28 Prisma Access Browser Reviews

Prisma Access Browser provides secure, cloud-delivered web access without requiring endpoint agents.
It uses Zero Trust principles to isolate web sessions and protect sensitive data.
Sessions are rendered in the cloud, streaming only safe content to the user.
Ideal for unmanaged devices, contractors, or BYOD environments.
It reduces risk from malware, phishing, and data leaks with minimal setup. Review collected by and hosted on G2.com.
Prisma Access Browser can introduce latency since sessions are cloud-rendered.
It may not support all complex web apps seamlessly, impacting user experience.
Requires a stable internet connection for optimal performance.
Limited offline functionality compared to native browsers.
Some users may find the interface less intuitive or overly restrictive. Review collected by and hosted on G2.com.

One of the many features of Prisma Access is the Zero Trust Architecture (ZTNA), which makes sure that access is given according to user identity, device posture, and context, reducing attack surfaces and improving security in general. As a one-stop shop for securing distributed networks, Prisma Access also provides strong security features like FW-as-a-service, data loss prevention, and advanced threat protection. From small teams to multinational organizations, the platform can grow to meet their needs. It easily accommodates both on-premises and remote users. Review collected by and hosted on G2.com.
It can be difficult to set up initially and maintain, especially for businesses without specialized security knowledge. Particularly when integrating with legacy systems, there is a significant learning curve. Despite having great features, Prisma Access can still be pricey in comparison to other options. Additionally, the analytics and reporting features of the platform could be more comprehensive and user-friendly. because the dashboard appears cluttered or unintuitive to certain users. Review collected by and hosted on G2.com.

the zero trust security protocol and enterprise grade data loss preventions. i do alot of work remotely as do my colleagues and the Prisma Access Browser was very seamless. Tested it for about a week . Review collected by and hosted on G2.com.
can be a little complex to setup your specifications, although I did find that after a bit of use you will catch on very quickly. Another downside is the pricing as it a bit more expensive than some of the competitors. Review collected by and hosted on G2.com.

Prisma Access Browser has good security, but sometimes it makes the device a bit slow. Also, it can be difficult to set up if a company already uses a different security system. Some features, like blocking copy and paste or file transfers, can feel too strict and make work harder. Review collected by and hosted on G2.com.
Prisma Access Browser is very secure, but sometimes it slows down work because of the constant security checks. Setting it up can also be difficult, especially if a company already has a different security system. Some restrictions, like blocking copy-paste and file transfers, can feel too strict and make simple tasks harder Review collected by and hosted on G2.com.

Prisma Access Browser provides a highly secure, cloud-isolated browsing experience that protects endpoints from threats like malware and phishing. It’s fast, user-friendly, and integrates well with enterprise systems. Review collected by and hosted on G2.com.
The initial setup and policy configuration can be a bit complex, especially for smaller teams without dedicated IT support. Also, since it’s cloud-based, a strong internet connection is always necessary. Review collected by and hosted on G2.com.

This browser is really helpful is the best that I have ever used, I am related with the TICs, and we use it in our organization, because when i need to work from home it protects the data for the organization I am browsing, and it is really easy to set up the filters and the safe browsing. Review collected by and hosted on G2.com.
I cannot dislike anything, why should you dislike something that keep you safe? In my case it continues keeping me safe i have not bad things to write. Review collected by and hosted on G2.com.

The most helpful aspect of Prisma Access Browser is its ability to securely enable web access without exposing the internal network. It provides a cloud-delivered secure web gateway (SWG) that includes advanced threat prevention, data loss prevention (DLP), and zero trust network access (ZTNA) capabilities—without the need for a full VPN client Review collected by and hosted on G2.com.
The least helpful aspect of Prisma Access Browser is that, like many browser isolation and cloud-delivered security tools, it may introduce performance or compatibility issues with certain websites or applications, especially those requiring rich client-side interactivity Review collected by and hosted on G2.com.
Its Zero Trust security model and its browser isolation technology prevents malware and phishing attacks, ensuring a safe browsing experience. The data protection features, such as restricting downloads, clipboard access, and printing, make it a great solution for organizations handling sensitive data. Review collected by and hosted on G2.com.
Prisma Access Browser's strict security controls can limit flexibility, restricting downloads, clipboard access, and printing. Some users experience slight latency with resource-heavy applications. Additionally, its pricing may be high for smaller businesses, and there’s a learning curve for new users. However, it remains a strong choice for secure, cloud-based remote access. Review collected by and hosted on G2.com.

The tool integration allows very fast alerts for any issues and risk management. The actual scalability is decent and it is equipped to set to many user preferences. Review collected by and hosted on G2.com.
The Prisma Access Browser is very expensive and the support for it is not top tier. The documentation and support is not good and feed back if any from Palo Alto is extremely slow. Review collected by and hosted on G2.com.

Most helpful: The ability to securely isolate web traffic.
Upside: Centralized policy enforcement across all endpoints. Additionally, secure access to Saas and web apps without requiring a traditional VPN. Review collected by and hosted on G2.com.
Least helpful aspect: Occasional impact on user experience (Websites loading slowly, not functioning properly due to content filtering or policies).
Downsides: Cloud-based, relies heavily on internet connectivity (Challenge for regions with limited infrastructure)/ Review collected by and hosted on G2.com.