Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

12 AWS reviews

External reviews

757 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Health, Wellness and Fitness

Effortless Remediation Steps Make It a Standout

  • December 09, 2025
  • Review provided by G2

What do you like best about the product?
The remediation steps are actually actionable - not just 'fix this' but showing you exactly how. Also, the multi-cloud coverage means I'm not juggling different tools for our various portfolio companies' infrastructure.
What do you dislike about the product?
Takes a bit to learn their UX language, but once you get it, it makes sense. Sometimes the alert noise can be high until you tune it properly.
What problems is the product solving and how is that benefiting you?
We're dealing with patient health data, so any cloud misconfiguration could mean a HIPAA breach. Wiz catches stuff like exposed S3 buckets or overly permissive access before it becomes a problem. The continuous monitoring means I'm not constantly manually checking if PHI is actually protected. Also makes compliance audits way easier - I can actually show what controls we have in place instead of just saying 'trust me, it's secure.


    MohammedYasin

Cloud security has improved and detects vulnerabilities across multi-account environments

  • December 09, 2025
  • Review from a verified AWS customer

What is our primary use case?

Wiz serves as our enterprise tool for securing our cloud platform. We use AWS as our cloud platform and have Wiz integrated across multiple accounts for IT, engineering, and other departments. Within IT itself, we have different environments including development, production, and stage accounts. In every account, we have Wiz integrated and use policies based on the environment. For example, the dev environment has a less secure policy while production has a high-security policy. Technically, we use Wiz for securing our cloud platform.

What is most valuable?

The best feature of Wiz is the ability to detect any security violations across multi-cloud platforms and the ability to integrate for creating security incidents and vulnerability incidents. It works very well for scanning the environment, detecting vulnerabilities, and reporting them based on our requirements. It can generate reports via email or create ServiceNow incidents. It has helped me identify threats more easily. When it comes to the Kubernetes cluster, we do not have any other option for detecting vulnerabilities. This is the only way we observe our Kubernetes clusters to determine whether they are secured or not. Regarding speed, I cannot compare it with other solutions, but so far, we are happy with the way it works.

Wiz has improved our business in many ways. While I do not know in numbers how it has helped the business gain more profit, as a technical expert and part of our IT architect team, I would say Wiz has helped tremendously to secure our cloud platform. There were many security vulnerabilities existing before we implemented this solution that were not at all in our attention because there was nothing to scan and report what was wrong. After implementing Wiz, it has helped significantly. There was a program for implementing high-security measures in our environment, and Wiz has contributed substantially to that program.

What needs improvement?

I feel there is a delay in detection, though I am uncertain whether this is due to our implementation disadvantage. Wiz can detect all the issues, threats, and security vulnerabilities, but the delay may be due to the time taken for running a scan because we have a 24-hour scan cycle. When I checked with the team, there was no on-demand scanning possibility. We still see improvement scopes in this area. It does the work, but we are not seeing the changes very fast. Once you get a threat and fix it, to see that fix reflected in Wiz, you have to wait 24 hours. That is something I am not happy with.

One improvement that I am looking for in Wiz is the capability for on-demand scanning. That should be available. Second, we should be able to see the fixes faster. Once a threat is detected and we apply the fix, we want to see that result updated in the dashboard or portal as soon as possible. If Wiz can detect it faster and update it in the portal, that would be beneficial.

For how long have I used the solution?

I have been using Wiz for more than two years, approximately two years and four months.

What do I think about the stability of the solution?

Regarding stability, it is stable. I would rate it nine out of ten.

What do I think about the scalability of the solution?

Regarding scalability, I would also rate it nine out of ten.

How are customer service and support?

I would rate the technical support of Wiz eight out of ten on a scale from one to ten, with ten being the best.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

When comparing Wiz with other software, I did not use any other software similar to Wiz for the same purpose. A similar tool was Qualys, but we used Qualys for a different use case. We used it for vulnerability scanning of our servers, not end-user devices. For securing or detecting threats from cloud accounts, I do not have any other tool that I am aware of. Qualys is another vulnerability management tool, but the use cases are different, so I do not have the expertise to compare.

How was the initial setup?

Deployment took approximately three months.

What about the implementation team?

From one to ten, with one being cheap and ten being expensive, I would rate the implementation cost a seven.

What was our ROI?

Wiz does require some maintenance.

What's my experience with pricing, setup cost, and licensing?

Wiz does require some maintenance.

Which other solutions did I evaluate?

My thoughts on the pricing of Wiz are that it is not cheap, but it is cost-efficient. From one to ten, with one being cheap and ten being expensive, I would rate it a seven.

What other advice do I have?

I would recommend Wiz to anyone. If anyone wants to secure their infrastructure, cloud environment, or Kubernetes cluster, I would strongly recommend Wiz as a tool because it is easy to use and user-friendly. It has tight integration with many tools out-of-the-box for sending alerts, creating emails, and creating incidents.

My advice to others looking to implement Wiz is that when you implement Wiz, if your hybrid environment is not managed properly, it will be difficult to implement. It is better to make some cleanup and ensure that the environment you are going to implement meets Wiz standards. If you do not take care of that and simply implement Wiz, you will encounter many issues being reported by the system. It is better to follow the prerequisite standards of your cloud account and then implement the solution. Otherwise, you will see many issues being reported.

Regarding whether Wiz has helped reduce alert fatigue, I do not have a definitive answer because we do not see that much decrease in the alerts. Initially, when we implemented Wiz, since we were not using any tool like that before, there were too many alerts. Because it was the first implementation, it started sending too many alerts. Later on, the alerts decreased, but this decrease was not because of Wiz itself. Rather, it was because we implemented security fixes wherever Wiz reported threats or vulnerabilities. That is how the number of alerts got reduced. I feel we can also customize the Wiz policy to reduce the number of alerts, but I am not at that level here, so I do not have that expertise.

My overall rating for this solution is eight out of ten.


    Yohan B.

Outstanding Experience

  • December 09, 2025
  • Review provided by G2

What do you like best about the product?
As a tech lead security engineer, what I appreciate most about Wiz is its ability to prioritize what truly matters. The toxic-combination engine is exceptionally effective at surfacing real, exploitable risks rather than overwhelming the team with noise. This also empowers our engineering teams to use Wiz autonomously daily, i.e. they can quickly understand what needs to be fixed first, without relying on security for constant supervision. That independence has been a major productivity boost and reduces friction, while the security team still maintains oversight for high-risk scenarios the tool might not fully capture.
On top of that, the CNAPP platform is comprehensive, and require only a few amount of time to set up and integrate everything in our ecosystem. We leverage Wiz across our cloud infrastructure, workloads, and runtime using the Wiz Sensor, which performs reliably with minimal overhead. The security graph makes exploration intuitive and gives us the context we need to understand issues end-to-end.
The customer success team is also one of the best I’ve worked with, which is highly appreciated.
What do you dislike about the product?
Overall, the platform work very well, and there are no big drawbacks. However, there is one challenge around KPIs, metrics, and vulnerability tracking in autoscaling environments. Because resources scale in and out frequently, we often lose track of what was actually fixed by engineering versus what simply disappeared due to autoscaling events. Vulnerabilities may appear “closed” when the underlying resource is terminated, only to reappear when a new instance is spun up. But overall, you still can follow the big picture of your vulnerabilities.
What problems is the product solving and how is that benefiting you?
Wiz brings us clarity to the complexity of managing cloud security at scale. It consolidates visibility across cloud resources, workloads, and runtime into a single, coherent platform. The prioritization model ensures that both security and engineering teams stay focused on the risks that matter most, rather than sifting through thousands of low-impact findings.

It also enables engineering teams to take meaningful action independently, which greatly accelerates remediation and reduces operational overhead for the security team. At the same time, it doesn’t replace the need for dedicated security expertise, we still rely on our team to investigate nuanced, high-risk cases and validate critical exposures. But Wiz provides a rich layer of insight with almost no additional effort required from engineers, making the entire organization more efficient and more secure.


    Alvaro M.

Wiz: Exceptional User Experience and Enhanced Efficiency

  • December 09, 2025
  • Review provided by G2

What do you like best about the product?
Wiz is a truly impressive tool. The user experience stands out, as it allows access to the platform through an interface adapted to each user's role. Additionally, Wiz's ability to prioritize critical aspects significantly contributes to improving work efficiency.
What do you dislike about the product?
The truth is that I don't find any negative aspect in Wiz, as for the use we give it, it turns out to be an excellent tool.
What problems is the product solving and how is that benefiting you?
Wiz provides us with centralized visibility of our multicloud environment, covering both the configuration of different clouds (CSPM) and the protection of workloads and applications (CNAPP). Having all findings visible and prioritized in one place allows us to organize and tackle the work much more efficiently.


    Consulting

Effortless Adoption and Prioritization Across Teams

  • December 08, 2025
  • Review provided by G2

What do you like best about the product?
I appreciate the ease of use, the ability to prioritize tasks, and the clear communication regarding issues. Additionally, I have noticed how quickly it has been adopted by various teams.
What do you dislike about the product?
The only aspect that left me disappointed was the transition from the previous "all in" licensing model to a pricing structure based more on specific features or workloads.
What problems is the product solving and how is that benefiting you?
Wiz helped us take enormous amounts of data about our systems, and turn it into actionable insights. Acting on those insights has generated tangible improvements in our security and responsiveness as new risks emerge.


    Uberto Vittorio F.

Effortless Setup, Powerful Insights, and Outstanding Support

  • December 08, 2025
  • Review provided by G2

What do you like best about the product?
Easy to setup, great insights and awesome quality of findings.
Every feature is useful in real world scenario and closes the loop of vulnerability management. I'm really able to focus on the real issues.
Customer support is top level, and the platformization allows to save money on other solutions. Also the threat intel team is great.
What do you dislike about the product?
Sometimes the UI has too many funtions (but hey, the product has a ton of features!).
Some lack of visiblity on the log ingestion capability (not highlighted in the connect panel)
What problems is the product solving and how is that benefiting you?
Validate cloud configurations, identify vulnerabilities and attack paths and detect realtime issues.
Also, discover shadow IT and have a complete cloud asset inventory


    Computer Hardware

Easy Setup and Great Support, But Requires Process Changes

  • December 08, 2025
  • Review provided by G2

What do you like best about the product?
Easy to install, easy to use. Very good technical support
What do you dislike about the product?
As for any new tool, need to implement associated process.
What problems is the product solving and how is that benefiting you?
Better understanding of our cloud environement. Identify most critical risks and facilitate remediation actions


    Mikael R.

Wiz Has Become an Essential Pillar of Our Security Strategy

  • December 08, 2025
  • Review provided by G2

What do you like best about the product?
The platform offers clear and actionable prioritization, enabling us to concentrate on the vulnerabilities that are most important. It provides comprehensive visibility into all our cloud assets, and does so without introducing unnecessary operational noise. The support team stands out for being consistently proactive, knowledgeable, and focused on finding solutions. Additionally, the product evolves rapidly, demonstrating that the team truly listens to customer feedback and needs.
What do you dislike about the product?
We uncovered some security issues we weren't previously aware of, but to be fair, that's precisely what we wanted Wiz to help us with! 😄
What problems is the product solving and how is that benefiting you?
Since implementing Wiz throughout our cloud environment, our approach to security has changed dramatically. The platform has made our proactive workflows more efficient, enhanced our visibility across the entire risk landscape, and, most importantly, improved how we prioritize vulnerabilities.

A key advantage is Wiz’s capability to automatically correlate signals from various sources, which significantly cuts down on noise and enables us to concentrate on the issues that truly matter. This has streamlined our remediation efforts and bolstered our overall security posture.

In addition to the product itself, the Wiz team has shown exceptional professionalism and genuine support. Their advice is always practical, reliable, and grounded in deep expertise. Whether we’re exploring best practices, adjusting configurations, or resolving complex challenges, they consistently show a strong dedication to our success. Their responsiveness and collaborative approach have played a crucial role in our smooth onboarding and ongoing growth with the platform.

Overall, Wiz has become a foundational part of our security strategy, thanks to both the value of the solution and the remarkable team behind it. Our experience has been extremely positive.


    Madhav Shyam Lakhera

Cloud risk posture has improved and custom dashboards and graph views provide deeper insights

  • December 05, 2025
  • Review provided by PeerSpot

What is our primary use case?

My experience with Wiz varies on a case-by-case basis because I don't work on it daily; I engage with it when we need to research something that isn't fully implemented in the organization. Some elements are implemented, but they were done on a POC basis. I have hands-on experience where I've explored the environment extensively, checked vulnerabilities, and shared different findings with team members. So while I've worked with all that, I wouldn't classify it as part of my everyday BAU work, but I've been introduced to it in the last one or two years, max.

We have multiple subscriptions linked to Wiz, and we monitor various aspects including cloud security posture management findings. Compliance is another area we've focused on, where we've created our own compliance framework within Wiz. One feature I particularly appreciate about Wiz is that, similar to other cloud-native security tools like Microsoft's Defender for Cloud, it allows you to define policies as code and deploy them through a version control system with a continuous deployment pipeline. This functionality is also present in Wiz, where their Terraform provider enables complete documentation on controlling aspects directly in the Wiz environment. The major things we've worked on include deploying policies based on CSPM findings detected in Wiz, setting up our own framework and rules within those categories, and we've also worked with inventory management, as Wiz provides an AI-driven inventory that gives visibility into all cloud deployments. Wiz also helps manage vulnerabilities in various environments, such as Kubernetes clusters or Azure container apps.

In different organizational contexts, whether product-based or service-based, the customization of dashboards is highly beneficial. For instance, if I'm a startup or a large company using Wiz for multiple applications, custom dashboards allow me to categorize data from various feeds. Dashboarding becomes effective after managing categorization; I can define a project and add relevant resources or subscriptions under that project. Moving forward in the dashboarding section, I can set up custom widgets to view high-severity CSPM findings or risks, thus visualizing data based on specific filters and categories.

What is most valuable?

One feature I appreciate about Wiz is the graph controls, which allow for the correlation of multiple findings. For example, if a virtual machine has a critical CVE and is exposed to the internet, this links multiple vulnerabilities such as initial access types. Wiz attempts to categorize these different types of findings, such as CWPP and CSPM, and offers customization through graph controls where we can create our own contextual risk assessments in the cloud environment. Additionally, Wiz allows you to deploy aspects in the tool similarly to the GitHub model, which I appreciate. Its UI is also very smooth and categorized, making it easy to navigate and search through resources efficiently. You can create custom reports and dashboards in your own way, which are some of the major aspects I value in Wiz.

What needs improvement?

There is definitely room for improvement with Wiz. Given the scope of CNAP technology, which covers the entire SDLC from deployment to monitoring and APIs, it would be beneficial to enhance data integration capabilities. Wiz could partner with leaders in the market, such as Checkmarx, for example; while it currently supports Checkmarx in preview, there still needs to be significant enhancement in contextually mapping risks from pre-deployment scans, such as SAS, SCA, and DAST scanning results. Including these results would elevate contextual risk assessments to a higher level.

Wiz does encounter some glitches similar to other tools in the market. I remember facing certain challenges, such as problems scanning encrypted disks or discrepancies in the findings from already remediated vulnerabilities not reflecting accurately in the tool. These issues are not indicative of an overarching systemic failure but are worth noting as areas that could be improved upon.

Currently, Wiz doesn't consolidate tools effectively. Though it is starting to move in that direction with Checkmarx integration in preview, it lacks the maturity to fully replace other mature open-source tools. Wiz does offer some capability in SCA via CLI, but it falls short compared to its market counterparts and would benefit from further development in tool consolidation and correlation.

For how long have I used the solution?

I started using Wiz around two years ago.

What do I think about the stability of the solution?

During the POC, there were indeed a lot of alerts generated by Wiz. It's important to note that alerts vary in type; there are different classifications for vulnerability alerts, CSPM alerts, and contextual risk alerts. Each category has its own significance, meaning that while there may be a high volume of alerts, they can be beneficial and informative based on the context.

Wiz does encounter some glitches similar to other tools in the market. I remember facing certain challenges, such as problems scanning encrypted disks or discrepancies in the findings from already remediated vulnerabilities not reflecting accurately in the tool. These issues are not indicative of an overarching systemic failure but are worth noting as areas that could be improved upon.

What do I think about the scalability of the solution?

I rate Wiz's scalability a perfect 10 out of 10. During our POC, we successfully linked many subscriptions and could manage them effectively without encountering any scalability issues.

How are customer service and support?

I would rate the vendor's technical support as a nine out of ten. They respond swiftly and provide support when needed; for instance, when we experienced some initial trouble figuring out how to configure CCRs and validate results, the vendor was readily available to assist us over calls, clarifying both technical aspects and theoretical insights.

How would you rate customer service and support?

Positive

How was the initial setup?

I didn't handle the initial installation of Wiz directly; that task fell to the operations team responsible for deploying security tools. However, from what I gather, integrating Wiz into the environment is not complex. It primarily requires the creation of a service account with sufficient permissions for Wiz to access necessary resources, making the overall integration process straightforward. Challenges might arise from organizational dynamics when persuading stakeholders, but technically, the setup doesn't appear to be cumbersome.

What about the implementation team?

Many people participated in the POC phase with Wiz, involving different teams such as the operational team for deployment and others handling various security dimensions. Many teams contributed during the POC phase., focusing primarily on the security specialists without including end users.

What was our ROI?

I would have appreciated providing a more specific return on investment metric for Wiz, but since my experience with it is based on a POC without full implementation, I cannot precisely track its impact on time or resource savings. It hasn't been operationalized fully yet in our organization.

What other advice do I have?

My understanding of Wiz's pricing suggests it's not cheap. While I may not have direct involvement in pricing discussions due to different teams managing purchasing decisions, feedback indicates that Wiz is among the most expensive tools available. Though there's likely room for adjustment in pricing, it should be noted that, compared to tools such as Microsoft Defender for Cloud, which scales according to subscriptions, Wiz's pricing can be significantly higher when supporting multiple products within larger organizations.

Wiz was implemented as a POC, and while there were many subscriptions linked, I can share examples of its usage. For instance, when Log4j vulnerabilities emerged several years ago, we managed to quickly create a report through the Wiz dashboard, enabling us to identify all workloads impacted by a critical CVE. With resource tagging for ownership, this helped us reach out to the relevant individuals responsible. Although Wiz offers an option for service integrations such as Jira for issue creation if implemented fully, our approach was manual report generation, where we exported findings and alerted personnel to maintain a zero-issues status.

I would rate this review a 9 out of 10 overall.


    Marcel Velica

Unified cloud visibility has transformed our risk prioritization and reduced alert fatigue while improving collaboration across security and DevSecOps teams

  • November 29, 2025
  • Review from a verified AWS customer

What is our primary use case?

My main use case for Wiz includes utilizing Wiz Code, Wiz Defend, and Wiz Cloud Security Posture Management.

A quick specific example of how I use Wiz Cloud Security Posture Management in my day-to-day work is analyzing all the issues we see within the cloud and infrastructure as a code over our SOC team and security engineering.

I have been using Wiz during these years and think it is a great product; I can review in depth when the need is being requested, and I have been doing POCs of other vendors out there compared with Wiz.

I did create a custom dashboard in Wiz, and my experience with it is that it works well, has a flexible widget system, good query-based customization, and easy cloning for multi-team environments, but it could work better with limited visualization types.

Wiz runtime sensor has helped in identifying active threats more effectively compared to previous solutions by providing increased visibility and accuracy, especially when correlating runtime behavior with cloud posture; it offers better context around runtime activity, faster detection of critical threats, improved detection accuracy, increased visibility across assets we previously missed, and stronger support for incident response, with the overall impact rated 10 out of 10.

Before adopting Wiz, we relied on multiple disconnected tools for CSPM, vulnerability scanning, and infrastructure as a code review, which each provided partial visibility; Wiz replaced most of these functions with one unified security graph that brings together configuration, risk, identity, workload vulnerability, data sensitivity, and exposure path in one way.

What is most valuable?

The standout features of Wiz that make it valuable for me include good multi-cloud environment support, data governance, shadow IT detection, DevSecOps governance, automation, level reporting, threat detection, and good infrastructure detection.

Wiz has positively impacted my organization by implementing zero trust authorization, providing good reporting that shows the top attack path, critical assets, overall risk posture, and demonstrating AI and ML workload capabilities towards my team, as well as good infrastructure detection and vulnerability detection accuracy with security posture management at massive scale and identity exposure. There is a massive reduction in risk exposure, immediate visibility across the entire cloud estate, reduced noise and better prioritization, stronger DevSecOps collaboration, continuous compliance instead of ad hoc panic, faster incident response with real context, significant cost savings through tool consolidation, and stronger AI and data governance.

What needs improvement?

Wiz can be improved with better maturity in code scanning and developer workflows, expanding secret detection to full lifecycle management, stronger IAM across multi-account environments, more transparent attack path scoring and risk modeling, improved AI and ML security scanning, reduced false positives in runtime threat detection, more fine-grained access control and tenant separation, and better integration for serverless workloads.

For how long have I used the solution?

I have been using Wiz for around two years.

What do I think about the stability of the solution?

In my experience, Wiz is very stable.

What do I think about the scalability of the solution?

Wiz is very scalable.

How are customer service and support?

I do use Wiz's post-sale support services, and I am improving every quarter the performance of the tool with their assistance.

The customer support for Wiz is very good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have evaluated multiple solutions before Wiz, including Palo Alto Prisma Cloud, Orca Security, Lacework, Check Point, Qualys cloud solution, Snyk, Checkmarx, and other DevSecOps platforms.

What was our ROI?

I have seen a return on investment with Wiz by reducing our budget spent on other tools, saving time, and needing fewer employees.

Wiz has reduced alert fatigue in my organization by around 90% over a given time period.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for Wiz was through an RFP where they offered us a good price, and the licensing was a flexible solution based on our business.

What other advice do I have?

My advice for others looking into using Wiz is to try it not just as another security tool, but as a foundational visibility and risk prioritization platform for your entire cloud environment; to get the full value, you need to think strategically about adoption, ownership, and cross-team alignment. I would rate this review as a 9 out of 10.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?