I primarily use the solution for my client's companies.
Network Security Presales Engineer at a financial services firm with 501-1,000 employees
Stable with an easy initial setup and decent technical support
Pros and Cons
- "The scalability is acceptable."
- "The automation and responsiveness need improvement."
What is our primary use case?
What is most valuable?
I did not find anything that makes it more unique than other equivalent products.
The initial setup is very simple.
The solution is stable.
The scalability is acceptable.
Technical support is great.
What needs improvement?
The solution needs more third-party integration.
The automation and responsiveness need improvement.
They need to be able to escalate technical support issues in a more effective way.
The solution is a bit too expensive.
For how long have I used the solution?
I've used the solution for many years. IT's been a while.
Buyer's Guide
Palo Alto Networks WildFire
November 2024
Learn what your peers think about Palo Alto Networks WildFire. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
823,875 professionals have used our research since 2012.
What do I think about the stability of the solution?
The solution is stable. There are no bugs or glitches. It doesn't crash or freeze. It's reliable.
What do I think about the scalability of the solution?
The solution does have the capability to scale. It can scale to a certain extent.
How are customer service and support?
Technical support was perfect. That said, it's hard to escalate. We're mostly happy with technical support. It's just that the escalation process takes too much time.
Which solution did I use previously and why did I switch?
We are working with a similar product to WildFire at the moment. The features are the same, however, the stability and reliability are better.
How was the initial setup?
The initial setup is very straightforward. It's not overly complex or difficult. A company shouldn't have any issue with the process.
What's my experience with pricing, setup cost, and licensing?
The pricing could be a bit better.
What other advice do I have?
I'm a freelancing security consultant.
I'd advise new users to just double-check the admin guide, the organization guide, before beginning.
I'd rate the solution at an eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Security Manager at a financial services firm with 501-1,000 employees
The automatic threat determination makes it a perfect complement to a Palo Alto Firewall
Pros and Cons
- "The most valuable feature is the Automatic Verdict, to recognize whether something is a threat, or not."
- "I would like to see them continue on their developmental roadmap for the product."
What is our primary use case?
Our primary use case for this solution is for threat intelligence, to detect threats.
How has it helped my organization?
This solution has given us a higher level of assurance that we don't have an active threat.
What is most valuable?
The most valuable feature is the Automatic Verdict feature that recognizes whether something is a threat or not.
What needs improvement?
I would like to see them continue their developmental roadmap for the product.
For how long have I used the solution?
Approximately one year.
What do I think about the stability of the solution?
We have never experienced any downtime or inaccuracies.
What do I think about the scalability of the solution?
This product is super scalable.
How are customer service and technical support?
Their technical support is excellent.
Which solution did I use previously and why did I switch?
We previously used a different solution but it was ineffective and didn't integrate well.
How was the initial setup?
The initial setup for this solution was very easy. You just turn it on and put it in monitoring mode. One person can deploy and maintain this product.
What about the implementation team?
We implemented in-house.
What was our ROI?
The ROI is pretty much right away.
What's my experience with pricing, setup cost, and licensing?
The licensing fees are on an annual basis and there are no costs in addition to the standard fees.
Which other solutions did I evaluate?
Before choosing this solution we evaluated OpenDNS.
What other advice do I have?
WildFire is a perfect complement to a Palo Alto Firewall, it's invaluable.
I would rate this solution a ten out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Palo Alto Networks WildFire
November 2024
Learn what your peers think about Palo Alto Networks WildFire. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
823,875 professionals have used our research since 2012.
Sr. Network Engineer at a tech services company
Strengthens existing protections, provides significant visibility into files and apps moving through the company's systems
Pros and Cons
- "Detailed reporting on analysis of content. The inspections are easily applied to security policy profiles and profile groups, and may be assigned on a per-rule basis."
How has it helped my organization?
This product/feature is an enhancement to traditional company/corporate AV and VP solutions, not a replacement. As such, it strengthens existing protections and provides significant visibility into files and applications that are moving through the company's systems.
What is most valuable?
Detailed reporting on analysis of content. The inspections are easily applied to security policy profiles and profile groups, and may be assigned on a per-rule basis.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
No stability issues.
What do I think about the scalability of the solution?
No scalability issues.
How are customer service and technical support?
I have never accessed PAN (Palo Alto Networks) technical support regarding this feature.
Which solution did I use previously and why did I switch?
This is a fairly unique feature offered by Palo Alto Networks (may be comparable to FireEye). As such, it was an addition to our existing protection suites.
How was the initial setup?
Very straightforward. Basically, a few check boxes and desired behaviors.
What's my experience with pricing, setup cost, and licensing?
It is expensive, a feature more accessible to enterprise class customers, but provides an enhanced possibility that Zero- or near-Zero-day threats may be identified and mitigated. The cost of the product weighed against the potential impact of even one successful crypto malware-type exploit may justify the expense.
Which other solutions did I evaluate?
No, again this "WildFire" is a fairly unique feature. The closest comparison may be FireEye, but I have not used that product.
What other advice do I have?
Consider your level of exposure to exploits of any nature. Also, consider the impact (cost and loss of business) of even one successful exploit to help make a business decision regarding this product.
I would also advise that the decision should be considered with regard to the company's ability/willingness to provide the assets to keep abreast of these types of products and features. There are no set and forget type functions.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Technical Lead at a tech services company with 11-50 employees
Sandboxing prototype and the ability to analyze a broad spectrum of file types ensure effective threat detection
Pros and Cons
- "The threat intelligence from WildFire supports our proactive defense strategies."
- "Palo Alto doesn't do much to support the on-premise version. It wants too much self-support for the on-premise version of WildFire."
What is our primary use case?
Sandboxing is the primary use case. WildFire is used for that. There are two options: one is on the cloud, and one is on-premise. The cloud version is perfect. It is working very well. But on the on-premise version, we have faced a lot of problems previously.
How has it helped my organization?
The threat intelligence from WildFire supports our proactive defense strategies. Palo Alto has a unit 42 team, which is one of the best in the market for threat intelligence. Their threat intelligence is comprehensive.
Also, Palo Alto is a pioneer in AI and ML integration, so I think there are some AI processes running in clusters.
What is most valuable?
It can detect new threats, particularly. It's a sandboxing prototype.
We send mostly emails or connections with context or files. The most important thing is how many kinds of files the sandbox can handle. Also, Palo Alto is good at this. There are more than 20 different file types, this product can understand.
The important thing for sandboxing is how many different types of files the sandbox product is analyzing. And so, also, Palo Alto is good at it, compared to other sandboxes.
What needs improvement?
Palo Alto doesn't do much to support the on-premise version. It wants too much self-support for the on-premise version of WildFire.
But for regulation purposes, some of our customers don't want to use the cloud environment, so they have to use the on-premise version.
Integration is okay, not too hard, with Palo Alto. But we are facing a lot of issues, and most of the issues go unresolved. So, the on-premise version is not very stable.
With my experience, the cloud version is stable. So I need the on-premises version to be more stable.
For how long have I used the solution?
I have been working with Palo Alto for four years, but I have been familiar with WildFire for one and a half years.
What do I think about the stability of the solution?
I would rate the stability a seven out of ten.
The cloud version is very stable. It is working very fine. Integration is very easy. There are not too many issues. I like it. Compared to the on-premise version, it is very easy and very effective for customers.
Which solution did I use previously and why did I switch?
Some of my colleagues work on SD-WAN.
How was the initial setup?
The initial setup is a little bit complex on-premise, but not too complex because it can only connect to a Palo Alto firewall. On the cloud, it is very easy; you only need to enable it with a click, and it is done. After that, you can set up the configuration on the firewall.
But on-premise, it is not a configuration issue; it's a little bit of a stability issue.
Integration with existing infrastructure:
WildFire can only integrate with the Palo Alto firewall. Right now, maybe XDR can integrate on the cloud version, but you cannot integrate it with other vendors or put it standalone without any Palo Alto product.
What about the implementation team?
We are an integrator. We also work with some other vendors.
What was our ROI?
WildFire has improved our customer's security posture and reduced costs overall.
It's not hard to configure as it connects to the firewall. After integration, you don't need much configuration and don't waste too much time, so the return on investment is very rapid.
What's my experience with pricing, setup cost, and licensing?
In general, all Palo Alto products are a little bit higher in price compared to competitors.
What other advice do I have?
I recommend it, but mostly the cloud version.
I recommend it to any company who needs sandboxing or this kind of file analysis. But they must be careful if they have to use on-premise, because of the stability issues.
Overall, I would rate the solution an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Jun 4, 2024
Flag as inappropriateHelps to analyze files transmitted over the network
Pros and Cons
- "The graphic user interface of Palo Alto is good and it's easy to configure."
- "In the future, Palo Alto could reduce the time it takes to process the file."
What is our primary use case?
I'm a reseller.
What is most valuable?
WildFire analyzes the malware in the network such as SSDB and can help analyze the files transmitted over the network, and can detect if the file contains malware.
There are features such as sandboxing in cloud. It submits malware to Palo Alto on the cloud, verifies the reputation file, and analyzes the malware in the files.
The graphic user interface of Palo Alto is good and it's easy to configure.
What needs improvement?
Palo Alto limits the files submitted per day. There are limitations with the boxes for the Palo Alto module. In the future, I think Palo Alto will reduce the sandboxing in the on-prem version because the box cannot operate.
In the future, Palo Alto could reduce the time it takes to process the file. Sometimes it takes 10 minutes.
For how long have I used the solution?
I've been using this solution for three years.
What do I think about the stability of the solution?
It's stable.
What do I think about the scalability of the solution?
It's scalable.
How are customer service and support?
Technical support is very good. In Vietnam, we work directly with Palo Alto engineers.
Which solution did I use previously and why did I switch?
I also have experience with Check Point, Fortinet, and Cisco.
How was the initial setup?
Configuration is easy.
What's my experience with pricing, setup cost, and licensing?
For the last three years, the price of Palo Alto in Vietnam has been very high.
What other advice do I have?
I would rate this solution 9 out of 10.
Disclosure: My company has a business relationship with this vendor other than being a customer:
Director at a tech services company with 1-10 employees
Intuitive, stable, and scalable zero-day threat prevention solution with a machine learning feature
Pros and Cons
- "Intuitive threat prevention and analysis solution, with a machine learning feature. Scalable, stable, and protects against zero-day threats."
- "The cost of this solution could still be improved, in particular, giving product discounts for charitable causes."
What is our primary use case?
Palo Alto Networks WildFire is being used as an effective zero-day threat prevention solution. When a file comes in from a user innocently clicking on a website, then downloading the file, for example, if your Palo Alto is set up in a way that detects what is happening in that traffic going through, whether the file is an audio file, a DLL, an executable file, etc., if it thinks that file is unsafe, it will ask for a second opinion from Palo Alto Networks WildFire.
If you'll imagine how a network would work: You've got your computer, then your antivirus on the computer, then you have your internet gateway. That suspicious file will stop at the gateway, rather than stopping at the computer. Think about hurdles, where you've got these people running over hurdles, and to win the race, you have to jump over every single hurdle. If you get one of those hurdles wrong, that's it. You're done. That's why we're doing this check almost at the perimeter, or at the edge of the network, instead of on the device, because once you're on the device, it means you're on the network.
What is most valuable?
What I found most valuable in Palo Alto Networks WildFire is that it's intuitive. I also love the App-ID feature, especially because it works out of the box. I can also instantly see all the traffic going out, e.g. I can just plug a firewall in, then connect one network socket to a switch, etc. There's no configuration I need to do to see it. It just tells me that you're sending BitTorrent traffic, or SLL traffic, or you're going into 365, etc. It just does that out of the box, and it's the best thing that this solution can do. Straight away you can see all the traffic going through your network.
Palo Alto Networks WildFire, because it's from Palo Alto Networks, has better visibility on everything, so they can see what's happening in the world. They recently released the Palo Alto Networks WildFire machine learning feature on the firewall, so it's them saying: "This thing's happening on your firewall, so you should do this," and it just does it for you. Rather than relying on a human to interpret these problems, it will just do it for you, and that's pretty cool. I've not played with the machine learning feature myself, but that's something I'm very keen to have a look at.
What needs improvement?
We do a lot with charities, and I'd love Palo Alto Networks WildFire to have more discounts, e.g. charity discounts, so we can protect healthcare and schools, then other than aiming at the universities and the big hospitals where it's a lot of money, we can go for the smaller schools, too. They make quite a killing there.
Again, it's just charity pricing, but because we are a partner with them, we can do that ourselves, e.g. we can buy it and then reduce our margins on it to get them over. We feel that it's better to sell the device that's very good at a lower cost, then, we lock in with their services at the end, so work management, etc. Rather than saying, "It's going to cost you this much money, and it's too expensive to even begin with."
For how long have I used the solution?
I've been a reseller of Palo Alto Networks WildFire for four years now.
What do I think about the stability of the solution?
Palo Alto Networks WildFire is a stable solution.
What do I think about the scalability of the solution?
Palo Alto Networks WildFire is scalable, particularly if you pick the right firewall, and that's it: you can do what you need to with it.
How are customer service and support?
With five being the highest and one being the lowest, I'm scoring the technical support for Palo Alto Networks WildFire a four. They're very, very good, but there is still room for improvement when some issues become more complex. If you understand the system, then you'll also understand why it is like it is.
How was the initial setup?
Setting up Palo Alto Networks WildFire is easy out of the box, because you just plug in the cables you need, but the way it works is you need to have an understanding of networking, otherwise, setting it up will be difficult. If you are the right type of person, then you'll have no problems with the setup.
What's my experience with pricing, setup cost, and licensing?
Palo Alto Networks WildFire is quite expensive, and this is what puts people off.
What other advice do I have?
The way Palo Alto Networks WildFire works is that it's essentially a service that you get from Palo Alto as part of your subscription. You can subscribe to it at an additional cost, and the idea is it can communicate with all the Palo Alto devices in the world about a file, e.g. whether a file is suspicious or harmless.
For example, a machine in Australia downloads a file, and it doesn't know if it's a file that can be trusted or not. The Palo Alto Networks WildFire process is that it takes that file, and then moves it to the WildFire service in the cloud, so there's a transaction from the firewall doing that.
Let's say it's a Word file or something that looks suspicious, Palo Alto Networks WildFire then detonates the file, e.g. it takes that file and runs checks against it, before and after, and then it sees the difference and says, "Well, this actual file contains a payload." The way that it works then, is that there are attackers or people who are trying to subvert systems, and they will say, "Oh, if this file is running on a virtual machine, like in a sandbox environment, don't do the thing that you're going to do, only when it's a physical thing, like actual hardware.
The Palo Alto Networks WildFire process is a process that goes through all these other checks, e.g. it runs on physical, on virtual, on different types of Linux, MacOS, etc. This file is checked against all these different environments to see if it's okay or not, so this is done off the box, off the firewall.
This is the service that you pay for as part of that subscription, so when it's done, essentially that file is marked as safe, that's cool. If it's marked as bad, then that file, the hash is taken from it, so it's easily identified, then through the Palo Alto Networks WildFire subscription, all the firewalls in the world then get that information within just one minute, if you set it to that. It will say something similar to: "Look out for this file if you ever see it", and then all the machines now knows that the file is dodgy or suspicious. That's what Palo Alto Networks WildFire does.
Palo Alto Networks is very well rounded. They're building an ecosystem: the Palo Alto ecosystem. You've got global protect VPNs and they are the armor that works on the whole ecosystem. They also have integrations, e.g. there are other applications from HP that plug into the device, because it's got the APIs there.
For the deployment and maintenance of Palo Alto Networks WildFire, one person can do it, but it's a special tool, so a network staff that just looks after a server would probably struggle with it, just because of some of the concepts that you need to use. There are specific trainings you'd need to do to get the best out of it, but one specialist could do it, e.g. it's not unheard of.
My advice to others looking into implementing this solution is for them not to be put off by the cost. It's similar to looking at cars, e.g. there's a reason people like Jaguar cars over the Fords. I've always got this mantra that if you have a network, if you have a data network, and if it's going to cost you, e.g. if you look at the fines associated with various industries, and if you're a school that gets a data breach, it'll cost you this much money. The question is: "Can you afford that much money as a company?" If your answer is "No", then you have to look at mitigating it. I would suggest looking at Palo Alto Networks WildFire and saying, "Well, we do these types of things to protect your network."
If you still don't want to pay that money, then chances are, you don't particularly care about security. If you want to pay for that kind of thing to stave off the bigger fine that results from getting a data breach, or getting hacked, etc., then that's how we think about it. Don't be off put by the cost when you're looking at it. Palo Alto Networks WildFire is a very comprehensive device. They are the best firewalls in the world.
There are also other solutions like UTMs and XGs, e.g. if you like Fortigate, but everyone I've shown the Palo Alto to instantly said: "This big screen here: I can see all the traffic going through", and you just filter it at the top, and it just makes more sense to people. It's very intuitive.
My rating for Palo Alto Networks WildFire is eight out of ten. It's not a perfect score because of its cost.
Disclosure: My company has a business relationship with this vendor other than being a customer:
Senior Network Engineer at a retailer with 10,001+ employees
Quick technical support, easy to set up, and is part of a complete product
Pros and Cons
- "What I like about Palo Alto is that it is a complete product, with everything in it."
- "In the future, I would like to see more automation in the reporting."
What is our primary use case?
I work on the network equipment in our company including switches, routers, firewalls, VPN, and all of the perimeter devices. Palo Alto WildFire is one of the products that we use to secure our network.
Generally, it detects threats to our network and blocks them. This includes checking applications for malware.
What is most valuable?
What I like about Palo Alto is that it is a complete product, with everything in it.
What needs improvement?
In the future, I would like to see more automation in the reporting.
For how long have I used the solution?
We have been using WildFire for between four and five years.
What do I think about the stability of the solution?
This product is pretty stable.
What do I think about the scalability of the solution?
Our network and security group are the ones who use it. We haven't had to scale beyond that.
How are customer service and technical support?
We don't have a lot of contact with technical support but when we do, they are pretty quick.
Which solution did I use previously and why did I switch?
I haven't used another solution that is better than this one.
How was the initial setup?
The initial setup is straightforward. It was not complex for me at all.
What's my experience with pricing, setup cost, and licensing?
The pricing is highly expensive.
What other advice do I have?
From my perspective, Palo Alto is the best solution in the market. This is the reason that we implemented it.
I would rate this solution an eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Security Engineer (Core Network Security) at NEX4 ICT Solutions
Feature-rich, reliable, and easy to deploy
Pros and Cons
- "The solution is scalable."
- "High availability features are lacking."
What is our primary use case?
We primarily use the solution for threat protection.
What is most valuable?
I found the solution easy to deploy.
It has a nice IP set.
The VPN technologies are very good.
It's largely very feature-rich.
The solution is scalable.
Technical support is generally helpful.
It is stable and reliable.
What needs improvement?
I don't have any real problems with the solution.
High availability features are lacking. It's a bit too standard as a solution. It needs high availability.
We'd like the solution to be a bit cheaper. It's quite pricey.
For how long have I used the solution?
I've been working with the solution for three or four years.
What do I think about the stability of the solution?
The solution is pretty stable. I'd rate it eight or nine out of ten in terms of reliability. It has limitations for high-availability features. It's more traditional.
What do I think about the scalability of the solution?
It's a good solution if you need to scale.
We have three or four customers using the solution right now.
How are customer service and support?
Technical support is fine. We haven't had issues with them when we need help.
How was the initial setup?
The solution is straightforward to set up. Since it is so easy, it takes one or two months for a migration. An initial setup might take one or two weeks.
We need Panorama. We give the IP to the team and Panorama as well. Then we have to ensure the firewall has internet access.
What's my experience with pricing, setup cost, and licensing?
There are a lot of licensing options. It can be a bit complicated for users. They could work to simplify the options. The product is also a very expensive firewall.
What other advice do I have?
I'm an integrator. We do use a variety of versions of the solution. We have a few clients using the product.
I'd recommend the solution to others. It improves protection and is a good firewall.
I would rate the solution eight out of ten. I'm happy with its capabilities.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
Buyer's Guide
Download our free Palo Alto Networks WildFire Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Product Categories
Advanced Threat Protection (ATP)Popular Comparisons
Microsoft Defender for Office 365
Microsoft Defender for Identity
Palo Alto Networks VM-Series
Digital Guardian
Barracuda CloudGen Firewall
Fortinet FortiSandbox
Trellix Network Detection and Response
Check Point SandBlast Network
Proofpoint Targeted Attack Protection
Symantec Advanced Threat Protection
Check Point Infinity
Trellix Advanced Threat Defense
SonicWall Capture Advanced Threat Protection
Buyer's Guide
Download our free Palo Alto Networks WildFire Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Fortinet, Palo Alto or Check Point?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Expert Opinion on Palo-Alto Required.
- What is the biggest difference between Fortinet FortiGate and Palo Alto Networks WildFire?
- Palo Alto Networks Firewalls has been in Gartner's Leaders quadrant for 3 years. Agree/Disagree?
- Palo Alto 5060 or Fortigate FG-1500D
- How does Cisco Firepower NGFW Firewall compare with Palo Alto Networks Wildfire?
- Which is better - Wildfire or FortiGate?
- How does Cisco ASA Firewall compare with Palo Alto's WildFire?
- How do Palo Alto Networks' security features compare to other security vendors like Cisco?