Our primary use case is to have as a gateway.
Presales Engineer at a tech services company with 1,001-5,000 employees
Easy to configure and easy to operate with great stability
Pros and Cons
- "For those who want a next-gen firewall that's easy to configure and easy to operate, I think you should go for Palo Alto."
- "The documentation needs to be improved. I need better information about how to configure it and what the best practices are."
What is our primary use case?
What is most valuable?
The dimensions is one of the most valuable features. WildFire is the sandbox solution from Palo Alto. No other sandbox solution can match WildFire.
What needs improvement?
The documentation needs to be improved. I need better information about how to configure it and what the best practices are.
For how long have I used the solution?
We have been using Palo Alto Networks Threat Prevention for a year.
Buyer's Guide
Palo Alto Networks Advanced Threat Prevention
November 2024
Learn what your peers think about Palo Alto Networks Advanced Threat Prevention. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
What do I think about the stability of the solution?
I don't have any stability problems with Palo Alto. Palo Alto is one of the greatest products in terms of stability. Compared to other solutions, Palo Alto is the most stable.
What do I think about the scalability of the solution?
I think it's very scalable, but in terms of the firewall, you need to define first where the firewall is located. You can deploy it anywhere, but it really depends on the environment of the customer.
How was the initial setup?
The initial setup was not so complex but not so simple. It depends on the requirements of the deployment. Sometimes it should be simple but sometimes you need more knowledge to connect the device.
The deployment can take around one month. Sometimes the project manager wants to extend the session with the customer and maybe upgrade the migration. Then he asks the customer if there are any problems or is there are any additional issues that come up after the migration. In terms of the configuration, it takes less than five days but in terms of the project, we saw more cases that took around a month.
We only need a project manager and engineer for the deployment. Some deployments require additional engineers. From our customer's side, we usually discuss the deployment with the security team.
What other advice do I have?
For those who want a next-gen firewall that's easy to configure and easy to operate, I think you should go for Palo Alto.
Palo Alto is a bit pricy compared to different models. Customers try to compare the price between other solutions, like Fortinet, Cisco, and Checkpoint.
In the next release, I would like for Palo Alto to work on email protection.
I would rate it a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
Director of Sales at S4E Serbia
Offers threat detection and prevention empowered by advanced machine learning capabilities
Pros and Cons
- "The most valuable feature is its use of machine learning to detect potentially unknown threats."
- "There is a potential drawback with the lack of support for the ICAP protocol."
What is our primary use case?
Advanced Threat Prevention is used for detecting and preventing mostly unknown attacks. It utilizes machine learning to detect malware in 90% of cases without assistance from the cloud.
It acts as inline security, stopping malware quickly by utilizing machine learning and other tools from Palo Alto Networks like virus definitions and behavior analysis of applications or files.
How has it helped my organization?
Usually, advanced threat prevention is used for detecting and preventing mostly unknown attacks since it uses machine learning, it can, in 90% of cases, detect malware without asking for help from the cloud. It's considered inline security as the malware can be stopped very quickly.
What is most valuable?
The most valuable feature is its use of machine learning to detect potentially unknown threats. Using various techniques, the system can conclude if there is a malware threat in network traffic.
It offers inline security, stopping malware quickly without relying on cloud support. Advanced Threat Prevention integrates other tools from Palo Alto like virus definitions and application behavior checking.
What needs improvement?
All the subscriptions come in bundles, therefore, it is difficult to pinpoint specific areas for improvement. However, there is a potential drawback to the lack of support for the ICAP protocol. Integration using this protocol could make the device work seamlessly with some other solutions.
For how long have I used the solution?
I have been dealing with Advanced Threat Prevention since it has existed, so I think it is already some two years.
What do I think about the stability of the solution?
If you are on the recommended version of PanOS, it is stable. However, if you immediately go for a new version or use an older one, instability can occur. It's crucial to follow the recommended versions on Palo Alto Networks' site.
What do I think about the scalability of the solution?
If more throughput is needed or additional users require features like decryption and the current device is insufficient, transitioning to a bigger model is suggested. Palo Alto Networks addresses scalability by offering a range of device models that fit varying business sizes.
How are customer service and support?
The support from Palo Alto is very good. If you run into issues, you just need to follow the rules, and usually, customers don't care about this, leading to potential problems.
How would you rate customer service and support?
Positive
How was the initial setup?
The installation is straightforward. You activate it on a customer support portal by entering the license code. After activation, security rules need to be prepared, and profiles included in the security policies.
What was our ROI?
The return on investment is significant, with campaigns providing bigger discounts. Customers are happy with the solution and tend to stay with Palo Alto, saving time and money.
What's my experience with pricing, setup cost, and licensing?
The pricing is competitive, and with current campaigns and discounts, it provides an excellent device for a reasonable price.
What other advice do I have?
Overall, I would give the solution a rating of nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Last updated: Nov 20, 2024
Flag as inappropriateBuyer's Guide
Download our free Palo Alto Networks Advanced Threat Prevention Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Product Categories
Intrusion Detection and Prevention Software (IDPS)Popular Comparisons
Splunk User Behavior Analytics
Trend Micro Deep Discovery
Trend Micro TippingPoint Threat Protection System
Fortinet FortiGate IPS
Palo Alto Networks URL Filtering with PAN-DB
Cisco Secure IPS (NGIPS)
Cisco Sourcefire SNORT
Cisco IOS Security
Trellix Intrusion Prevention System
Threat Stack Cloud Security Platform
Fortra's Tripwire Enterprise
Buyer's Guide
Download our free Palo Alto Networks Advanced Threat Prevention Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Intrusion Detection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- What product do you recommend for a Campus IPS appliance implementation?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which alternative solutions (other than Darktrace) do you recommend for an SMB?
- Which is the best intrusion detection and prevention solution?
- What is the best IDPS security tool and why?
- What is Cognitive Cybersecurity and what is it used for?