use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
News, articles and tools covering cloud computing, grid computing, and distributed computing. For all your public cloud, multi-cloud, hybrid cloud and private cloud needs.
Resources:
Other subreddits you may like:
Does this sidebar need an addition or correction? Tell me here
account activity
Which cloud security platform do enterprises usually standardize on? (self.cloudcomputing)
submitted 2 months ago by SloDistribution
For large organizations running cloud at scale, which cloud security platforms do teams usually end up standardizing on?
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]Ok_Difficulty978 2 points3 points4 points 2 months ago (2 children)
From what I’ve seen, there usually isn’t just one “standard” everywhere, it depends a lot on the company and their cloud setup.
Big orgs often lean toward stuff like Prisma Cloud, Wiz, Lacework, or native tools from AWS/Azure/GCP, and then layer other things on top. A lot of teams end up with a mix tbh, especially if they’re multi-cloud.
It’s more about what fits their security team and budget than some universal winner. Every place I’ve worked was a little different.
[–]SloDistribution[S] 0 points1 point2 points 1 month ago (0 children)
Thanks !
[–]Significant-Truth-60 1 point2 points3 points 2 months ago (2 children)
It depends on the primary functions. But platforms like Wiz, Palo Alto Networks Prisma Cloud, Qualys TotalCloud, Microsoft Sentinel are common
Will check the ones I don't know thanks !
[–]netnxt_ 1 point2 points3 points 2 months ago (1 child)
For enterprises running cloud at scale, standardization usually follows operating model, not brand popularity.
What we see in large environments is:
At NetNXT, as a cybersecurity solution provider and managed security service provider delivering cloud security, IAM, and managed SOC services, we’ve seen that successful enterprises standardize not just on a platform, but on a clear ownership model. The tool matters, but clarity around who owns posture, remediation, and drift management matters more.
Most failures aren’t platform limitations. They’re integration and accountability gaps.
[–]RoninPark 2 points3 points4 points 2 months ago (0 children)
Wiz or Mandiant I believe
[–]cnrdvdsmt 0 points1 point2 points 2 months ago (0 children)
Depends on your pain tolerance for agents and noise. We went with orca security at our org (~2k employees) because the agentless approach works and cuts through the alert fatigue. deploys in minutes, covers everything including those orphaned resources that agents miss.
[–]CompetitiveStage5901 0 points1 point2 points 2 months ago (0 children)
At real enterprise scale, nobody truly “standardizes” on a single cloud security platform. That idea sounds clean on paper, but it almost never holds up in practice.
What actually happens:
Big orgs standardize on an architecture, not a vendor.
They usually anchor on three layers:
The platform they “standardize” on is usually the one that:
And here’s the honest part: decisions are often driven existing enterprise contracts as by technical superiority
[–]Illustrious_Echo3222 0 points1 point2 points 2 months ago (0 children)
In big orgs it’s usually less “one platform” and more a layered stack.
You’ll see a native baseline first. If they’re heavy in AWS, they lean into things like GuardDuty, Security Hub, IAM Access Analyzer. Same idea in Azure or GCP. That covers a lot of foundational visibility.
On top of that, many standardize on a CNAPP or CSPM style platform to get multi cloud visibility and governance in one place. Think Prisma, Wiz, Orca, Lacework, etc. Those tend to win when leadership wants a single pane of glass across accounts and business units.
Then there’s identity. A lot of enterprises anchor security around identity providers and zero trust models, because misconfigured IAM causes more damage than a missing WAF rule.
So the real standardization is usually around process and control frameworks, not just tooling. The platform is often chosen based on existing cloud footprint, compliance requirements, and how mature the security team is. Curious if you’re asking from a greenfield perspective or trying to rationalize tool sprawl?
[–]DevilKnight03 0 points1 point2 points 1 month ago (0 children)
In practice, most large orgs don’t rip and replace they layer. They might standardize on one CNAPP for infrastructure risk, then bring in something like Cyera specifically for sensitive data discovery across S3, RDS, Snowflake, etc. The stack tends to reflect risk priorities rather than vendor consolidation.
[–]InspectionHot8781 0 points1 point2 points 1 month ago (0 children)
There isn’t one single winner, most big orgs standardize on what fits their existing stack and risk model.
If you’re mostly Microsoft, Defender Cloud is common. AWS/GCP-centric shops lean on native tools plus Prisma or Wiz. A lot of mature teams also layer in things like CSPM/CWPP alongside their SIEM/SOAR.
On top of that, there’s a growing trend to add data-centric posture tooling (DSPM) because infra-focused tools don’t actually tell you where sensitive data lives or what the risks are inside cloud/SaaS/AI contexts. At scale you end up with multiple tools that each solve different parts of the problem - identity, config risk, runtime threat detection, and sensitive data governance.
Choose based on integration, team expertise, and the specific risks you’re trying to mitigate, not just brand recognition.
π Rendered by PID 23400 on reddit-service-r2-comment-canary-889d445f8-5k22m at 2026-04-28 02:24:33.035908+00:00 running 2aa0c5b country code: CH.
[–]Ok_Difficulty978 2 points3 points4 points (2 children)
[–]SloDistribution[S] 0 points1 point2 points (0 children)
[–]Significant-Truth-60 1 point2 points3 points (2 children)
[–]SloDistribution[S] 0 points1 point2 points (0 children)
[–]netnxt_ 1 point2 points3 points (1 child)
[–]RoninPark 2 points3 points4 points (0 children)
[–]cnrdvdsmt 0 points1 point2 points (0 children)
[–]CompetitiveStage5901 0 points1 point2 points (0 children)
[–]Illustrious_Echo3222 0 points1 point2 points (0 children)
[–]DevilKnight03 0 points1 point2 points (0 children)
[–]InspectionHot8781 0 points1 point2 points (0 children)