That was definitely a positive factor and a welcome one because it's less hands-on than some of the other tools.
Also, the fact that Wiz is able to see and contextualize multiple components or issues, provides a richer way of looking at risk. It takes into account not just a particular vulnerability that is CVE-driven, but also items like misconfigurations, over-privileged service accounts, and other factors that help us better prioritize our risk.
What other advice do I have?
Initially, there was unplanned work when our cloud owners saw the risks in their environments. But because we were prioritizing what needed to be fixed first, they were able to utilize existing staff resources to address those vulnerabilities. We were not just trying to patch or fix something that might be low risk. Rather, we were always trying to identify where our critical issues were and address those first.
If you're looking at Wiz but are concerned that your existing products already give you a lot of alerts, I would ask about your journey to the cloud and what you're focusing on. Are you mainly focusing on what I call CVEs and patching? Or are you looking into other areas like compliance and identity and access management pieces? If you are, then Wiz is definitely the right choice. It has to be driven based on that journey to the cloud. Visibility, once deployed, is one thing, and visibility prior to deployment is another thing. You should have a good understanding of what your requirements are and where you see the value of addressing any type of risk that is introduced into your environment.
Understand what is important to you. Are you more focused on the CSPM features that are available through Wiz? Are you more focused on cloud infrastructure entitlements that are available through Wiz? Are you looking to remove existing agents that could create overlap, and how does that fit into your roadmap? Understanding your requirements for the type of information that you want to see out of the tool is going to be critical to understanding your use cases, and how your community is engaged with those use cases, regardless of how easy the tool is to integrate. Those are factors that are going to be vital to your success.
SRE using wiz to manage vulns
What do you like best about the product?
The continuous scanning of our infra without human interaction
What do you dislike about the product?
Too many tickets created for only one issue
What problems is the product solving and how is that benefiting you?
Vulnerability management and discovery
CSP graph at a glance
What do you like best about the product?
The ease at finding risks to the organization and conveying them to others
What do you dislike about the product?
Aggregation has to be done external for advanced grouping
What problems is the product solving and how is that benefiting you?
Reducing security risks across the multi vendor cloud service provider landscape