Network Security Services at ACE Managed Securty Services
Real User
Top 5
2023-01-02T11:14:50Z
Jan 2, 2023
When it comes to URL filtering, Palo Alto Networks URL Filtering with PAN-DB is the way to go. It helps you maintain complete control of your network security by identifying and blocking risky websites that can contain malicious content or be used for phishing attempts. Through URL filtering powered by PAN-DB, you can also ensure that users are not accessing inappropriate content, allowing you to maintain a safe and secure online environment for all users. With URL filtering from Palo Alto Networks, you can rest assured that your business is always protected.
Plus, URL filtering with PAN-DB is incredibly easy to use. With an intuitive and user-friendly interface, you can quickly set up URL filtering policies that will be enforced on your network in no time. URL Filtering with Palo Alto Networks is the perfect solution for keeping your business safe and secure!
We have a few servers in DMC that are not going to go through proxy, but at the same time, they are trying to connect to the internet to download some updates from repo. So, anything that is not a red-hat-related repo or Apache-related repo is blocked, and we have a specific repository. This is when we have been trying to use a URL filter.
Consultant at a tech services company with 11-50 employees
Consultant
2021-08-06T20:35:13Z
Aug 6, 2021
Our company is based in Sacramento. This solution is generally used for enforcing HR policy for enterprise. In our case, most of the clients are state government institutions. Palo Alto ensures that no hate speech or anarchy websites, for example, get through. We also implement this product. If somebody takes our recommendation and buys the product, they can trust that it's good because we're not partners with Palo Alto, we're recommending it because it's a good product. I trust PAN.
Learn what your peers think about Palo Alto Networks URL Filtering with PAN-DB. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Consultant at a tech services company with 501-1,000 employees
Reseller
2021-06-05T10:04:26Z
Jun 5, 2021
We require a firewall to deploy URL filtering or to enforce this URL filtering solution to our users. It is actually cloud-based, deployed on a cloud, and is URL Filtering as a service, which requires a firewall. The firewall, therefore, will then enforce the URL filtering options on my users' traffic. We are using this for preventing the user's access to malicious websites, or access to inappropriate adult websites or porn websites or even the P2P tunnels or tunnels or domains they should not access. This is our main priority and main use case.
We operate in the automotive industry. Internally we work with computing and networking equipment, concentrated on collecting, storing, processing, and distributing enormous amounts of data. Our company deploys this solution for internal web security purposes.
Palo Alto Networks URL Filtering with PAN-DB is an advanced URL filtering solution that provides a way to control web access, as well as how users interact with online content. With this solution, your organization can prevent credential phishing theft by assuming strict control over which sites users can enter their corporate credentials into. Palo Alto Networks Advanced URL Filtering with PAN-DB provides web protection by using URL database capabilities to help you automatically detect and...
It provides visibility and control over where people are web browsing and protects them from going to malicious sites.
We use the solution to filter URLs.
When it comes to URL filtering, Palo Alto Networks URL Filtering with PAN-DB is the way to go. It helps you maintain complete control of your network security by identifying and blocking risky websites that can contain malicious content or be used for phishing attempts. Through URL filtering powered by PAN-DB, you can also ensure that users are not accessing inappropriate content, allowing you to maintain a safe and secure online environment for all users. With URL filtering from Palo Alto Networks, you can rest assured that your business is always protected.
Plus, URL filtering with PAN-DB is incredibly easy to use. With an intuitive and user-friendly interface, you can quickly set up URL filtering policies that will be enforced on your network in no time. URL Filtering with Palo Alto Networks is the perfect solution for keeping your business safe and secure!
My primary use case is to ensure there's no need for a separate IDS or IPS solution.
We have a few servers in DMC that are not going to go through proxy, but at the same time, they are trying to connect to the internet to download some updates from repo. So, anything that is not a red-hat-related repo or Apache-related repo is blocked, and we have a specific repository. This is when we have been trying to use a URL filter.
Our company is based in Sacramento. This solution is generally used for enforcing HR policy for enterprise. In our case, most of the clients are state government institutions. Palo Alto ensures that no hate speech or anarchy websites, for example, get through. We also implement this product. If somebody takes our recommendation and buys the product, they can trust that it's good because we're not partners with Palo Alto, we're recommending it because it's a good product. I trust PAN.
We require a firewall to deploy URL filtering or to enforce this URL filtering solution to our users. It is actually cloud-based, deployed on a cloud, and is URL Filtering as a service, which requires a firewall. The firewall, therefore, will then enforce the URL filtering options on my users' traffic. We are using this for preventing the user's access to malicious websites, or access to inappropriate adult websites or porn websites or even the P2P tunnels or tunnels or domains they should not access. This is our main priority and main use case.
Our primary use case of this solution is for both internal and external firewalls.
We operate in the automotive industry. Internally we work with computing and networking equipment, concentrated on collecting, storing, processing, and distributing enormous amounts of data. Our company deploys this solution for internal web security purposes.