Information Technology Security Engineer at a tech services company with 11-50 employees
Reseller
Top 5
2024-10-23T10:42:00Z
Oct 23, 2024
I use WildFire mostly for customers, especially when they ask about firewalls. We recommend Palo Alto, FortiGate, Check Point, and then a customer decides what is the best firewall for their tasks. I generally recommend WildFire for telecom companies, banks, supermarkets, or any company which has its own IT infrastructure.
Owner at a tech services company with 1-10 employees
Real User
Top 5
2024-07-30T14:23:19Z
Jul 30, 2024
We use the product to identify and analyze unknown threats. This includes handling new files or URLs that are not yet known to be malicious. It operates in a secure environment, ensuring that no infrastructure is at risk while determining if a file is harmful.
Palo Alto Networks WildFire acts as a sandboxing or intrusion prevention solution. It is used to prevent malicious attacks depending on predefined detection. The on-premises detection engine or cloud-based WildFire can be licensed on the firewall to send all traffic to the cloud to be analyzed. It then sends feedback (good or not good) that can mitigate against malware attacks. It basically analyzes this with an Android traffic engine.
Cyber Security Director at a manufacturing company with 5,001-10,000 employees
Real User
Top 5
2024-06-18T14:06:05Z
Jun 18, 2024
We primarily use the product for on-site protection through Palo Alto's XDR, which triggers scans for potential malicious files in network traffic and endpoints.
We use the product to enhance threat detection and response. We utilize it as part of a broader security ecosystem to monitor and block potential cyber threats. Our environment includes multiple financial clients and has tailored rules for specific needs, such as anti-fraud measures. The solution integrates seamlessly with our firewalls and incident response systems, vital for our security operations.
WildFire is a centralized intelligence service that updates its database with the latest information about real-time threats worldwide. This allows it to update firewall licenses in the cloud in real time. When it detects new attacks or vulnerabilities, it immediately pushes real-time firewall updates for remediation. This capability enables WildFire to protect against zero-day attacks.
Learn what your peers think about Palo Alto Networks WildFire. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Security Technical Lead at a tech services company with 11-50 employees
Real User
Top 5
2024-05-23T11:52:54Z
May 23, 2024
Sandboxing is the primary use case. WildFire is used for that. There are two options: one is on the cloud, and one is on-premise. The cloud version is perfect. It is working very well. But on the on-premise version, we have faced a lot of problems previously.
Application Support Administrator at a transportation company with 501-1,000 employees
Real User
Top 10
2024-02-07T11:02:00Z
Feb 7, 2024
In our company, Palo Alto Networks WildFire is seamlessly integrated with our firewall, working automatically to detect and prevent zero-day attacks. It is like having an extra layer of defense that kicks in whenever there is a potential security threat. My role mainly involves managing firewall policies and configurations, while WildFire handles the more intricate aspects of threat detection and analysis.
My company uses Palo Alto Networks WildFire to protect itself from unknown or zero-day attacks. We use machine learning to send the file or the URL we've never seen before to the cloud and WildFire. WildFire uses machine learning and an appliance update before providing a signature in less than five minutes. All the customers globally receive the signature from WildFire. WildFire is a good feature in Palo Alto besides IPS allowing us to prepare for unknown attacks.
Most of my customers use Palo Alto Networks WildFire for zero-day and ransomware attack prevention. If an unfamiliar attack occurs and the security measures in place are not equipped to handle it, a common approach is to utilize sandboxing in the Palo Alto Networks WildFire. These tools simulate the attack in a separate environment, allowing for the analysis of the attack's behavior to determine if it is malicious or benign and whether it is an acceptable behavior or not.
We use this solution to identify whether an unknown file is managed or not. We also use it to identify any unknown file that is executable without reputation. We do this before releasing it to the end-user.
Director at a tech services company with 1-10 employees
Reseller
2022-03-29T01:37:00Z
Mar 29, 2022
Palo Alto Networks WildFire is being used as an effective zero-day threat prevention solution. When a file comes in from a user innocently clicking on a website, then downloading the file, for example, if your Palo Alto is set up in a way that detects what is happening in that traffic going through, whether the file is an audio file, a DLL, an executable file, etc., if it thinks that file is unsafe, it will ask for a second opinion from Palo Alto Networks WildFire. If you'll imagine how a network would work: You've got your computer, then your antivirus on the computer, then you have your internet gateway. That suspicious file will stop at the gateway, rather than stopping at the computer. Think about hurdles, where you've got these people running over hurdles, and to win the race, you have to jump over every single hurdle. If you get one of those hurdles wrong, that's it. You're done. That's why we're doing this check almost at the perimeter, or at the edge of the network, instead of on the device, because once you're on the device, it means you're on the network.
Sr Manager - Information Security & Researcher at a tech services company with 1,001-5,000 employees
Real User
2021-08-31T17:34:22Z
Aug 31, 2021
We are using Palo Alto Networks WildFire as a firewall to block malicious traffic. We use the IOCs, such as hash signatures matches, and IP addresses to block potential threats. Additionally, we use Palo Alto for VPN connectivity, but this is another product.
Pre-sales manager at a tech services company with 11-50 employees
Real User
2021-02-10T03:04:00Z
Feb 10, 2021
We are a security company working in the security system for the banking sectors, and we're trying to penetrate through the identity and access management products for our clients. We work with all of the Palo Alto technologies.
Senior Network Engineer at a retailer with 10,001+ employees
Real User
2020-09-06T08:04:24Z
Sep 6, 2020
I work on the network equipment in our company including switches, routers, firewalls, VPN, and all of the perimeter devices. Palo Alto WildFire is one of the products that we use to secure our network. Generally, it detects threats to our network and blocks them. This includes checking applications for malware.
We are a solution provider and WildFire is one of the security products that we implement for our customers. We are also using it for testing purposes. It is primarily used to check for cloud-based malware.
Managing Director at a tech services company with 1-10 employees
Real User
2020-09-03T07:49:51Z
Sep 3, 2020
We are a solution provider and Palo Alto WildFire is one of the products that we implement for our customers. One of the things that we do is design firewalls for companies that need to enhance their security.
Senior Analyst Security and Compliance at a insurance company with 5,001-10,000 employees
Real User
2020-07-28T06:50:00Z
Jul 28, 2020
WildFire is being deployed based on vendor and security best practices and recommendations from our Managed Service Provider. leveraging their inherent knowledge it allows us to think outside the box.
We had two 800-Series Palo Alto Firewalls, but as they reached end-of-life, we began researching alternatives. Ultimately, we chose to switch to Cisco Firepower, so we no longer use WildFire.
Technical Support Engineer at a venture capital & private equity firm with 501-1,000 employees
Reseller
2020-02-16T08:27:36Z
Feb 16, 2020
We primarily use Wildfire products to prevent attacks. As resellers, we showcase the Wildfire capabilities like handling known and unknown threats on the customer side.
Information Technology Manager at a construction company with 51-200 employees
Real User
2020-02-16T08:27:33Z
Feb 16, 2020
We have the Palo Alto Firewall sitting on the edge and everything that comes through it is analyzed. Even if anything comes through via email, it is forwarded to the WildFire service, which then opens up email attachments to see if they do any damage to the system. If it reports back that the attachment should not be forwarded then it keeps it out. WildFire has discovered a lot of stuff that our other anti-spam tool did not, so it has been quite good.
Architect - Cloud Serviced at a comms service provider with 10,001+ employees
Real User
Top 20
2019-04-17T08:37:00Z
Apr 17, 2019
We use Palo Alto Networks WildFire for firewall and IT services. We also use it for bank security requirements. They are remarkable for support of threat analysis on files.
Palo Alto Networks WildFire is a highly effective cloud-based advanced threat protection (ATP) solution that organizations in a wide variety of fields trust to help them keep safe from digital threats. It is designed to enable businesses to confront even the most evasive threats and resolve them. It combines many techniques to maximize the level of threat protection available to users.
Palo Alto Networks WildFire Benefits
Some of the ways that organizations can benefit by choosing to deploy...
I use WildFire mostly for customers, especially when they ask about firewalls. We recommend Palo Alto, FortiGate, Check Point, and then a customer decides what is the best firewall for their tasks. I generally recommend WildFire for telecom companies, banks, supermarkets, or any company which has its own IT infrastructure.
We use the product to identify and analyze unknown threats. This includes handling new files or URLs that are not yet known to be malicious. It operates in a secure environment, ensuring that no infrastructure is at risk while determining if a file is harmful.
Palo Alto Networks WildFire acts as a sandboxing or intrusion prevention solution. It is used to prevent malicious attacks depending on predefined detection. The on-premises detection engine or cloud-based WildFire can be licensed on the firewall to send all traffic to the cloud to be analyzed. It then sends feedback (good or not good) that can mitigate against malware attacks. It basically analyzes this with an Android traffic engine.
We primarily use the product for on-site protection through Palo Alto's XDR, which triggers scans for potential malicious files in network traffic and endpoints.
We use the product to enhance threat detection and response. We utilize it as part of a broader security ecosystem to monitor and block potential cyber threats. Our environment includes multiple financial clients and has tailored rules for specific needs, such as anti-fraud measures. The solution integrates seamlessly with our firewalls and incident response systems, vital for our security operations.
WildFire is a centralized intelligence service that updates its database with the latest information about real-time threats worldwide. This allows it to update firewall licenses in the cloud in real time. When it detects new attacks or vulnerabilities, it immediately pushes real-time firewall updates for remediation. This capability enables WildFire to protect against zero-day attacks.
Sandboxing is the primary use case. WildFire is used for that. There are two options: one is on the cloud, and one is on-premise. The cloud version is perfect. It is working very well. But on the on-premise version, we have faced a lot of problems previously.
In our company, Palo Alto Networks WildFire is seamlessly integrated with our firewall, working automatically to detect and prevent zero-day attacks. It is like having an extra layer of defense that kicks in whenever there is a potential security threat. My role mainly involves managing firewall policies and configurations, while WildFire handles the more intricate aspects of threat detection and analysis.
I use the tool in my company for advanced threat protection and for configuring the firewall policy. I also use GlobalProtect VPN, along with IPsec.
My company uses Palo Alto Networks WildFire to protect itself from unknown or zero-day attacks. We use machine learning to send the file or the URL we've never seen before to the cloud and WildFire. WildFire uses machine learning and an appliance update before providing a signature in less than five minutes. All the customers globally receive the signature from WildFire. WildFire is a good feature in Palo Alto besides IPS allowing us to prepare for unknown attacks.
Mainly file scanning and email threat detection, especially when it comes to attachments and communications.
The solution is used for threat protection. The solution can be deployed on-prem and in the cloud.
We primarily use the solution both in our company and with our clients. It is mostly used for security.
Most of my customers use Palo Alto Networks WildFire for zero-day and ransomware attack prevention. If an unfamiliar attack occurs and the security measures in place are not equipped to handle it, a common approach is to utilize sandboxing in the Palo Alto Networks WildFire. These tools simulate the attack in a separate environment, allowing for the analysis of the attack's behavior to determine if it is malicious or benign and whether it is an acceptable behavior or not.
We use it for DNS security, URL filtering, and threat prevention.
We use this solution to identify whether an unknown file is managed or not. We also use it to identify any unknown file that is executable without reputation. We do this before releasing it to the end-user.
I'm a reseller.
The solution is deployed on-premise.
Palo Alto Networks WildFire is being used as an effective zero-day threat prevention solution. When a file comes in from a user innocently clicking on a website, then downloading the file, for example, if your Palo Alto is set up in a way that detects what is happening in that traffic going through, whether the file is an audio file, a DLL, an executable file, etc., if it thinks that file is unsafe, it will ask for a second opinion from Palo Alto Networks WildFire. If you'll imagine how a network would work: You've got your computer, then your antivirus on the computer, then you have your internet gateway. That suspicious file will stop at the gateway, rather than stopping at the computer. Think about hurdles, where you've got these people running over hurdles, and to win the race, you have to jump over every single hurdle. If you get one of those hurdles wrong, that's it. You're done. That's why we're doing this check almost at the perimeter, or at the edge of the network, instead of on the device, because once you're on the device, it means you're on the network.
Palo Alto Networks WildFire is an ATP solution. It provides advanced threat protection, so it can protect customers against zero-day attacks.
We are using Palo Alto Networks WildFire as our network firewall.
We use WildFire for malware protection in our customers' companies.
I primarily use the solution for my client's companies.
We are using Palo Alto Networks WildFire as a firewall to block malicious traffic. We use the IOCs, such as hash signatures matches, and IP addresses to block potential threats. Additionally, we use Palo Alto for VPN connectivity, but this is another product.
We use it for remote access and security.
We are using the solution for our zero-day advanced persistent threats(APT). Additionally, we are using it as our only sole network distribution.
I use this solution for protecting endpoint devices from malware.
We are a security company working in the security system for the banking sectors, and we're trying to penetrate through the identity and access management products for our clients. We work with all of the Palo Alto technologies.
I work on the network equipment in our company including switches, routers, firewalls, VPN, and all of the perimeter devices. Palo Alto WildFire is one of the products that we use to secure our network. Generally, it detects threats to our network and blocks them. This includes checking applications for malware.
We are a solution provider and WildFire is one of the security products that we implement for our customers. We are also using it for testing purposes. It is primarily used to check for cloud-based malware.
We are a solution provider and Palo Alto WildFire is one of the products that we implement for our customers. One of the things that we do is design firewalls for companies that need to enhance their security.
WildFire is being deployed based on vendor and security best practices and recommendations from our Managed Service Provider. leveraging their inherent knowledge it allows us to think outside the box.
We had two 800-Series Palo Alto Firewalls, but as they reached end-of-life, we began researching alternatives. Ultimately, we chose to switch to Cisco Firepower, so we no longer use WildFire.
We primarily use Wildfire products to prevent attacks. As resellers, we showcase the Wildfire capabilities like handling known and unknown threats on the customer side.
We have the Palo Alto Firewall sitting on the edge and everything that comes through it is analyzed. Even if anything comes through via email, it is forwarded to the WildFire service, which then opens up email attachments to see if they do any damage to the system. If it reports back that the attachment should not be forwarded then it keeps it out. WildFire has discovered a lot of stuff that our other anti-spam tool did not, so it has been quite good.
Our primary use case for this solution is for threat intelligence, to detect threats.
We use Palo Alto Networks WildFire for firewall and IT services. We also use it for bank security requirements. They are remarkable for support of threat analysis on files.
Our primary use cases are for firewalls, cloud, and on-premise.
My primary use case of this solution is on-frame and in-cloud security of the infrastructure.
The primary use case for this solution is the attention to detail. IT is also easy to manage, and easy to use. It is a really good product.
My primary use case for this solution is for a secure gateway. It creates a proxy or an appropriation for the suspicious files that can be damaging.
We don't want a virus. We don't want people visiting unknown sites and opening us up to any type of malware or any type of virus attacks.