We performed a comparison between Palo Alto Networks WildFire and Trellix Network Detection and Response based on real PeerSpot user reviews.
Find out in this report how the two Advanced Threat Protection (ATP) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable features of Palo Alto Networks WildFire are the good URL and file analysis that uses artificial intelligence. It has different interfaces, such as rest, SMTP protocol, and HTTPS. The Security incidents and event management are very good. Additionally, there are many file types that are supported and there is no limit to the number of files it can handle simultaneously. It integrates well with SIEM solutions."
"You have better control because you define apps. You just don't define ports. You define apps, and the apps are monitored in the traffic. It is more specific than the Cisco firewall when it comes to our needs."
"The solution has plenty of features."
"High availability with active-active and active-passive modes."
"The backup is the best feature."
"We get support in the free version."
"The technical support is good."
"The most valuable feature is the Automatic Verdict, to recognize whether something is a threat, or not."
"It is stable and quite protective. It has a lot of features to scan a lot of malicious things and vulnerabilities."
"The sandbox feature of FireEye Network Security is very good. The operating system itself has many features and it supports our design."
"We wanted to cross-reference that activity with the network traffic just to be sure there was no lateral movement. With Trellix, we easily confirmed that there was no lateral network involvement and that nothing else was infected. It helped us correlate the events and feel confident in our containment."
"The solution can scale."
"The most valuable feature is the network security module."
"Its ability to find zero-day threats, malware and anything malicious has greatly improved my customer's organization, especially for protecting the users' browser."
"The product is very easy to configure."
"We see ROI in the sense that we don't have to react because it stops anything from hurting the network. We can stop it before we have a bigger mess to clean up."
"The solution can improve its traffic management."
"The cost of the solution is excessively high."
"The product's false positive logs could be more user-friendly to understand. They could provide examples of precious cases to learn."
"The deployment model could be better."
"It's not really their problem, it's a problem across the board. There will always be problems with interrupted traffic. We have to set it up where we're playing a middle man game where we're stripping it out, looking at it, and then putting it back together and sending it on its way. That requires CPU cycles. And there's some overhead with that."
"The VPN and decryption need improvement."
"Any enhancements should likely be focused on the firewall appliance to further strengthen overall security capabilities, such as refining app and user identity features."
"Other vendors have some sort of bandwidth management built into the firewall itself and Palo Alto is missing that."
"I heard that FireEye recently was hacked, and a lot of things were revealed. We would like FireEye to be more secure as an organization. FireEye has to be more protective because it is one of the most critical devices that we are using in our environment. They have a concept called SSL decryption, but that is only the packet address. We would like FireEye to also do a lot of decryption inside the packet. Currently, FireEye only does encryption and decryption of the header, but we would like them to do encryption and decryption of the entire packet."
"Cybersecurity posture has room for improvement."
"Technical support could be improved."
"A better depth of view, being able to see deeper into the management process, is what I'd like to see."
"Its documentation can be improved. The main problem that I see with FireEye is the documentation. We are an official distributor and partner of FireEye, and we have access to complete documentation about how to configure or implement this technology, but for customers, very limited documentation is available openly. This is the area in which FireEye should evolve. All documents should be easily available for everyone."
"The initial setup was complex because of the nature of our environment. When it comes to the type of applications and functions which we were looking at in terms of identifying malicious threats, there would be some level of complexity, if we were doing it right."
"It would be a good idea if we could get an option to block based upon the content of an email, or the content of a file attachment."
"It would be very helpful if there were better integration with other solutions from other vendors, such as Fortinet and Palo Alto."
More Trellix Network Detection and Response Pricing and Cost Advice →
Palo Alto Networks WildFire is ranked 3rd in Advanced Threat Protection (ATP) with 58 reviews while Trellix Network Detection and Response is ranked 9th in Advanced Threat Protection (ATP) with 37 reviews. Palo Alto Networks WildFire is rated 8.4, while Trellix Network Detection and Response is rated 8.4. The top reviewer of Palo Alto Networks WildFire writes "Good technical support and provides automatic analysis that saves us time in filtering email". On the other hand, the top reviewer of Trellix Network Detection and Response writes "Offers in-depth investigation capabilities, integrates well and smoothly transitioned from a lower-capacity appliance to a higher one". Palo Alto Networks WildFire is most compared with Cisco Secure Firewall, Fortinet FortiGate, Juniper SRX Series Firewall, Proofpoint Email Protection and Netgate pfSense, whereas Trellix Network Detection and Response is most compared with Fortinet FortiSandbox, Zscaler Internet Access, Fortinet FortiGate, Vectra AI and NetWitness Platform. See our Palo Alto Networks WildFire vs. Trellix Network Detection and Response report.
See our list of best Advanced Threat Protection (ATP) vendors.
We monitor all Advanced Threat Protection (ATP) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.