Symantec Advanced Threat Protection Competitors and Alternatives

Read reviews of Symantec Advanced Threat Protection competitors and alternatives
Palo Alto Networks
Real User
Network Security Engineer at a tech services company with 51-200 employees
Feb 04 2018

What do you think of Palo Alto Networks WildFire?

Improvements to My Organization Installing this product as a datacenter firewall for segregation and segmentation, and also configuring policies between zones. • Valuable Features Threat Prevention and WildFire features should be enabled in Palo Alto. With this product, we receive the best monitoring and reports. • Room for Improvement The VPN and decryption need improvement. • Use of Solution Three to five years. • Stability Issues No, I did not encounter any issues with Palo Alto's firewall. The product is very stable. • Scalability Issues No, but you should do the rightsizing before buying the product.  • Customer Service and Technical Support They provide a medium level of technical support. • Previous Solutions I used Cisco. Palo Alto is better...
Consultant
Master Consultant (Network Security) at a tech services company with 1,001-5,000 employees
Aug 31 2016

What is most valuable?

FireEye's virtual execution engine is designed to catch 0-day or targeted malware files.

How has it helped my organization?

I work for a managed services provider, so we don't deploy the product internally but deploy it in customers’ environments. For our customers, it added a layer of inspection that might be missed by traditional IPS or antivirus products, and... more»

What needs improvement?

FireEye’s main feature is its sandboxing or threat emulation capabilities to detect malware with extra add-ons such as signature-based IPS or endpoint protection, but these features are lacking compared to most IPS or endpoint vendors.... more»
Real User
Direct Sales Director at a tech services company with 501-1,000 employees
May 11 2017

What is most valuable?

Full packet capture: A must in an SOC Possibility to investigate incidents based on logs and raw packets, such as extracting files sent over the network Built-in Incident Management module for small security/SOC teams Advanced correlation... more»

How has it helped my organization?

We can monitor all traffic to/from our company. It is possible to track end user behaviour. With RSA NetWitness Endpoint, we are able to monitor not only the network, but also what’s happening on endpoints, i.e., behaviour analytics for... more»

What needs improvement?

Integration with external tools should be built-in, such as an external sandbox for files. We can import data using external feeds, using STIX or CVS files. The REST API is poor The system architecture is complex and sometimes it’s hard to... more»

Sign Up with Email