Compare Cortex Cloud and Netskope One Platform

At a Glance
Cortex Cloud
Cortex Cloud
Star Rating
(111)4.1 out of 5
Market Segments
Enterprise (38.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Cortex Cloud
Netskope One Platform
Netskope One Platform
Star Rating
(69)4.4 out of 5
Market Segments
Enterprise (61.2% of reviews)
Information
Pros & Cons
Entry-Level Pricing
Call for quote
Learn more about Netskope One Platform
AI Generated Summary
AI-generated. Powered by real user reviews.
  • G2 reviewers report that Netskope One Platform excels in providing comprehensive visibility and control over cloud and web traffic, which is crucial for modern security operations. Users appreciate its ability to filter and act on traffic from a single console, significantly reducing the workload for IT teams.
  • Users say that Cortex Cloud offers a user-friendly experience with quick setup, making it an attractive option for those looking to streamline their security operations. The automation features are particularly praised for making everyday tasks faster and smoother, which can enhance overall efficiency.
  • Reviewers mention that Netskope One Platform stands out for its unified approach, combining multiple security functions into a single, easy-to-manage platform. This integration allows for strong zero trust enforcement and deep visibility across various environments, which users find essential for effective threat management.
  • According to verified reviews, Cortex Cloud is recognized for its ability to centralize data and analytics, making performance monitoring and report generation much more efficient. Users highlight how this capability saves time and aids in making better decisions, which is a significant advantage for organizations managing complex security landscapes.
  • G2 reviewers note that Netskope One Platform has a higher rating in terms of ease of administration, with users appreciating its intuitive management features. This ease of use is complemented by strong support for real-time threat protection and data loss prevention, which are critical for maintaining security in hybrid environments.
  • Users express that Cortex Cloud, while effective, faces challenges in comparison to Netskope One Platform regarding overall user satisfaction and support quality. Although it integrates threat detection and response well, some users feel that it could improve in areas like support and ease of administration, which are crucial for day-to-day operations.
Pricing
Entry-Level Pricing
Cortex Cloud
No pricing available
Netskope One Platform
Netskope Active Platform
Call for quote
Learn more about Netskope One Platform
Free Trial
Cortex Cloud
Free Trial is available
Netskope One Platform
Free Trial is available
Ratings
Meets Requirements
8.3
98
8.8
59
Ease of Use
7.7
100
8.5
59
Ease of Setup
7.6
89
8.6
39
Ease of Admin
7.9
52
9.0
31
Quality of Support
7.9
94
8.6
57
Has the product been a good partner in doing business?
8.0
48
8.9
32
Product Direction (% positive)
8.8
95
9.4
58
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
8.7
10
Not enough data
Management
7.9
7
Not enough data
8.3
7
Not enough data
8.1
7
Not enough data
Operations
8.6
7
Not enough data
8.8
7
Not enough data
9.4
6
Not enough data
Security Controls
8.9
6
Not enough data
8.5
8
Not enough data
9.0
7
Not enough data
9.2
6
Not enough data
8.0
16
Not enough data
Administration
8.1
14
Not enough data
7.7
14
Not enough data
8.3
14
Not enough data
8.1
14
Not enough data
Monitoring
8.1
14
Not enough data
8.1
14
Not enough data
7.9
14
Not enough data
Protection
7.9
14
Not enough data
8.3
14
Not enough data
7.7
14
Not enough data
7.7
14
Not enough data
Data Loss Prevention (DLP)Hide 10 FeaturesShow 10 Features
Not enough data
8.4
21
Administration
Not enough data
8.0
19
Not enough data
8.5
19
Not enough data
8.6
18
Governance
Not enough data
8.3
18
Not enough data
8.0
18
Not enough data
8.7
19
Security
Not enough data
8.7
18
Not enough data
8.1
19
Not enough data
8.8
20
Not enough data
8.6
18
Not enough data
8.7
14
Network Management
Not enough data
8.8
12
Not enough data
8.6
12
Not enough data
8.6
13
Not enough data
8.3
13
Security
Not enough data
8.6
13
Not enough data
8.6
13
Not enough data
8.8
11
Not enough data
9.2
12
Identity Management
Not enough data
8.6
12
Not enough data
8.8
11
Not enough data
8.9
12
Generative AI
Not enough data
9.0
7
Not enough data
7.9
7
Cloud Access Security Broker (CASB)Hide 10 FeaturesShow 10 Features
Not enough data
8.5
20
Analysis
Not enough data
8.7
17
Not enough data
8.2
16
Not enough data
8.8
15
Functionality
Not enough data
8.4
16
Not enough data
8.4
16
Not enough data
7.8
16
Security
Not enough data
8.5
16
Not enough data
8.9
20
Not enough data
8.6
17
Not enough data
9.0
15
8.4
39
Not enough data
Security
8.5
37
Not enough data
8.2
36
Not enough data
8.0
34
Not enough data
8.1
36
Not enough data
Compliance
8.5
37
Not enough data
8.3
36
Not enough data
8.3
36
Not enough data
Administration
8.7
36
Not enough data
8.6
35
Not enough data
8.5
36
Not enough data
Software Composition AnalysisHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Functionality - Software Composition Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Effectiveness - Software Composition Analysis
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk-Based Vulnerability ManagementHide 11 FeaturesShow 11 Features
7.8
6
Not enough data
Risk Analysis
8.3
5
Not enough data
7.8
6
Not enough data
8.1
6
Not enough data
Vulnerability Assesment
8.3
5
Not enough data
7.5
6
Not enough data
8.0
5
Not enough data
7.0
5
Not enough data
Automation
7.3
5
Not enough data
7.0
5
Not enough data
8.3
5
Not enough data
8.3
5
Not enough data
Not enough data
8.5
13
Management
Not enough data
7.6
11
Not enough data
8.6
12
Not enough data
8.0
11
Not enough data
9.0
12
Monitoring
Not enough data
8.7
10
Not enough data
8.5
11
Not enough data
8.2
12
Protection
Not enough data
8.9
12
Not enough data
9.0
10
Not enough data
8.6
12
Not enough data
8.5
11
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
7.7
24
Not enough data
Configuration
7.7
20
Not enough data
7.6
21
Not enough data
7.7
21
Not enough data
7.8
18
Not enough data
7.1
20
Not enough data
Visibility
8.2
22
Not enough data
7.5
21
Not enough data
Vulnerability Management
7.8
18
Not enough data
7.9
21
Not enough data
8.0
19
Not enough data
7.8
21
Not enough data
SaaS Security Posture Management (SSPM) SolutionsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Monitoring
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - SaaS Security Posture Management (SSPM) Solutions Features
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Infrastructure Entitlement Management (CIEM)Hide 8 FeaturesShow 8 Features
8.5
10
Not enough data
Access control - Cloud Infrastructure Entitlement Management (CIEM)
8.7
9
Not enough data
8.5
10
Not enough data
8.7
10
Not enough data
8.1
8
Not enough data
Monitoring - Cloud Infrastructure Entitlement Management (CIEM)
9.0
10
Not enough data
7.8
10
Not enough data
Auditing - Cloud Infrastructure Entitlement Management (CIEM)
8.7
10
Not enough data
8.3
10
Not enough data
Not enough data
9.2
8
Web Content and Traffic Filtering - Secure Web Gateways
Not enough data
9.2
6
Not enough data
9.3
7
Not enough data
9.7
6
Not enough data
8.9
6
Not enough data
8.6
6
Data Protection and Loss Prevention - Secure Web Gateways
Not enough data
9.6
8
Not enough data
9.2
6
Not enough data
9.2
6
Not enough data
9.4
6
Access Control and Authentication - Secure Web Gateways
Not enough data
8.9
6
Not enough data
9.4
6
Not enough data
9.7
6
Performance and Management - Secure Web Gateways
Not enough data
9.4
6
Not enough data
9.0
5
Not enough data
8.3
7
Not enough data
9.2
6
Not enough data
8.9
6
7.3
6
Not enough data
AI Compliance
7.5
6
Not enough data
6.7
6
Not enough data
8.1
6
Not enough data
Risk Management & Monitoring
6.4
6
Not enough data
7.8
6
Not enough data
AI Lifecycle Management
7.2
6
Not enough data
Access Control and Security
7.2
6
Not enough data
Collaboration and Communication
7.5
6
Not enough data
Agentic AI - AI Governance Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud-Native Application Protection Platform (CNAPP)Hide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Security - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
Not enough data
Not enough data
Not enough data
Data Security Posture Management (DSPM)Hide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Discovery & Classification - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Prioritization - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Remediation & Governance - Data Security Posture Management (DSPM)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Secure Service Edge (SSE) SolutionsHide 11 FeaturesShow 11 Features
Not enough data
Not enough data
Components - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Artificial Intelligence -Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Agentic AI - Secure Service Edge (SSE)
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
AI Security Posture Management (AI-SPM) ToolsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Assessment - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Detection and Response (CDR)Hide 4 FeaturesShow 4 Features
7.7
9
Not enough data
Agentic AI - Cloud Detection and Response (CDR)
7.8
9
Not enough data
7.0
9
Not enough data
8.3
8
Not enough data
Services - Cloud Detection and Response (CDR)
7.5
8
Not enough data
Reviews
Reviewers' Company Size
Cortex Cloud
Cortex Cloud
Small-Business(50 or fewer emp.)
30.3%
Mid-Market(51-1000 emp.)
31.2%
Enterprise(> 1000 emp.)
38.5%
Netskope One Platform
Netskope One Platform
Small-Business(50 or fewer emp.)
7.5%
Mid-Market(51-1000 emp.)
31.3%
Enterprise(> 1000 emp.)
61.2%
Reviewers' Industry
Cortex Cloud
Cortex Cloud
Information Technology and Services
17.4%
Computer & Network Security
11.0%
Computer Software
9.2%
Consulting
7.3%
Financial Services
4.6%
Other
50.5%
Netskope One Platform
Netskope One Platform
Information Technology and Services
38.2%
Computer & Network Security
11.8%
Banking
7.4%
Financial Services
7.4%
Computer Software
5.9%
Other
29.4%
Alternatives
Cortex Cloud
Cortex Cloud Alternatives
Wiz
Wiz
Add Wiz
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Add Microsoft Defender for Cloud
Orca Security
Orca Security
Add Orca Security
FortiCNAPP
FortiCNAPP
Add FortiCNAPP
Netskope One Platform
Netskope One Platform Alternatives
Cato SASE Cloud
Cato SASE Cloud
Add Cato SASE Cloud
Check Point SASE
Check Point SASE
Add Check Point SASE
Zscaler Internet Access
Zscaler Internet Access
Add Zscaler Internet Access
Cisco Umbrella
Cisco Umbrella
Add Cisco Umbrella
Discussions
Cortex Cloud
Cortex Cloud Discussions
Monty the Mongoose crying
Cortex Cloud has no discussions with answers
Netskope One Platform
Netskope One Platform Discussions
What is a cloud access security broker (CASB)?
1 Comment
Official Response from Netskope One Platform
By 2020, 60 percent of large enterprises will use a cloud access security broker. According to Gartner, a cloud access security broker (CASB) is an...Read more
Is Netskope a CASB?
1 Comment
DN
yes, its one of many offerings Read more
Monty the Mongoose crying
Netskope One Platform has no more discussions with answers