A Single Pane of Glass for our GCP Security Needs
What do you like best about the product?
Wiz provides incredible coverage across our cloud environments. The inclusion of raw logs and the ability to search and write custom threat detection rules against these logs saves us from having to send them to a SIEM/Data Warehouse, normalize them, and build detections against them. Additionally, the hundreds or thousands of threat detection rules included in Wiz are overall very high quality and provide a huge degree of coverage on top of the dozens of custom company-specific rules we've created.
Wiz regularly releases useful new features and integrations and the level of support we have received has generally been top-tier. The detailed system activity log and audit logs also increase our confidence that we will be able to view any actions taken inside of our Wiz console - either from our own users or from Wiz.
Onboarding Wiz was a breeze and their documentation is excellent and covers the vast majority of questions that have come up during our usage of the product.
Wiz regularly releases useful new features and integrations and the level of support we have received has generally been top-tier. The detailed system activity log and audit logs also increase our confidence that we will be able to view any actions taken inside of our Wiz console - either from our own users or from Wiz.
Onboarding Wiz was a breeze and their documentation is excellent and covers the vast majority of questions that have come up during our usage of the product.
What do you dislike about the product?
To date, we haven't had any major issues using Wiz. Their usage licensing model means as you scale up your compute and data resources, you will necessarily increase your utilization (and therefore cost), but I appreciate all the tooling they include to help you both visualize, calculate, and fine tune your utilization.
What problems is the product solving and how is that benefiting you?
* Centralizing all of our security logs from cloud providers
* Providing coverage via Threat Detection Rules
* Helping us identify misconfigurations in our cloud platforms
* Helping us cut costs by identifying assets that are oversized or unused
* Integrating with third-party tooling (Google Workspace, Github, etc)
* Easily integrated with other tools
* Flexible and well documented API
* Providing coverage via Threat Detection Rules
* Helping us identify misconfigurations in our cloud platforms
* Helping us cut costs by identifying assets that are oversized or unused
* Integrating with third-party tooling (Google Workspace, Github, etc)
* Easily integrated with other tools
* Flexible and well documented API