Palo Alto Networks Advanced Threat Prevention Primary Use Case
RG
reviewer2018892
Senior Network Security Architect at a financial services firm with 10,001+ employees
Our company uses the solution for IDS and IPS functionality in the signature phase that includes vulnerability and antivirus plus file blocking in the DLP to some extent.
The signature feed is sent to the firewall based on a schedule we configure. Intervals can go up to every five minutes where the firewall goes to the cloud to get the latest signature feeds. At the same time, there are mission learning capabilities on the firewall that categorize certain non-threats on ports and protocols as malicious traffic before creating the signature.
We have 30 to 50 resources that use the solution throughout our company.
We use Palo Alto Networks Threat Prevention to check the traffic pattern.
We must analyze the payload's content. We use security policies to inspect the traffic further passing through the firewalls.
View full review »The solution can be deployed on the cloud or on-premise.
View full review »Buyer's Guide
Intrusion Detection and Prevention Software (IDPS)
March 2024
Find out what your peers are saying about Palo Alto Networks, Darktrace, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS). Updated: March 2024.
765,234 professionals have used our research since 2012.
We implemented the IPS solution and the DNS sinkhole blocking.
View full review »VG
Vishal Goorye
Network Security Engineer at Mauritius Telecom
We use the product to protect servers.
View full review »We use the solution for network segregation.
View full review »RB
Ro Ba
College Lecturer at New College Lanarkshire
The tool is a next-generation firewall. We use it to teach students about firewalls.
View full review »MS
Mahesh Surrun
IT Specialist at Icall LTD
We use it to upload, delete, and list what to publish on the net to block websites and even posts.
Recently, I blocked Adobe Acrobat Reader. When you install it on your PC, sometimes it contacts the internet and opens some posts. Thus, it can be easily hacked by a user on the internet. When you browse for this kind of list, you can easily upload it on Palo Alto without any difficulty.
View full review »VG
Vishal Goorye
Network Security Engineer at Mauritius Telecom
The primary use is for application control and encryption.
View full review »DD
Reviewer23
IT Infrastructure Manager at Jonah Energy LLC
We primarily use this solution for general user security and protection. In our organization, there are around 250 users, using this solution.
View full review »MV
Maksim Vedernikov
Quality engineer of the 1st category at Modern Expo
We use this solution for the security of our organization. It protects the LAN and WAN traffic.
We have two boxes that have this solution for threat prevention. Some of our servers also have Palo Alto agents installed on them.
We have an on-premises deployment.
JB
reviewer725523
General Manager at a tech services company with 11-50 employees
We are resellers of this solution so we facilitate technical services to our clients. We maintain Palo Alto for what we are responsible for maintaining, on the latest version of the software.
View full review »SA
SHAIKAHMED
Head Of Information Security at SAUDI PARAMOUNT COMPUTER SYSTEMS
For a total overall solution, Palo Alto Threat Prevention can satisfy most of your needs as a company. Right now, we are implementing Cisco ASA and renewing our Palo Alto license.
View full review »GG
reviewer1248363
Network Security administrator at a financial services firm with 5,001-10,000 employees
We are in financial environment so we put it on premises and in the cloud.
PW
Consulti678
Consultant at a aerospace/defense firm with 501-1,000 employees
We primarily use the solution as a firewall.
View full review »GG
reviewer1248363
Network Security administrator at a financial services firm with 5,001-10,000 employees
Our primary use cases for this solution is content fileting and threat prevention.
View full review »AS
Ang Sokroeurn
Information Security Officer at National Bank of Cambodia
We use the firewall in the network.
View full review »Our primary use case for Palo Alto Threat Prevention is related to the placement of files in a laboratory test environment. We use Palo Alto Threat Prevention for network testing.
View full review »RS
reviewer1298478
Presales Engineer at a tech services company with 1,001-5,000 employees
Our primary use case is to have as a gateway.
View full review »Buyer's Guide
Intrusion Detection and Prevention Software (IDPS)
March 2024
Find out what your peers are saying about Palo Alto Networks, Darktrace, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS). Updated: March 2024.
765,234 professionals have used our research since 2012.