We performed a comparison between Palo Alto Networks WildFire and Trellix Network Detection and Response based on real PeerSpot user reviews.
Find out in this report how the two ATP (Advanced Threat Protection) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable features of the solution are user-friendliness, price, good security, and cloud-related options."
"The scalability is acceptable."
"The most valuable feature for us is the VPN."
"High availability with active-active and active-passive modes."
"My primary use case for this solution is for a secure gateway."
"The most valuable feature is the improved security that it offers."
"What I like about Palo Alto is that it is a complete product, with everything in it."
"They have many different options with Palo Alto WildFire and the set-up is quick. If you have all the details in hand, it does not take more than 15 minutes to deploy a firewall."
"The most valuable feature is the network security module."
"Its ability to find zero-day threats, malware and anything malicious has greatly improved my customer's organization, especially for protecting the users' browser."
"Application categorization is the most valuable feature for us. Application filtering is very interesting because other products don't give you full application filtering capabilities."
"The server appliance is good."
"Support is very helpful and responsive."
"Initially, we didn't have much visibility around what is occurring at our applications lower level. For instance, if we are exposed to any malicious attacks or SQL injections. But now we've integrated FireEye with Splunk, so now we get lots of triggers based on policy content associated with FireEye. The solution has allowed for growth and improvement in our information security and security operations teams."
"The most valuable feature is MVX, which tests all of the files that have been received in an email."
"If we are receiving spam emails, or other types of malicious email coming from a particular email ID, then we are able to block them using this solution."
"The cyber security visibility and forensics features to receive more information about incidents could improve in Palo Alto Networks WildFire."
"It would be nice if there was an easier way to install and deploy it, such as through the inclusion of wizards."
"They should make their user interface a little more user-friendly."
"The solution can improve its traffic management."
"The product's false positive logs could be more user-friendly to understand. They could provide examples of precious cases to learn."
"In terms of what I'd like to see in the next release of Palo Alto Networks WildFire, each release is based on malware that has been identified. The key problem is an average of six months from the time malware is written to the time it's discovered and a signature is created for it. The only advice that I can give is for them to shorten that timeframe. I don't know how they would do it, but if they shorten that, for example, cut it in half, they'll make themselves more famous."
"The data analytical system for deployment needs to improve."
"The threat intelligence that we receiving in the reporting was not as expected. We were expecting more. Additionally, we should be able to whitelist a specific file based on a variety of attributes."
"The initial setup was complex because of the nature of our environment. When it comes to the type of applications and functions which we were looking at in terms of identifying malicious threats, there would be some level of complexity, if we were doing it right."
"It doesn't connect with the cloud, advanced machine learning is not there. A known threat can be coming into the network and we would want the cloud to look up the problem. I would also like to see them develop more file replication and machine learning."
"They can maybe consider supporting some compliance standards. When we are configuring rules and policies, it can guide whether they are compliant with a particular compliance authority. In addition, if I have configured some rules that have not been used, it should give a report saying that these rules have not been used in the last three months or six months so that I disable or delete those rules."
"Certain features in Trellix Network Detection and Response, such as using AL-type commands, may initially pose a challenge for those unfamiliar with such commands. However, once users become accustomed to the system, it becomes easier to use."
"We'd like the potential for better scaling."
"Technical packaging could be improved."
"The problem with FireEye is that they don't allow VM or sandbox customization. The user doesn't have control of the VMs that are inside the box. It comes from the vendor as-is. Some users like to have control of it. Like what type of Windows and what type of applications and they have zero control over this."
"The product's integration capabilities are an area of concern where improvements are required."
More Trellix Network Detection and Response Pricing and Cost Advice →
Palo Alto Networks WildFire is ranked 3rd in ATP (Advanced Threat Protection) with 58 reviews while Trellix Network Detection and Response is ranked 14th in ATP (Advanced Threat Protection) with 35 reviews. Palo Alto Networks WildFire is rated 8.4, while Trellix Network Detection and Response is rated 8.6. The top reviewer of Palo Alto Networks WildFire writes "Good technical support and provides automatic analysis that saves us time in filtering email". On the other hand, the top reviewer of Trellix Network Detection and Response writes "Blocks traffic and DDoS attacks ". Palo Alto Networks WildFire is most compared with Cisco Secure Firewall, Fortinet FortiGate, Proofpoint Email Protection, Juniper SRX Series Firewall and Arbor DDoS, whereas Trellix Network Detection and Response is most compared with Fortinet FortiSandbox, Fortinet FortiGate, Zscaler Internet Access, Cisco Secure Firewall and NetWitness Platform. See our Palo Alto Networks WildFire vs. Trellix Network Detection and Response report.
See our list of best ATP (Advanced Threat Protection) vendors.
We monitor all ATP (Advanced Threat Protection) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.