We performed a comparison between Check Point IPS and Palo Alto Networks Advanced Threat Prevention based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It is easy to configure."
"The most valuable feature is that it protects us against hundreds of different attack vectors, like ransomware. The protection is always being triggered. People try to access websites that are categorized as malware, so when the users do a DNS request for the IP of those malware websites, the IPS Blade replaces the real IP of the website that is malware with a bogus IP. The user gets an IP that doesn't exist and when he tries to access, it won't work."
"Check Point helps reduce downtime and costs associated with detected cyberattacks and can block those threats to ensure protection from any significant damage that may be caused within the organization."
"It protects against specific known exploits but also, with SandBlast integration, it is able to protect against unknown or zero-day attacks at the perimeter level."
"The most valuable feature of Check Point IPS is the management of devices and policies."
"The solution's IPS functionality and firewall functionality are the solution's most valuable features."
"I can generate reports for management automatically based on the threats of the last day/week/whatever is needed."
"IPS signatures can be set quite granularly depending on your environment. You can filter on performance impact, severity, and confidence which makes sizing and adapting easier."
"It's a monster, it's got so many beautiful features. We do deal with other firewalls and we've got a better idea of what other firewalls' capabilities are, any comparison with the Palo Alto I liked the quality of service on the applications that you can control the amount of bandwidth an application is allowed to consume. The best feature is the quality of the application quality of service."
"It's very easy to use and configure. What is nice about Palo Alto is that even if you don't understand how to use it, you can just click on upload and upload everything that needs to be blocked."
"With the IP address flag, I was able to see that I was being hacked. The moment there was an interaction between somebody on my network and that IP, the solution was able to flag it, and we were able to protect ourselves."
"The application control and vulnerability protection are the most valuable features."
"The most valuable features are that it's user-friendly, has interesting features, URL filtering, and threat prevention."
"One of the most valuable features is the anti-malware protection."
"The most valuable feature of Palo Alto Threat Prevention for our company is the next generation firewall."
"Edge protection is a valuable feature."
"I observed on our management that sometimes IPS does not connect to the threat cloud, we have to check and improve it. Otherwise, all of the features are good."
"There is no standalone IPS appliance available."
"Despite being a blade, this is expensive."
"The dashboard reports can be easier to generate and customize."
"The service that we want to see in the future is a capacity to segment the IPS services by equipment."
"It would be good to update the public documentation of Check Point so that we can generate improvements and best practices based on the documentation."
"The area with certain shortcomings where improvements are required consist of support availability."
"Sometimes Check Point documentation is not always updated, which is why when some implementations change, it generates confusion about details."
"The pricing has improved with the newer generation of their Firewalls, but the price could always be lower. In comparison with other solutions, I believe they're quite competitive."
"Palo Alto's maintenance needs to be improved."
"Right now we are focusing on email. If Palo Alto can increase the features related to email filtering and the new malware, it would help us protect our systems."
"In Africa, the technical support is probably not as good as in Europe and the USA because it's a specific premium support, partner-enabled premium support and all of that. But it's really good, I don't really have any complaints, it's fairly good. I'll give them 80%."
"The technology firewall anomaly network could stand improvement."
"Mission learning techniques should continue to expand and detect unknown threats on the fly."
"The application’s pricing and dashboard need improvement. It could be user-friendly."
"Palo Alto Networks Threat Prevention could improve the commercial offing. Other solutions, such as Fortinet provide better commercial features."
More Palo Alto Networks Advanced Threat Prevention Pricing and Cost Advice →
Check Point IPS is ranked 3rd in Intrusion Detection and Prevention Software (IDPS) with 46 reviews while Palo Alto Networks Advanced Threat Prevention is ranked 7th in Intrusion Detection and Prevention Software (IDPS) with 24 reviews. Check Point IPS is rated 8.6, while Palo Alto Networks Advanced Threat Prevention is rated 8.8. The top reviewer of Check Point IPS writes "Great for detection and access with the capabilities of defining specific rules". On the other hand, the top reviewer of Palo Alto Networks Advanced Threat Prevention writes "A good amount of granularity and advanced URL filtering capabilities". Check Point IPS is most compared with Darktrace, Palo Alto Networks URL Filtering with PAN-DB, Trend Micro TippingPoint Threat Protection System, Cisco NGIPS and Fortinet FortiGate IPS, whereas Palo Alto Networks Advanced Threat Prevention is most compared with Fortinet FortiGate IPS, Arista NDR, Trend Micro TippingPoint Threat Protection System, Forcepoint Next Generation Firewall and Darktrace. See our Check Point IPS vs. Palo Alto Networks Advanced Threat Prevention report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.