Our primary use case for Palo Alto Threat Prevention is related to the placement of files in a laboratory test environment. We use Palo Alto Threat Prevention for network testing.
Information Security Specialist at a comms service provider with 1,001-5,000 employees
Valuable next generation firewall features
Pros and Cons
- "The most valuable feature of Palo Alto Threat Prevention for our company is the next generation firewall."
- "The organization mail security solutions could be improved. There is no mail security solution available."
What is our primary use case?
How has it helped my organization?
I can't give an example of how Palo Alto has improved our organization because we are using this product in test networks.
What is most valuable?
The most valuable feature of Palo Alto Threat Prevention for our company is the next generation firewall.
What needs improvement?
The organization mail security solutions could be improved. There is no mail security solution available.
Buyer's Guide
Palo Alto Networks Advanced Threat Prevention
December 2024
Learn what your peers think about Palo Alto Networks Advanced Threat Prevention. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
Palo Alto Threat Prevention is naturally stable in operations.
What do I think about the scalability of the solution?
I don't see a problem with Palo Alto Threat Prevention in scalability. Because it's a testing product for use it only for test alignment.
We have maybe 10 or 12 engineers dedicated to the solution. Only engineers are using this product. For deployment and maintenance, only one staff.
We use Palo Alto Threat Prevention just for testing.
How are customer service and support?
Palo Alto's technical support is very good.
How was the initial setup?
The setup of Palo Alto Threat Prevention is very easy and straightforward. From initial configuration to deployment, it took maybe one day.
What about the implementation team?
We did not use an integrator, re-seller, or consultant for the deployment.
What other advice do I have?
I would rate Palo Alto Threat Prevention a nine out of ten overall. I would prefer better mail security features.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Presales Engineer at a tech services company with 1,001-5,000 employees
Easy to configure and easy to operate with great stability
Pros and Cons
- "For those who want a next-gen firewall that's easy to configure and easy to operate, I think you should go for Palo Alto."
- "The documentation needs to be improved. I need better information about how to configure it and what the best practices are."
What is our primary use case?
Our primary use case is to have as a gateway.
What is most valuable?
The dimensions is one of the most valuable features. WildFire is the sandbox solution from Palo Alto. No other sandbox solution can match WildFire.
What needs improvement?
The documentation needs to be improved. I need better information about how to configure it and what the best practices are.
For how long have I used the solution?
We have been using Palo Alto Networks Threat Prevention for a year.
What do I think about the stability of the solution?
I don't have any stability problems with Palo Alto. Palo Alto is one of the greatest products in terms of stability. Compared to other solutions, Palo Alto is the most stable.
What do I think about the scalability of the solution?
I think it's very scalable, but in terms of the firewall, you need to define first where the firewall is located. You can deploy it anywhere, but it really depends on the environment of the customer.
How was the initial setup?
The initial setup was not so complex but not so simple. It depends on the requirements of the deployment. Sometimes it should be simple but sometimes you need more knowledge to connect the device.
The deployment can take around one month. Sometimes the project manager wants to extend the session with the customer and maybe upgrade the migration. Then he asks the customer if there are any problems or is there are any additional issues that come up after the migration. In terms of the configuration, it takes less than five days but in terms of the project, we saw more cases that took around a month.
We only need a project manager and engineer for the deployment. Some deployments require additional engineers. From our customer's side, we usually discuss the deployment with the security team.
What other advice do I have?
For those who want a next-gen firewall that's easy to configure and easy to operate, I think you should go for Palo Alto.
Palo Alto is a bit pricy compared to different models. Customers try to compare the price between other solutions, like Fortinet, Cisco, and Checkpoint.
In the next release, I would like for Palo Alto to work on email protection.
I would rate it a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
Buyer's Guide
Download our free Palo Alto Networks Advanced Threat Prevention Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Product Categories
Intrusion Detection and Prevention Software (IDPS)Popular Comparisons
Splunk User Behavior Analytics
Trend Micro Deep Discovery
Trend Micro TippingPoint Threat Protection System
Fortinet FortiGate IPS
Palo Alto Networks URL Filtering with PAN-DB
Cisco Secure IPS (NGIPS)
Cisco Sourcefire SNORT
Cisco IOS Security
Trellix Intrusion Prevention System
Threat Stack Cloud Security Platform
Fortra's Tripwire Enterprise
Buyer's Guide
Download our free Palo Alto Networks Advanced Threat Prevention Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Intrusion Detection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- What product do you recommend for a Campus IPS appliance implementation?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which alternative solutions (other than Darktrace) do you recommend for an SMB?
- Which is the best intrusion detection and prevention solution?
- What is the best IDPS security tool and why?
- What is Cognitive Cybersecurity and what is it used for?