Palo Alto Networks VM-Series and ThreatLocker Zero Trust Endpoint Protection Platform compete in the cybersecurity market. Palo Alto Networks VM-Series has the upper hand in ease of deployment and advanced features, while ThreatLocker excels in customer service and cost-effectiveness.
Features: Palo Alto Networks VM-Series offers full-content inspection, next-generation IDS and IPS, and robust support for AWS environments, making it ideal for extensive threat management. Its application filtering features such as AppiID and URL filtering provide advanced protection. Additionally, the solution is scalable, meeting diverse technical requirements. ThreatLocker Zero Trust Endpoint Protection Platform provides zero-trust strategies, granular application control, and ring-fencing features. These capabilities prevent unauthorized software execution, enhancing operational security through stringent security postures.
Room for Improvement: Palo Alto Networks VM-Series could improve its user interface and integration capabilities, especially concerning multi-factor authentication and Azure auto-scaling. Pricing transparency and documentation are other areas identified for refinement. Users also highlighted delays in antivirus capabilities. ThreatLocker can work on enhancing its user interface and streamline workflow management. Better integration with PSA systems and reducing network saturation during policy updates have been suggested as potential areas of improvement.
Ease of Deployment and Customer Service: Both Palo Alto Networks VM-Series and ThreatLocker offer simple deployment processes across cloud and hybrid environments. While user reviews show that Palo Alto Networks provides responsive customer service, delays from tiered support may impact efficiency. ThreatLocker, with direct contact options, receives higher marks for customer satisfaction and efficiency.
Pricing and ROI: Palo Alto Networks VM-Series is viewed as a premium solution with a comprehensive licensing and support structure, which can be costly. Despite its higher price point, the effectiveness in security justifies the cost, although some budget concerns exist. ThreatLocker is priced reasonably, offering significant value with its zero-trust architecture, providing cost-effective security features that lead to high customer satisfaction. Both solutions show substantial ROI by enhancing security postures and streamlining operations, aiding better agility and resource management.
Customers can see data within a week, indicating a quick return on investment.
If something were to happen without ThreatLocker, the cost would be huge, and thus, having it is definitely worth it.
The main return on investment is peace of mind, knowing that with ThreatLocker on any endpoint, it will almost always block all malicious code or exploits, even zero-day exploits.
It keeps malware, Trojans, and ransomware at bay.
The support quality could be improved.
The technical support is very good.
It is very hard to reach, and the process can be lengthy and frustrating because support involves several layers.
They have been very responsive, helpful, and knowledgeable.
I would rate their customer support a ten out of ten.
Their support is world-class.
They are easy to upgrade, and with credit licensing, they scale effectively according to demand.
If I were to rate it on a scale, it would receive nine out of ten, and with two-factor authentication, it would be ten.
I started off with just the servers, and within a month and a half, I set up the entire company with ThreatLocker.
It seems to primarily operate on the endpoints rather than at a central location pushing out policies.
I would rate it a ten out of ten for scalability.
Hardware is generally very stable.
I have not experienced any major problems or downtime.
For five years, we have not had a problem.
Once deployed, it downloads the policies locally, so even if the computer doesn't have internet, it doesn't matter.
It has been very stable, reliable, and accessible.
Most customers go for partner-enabled support, which involves multiple layers, leading to delays.
When managing the firewall, it involves a Strata Cloud web browser that requires improvement to enhance deployment ease and call center efficiency.
There is a need for two-factor authentication, particularly for VPN and CloudProtect.
Controlling the cloud environment, not just endpoints, is crucial.
This is problematic when immediate attention is needed.
Comprehensive 24-hour log monitoring is a valuable enhancement for both business and enterprise-level users.
Palo Alto is expensive in terms of pricing, particularly when comparing features to cost.
The cost involves purchasing through a vendor, which might mark up due to the supply chain.
The pricing is reasonable and reflects the quality of the product.
After conversations with other partners, it became clear we underpriced it initially, which caused most of our issues.
We are moving towards the Unified solution, where they basically bundle everything together, providing us better stability with the ability to bring in new product offerings without having to go back to the customer and say, 'This is going to cost you.'
I had a really good deal at the time, and it continues to be cost-effective.
We use these tools to prevent all known and unknown threats using Palo Alto Networks' Wildfire and other data filtering tools to gather information, analyze traffic, manage malicious traffic, and offer visibility, control, and attack prevention.
Palo Alto's robust threat intelligence supports new updates, and I can open cases directly with their Threat Intelligence team.
Palo Alto offers excellent security, with features such as email scanning, malware protection, and efficient VPN and antivirus capabilities.
ThreatLocker Zero Trust Endpoint Protection Platform's ability to block access to unauthorized applications has been excellent.
It protects our customers.
The major benefit is fewer breaches overall, as nothing can be run without prior approval. This helps my company protect its data and secure itself effectively.
Palo Alto Networks VM-Series is a highly effective advanced threat protection (ATP) solution and firewall that can be hosted on cloud computing technologies designed by many different companies. It decreases the amount of time that it will take administrators to respond to threats. Users that deploy VM-series have 70% less downtime than those who use similar firewalls. Neither protection nor efficiency are concerns when this next-generation firewall is in play.
VM-Series is being deployed to protect both public and private cloud environments. This level of flexibility empowers organizations to run the environment or environments that best meet their needs without worrying that they are going to be exposed to digital threats due to the environment that they choose.
In the public cloud, users of Palo Alto Networks VM-Series can automate their deployment and dynamically scale up their environment while experiencing a consistent level of protection. This dynamic scalability means that they also integrate their security into their DevOps workflows so that their security can keep up with their activities and requirements. Users of private cloud environments can set up security policies that can be automated to be provisioned as the need arises. Organizations don’t need to slow down when they deploy VM-Series because it makes the task of defending them so simple that they can set their defenses and forget that they are even there.
Users gain a deep level of visibility when they deploy Palo Alto Networks VM-Series. App-ID technology enables organizations to see their network traffic on the application level and spot threats that might be trying to sneak in through vulnerable points in their defenses. It also leverages Palo Alto Networks WildFire and advanced threat protection to block the threats before they can escalate.
Palo Alto Networks VM-Series Features:
Reviews from Real Users:
Palo Alto Networks VM-Series is a solution that stands out when compared to other similar solutions. Two major advantages that it offers are its ability to protect users without degrading the efficiency with which their networks perform and its centralized management system.
Jason H., the director of information technology at Tavoca Inc, writes, “There is no noticeable trade-off between security and network performance. In fact, so far, we've not seen any negative network performance with it. We're very impressed in that regard.”
An information technology manager at a tech services company says, “We use Palo Alto’s Panorama centralized management system. We have an on-prem firewall where Panorama is very good for pulling logs in from the cloud so we can see what is going on. It gives us visibility into that as well as shows us what attacks are coming in. Palo Alto’s Panorama centralized management system simplifies our security posture based on our requirements. Instead of manually pulling logs, then generating them into readable formats, it gives us the console in a readable format to view.”
ThreatLocker Zero Trust Endpoint Protection Platform offers robust endpoint security through application control and allowlisting, safeguarding servers and workstations from unauthorized software execution.
ThreatLocker Zero Trust Endpoint Protection Platform provides extensive application control with features like ring-fencing and selective elevation, ensuring meticulous execution management. Offering learning mode and extensive support, it integrates threat detection and activity monitoring to enhance compliance, reduce costs, and bolster cybersecurity through alerts and approvals. Despite its strengths, there are areas for improvement in training flexibility, policy updates, and interface enhancements, along with challenges in handling non-digitally signed software. Deployed across environments, it works well with existing cybersecurity instruments for real-time threat prevention.
What are the top features of ThreatLocker?ThreatLocker Zero Trust Endpoint Protection Platform is widely implemented to safeguard IT infrastructures against unauthorized access and application use. In sectors where data security is paramount, this platform enables users to prevent unauthorized software installations and control device applications, ensuring real-time threat prevention and compliance with industry regulations.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.