Top 8 Advanced Threat Protection (ATP) Tools
Palo Alto Networks WildFirePalo Alto Networks VM-SeriesRSA NetWitness Logs and Packets (RSA SIEM)Check Point SandBlast NetworkFortinet FortiSandboxSymantec Advanced Threat ProtectionSonicWall Capture Advanced Threat ProtectionFireEye Network Security
Remote access is excellent.
The solution is completely integrated with all the other Palo Alto products. I think that it is the best part for endpoint protection. The firewall features include URL and DNS filtering, threat protection, and antivirus.
The initial setup was straightforward.
Using Palo Alto Networks Panorama, we were able to deploy a single point of management and visualization of the firewall infrastructure in cloud, on-premise and integrated with Azure to automate scale up. Its security features, i.e. anti-malware, threat prevention, URL Filtering, VPN, and antivirus are the most valuable. The ID-User integrated with AD and 2FA features are also very useful to provide secure access to servers and some users in the company.
The packet capture aspect of it is a valuable feature because it is quite different from a traditional SIEM solution that only carries out investigations based on captured logs.
The sandbox is able to scan files without adding a delay or compromising productivity.
Preventing zero-day threats and extracting potential threats from incoming files with Threat Extraction is the most valuable feature for us.
Integration is one of the solution's most valuable aspects. You can integrate even third-party solutions so that they can send the information or files they quarantine through the FortiSandbox
The incident management on the solution is very good. You get a lot of detailed information about an incident. You also get a lot of documentation in connection with the CVI or integration.
It also has an easy configuration. The feedback that we get from our customers is that it's a good product.
Provides good protection and security.
I also like its logging method. Its logging is very powerful and useful for forensic purposes. You can see the traffic or a specific activity or how something entered your network and where it went.
Advice From The CommunityRead answers to top Advanced Threat Protection (ATP) questions. 521,817 professionals have gotten help from our community of experts.
See more Advanced Threat Protection (ATP) questions »
Rony_SklarCommunity Manager at IT Central Station
What steps should businesses take to assess and improve their security posture? What tools would you recommend for this purpose?