Network Security Services at ACE Managed Securty Services
Real User
Top 5
2023-02-09T04:32:34Z
Feb 9, 2023
URL Filtering with Palo Alto Networks PAN-DB can help you protect your networks and users from malicious URLs, but it's not perfect. For starters, the database needs to be constantly updated to accurately identify new threats. Additionally, its categorization of websites is sometimes too broad or specific for organizations' needs. Finally, many features like granular controls and multi-category assignments are only available with paid licenses. With all these limitations, it's clear that Palo Alto Networks' URL Filtering could use some improvement. But thankfully, the company is continually striving to improve its offerings to keep networks secure from malicious URLs.
URL Filtering with Palo Alto Networks PAN-DB can help you protect your networks and users from malicious URLs, but it's not perfect. For starters, the database needs to be constantly updated to accurately identify new threats. Additionally, its categorization of websites is sometimes too broad or specific for organizations' needs. Finally, many features like granular controls and multi-category assignments are only available with paid licenses. With all these limitations, it's clear that Palo Alto Networks' URL Filtering could use some improvement. But thankfully, the company is continually striving to improve its offerings to keep networks secure from malicious URLs.
We have been trying make Palo Alto Networks URL Filtering with PAN-DB work with ELK stack. We have had some challenges with that because we are getting limited SNMP. It would be good if it worked better with ELK stack. I'm only able to do it faster when I log into the device and not through Panorama.
Consultant at a tech services company with 11-50 employees
Consultant
Top 20
2021-08-06T20:35:13Z
Aug 6, 2021
One of the less favorite features is the cost of the solution. For example, ~5K for a PA-820 AND ~$1K EACH *per year* for Premium Support, Threat Prevention, and PANDB URL filtering. We also implement other solutions. We tell customers that if they want to have the best possible perimeter security, they're going to have to pay for it. Some smaller entities don't have the budget for it, so we'll suggest Fortinet or something that has similar but inferior capabilities, but is less expensive.
Consultant at a tech services company with 501-1,000 employees
Reseller
2021-06-05T10:04:26Z
Jun 5, 2021
It would be ideal if this solution could be a separate product rather than have to have it deploy through a firewall. If it was a separate product, many of our customers would be happier as most just require a URL filtering option. They do not require a firewall. They do not require any threat prevention or anything. If it was a separate product, we could deploy it to branch offices or any of our customer locations in which different firewalls are being used. The solution is a bit expensive.
Find out what your peers are saying about Palo Alto Networks, Check Point Software Technologies, Fortinet and others in Intrusion Detection and Prevention Software (IDPS). Updated: April 2024.
One way Palo Alto can improve is by offering sandboxing. I don't know if they currently offer a sandboxing feature together with the firewall or not. They should provide secure sandboxing with the firewalls.
What Is an Intrusion Detection System? Intrusion detection systems (IDSes) analyze network traffic for signatures of known attackers. The systems can be hardware devices or software solutions. An IDS can mitigate existing malware, such as backdoors, rootkits, and trojans.The goal of an intrusion detection system is to detect an attack as it occurs. The system starts by analyzing inbound and outbound network traffic for signs of known attackers.
Some activities an IDS performs...
URL Filtering with Palo Alto Networks PAN-DB can help you protect your networks and users from malicious URLs, but it's not perfect. For starters, the database needs to be constantly updated to accurately identify new threats. Additionally, its categorization of websites is sometimes too broad or specific for organizations' needs. Finally, many features like granular controls and multi-category assignments are only available with paid licenses. With all these limitations, it's clear that Palo Alto Networks' URL Filtering could use some improvement. But thankfully, the company is continually striving to improve its offerings to keep networks secure from malicious URLs.
URL Filtering with Palo Alto Networks PAN-DB can help you protect your networks and users from malicious URLs, but it's not perfect. For starters, the database needs to be constantly updated to accurately identify new threats. Additionally, its categorization of websites is sometimes too broad or specific for organizations' needs. Finally, many features like granular controls and multi-category assignments are only available with paid licenses. With all these limitations, it's clear that Palo Alto Networks' URL Filtering could use some improvement. But thankfully, the company is continually striving to improve its offerings to keep networks secure from malicious URLs.
An area for improvement would be the technical support, which can be slow.
We have been trying make Palo Alto Networks URL Filtering with PAN-DB work with ELK stack. We have had some challenges with that because we are getting limited SNMP. It would be good if it worked better with ELK stack. I'm only able to do it faster when I log into the device and not through Panorama.
One of the less favorite features is the cost of the solution. For example, ~5K for a PA-820 AND ~$1K EACH *per year* for Premium Support, Threat Prevention, and PANDB URL filtering. We also implement other solutions. We tell customers that if they want to have the best possible perimeter security, they're going to have to pay for it. Some smaller entities don't have the budget for it, so we'll suggest Fortinet or something that has similar but inferior capabilities, but is less expensive.
It would be ideal if this solution could be a separate product rather than have to have it deploy through a firewall. If it was a separate product, many of our customers would be happier as most just require a URL filtering option. They do not require a firewall. They do not require any threat prevention or anything. If it was a separate product, we could deploy it to branch offices or any of our customer locations in which different firewalls are being used. The solution is a bit expensive.
Performance monitoring could use improvement.
One way Palo Alto can improve is by offering sandboxing. I don't know if they currently offer a sandboxing feature together with the firewall or not. They should provide secure sandboxing with the firewalls.