![]() When you buy this product you need to connect your data center to Prisma using a service connection. This last one is to connect to the Prisma Cloud. Each user needs the client installed and you as a customer need to buy Panorama plus any network device capable of doing IPSEC tunnel. The users also can access their internal DC on prem and that’s it. This helps your corporate users to protect them when going to the internet and apply the PANOS security we all know. I would like to start with Prisma Access. I think that first of all you guys are comparing two different technologies and the only thing they have in common is that they both are used to protect users to the internet or to their private DC. The only tiny catch we had, was that Prisma Access is served out of GCP in AU (I assume its the same for the rest of the world) - being a financial services client, it meant some regulatory/compliance things, but that was about it. It was easily one of the most reliable services we used - had more issues with virtually everything else. Putting that aside, once it was fixed, we ended up having zero problems whatsoever. The only problem we had, was that our environment was scaled for remote access, not for COVID WFH - we only allocated a /23 for it, and that obviously limited us. Our environment was small though, circa 850 odd users. Our environment was 9.x for everything bar our 5220s, which were still 8.x. We ended up going Prisma Access, but thats also because we bought a ton of other PAN stuff (5220s, virtual FWs in both AWS and Azure, Demisto, Redlock/Prisma Cloud, Twistlock/Prisma Cloud Compute and a couple of other things that I forget). ![]() zScaler' proxy based access was basically a show stopper with our user base - in our limited POC, we had too many calls due to things not working. In my previous job, I evaluated zScaler vs traditional VPN vs Prisma Access.
0 Comments
Leave a Reply. |