I use Wiz for visibility, cloud visibility, and inventory. We will be using it for prioritizing toxic combinations like risk analysis or vulnerability management and compliance and governments.
External reviews
External reviews are not included in the AWS star rating for the product.
Cloud risks have been prioritized and investigations are now faster with automated visibility
What is our primary use case?
What is most valuable?
The best features in Wiz are visibility and the security graph, which is one of the main core components of Wiz. Instead of flat results, Wiz builds a digital twin of your entire cloud environment such as AWS and Azure. A site scanning option is also available. One of the main features is automated compliance mapping in Wiz.
As a security analyst, I would say automated compliance mapping is one of the important features because many companies do not actually know everything they have running in the cloud. Wiz provides a single pane of glass to see shadow IT, discovering any forgotten database or server created by developers during unmonitored periods. Multi-cloud management allows seeing assets across different providers, such as AWS and Azure, and maintaining a real-time list of virtual machines, serverless functions, buckets, and containers.
Wiz is a full-scale cloud detection and response platform. Agentless scanning is taking a high-resolution photo of your house once an hour to check for unlocked windows. Runtime is having a motion-activated security camera or a guard on site for twenty-four seven. Unlike other traditional agents that slow down servers, Wiz uses extended Berkeley Packet Filter, which is one of the major key features. It is incredibly lightweight and provides deep visibility into containers and Kubernetes nodes, where agentless snapshots might miss live execution details compared to the previous tool I have worked with.
The security graph takes you to zero through the toxic combination filter, which is the fastest way to clear the queue by focusing on the security graph and its logic with a high CVSS score, vulnerability that is exposed and has server identity that can reach sensitive data. Resolving those specific combinations first means that once the path is broken, for example by closing a port or stripping a permission, the issue moves to zero. To automate that remediation and keep the queue at zero, you cannot rely on manual clicks, so you can set up automation rules that automatically resolve critical issues in Jira or ServiceNow. Serverless cleanup will trigger a Lambda function to automatically remove any permissive IAM role and quarantine any suspicious container the moment Wiz detects it.
Wiz reduces alert fatigue. Unlike traditional scanners, Wiz uses a security graph to filter out the noise. Time to value is achieved through agentless deployment. Wiz connects via API rather than requiring software installation on every server. It provides one hundred percent visibility in minutes, which is one of the key benefits.
For time saving, I have reduced around forty to fifty percent time reduction in investigation by using the Security Graph to show exactly how an attacker could reach a database. That almost saves seventy percent of my time. Instead of manually tracking, which would take much time, it saves overall around forty to fifty percent. The alert volume will decrease almost eighty to ninety percent. SLA issues are also addressed. While using this, I do not have to be afraid of facing any SLA issues since it will reduce almost all the backlogs, ensuring all the critical vulnerabilities are fixed within their required policy window. For cost saving, replacing several point solutions with one platform is absolutely cost saving compared to many other products in the market.
What needs improvement?
Everything Wiz has in place is good enough to analyze things.
Nothing has to be added in the future.
The alert fatigue zero issues and priority-based consolidation security graph and anything that has in it easily make it rate eight, including its customer service and support team service. Two percent would be that the loading time is taking a bit longer while loading the graph, and while navigating to other links, that is also taking some time. That is why I am giving it an eight instead of a ten.
For how long have I used the solution?
I have been working with Wiz for almost five years.
What do I think about the stability of the solution?
I have not faced any stability issues during my use of Wiz.
What do I think about the scalability of the solution?
I have not experienced any scalability issues.
How are customer service and support?
The customer support in Wiz is really good. They are super quick to answer the queries that I am facing or any kind of issues that I am facing. They are responsive over time. The onboarding was easy and smooth.
The support team is really helpful, and whenever I raise any kind of ticket about issues I am facing, they will immediately respond to it.
How would you rate customer service and support?
Positive
How was the initial setup?
It was easy while onboarding Wiz.
What about the implementation team?
Wiz was purchased from the same marketplace. I did not buy it from a different place.
What was our ROI?
Wiz is absolutely cost-effective.
What's my experience with pricing, setup cost, and licensing?
The setup cost is somewhere around twenty-four thousand dollars based on your organization's size.
What other advice do I have?
Wiz does consolidate the issue and the priorities and the containers. I would recommend Wiz because of its time-saving ability. You can almost see what are the criticalities that are there and the consolidation feature that is also there in Wiz. Majorly, the security graph will give you a deep information to analyze things in a much better way.
Traditional scanners and other tools do not treat every vulnerability as a priority. Wiz has the security graph to filter out the noise and by only surfacing toxic combinations, security teams can stop chasing thousands of low-risk patches and focus on the few that actually matter. It allows a small security team to manage a massive complex cloud environment without hiring dozens of additional users to look into it.
For any organization who want to think of moving to Wiz, the Security Graph feature is amazing and awesome. It will give you deeper information than any other tools does. That is the main thing to consider. Overall, I rate this product an eight.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Very Capable APIs and complete product
Easy Investigations with a Feature-Rich Toolkit
Wiz Delivers Exceptional Cloud Visibility and Actionable Security Insights
Its ease of use, intuitive interface, and powerful correlation engine significantly streamline our security operations. Integrations are seamless, deployment is fast, and the insights are both actionable and highly reliable.
Overall, Wiz enables us to proactively strengthen our security posture with minimal effort, and I’m extremely satisfied with the product.
The platform’s ability to automatically surface toxic combinations, prioritize vulnerabilities based on real context, and map potential attack vectors dramatically improves our response time and reduces operational overhead. This allows our security team to focus on meaningful remediation instead of spending time piecing data together. Overall, Wiz enables us to strengthen our cloud security posture efficiently, proactively, and with significantly greater accuracy.
Explanatory Graphics That Make Threat Prioritization Easy
Easy Implementation, Excellent Visibility
Effortless Cloud Security with Wiz
Wiz Delivers Outstanding CSPM and Continuous Improvements
Now, we use it all the time to proactively monitor our systems, look for config or vulnerabilities, and whenever I see a new Critical or High issue we immediately jump on it to triage. This means we have got managing Critical config issues down to similar remediation timelines as a Critical security incident and indeed in most cases we treat them almost identically (urgent conf calls, drop tools and huddle to fix etc.).
When it came to implementing Wiz, it was simply as quick as hooking up to our Cloud instances, providing the access, and sitting back to watch the fireworks. During the implementation the support was outstanding, and Wiz spent so much time with us and our different teams showing them how to use it, how simple it was to integrate with other tools, how we could extend visibility to the max, how to interpret the results, get good report data to the right people etc.. This operationalisation help ensure Wiz was used by multiple teams - although I think there's always room for even more engagement internally.
After implementing the engagement didn't stop though, and we still have a regular call with our TAM who is always happy to demo to some new users, or to help tweak some settings or help with some report or other. I don't think we've ever found the limit of engagement and Wiz seems happy to provide whatever level of interaction we need to get where we want to go.
Cloud security has unified multi-cloud visibility and simplifies vulnerability management
What is our primary use case?
I have been using Wiz for approximately three years in my career. Our first use case is Cloud Security Posture Management. We needed that because we are a multi-cloud company. We have most of our infrastructure in AWS, but we also have some in Azure and some in GCP. So we needed a CSPM to cover all three environments.
What is most valuable?
The feature I appreciate most about Wiz as a CSPM is the vulnerability detection and misconfiguration identification. It helps us to ensure that we know if there are misconfigured cloud workloads and what those are, as well as if there are vulnerabilities. That is one of the key value adds for us.
What we have done is create a tool that is not just a security tool but is actually used by other teams. We have created dashboards for other teams, for product teams who are developing code. They can see their assets, or our cloud team or other teams that own different assets can view their own team's vulnerabilities and misconfigurations through per-team dashboards.
For us, the value add when considering Wiz is that I would rather consolidate under fewer tools to get to a platform. This allows for alerts, administration, and dashboards to all be under one platform, simplifying the environment. It makes operations easier and ultimately enhances our ability to use the platform more effectively.
What needs improvement?
Wiz allows us to consolidate tools, particularly in vulnerability management. We used to use a technology called Tenable to do our vulnerability scans, not just on-prem but in the cloud, and we replaced Tenable with Wiz's capabilities as well as the capabilities of an endpoint protection technology we use called CrowdStrike.
Regarding scalability, we have connected to all our cloud accounts and have never had any capacity or performance issues, so scalability really has not been a topic of conversation for us because we have never had any issues.
I have contacted customer support for Wiz. They are aware of our discussions about it. We have talked about it during our quarterly business reviews.
What do I think about the stability of the solution?
I have never seen any instability with Wiz, such as lagging, crashing, or downtime.
What do I think about the scalability of the solution?
We have connected to all our cloud accounts and have never had any capacity or performance issues, so scalability really has not been a topic of conversation for us because we have never had any issues.
How are customer service and support?
I have contacted customer support for Wiz. They are aware of our discussions about it. We have talked about it during our quarterly business reviews.
I am a few steps removed from the details about the support quality and speed, but my impression through the team and talking with the account team directly is that when we raise issues, they are addressed thoughtfully, professionally, and quickly. I do not think there have been any lingering support issues we have had. We have also surfaced feature requests or changes, and they have implemented those and rolled those out within a few weeks. Wiz does a good job of listening to the feedback of their customers and using that to help shape the platform.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have not used any alternatives to Wiz. Wiz was our choice; although we evaluated different technologies when we were looking for a CSPM, we went with Wiz, so we went from nothing to Wiz.
How was the initial setup?
The initial deployment of Wiz was easy from my point of view. Essentially, once we connected Wiz to our AWS account, all the data starts to flow in and telemetry on our cloud assets, any vulnerabilities, and misconfigurations. So the dashboards light up with red, yellow, and green indicators. After deciding to go with Wiz, our proof of concept ended up becoming our production implementation, and we just expanded Wiz to more accounts, then to Azure and GCP. So it was very easy.
What about the implementation team?
I do not know exactly how long it took to fully deploy to a working condition because it has been so long ago, but I will say that getting the visibility was in a matter of weeks to connect the accounts, probably within a week. Then it was a few months to build some of the dashboards and operationalize what we were seeing.
What other advice do I have?
Feature-wise, I cannot tell you that it is a bit expensive compared to its peers, but I do think the premium is worth it. One of the things that Wiz has done well is that there are no agents for the CSPM, at least from what we are doing. It is very easy to roll out, easy to configure, maintain, and generally it does what it says it does with few issues. We had more overhead and more issues with other competing CSPM platforms.
From the team standpoint, I do not think Wiz requires much maintenance on our end because it is all cloud-based and Wiz does a great job of providing almost weekly updates. The ongoing maintenance itself of Wiz is low. We do have integrations which require some care and feeding. We have an integration with ServiceNow, but Wiz's ServiceNow integration is not the best. I have been told there have been issues getting the data out of Wiz and plugged into ServiceNow effectively, so that has taken a little bit more attention.
We are working on achieving zero criticals in our issue queues with Wiz. It has helped us gain visibility into our critical issues, but we still have a few dozen left to work through. A lot of that actually has to do with some older infrastructure and workloads that applications use. So we have some application migrations in the works, but we have not quite got to the zero critical status.
I would rate this review as a 9 overall.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
A Force Multiplier for Lean Security Teams
The biggest upside is the prioritization. Instead of a flat list of thousands of alerts, Wiz uses its Security Graph to identify 'toxic combinations'—helping us focus on the 1% of issues that actually pose a reachable risk. Lastly, the support team is exceptional. They are highly responsive and act more like partners than a standard help desk.
There is also a slight workflow gap for developers. While Wiz is great at identifying the problem, the transition from 'finding an issue' to 'fixing it' still requires manual effort. Navigating the Security Graph can be a bit of a learning curve for non-security users who just want to know exactly what code to change.
For Security: It acts as a force multiplier. Our current security engineers can manage a complex cloud footprint that would typically require a much larger team.
For Developers and SRE: We’ve given them their time back. We no longer bother them with irrelevant vulnerabilities; we only surface the "reachable" risks that actually matter. This has improved our developer and SRE velocity and built a culture of trust between security and engineering.