Palo Alto Networks URL Filtering with PAN-DB Overview

Palo Alto Networks URL Filtering with PAN-DB is the #19 ranked solution in our list of top Intrusion Detection and Prevention Software. It is most often compared to Cisco Sourcefire SNORT: Palo Alto Networks URL Filtering with PAN-DB vs Cisco Sourcefire SNORT

What is Palo Alto Networks URL Filtering with PAN-DB?

The majority of attacks and exposure to malicious content occurs during the normal course of web browsing activities, which requires the ability to allow safe, secure web access for all users. URL Filtering with PAN-DB automatically prevents attacks that leverage the web as an attack vector, including phishing links in emails, phishing sites, HTTP-based command and control, malicious sites and pages that carry exploit kits.

Palo Alto Networks URL Filtering with PAN-DB is also known as Palo Alto Networks URL Filtering PAN-DB.

Buyer's Guide

Download the Intrusion Detection and Prevention Software Buyer's Guide including reviews and more. Updated: May 2021

Palo Alto Networks URL Filtering with PAN-DB Customers

TRI-AD, Telkom Indonesia

Palo Alto Networks URL Filtering with PAN-DB Video

Filter Archived Reviews (More than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
AA
Deputy manager IT at Hyundai Nishad
Real User
Provides Threat Protection Across a Variety of Internet Connections

What is our primary use case?

We operate in the automotive industry. Internally we work with computing and networking equipment, concentrated on collecting, storing, processing, and distributing enormous amounts of data. Our company deploys this solution for internal web security purposes.

Pros and Cons

  • "The Palo Alto solution has improved our organization by providing threat protection across a variety of internet connections. Our company also gets valuable insights regarding threat analysis."
  • "One way Palo Alto can improve is by offering sandboxing. I don't know if they currently offer a sandboxing feature together with the firewall or not. They should provide secure sandboxing with the firewalls."

What other advice do I have?

I would recommend using this solution as an enterprise-class security, including a firewall and protection for Microsoft Edge. This solution can also be used as a data center or file storage tool for workloads (small or large). I would rate this tool as a 7 out of 10.
CS
Information Security Officer at a government with 501-1,000 employees
Real User
Top 20
Enables us to have better visibility and protection from threats and is incredibly stable

What is our primary use case?

Our primary use case of this solution is for both internal and external firewalls.

How has it helped my organization?

It's allowed us to have better visibility and protection from threats.

What is most valuable?

Next generation rule set  Much more granular

What needs improvement?

Performance monitoring could use improvement. 

For how long have I used the solution?

Less than one year.

What do I think about the stability of the solution?

It's incredibly stable. 

How are customer service and technical support?

Their technical support is very good. 

Which solution did I use previously and why did I switch?

We were previously using Fortinet Fortigate.

How was the initial setup?

The initial setup was very straightforward. The…
Find out what your peers are saying about Palo Alto Networks, Cisco, Darktrace and others in Intrusion Detection and Prevention Software. Updated: May 2021.
509,820 professionals have used our research since 2012.
Sr. Systems Analyst at a manufacturing company with 5,001-10,000 employees
Real User
Top 10
The ability to manage blacklists and whitelists easily is very useful, especially for internal access and limiting outbound access

What is our primary use case?

We are not using it for the general population, just for a select group of users in an isolated subnet. We are using it primarily as a whitelist with little reliance on the PAN-DB.

How has it helped my organization?

I cannot say that PAN-DB has provided any significant improvements, since we are using it primarily as a white list.

What is most valuable?

Being able to manage blacklists and whitelists easily is very useful, especially for internal access and limiting outbound access.

What needs improvement?

The biggest improvement is the categories per site. For hosting sites like Blogspot, they host sites that should be in different categories, but get lumped together in general. There needs to be more granularity or multiple categorizations. …