Try our new research platform with insights from 80,000+ expert users

Fortra's Tripwire Enterprise vs Palo Alto Networks Advanced Threat Prevention comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on Dec 19, 2024

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Categories and Ranking

Fortra's Tripwire Enterprise
Ranking in Intrusion Detection and Prevention Software (IDPS)
20th
Average Rating
8.0
Reviews Sentiment
7.2
Number of Reviews
8
Ranking in other categories
No ranking in other categories
Palo Alto Networks Advanced...
Ranking in Intrusion Detection and Prevention Software (IDPS)
10th
Average Rating
8.4
Reviews Sentiment
6.6
Number of Reviews
29
Ranking in other categories
No ranking in other categories
 

Mindshare comparison

As of January 2026, in the Intrusion Detection and Prevention Software (IDPS) category, the mindshare of Fortra's Tripwire Enterprise is 1.7%, up from 0.9% compared to the previous year. The mindshare of Palo Alto Networks Advanced Threat Prevention is 5.6%, up from 4.9% compared to the previous year. It is calculated based on PeerSpot user engagement data.
Intrusion Detection and Prevention Software (IDPS) Market Share Distribution
ProductMarket Share (%)
Palo Alto Networks Advanced Threat Prevention5.6%
Fortra's Tripwire Enterprise1.7%
Other92.7%
Intrusion Detection and Prevention Software (IDPS)
 

Featured Reviews

reviewer2093205 - PeerSpot reviewer
Senior Cybersecurity Analyst at a energy/utilities company with 1,001-5,000 employees
It has excellent scalability and allows you to execute custom COCR rules, letting you fine-tune agent monitoring
I'm using Tripwire Enterprise version 9.0. In my company, thirty to forty people use Tripwire Enterprise, mainly different types of engineers, governance, risk, compliance, and cybersecurity personnel. I advise people planning to use Tripwire Enterprise to take the training because the solution has a fairly complex interface. You can do a lot of work with it, but it isn't very easy. Tripwire Enterprise is a sophisticated tool. I rate the tool an eight on a scale of one to ten because it does an excellent job of handling the unique challenges of maintaining NERC CIP compliance and monitoring industrial controls.
Partha Dash - PeerSpot reviewer
Global Network Tech Lead at a tech vendor with 10,001+ employees
Advanced protection enables us to confidently secure against evolving threats
Palo Alto Networks can improve Advanced Threat Prevention by catering to the growing adoption of AI and agentic tooling. The Threat Protection modules should have the necessary intelligence to protect against those types of threats, as AI will be there to do a human job; this is an evolving area. From an Advanced Threat Protection perspective, the technology associated with Palo Alto Networks, such as their sandboxing environment, is quite good. However, Palo Alto needs to focus on how to bring that technology to end users and how easy it is to use, especially in a hybrid environment where users work from various locations. While Palo Alto excels in certain setups, they need to improve the user experience in distributed working conditions.

Quotes from Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

Pros

"Its reporting features are great. It gives you an in-depth report. Its customization is also great, and it is working fine."
"The most valuable feature is the integrity."
"File monitoring is the most valuable feature of the solution."
"The product supports different platforms."
"We use Tripwire Enterprise as a tool to test the vulnerability of a network. That is the most valuable feature of the product for us."
"Even if you change a single word in Notepad, it will let you know whether it was added, removed, or modified."
"What's most valuable in Tripwire Enterprise is the ability to execute custom COCR rules that lets me fine-tune how I monitor Linux and Windows agents."
"The most valuable feature is integrity management. I had some discussions with service providers, and they also agreed."
"Most of the features of Palo Alto Threat Prevention are alright. I recommend features like content filtering, IP address, & intelligent firewalls. The reporting feature is very good."
"One of the most valuable features is the anti-malware protection."
"Palo Alto Networks Advanced Threat Prevention provides protections against both known and unknown threats quickly, and they have great Cyber Threat Alliance integration, which allows anything that is even unknown to get to our systems quickly in terms of being patched."
"It's very easy to use and configure. What is nice about Palo Alto is that even if you don't understand how to use it, you can just click on upload and upload everything that needs to be blocked."
"The most valuable features are the simplicity, transparency, and overall ease of management."
"It is a stable product."
"I rate Palo Alto Networks Advanced Threat Prevention as nine out of ten."
"The most valuable feature of Palo Alto Threat Prevention for our company is the next generation firewall."
 

Cons

"The main way that it can be improved is through better reporting."
"The deployment with certain systems can be difficult and it needs to be simplified."
"Cloud monitoring could be better. It would also be better if the company followed a pay-as-you-use model."
"A lot of network devices need a custom integration."
"It needs more local support from the OEM side. It would be great if this can be improved."
"An area for improvement in Tripwire Enterprise is stability, as my company had stability issues with the last few versions of the solution. Tripwire Enterprise has been a bit buggy."
"The Windows online integration license needs to be improved."
"The initial setup is complex."
"The solution could benefit from improved AI analytics to predict potential attacks before they occur, similar to NDR systems."
"The organization mail security solutions could be improved. There is no mail security solution available."
"The installation was complicated."
"The documentation needs to be improved. I need better information about how to configure it and what the best practices are."
"The price of licenses should be lowered to make it less costly to scale our solution."
"Mission learning techniques should continue to expand and detect unknown threats on the fly."
"We are attempting to improve the use of URL filtering beyond threat protection."
"In terms of what needs improvement, the only thing I don't like is the support."
 

Pricing and Cost Advice

"Cloud monitoring could be better. It could also be cheaper. It would be better if the company followed a pay-as-you-use model."
"Tripwire is more expensive than Netwrix."
"The licensing depends on the equipment, how many devices and the types of devices."
"Palo Alto Networks Advanced Threat Prevention is quite competitive, offering extensive threat detection and prevention capabilities, though it is priced higher than some alternatives."
"From one to ten, with one being the most expensive, I would rate the pricing of Palo Alto Networks Threat Prevention a one out of ten. It is my understanding that Palo Alto Networks Threat Prevention is the most expensive one."
"It is an expensive solution and I would like to see a drop in price."
"The pricing and the licensing are pretty competitive at this stage. As a reseller, I would like to see the price come down a little bit so I can compete better against other firewalls because we do that all the time."
"The cost involves the price of the hardware, which is expensive. However, most of the Palo Alto solutions are expensive."
"The product’s pricing is expensive for small companies."
"It's not too expensive."
"Palo Alto Networks Threat Prevention could improve by having consistent pricing at system levels."
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
880,685 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Manufacturing Company
10%
University
8%
Computer Software Company
7%
Government
6%
Computer Software Company
10%
Financial Services Firm
9%
Manufacturing Company
8%
Government
7%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
By reviewers
Company SizeCount
Small Business5
Large Enterprise3
By reviewers
Company SizeCount
Small Business9
Midsize Enterprise4
Large Enterprise14
 

Questions from the Community

Ask a question
Earn 20 points
Which is the best DDoS protection solution for a big ISP for monitoring and mitigating?
Arbor would be the best bid, apart from Arbor, Palo Alto and Fortinet have good solutions. As this is an ISP, I would prefer Arbor.
What is your experience regarding pricing and costs for Palo Alto Networks Threat Prevention?
Palo Alto Networks Advanced Threat Prevention requires an add-on license and is considered expensive compared to competitors like Cisco AMP and FortiGate ( /products/fortinet-fortigate-reviews ) fi...
What needs improvement with Palo Alto Networks Threat Prevention?
Palo Alto Networks can improve Advanced Threat Prevention by catering to the growing adoption of AI and agentic tooling. The Threat Protection modules should have the necessary intelligence to prot...
 

Overview

 

Sample Customers

1. Aetna 2. Adobe 3. ADP 4. Airbus 5. Amazon 6. American Express 7. Aon 8. ATT 9. Bank of America 10. Barclays 11. Baxter International 12. Bechtel 13. Boeing 14. Cisco Systems 15. CocaCola 16. Comcast 17. Dell 18. ETRADE 19. ExxonMobil 20. Ford Motor Company 21. General Electric 22. General Motors 23. Google 24. JPMorgan Chase 25. Kraft Foods 26. Lockheed Martin 27. McDonald's 28. Merck 29. Microsoft 30. Morgan Stanley 31. Nike 32. Oracle
University of Arkansas, JBG SMITH, SkiStar AB, TRI-AD, Temple University, Telkom Indonesia
Find out what your peers are saying about Fortra's Tripwire Enterprise vs. Palo Alto Networks Advanced Threat Prevention and other solutions. Updated: December 2025.
880,685 professionals have used our research since 2012.