Cisco Cognitive Threat Analytics vs. Palo Alto Threat Prevention

As of June 2019, Cisco Cognitive Threat Analytics is ranked 35th in Intrusion Detection and Prevention Software vs Palo Alto Threat Prevention which is ranked 6th in Intrusion Detection and Prevention Software with 5 reviews. The top reviewer of Palo Alto Threat Prevention writes "Enables us to control the amount of bandwidth an application is allowed to consume and is extremely scalable". Cisco Cognitive Threat Analytics is most compared with . Palo Alto Threat Prevention is most compared with Darktrace, Trend Micro TippingPoint NGIPS and McAfee Network Security Platform.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Use Cisco Cognitive Threat Analytics? Share your opinion.
Find out what your peers are saying about Cisco, GFI, Darktrace and others in Intrusion Detection and Prevention Software. Updated: May 2019.
345,915 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pricing and Cost Advice
Information Not Available
It's not too expensive.The pricing and the licensing are pretty competitive at this stage. As a reseller, I would like to see the price come down a little bit so I can compete better against other firewalls because we do that all the time.

Read more »

report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software solutions are best for your needs.
345,915 professionals have used our research since 2012.
Ranking
Views
23
Comparisons
18
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
Views
1,998
Comparisons
1,598
Reviews
4
Average Words per Review
440
Avg. Rating
9.0
Top Comparisons
Also Known As
Cognitive Threat Analytics, CTA
Learn
Cisco
Palo Alto Networks
Overview

Cognitive Threat Analytics (CTA) enhances web security with breach detection and analytics to stop threats in the network. Online threats have become increasingly sophisticated, targeted attacks are on the rise, and cybercriminals launch their campaigns through a variety of vectors. They can serve up malvertising and deploy exploit kits that install rootkits. They can establish a botnet presence within your infrastructure. Once cybercriminals establish a foothold, more than 90 percent of their threats use the web. There, they can establish channels for command-and-control communications and exfiltrate sensitive information. Analyzing more than 10 billion web requests daily, Cisco Cognitive Threat Analytics finds malicious activity that has bypassed security controls, or entered through unmonitored channels (including removable media), and is operating inside an organization’s environment. Cognitive Threat Analytics is a cloud-based product that uses machine learning and statistical modeling of networks. It creates a baseline of the traffic in your network and identifies anomalies. It analyzes user and device behavior, and web traffic, to discover command-and-control communications, data exfiltration, and potentially unwanted applications operating in your infrastructure.

Threats do not discriminate between application delivery vectors, requiring an approach that has full visibility into all application traffic, including SSL encrypted content, with full user context. Threat Prevention leverages the visibility of our next-generation firewall to inspect all traffic, automatically preventing known threats, regardless of port, protocol or SSL encryption.

Offer
Learn more about Cisco Cognitive Threat Analytics
Learn more about Palo Alto Threat Prevention
Sample Customers
TransplaceUniversity of Arkansas, JBG SMITH, SkiStar AB, TRI-AD, Temple University, Telkom Indonesia
Find out what your peers are saying about Cisco, GFI, Darktrace and others in Intrusion Detection and Prevention Software. Updated: May 2019.
345,915 professionals have used our research since 2012.
We monitor all Intrusion Detection and Prevention Software reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email