Palo Alto Networks WildFire vs. RSA NetWitness Logs and Packets (RSA SIEM)

As of February 2019, Palo Alto Networks WildFire is ranked 2nd in Advanced Threat Protection with 9 reviews vs RSA NetWitness Logs and Packets (RSA SIEM) which is ranked 4th in Advanced Threat Protection with 5 reviews. The top reviewer of Palo Alto Networks WildFire writes "At the end of the day, even in spite of application controls, it's on top of the charts in terms of functionality". The top reviewer of RSA NetWitness Logs and Packets (RSA SIEM) writes "We can investigate incidents based on logs and raw packets". Palo Alto Networks WildFire is most compared with Fortinet FortiGate, Cisco ASA and Cisco Firepower NGFW. RSA NetWitness Logs and Packets (RSA SIEM) is most compared with Splunk, IBM QRadar and ArcSight. See our Palo Alto Networks WildFire vs. RSA NetWitness Logs and Packets (RSA SIEM) report.
Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Palo Alto Networks WildFire vs. RSA NetWitness Logs and Packets (RSA SIEM) and other solutions. Updated: January 2019.
316,051 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
Being an application-based firewall, this is one of the critical focus factors along with the threat prevention services it provides.It is stable and pretty much scalable.The cloud-based services are a nice feature.My primary use case for this solution is for a secure gateway.The reporting feature helps our performance.Their technical support is outstanding and top-notch.It catches modified signatures of known viruses.​Installing this product as a datacenter firewall for segregation and segmentation, and also configuring policies between zones has improved my organization.

Read more »

The most valuable feature is the correlation. It can report in real-time and monitor the management.It gives the ability to investigate into network traffic in the Net and the organization what we couldn't do before.Alerting Module: It provides real-time event processing language on all the logs/packets stream for advanced alerting, i.e., using SQL LIKE statements.Possibility to investigate incidents based on logs and raw packets, such as extracting files sent over the network

Read more »

Cons
As a firewall and 360 degrees of security, there needs to be more maturity.The initial setup was complex.I think it would be nice for Palo Alto to work without the connection to the cloud. It is 100% powerful when connected to the cloud. But, if you disconnect from the cloud, you only get 40-50% power.I would give this product a rating of 9 out of 10 due to some slight issues of performance.They should make their user interface a little more user-friendly.​The VPN and decryption need improvement.​They provide a medium level of technical support.The data analytical system for deployment needs to improve.

Read more »

The implementation needs assistance.We have encountered issues with unresolved crashes.Health monitoring of the event sources and devices.The system architecture is complex and sometimes it’s hard to troubleshoot potential problems.

Read more »

Pricing and Cost Advice
It is a reasonable price compared to other solutions on the market.The pricing is OK, it is not too expensive.​More expensive than other firewalls.​It is expensive, a feature more accessible to enterprise class customers, but provides an enhanced possibility that Zero- or near-Zero-day threats may be identified and mitigated. The cost of the product weighed against the potential impact of even one successful crypto malware-type exploit may justify the expense.The pricing and licensing option should be categorized for various countries such as for Bangladesh.It's not particularly cheap, but it is absolutely worth it.It IS a bit expensive, but I think you get what you pay for. Value is there.

Read more »

It is cheap.The new pricing and licensing mechanisms are fair. I would advise always to get the full solution (i.e., not only Logs).It’s cheaper to run virtual machines in a VMware environment.

Read more »

report
Use our free recommendation engine to learn which Advanced Threat Protection solutions are best for your needs.
316,051 professionals have used our research since 2012.
Ranking
Views
77,634
Comparisons
40,420
Reviews
8
Followers
2,294
Avg. Rating
9.0
Views
8,757
Comparisons
4,181
Reviews
5
Followers
484
Avg. Rating
7.4
Top Comparisons
Also Known As
RSA Security Analytics
Learn
Palo Alto Networks
RSA
Overview
WildFire™ cloud-based threat analysis service is the industry’s most advanced analysis and prevention engine for highly evasive zero-day exploits and malware. The cloud-based service employs a unique multi-technique approach combining dynamic and static analysis, innovative machine learning techniques, and a groundbreaking bare metal analysis environment to detect and prevent even the most evasive threats.

If you’re relying on log data to detect and prevent cyber threats, you’re in trouble. Attackers increasingly evade detection of log-centric security and network monitoring tools. But logs combined with full packet, endpoint NetFlow data are proven to provide the essential details for early threat detection. Here’s a closer look at our solution.

Offer
Learn more about Palo Alto Networks WildFire
Learn more about RSA NetWitness Logs and Packets (RSA SIEM)
Sample Customers
Novamedia, Nexon Asia Pacific, Lenovo, Samsonite, IOOF, Sinogrid, SanDisk CorporationLos Angeles World Airports, Reply
Top Industries
VISITORS READING REVIEWS
Financial Services Firm16%
Comms Service Provider14%
Manufacturing Company9%
Legal Firm9%
No Data Available
Company Size
REVIEWERS
Small Business65%
Midsize Enterprise6%
Large Enterprise29%
VISITORS READING REVIEWS
Small Business24%
Midsize Enterprise33%
Large Enterprise43%
No Data Available
Find out what your peers are saying about Palo Alto Networks WildFire vs. RSA NetWitness Logs and Packets (RSA SIEM) and other solutions. Updated: January 2019.
316,051 professionals have used our research since 2012.
We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email