Introducing G2.ai, the future of software buying.Try now

Compare FortiCNAPP and Wiz

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
FortiCNAPP
FortiCNAPP
Star Rating
(384)4.4 out of 5
Market Segments
Mid-Market (62.4% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about FortiCNAPP
Wiz
Wiz
Star Rating
(752)4.7 out of 5
Market Segments
Enterprise (54.5% of reviews)
Information
Pros & Cons
Entry-Level Pricing
No pricing available
Free Trial is available
Learn more about Wiz
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that Lacework excels in multicloud visibility with a score of 8.7, allowing organizations to effectively monitor their cloud environments. In contrast, Wiz shines even brighter with a score of 9.2, indicating a more comprehensive approach to cloud visibility that users find invaluable.
  • Reviewers mention that Lacework's security auditing feature is robust, scoring 8.9, which helps in maintaining compliance. However, Wiz matches this with an impressive score of 8.9 as well, but users highlight that Wiz offers more intuitive reporting capabilities that enhance the auditing process.
  • G2 users indicate that Lacework's risk scoring feature, rated at 8.5, provides a solid foundation for assessing vulnerabilities. Conversely, Wiz's risk scoring is rated higher at 8.9, with users noting that it offers more detailed insights and actionable recommendations.
  • Reviewers say that Lacework's workflow automation is effective, scoring 8.8, but Wiz outperforms it with a score of 9.0. Users appreciate Wiz's ability to streamline processes and reduce manual intervention, making it a preferred choice for automation.
  • Users on G2 report that Lacework's configuration management feature is satisfactory with a score of 8.3, but Wiz's score of 8.9 indicates a more advanced capability. Reviewers mention that Wiz provides better tools for managing configurations across diverse environments.
  • Users say that while Lacework's threat hunting capabilities are commendable with a score of 8.2, Wiz's score of 8.2 also reflects strong performance. However, users highlight that Wiz's threat hunting is more proactive, allowing for quicker identification and response to potential threats.
Pricing
Entry-Level Pricing
FortiCNAPP
No pricing available
Wiz
No pricing available
Free Trial
FortiCNAPP
Free Trial is available
Wiz
Free Trial is available
Ratings
Meets Requirements
8.6
351
9.1
621
Ease of Use
8.3
355
8.7
624
Ease of Setup
8.5
236
9.1
484
Ease of Admin
8.6
224
9.0
470
Quality of Support
8.9
330
9.2
592
Has the product been a good partner in doing business?
9.0
218
9.4
459
Product Direction (% positive)
9.3
347
9.8
579
Features by Category
Cloud Workload Protection PlatformsHide 10 FeaturesShow 10 Features
8.6
92
8.8
121
Management
8.6
84
8.7
115
8.0
73
8.4
104
8.5
85
9.3
116
Operations
8.6
82
8.9
106
8.6
84
8.6
109
8.2
79
8.9
109
Security Controls
9.0
83
8.5
75
Feature Not Available
Feature Not Available
9.0
80
9.1
103
8.6
69
Feature Not Available
8.6
157
8.4
206
Administration
8.5
144
9.0
193
Feature Not Available
8.2
183
8.8
139
9.1
195
8.3
128
8.9
190
Monitoring
8.5
112
8.4
169
8.8
121
7.9
162
Feature Not Available
8.6
180
Protection
8.6
118
8.5
174
8.5
117
8.0
169
Feature Not Available
Feature Not Available
Feature Not Available
7.7
163
8.5
212
8.6
290
Security
9.0
203
9.0
275
8.8
194
8.3
224
Feature Not Available
Feature Not Available
8.2
164
8.9
250
Compliance
8.7
165
8.7
244
8.4
144
8.4
231
8.1
142
8.3
230
Administration
8.5
156
8.5
258
8.7
172
8.6
233
8.0
147
8.3
248
Not enough data
8.3
293
Performance
Not enough data
8.4
277
Not enough data
8.8
274
Not enough data
7.4
274
Not enough data
9.0
278
Network
Not enough data
8.6
258
Not enough data
8.5
254
Not enough data
8.8
274
Application
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Agentic AI - Vulnerability Scanner
Not enough data
7.4
29
Not enough data
7.4
29
Software Composition AnalysisHide 6 FeaturesShow 6 Features
Not enough data
9.1
66
Functionality - Software Composition Analysis
Not enough data
8.8
54
Not enough data
9.3
59
Not enough data
9.2
56
Effectiveness - Software Composition Analysis
Not enough data
8.7
59
Not enough data
9.2
58
Not enough data
9.2
60
Cloud Security Monitoring and AnalyticsHide 13 FeaturesShow 13 Features
8.5
193
8.2
246
Activity Monitoring
Feature Not Available
Feature Not Available
Feature Not Available
Feature Not Available
Feature Not Available
7.5
183
Feature Not Available
8.0
196
Security
8.7
176
8.6
204
8.5
164
8.9
214
8.2
173
8.4
220
Administration
Feature Not Available
8.4
201
8.4
166
8.7
211
8.7
143
9.1
211
Agentic AI - Cloud Security Monitoring and Analytics
Not enough data
7.5
20
Not enough data
7.5
20
Not enough data
7.5
19
Extended Detection and Response (XDR) PlatformsHide 14 FeaturesShow 14 Features
Not enough data
8.9
32
Detection & Response
Not enough data
9.1
27
Not enough data
9.2
26
Not enough data
9.6
26
Not enough data
8.4
27
Management
Not enough data
8.6
26
Not enough data
8.9
25
Not enough data
9.2
22
Analytics
Not enough data
8.8
27
Not enough data
8.2
26
Not enough data
8.8
27
Agentic AI - Extended Detection and Response (XDR) Platforms
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Services - Extended Detection and Response (XDR)
Not enough data
Not enough data
Cloud Security Posture Management (CSPM)Hide 11 FeaturesShow 11 Features
8.5
134
8.8
307
Configuration
Feature Not Available
Feature Not Available
8.8
115
8.9
277
8.4
93
8.4
251
8.1
93
8.1
249
8.3
111
8.5
262
Visibility
8.8
107
9.3
280
8.6
114
9.2
284
Vulnerability Management
8.3
108
8.4
266
8.9
126
9.2
290
8.6
113
8.9
275
8.6
117
9.0
285
Attack Surface ManagementHide 12 FeaturesShow 12 Features
Not enough data
8.6
220
Asset Management
Not enough data
9.3
192
Not enough data
8.0
166
Not enough data
7.6
163
Monitoring
Not enough data
8.6
176
Not enough data
9.0
189
Not enough data
8.8
178
Not enough data
9.0
187
Risk Management
Not enough data
9.2
207
Not enough data
8.6
195
Not enough data
8.7
192
Not enough data
8.5
196
Generative AI
Not enough data
8.0
101
Not enough data
8.6
134
Alerts management
Not enough data
8.8
109
Not enough data
8.5
110
Not enough data
9.0
119
Monitoring
Not enough data
8.4
104
Not enough data
8.5
115
Not enough data
8.4
101
Not enough data
7.8
104
Automation
Not enough data
8.2
109
Not enough data
8.6
112
Analysis
Not enough data
8.7
126
Not enough data
8.5
123
Not enough data
9.3
125
Not enough data
8.5
114
Issue Resolution
Not enough data
8.6
117
Not enough data
8.9
121
Not enough data
9.0
114
Cloud Infrastructure Entitlement Management (CIEM)Hide 8 FeaturesShow 8 Features
7.9
8
8.2
50
Access control - Cloud Infrastructure Entitlement Management (CIEM)
8.3
8
8.1
44
8.1
8
8.7
45
7.7
8
8.5
45
6.0
8
6.8
43
Monitoring - Cloud Infrastructure Entitlement Management (CIEM)
8.3
8
8.4
46
8.3
7
7.2
45
Auditing - Cloud Infrastructure Entitlement Management (CIEM)
8.3
7
9.0
49
7.9
7
8.9
49
Cloud-Native Application Protection Platform (CNAPP)Hide 11 FeaturesShow 11 Features
Not enough data
9.0
22
Security - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
9.5
19
Not enough data
9.2
19
Not enough data
8.9
19
Not enough data
9.5
20
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
8.9
19
Not enough data
9.1
20
Not enough data
9.0
18
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
9.4
19
Not enough data
9.5
19
Agentic AI - Cloud-Native Application Protection Platform (CNAPP)
Not enough data
7.9
18
Not enough data
8.1
17
Exposure Management PlatformsHide 6 FeaturesShow 6 Features
Not enough data
7.6
14
Generative AI - Exposure Management Platforms
Not enough data
6.2
14
Not enough data
5.9
13
Risk Identification and Assessment - Exposure Management Platforms
Not enough data
8.3
13
Not enough data
8.3
13
Monitoring and Integration - Exposure Management Platforms
Not enough data
8.3
13
Not enough data
8.5
13
Data Security Posture Management (DSPM)Hide 9 FeaturesShow 9 Features
Not enough data
8.6
10
Discovery & Classification - Data Security Posture Management (DSPM)
Not enough data
8.7
9
Not enough data
8.5
9
Not enough data
8.3
8
Risk Prioritization - Data Security Posture Management (DSPM)
Not enough data
8.7
9
Not enough data
9.0
8
Not enough data
8.8
8
Remediation & Governance - Data Security Posture Management (DSPM)
Not enough data
8.5
10
Not enough data
8.5
9
Not enough data
8.7
9
AI Security Posture Management (AI-SPM) ToolsHide 9 FeaturesShow 9 Features
Not enough data
Not enough data
Functionality - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Risk Assessment - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Cloud Detection and Response (CDR)Hide 4 FeaturesShow 4 Features
Not enough data
7.2
12
Agentic AI - Cloud Detection and Response (CDR)
Not enough data
6.7
11
Not enough data
7.0
11
Not enough data
7.0
11
Services - Cloud Detection and Response (CDR)
Not enough data
8.2
12
Reviews
Reviewers' Company Size
FortiCNAPP
FortiCNAPP
Small-Business(50 or fewer emp.)
12.4%
Mid-Market(51-1000 emp.)
62.4%
Enterprise(> 1000 emp.)
25.3%
Wiz
Wiz
Small-Business(50 or fewer emp.)
6.5%
Mid-Market(51-1000 emp.)
39.0%
Enterprise(> 1000 emp.)
54.5%
Reviewers' Industry
FortiCNAPP
FortiCNAPP
Information Technology and Services
17.9%
Computer Software
15.5%
Financial Services
13.7%
Computer & Network Security
5.8%
Marketing and Advertising
5.5%
Other
41.6%
Wiz
Wiz
Financial Services
18.1%
Information Technology and Services
12.0%
Computer Software
11.4%
Computer & Network Security
4.1%
Hospital & Health Care
3.9%
Other
50.5%
Alternatives
FortiCNAPP
FortiCNAPP Alternatives
Sysdig Secure
Sysdig Secure
Add Sysdig Secure
Orca Security
Orca Security
Add Orca Security
Cortex Cloud
Cortex Cloud
Add Cortex Cloud
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Add Microsoft Defender for Cloud
Wiz
Wiz Alternatives
Microsoft Defender for Cloud
Microsoft Defender for Cloud
Add Microsoft Defender for Cloud
Orca Security
Orca Security
Add Orca Security
Cortex Cloud
Cortex Cloud
Add Cortex Cloud
Sysdig Secure
Sysdig Secure
Add Sysdig Secure
Discussions
FortiCNAPP
FortiCNAPP Discussions
What is in the pipeline for Lacework?
2 Comments
Abner G.
AG
Hey Gerald, apologies for letting this question go unanswered for so long. This TechTarget interview with Lacework's CEO Dan Hubbard has some good...Read more
Is lacework a SIEM?
1 Comment
Jeffrey M.
JM
No, but you can send all the logs from Lacework to a SIEM.Read more
Monty the Mongoose crying
FortiCNAPP has no more discussions with answers
Wiz
Wiz Discussions
Monty the Mongoose crying
Wiz has no discussions with answers
FortiCNAPP
FortiCNAPP
Optimized for quick response
Wiz
Wiz
Optimized for quick response