I use Wiz for visibility, cloud visibility, and inventory. We will be using it for prioritizing toxic combinations like risk analysis or vulnerability management and compliance and governments.
External reviews
External reviews are not included in the AWS star rating for the product.
CSP-Agnostic, User-Friendly Risk Visibility in One Pane
Wiz.io: A Strong Primary CNAPP and CWP Platform
Cloud risks have been prioritized and investigations are now faster with automated visibility
What is our primary use case?
What is most valuable?
The best features in Wiz are visibility and the security graph, which is one of the main core components of Wiz. Instead of flat results, Wiz builds a digital twin of your entire cloud environment such as AWS and Azure. A site scanning option is also available. One of the main features is automated compliance mapping in Wiz.
As a security analyst, I would say automated compliance mapping is one of the important features because many companies do not actually know everything they have running in the cloud. Wiz provides a single pane of glass to see shadow IT, discovering any forgotten database or server created by developers during unmonitored periods. Multi-cloud management allows seeing assets across different providers, such as AWS and Azure, and maintaining a real-time list of virtual machines, serverless functions, buckets, and containers.
Wiz is a full-scale cloud detection and response platform. Agentless scanning is taking a high-resolution photo of your house once an hour to check for unlocked windows. Runtime is having a motion-activated security camera or a guard on site for twenty-four seven. Unlike other traditional agents that slow down servers, Wiz uses extended Berkeley Packet Filter, which is one of the major key features. It is incredibly lightweight and provides deep visibility into containers and Kubernetes nodes, where agentless snapshots might miss live execution details compared to the previous tool I have worked with.
The security graph takes you to zero through the toxic combination filter, which is the fastest way to clear the queue by focusing on the security graph and its logic with a high CVSS score, vulnerability that is exposed and has server identity that can reach sensitive data. Resolving those specific combinations first means that once the path is broken, for example by closing a port or stripping a permission, the issue moves to zero. To automate that remediation and keep the queue at zero, you cannot rely on manual clicks, so you can set up automation rules that automatically resolve critical issues in Jira or ServiceNow. Serverless cleanup will trigger a Lambda function to automatically remove any permissive IAM role and quarantine any suspicious container the moment Wiz detects it.
Wiz reduces alert fatigue. Unlike traditional scanners, Wiz uses a security graph to filter out the noise. Time to value is achieved through agentless deployment. Wiz connects via API rather than requiring software installation on every server. It provides one hundred percent visibility in minutes, which is one of the key benefits.
For time saving, I have reduced around forty to fifty percent time reduction in investigation by using the Security Graph to show exactly how an attacker could reach a database. That almost saves seventy percent of my time. Instead of manually tracking, which would take much time, it saves overall around forty to fifty percent. The alert volume will decrease almost eighty to ninety percent. SLA issues are also addressed. While using this, I do not have to be afraid of facing any SLA issues since it will reduce almost all the backlogs, ensuring all the critical vulnerabilities are fixed within their required policy window. For cost saving, replacing several point solutions with one platform is absolutely cost saving compared to many other products in the market.
What needs improvement?
Everything Wiz has in place is good enough to analyze things.
Nothing has to be added in the future.
The alert fatigue zero issues and priority-based consolidation security graph and anything that has in it easily make it rate eight, including its customer service and support team service. Two percent would be that the loading time is taking a bit longer while loading the graph, and while navigating to other links, that is also taking some time. That is why I am giving it an eight instead of a ten.
For how long have I used the solution?
I have been working with Wiz for almost five years.
What do I think about the stability of the solution?
I have not faced any stability issues during my use of Wiz.
What do I think about the scalability of the solution?
I have not experienced any scalability issues.
How are customer service and support?
The customer support in Wiz is really good. They are super quick to answer the queries that I am facing or any kind of issues that I am facing. They are responsive over time. The onboarding was easy and smooth.
The support team is really helpful, and whenever I raise any kind of ticket about issues I am facing, they will immediately respond to it.
How would you rate customer service and support?
Positive
How was the initial setup?
It was easy while onboarding Wiz.
What about the implementation team?
Wiz was purchased from the same marketplace. I did not buy it from a different place.
What was our ROI?
Wiz is absolutely cost-effective.
What's my experience with pricing, setup cost, and licensing?
The setup cost is somewhere around twenty-four thousand dollars based on your organization's size.
What other advice do I have?
Wiz does consolidate the issue and the priorities and the containers. I would recommend Wiz because of its time-saving ability. You can almost see what are the criticalities that are there and the consolidation feature that is also there in Wiz. Majorly, the security graph will give you a deep information to analyze things in a much better way.
Traditional scanners and other tools do not treat every vulnerability as a priority. Wiz has the security graph to filter out the noise and by only surfacing toxic combinations, security teams can stop chasing thousands of low-risk patches and focus on the few that actually matter. It allows a small security team to manage a massive complex cloud environment without hiring dozens of additional users to look into it.
For any organization who want to think of moving to Wiz, the Security Graph feature is amazing and awesome. It will give you deeper information than any other tools does. That is the main thing to consider. Overall, I rate this product an eight.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Very Capable APIs and complete product
Easy Investigations with a Feature-Rich Toolkit
Wiz Delivers Exceptional Cloud Visibility and Actionable Security Insights
Its ease of use, intuitive interface, and powerful correlation engine significantly streamline our security operations. Integrations are seamless, deployment is fast, and the insights are both actionable and highly reliable.
Overall, Wiz enables us to proactively strengthen our security posture with minimal effort, and I’m extremely satisfied with the product.
The platform’s ability to automatically surface toxic combinations, prioritize vulnerabilities based on real context, and map potential attack vectors dramatically improves our response time and reduces operational overhead. This allows our security team to focus on meaningful remediation instead of spending time piecing data together. Overall, Wiz enables us to strengthen our cloud security posture efficiently, proactively, and with significantly greater accuracy.
Explanatory Graphics That Make Threat Prioritization Easy
Easy Implementation, Excellent Visibility
Effortless Cloud Security with Wiz
Wiz Delivers Outstanding CSPM and Continuous Improvements
Now, we use it all the time to proactively monitor our systems, look for config or vulnerabilities, and whenever I see a new Critical or High issue we immediately jump on it to triage. This means we have got managing Critical config issues down to similar remediation timelines as a Critical security incident and indeed in most cases we treat them almost identically (urgent conf calls, drop tools and huddle to fix etc.).
When it came to implementing Wiz, it was simply as quick as hooking up to our Cloud instances, providing the access, and sitting back to watch the fireworks. During the implementation the support was outstanding, and Wiz spent so much time with us and our different teams showing them how to use it, how simple it was to integrate with other tools, how we could extend visibility to the max, how to interpret the results, get good report data to the right people etc.. This operationalisation help ensure Wiz was used by multiple teams - although I think there's always room for even more engagement internally.
After implementing the engagement didn't stop though, and we still have a regular call with our TAM who is always happy to demo to some new users, or to help tweak some settings or help with some report or other. I don't think we've ever found the limit of engagement and Wiz seems happy to provide whatever level of interaction we need to get where we want to go.