Trellix Network Detection and Response and Palo Alto Networks VM-Series are prominent competitors in the cybersecurity space. Trellix demonstrates an advantage in zero-day detection capabilities, while Palo Alto stands out for its robust application control and cloud integration features.
Features: Trellix Network Detection and Response offers advanced threat detection including zero-day attacks and APTs, a sophisticated sandboxing engine, and deep visibility into threats with user-level insights. Palo Alto Networks VM-Series is equipped with powerful application and URL filtering, advanced threat prevention, and seamless cloud integration with unparalleled deployment flexibility.
Room for Improvement: Trellix could benefit from enhanced integration capabilities, increased customization options, and improved reporting and management functionalities. Its pricing is also high, and there is a desire for better cloud-based machine learning. Palo Alto Networks VM-Series needs improvements in AWS integration, complexity reduction, and dynamic scalability. User interface updates and advanced multi-factor authentication integration are necessary areas of improvement.
Ease of Deployment and Customer Service: Trellix Network Detection and Response is primarily deployed on-premises, offering strong support, though direct technical support is less accessible, often depending on partners or internal teams. Palo Alto Networks VM-Series, frequently deployed in cloud environments, is known for seamless cloud service integration. Its customer service and technical support are positively noted, though there is room for reducing deployment cost and complexity.
Pricing and ROI: Trellix Network Detection and Response, though expensive, delivers high ROI by effectively preventing breaches and reducing response times. Meanwhile, Palo Alto Networks VM-Series, also seen as costly, offers flexible pricing through AWS Marketplace, allowing for right-sizing. Despite its high price, users value its comprehensive features and flexibility, though licensing complexity is a concern. Both solutions provide significant ROI in threat prevention and operational efficiency.
The support quality could be improved.
The technical support is very good.
When managing the firewall, it involves a Strata Cloud web browser that requires improvement to enhance deployment ease and call center efficiency.
There is a need for two-factor authentication, particularly for VPN and CloudProtect.
If I were to rate it on a scale, it would receive nine out of ten, and with two-factor authentication, it would be ten.
There are no issues with the cost, as it is commensurate with the quality received.
We use these tools to prevent all known and unknown threats using Palo Alto Networks' Wildfire and other data filtering tools to gather information, analyze traffic, manage malicious traffic, and offer visibility, control, and attack prevention.
Palo Alto offers excellent security, with features such as email scanning, malware protection, and efficient VPN and antivirus capabilities.
Palo Alto Networks VM-Series is a highly effective advanced threat protection (ATP) solution and firewall that can be hosted on cloud computing technologies designed by many different companies. It decreases the amount of time that it will take administrators to respond to threats. Users that deploy VM-series have 70% less downtime than those who use similar firewalls. Neither protection nor efficiency are concerns when this next-generation firewall is in play.
VM-Series is being deployed to protect both public and private cloud environments. This level of flexibility empowers organizations to run the environment or environments that best meet their needs without worrying that they are going to be exposed to digital threats due to the environment that they choose.
In the public cloud, users of Palo Alto Networks VM-Series can automate their deployment and dynamically scale up their environment while experiencing a consistent level of protection. This dynamic scalability means that they also integrate their security into their DevOps workflows so that their security can keep up with their activities and requirements. Users of private cloud environments can set up security policies that can be automated to be provisioned as the need arises. Organizations don’t need to slow down when they deploy VM-Series because it makes the task of defending them so simple that they can set their defenses and forget that they are even there.
Users gain a deep level of visibility when they deploy Palo Alto Networks VM-Series. App-ID technology enables organizations to see their network traffic on the application level and spot threats that might be trying to sneak in through vulnerable points in their defenses. It also leverages Palo Alto Networks WildFire and advanced threat protection to block the threats before they can escalate.
Palo Alto Networks VM-Series Features:
Reviews from Real Users:
Palo Alto Networks VM-Series is a solution that stands out when compared to other similar solutions. Two major advantages that it offers are its ability to protect users without degrading the efficiency with which their networks perform and its centralized management system.
Jason H., the director of information technology at Tavoca Inc, writes, “There is no noticeable trade-off between security and network performance. In fact, so far, we've not seen any negative network performance with it. We're very impressed in that regard.”
An information technology manager at a tech services company says, “We use Palo Alto’s Panorama centralized management system. We have an on-prem firewall where Panorama is very good for pulling logs in from the cloud so we can see what is going on. It gives us visibility into that as well as shows us what attacks are coming in. Palo Alto’s Panorama centralized management system simplifies our security posture based on our requirements. Instead of manually pulling logs, then generating them into readable formats, it gives us the console in a readable format to view.”
Detect the undetectable and stop evasive attacks. Trellix Network Detection and Response (NDR) helps your team focus on real attacks, contain intrusions with speed and intelligence, and eliminate your cybersecurity weak points.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.