Top 8 Advanced Threat Protection Tools
Palo Alto Networks WildFirePalo Alto Networks VM-SeriesRSA NetWitness Logs and Packets (RSA SIEM)Fortinet FortiSandboxFireEye Network SecuritySymantec Advanced Threat ProtectionSonicWall Capture Advanced Threat ProtectionCheck Point SandBlast Network
The most valuable features of this solution are sandbox capabilities.
The most valuable feature is the cloud-based protection against zero-day malware attacks.
Using Palo Alto Networks Panorama, we were able to deploy a single point of management and visualization of the firewall infrastructure in cloud, on-premise and integrated with Azure to automate scale up. Its security features, i.e. anti-malware, threat prevention, URL Filtering, VPN, and antivirus are the most valuable. The ID-User integrated with AD and 2FA features are also very useful to provide secure access to servers and some users in the company.
The most valuable features are the packet inspection and the automated incident response.
What we are mainly using are the RSA concentrator, RSA Decoder, Archiver, Broker, and Log Decoder.
Integration is one of the solution's most valuable aspects. You can integrate even third-party solutions so that they can send the information or files they quarantine through the FortiSandbox
It is stable and quite protective. It has a lot of features to scan a lot of malicious things and vulnerabilities.
The most valuable feature is the network security module.
The incident management on the solution is very good. You get a lot of detailed information about an incident. You also get a lot of documentation in connection with the CVI or integration.
It also has an easy configuration. The feedback that we get from our customers is that it's a good product.
Provides good protection and security.
Threat extraction can help us to remove malicious content from documents by converting them to PDF.
It provides a high rate of catching the zero-day advanced threats.
Advice From The CommunityRead answers to top Advanced Threat Protection questions. 479,323 professionals have gotten help from our community of experts.
See more Advanced Threat Protection questions »
Rony_SklarCommunity Manager at IT Central Station
What steps should businesses take to assess and improve their security posture? What tools would you recommend for this purpose?