Advanced Threat Prevention is used for detecting and preventing mostly unknown attacks. It utilizes machine learning to detect malware in 90% of cases without assistance from the cloud. It acts as inline security, stopping malware quickly by utilizing machine learning and other tools from Palo Alto Networks like virus definitions and behavior analysis of applications or files.
We use Palo Alto Networks Threat Prevention to check the traffic pattern. We must analyze the payload's content. We use security policies to inspect the traffic further passing through the firewalls.
Learn what your peers think about Palo Alto Networks Advanced Threat Prevention. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
Senior Network Security Architect at a financial services firm with 10,001+ employees
Real User
2022-12-08T17:33:32Z
Dec 8, 2022
Our company uses the solution for IDS and IPS functionality in the signature phase that includes vulnerability and antivirus plus file blocking in the DLP to some extent. The signature feed is sent to the firewall based on a schedule we configure. Intervals can go up to every five minutes where the firewall goes to the cloud to get the latest signature feeds. At the same time, there are mission learning capabilities on the firewall that categorize certain non-threats on ports and protocols as malicious traffic before creating the signature. We have 30 to 50 resources that use the solution throughout our company.
We use it to upload, delete, and list what to publish on the net to block websites and even posts. Recently, I blocked Adobe Acrobat Reader. When you install it on your PC, sometimes it contacts the internet and opens some posts. Thus, it can be easily hacked by a user on the internet. When you browse for this kind of list, you can easily upload it on Palo Alto without any difficulty.
Quality engineer of the 1st category at Modern Expo
Real User
Top 20
2019-09-29T07:27:00Z
Sep 29, 2019
We use this solution for the security of our organization. It protects the LAN and WAN traffic. We have two boxes that have this solution for threat prevention. Some of our servers also have Palo Alto agents installed on them. We have an on-premises deployment.
Information Security Specialist at a comms service provider with 1,001-5,000 employees
Real User
2019-04-11T10:03:00Z
Apr 11, 2019
Our primary use case for Palo Alto Threat Prevention is related to the placement of files in a laboratory test environment. We use Palo Alto Threat Prevention for network testing.
Head Of Information Security at SAUDI PARAMOUNT COMPUTER SYSTEMS
Real User
2019-04-11T10:03:00Z
Apr 11, 2019
For a total overall solution, Palo Alto Threat Prevention can satisfy most of your needs as a company. Right now, we are implementing Cisco ASA and renewing our Palo Alto license.
General Manager at a tech services company with 11-50 employees
Reseller
2019-02-10T10:06:00Z
Feb 10, 2019
We are resellers of this solution so we facilitate technical services to our clients. We maintain Palo Alto for what we are responsible for maintaining, on the latest version of the software.
Palo Alto Networks Advanced Threat Prevention is a cloud-based security service that combines cutting-edge technologies, including machine learning, artificial intelligence, and expert human monitoring, to effectively thwart advanced threats like malware, zero-day attacks, and command-and-control threats. It offers inline protection, scrutinizing all network traffic irrespective of port, protocol, or encryption. An integral component of Palo Alto Networks' security platform, it enjoys...
Advanced Threat Prevention is used for detecting and preventing mostly unknown attacks. It utilizes machine learning to detect malware in 90% of cases without assistance from the cloud. It acts as inline security, stopping malware quickly by utilizing machine learning and other tools from Palo Alto Networks like virus definitions and behavior analysis of applications or files.
We use the solution for network segregation.
We use the product to protect servers.
The tool is a next-generation firewall. We use it to teach students about firewalls.
The solution can be deployed on the cloud or on-premise.
We use Palo Alto Networks Threat Prevention to check the traffic pattern. We must analyze the payload's content. We use security policies to inspect the traffic further passing through the firewalls.
Our company uses the solution for IDS and IPS functionality in the signature phase that includes vulnerability and antivirus plus file blocking in the DLP to some extent. The signature feed is sent to the firewall based on a schedule we configure. Intervals can go up to every five minutes where the firewall goes to the cloud to get the latest signature feeds. At the same time, there are mission learning capabilities on the firewall that categorize certain non-threats on ports and protocols as malicious traffic before creating the signature. We have 30 to 50 resources that use the solution throughout our company.
We implemented the IPS solution and the DNS sinkhole blocking.
We use it to upload, delete, and list what to publish on the net to block websites and even posts. Recently, I blocked Adobe Acrobat Reader. When you install it on your PC, sometimes it contacts the internet and opens some posts. Thus, it can be easily hacked by a user on the internet. When you browse for this kind of list, you can easily upload it on Palo Alto without any difficulty.
We are in financial environment so we put it on premises and in the cloud.
We primarily use this solution for general user security and protection. In our organization, there are around 250 users, using this solution.
Our primary use cases for this solution is content fileting and threat prevention.
Our primary use case is to have as a gateway.
We use this solution for the security of our organization. It protects the LAN and WAN traffic. We have two boxes that have this solution for threat prevention. Some of our servers also have Palo Alto agents installed on them. We have an on-premises deployment.
The primary use is for application control and encryption.
We primarily use the solution as a firewall.
Our primary use case for Palo Alto Threat Prevention is related to the placement of files in a laboratory test environment. We use Palo Alto Threat Prevention for network testing.
For a total overall solution, Palo Alto Threat Prevention can satisfy most of your needs as a company. Right now, we are implementing Cisco ASA and renewing our Palo Alto license.
We use the firewall in the network.
We are resellers of this solution so we facilitate technical services to our clients. We maintain Palo Alto for what we are responsible for maintaining, on the latest version of the software.