2019-02-10T10:06:00Z

What do you like most about Palo Alto Networks Threat Prevention?

Miriam Tover - PeerSpot reviewer
  • 0
  • 5
PeerSpot user
21

21 Answers

VG
Real User
Top 20
2023-10-20T15:58:45Z
Oct 20, 2023

It is a stable product.

Search for a product comparison
RB
Real User
Top 20
2023-09-27T08:07:02Z
Sep 27, 2023

The user interface is a bit more professional than some free products.

Prasanth Kailasam - PeerSpot reviewer
Real User
Top 5Leaderboard
2023-05-03T07:46:24Z
May 3, 2023

Palo Alto Networks Threat Prevention is the market leader as far as security gateways and endpoint protection. Additionally, the threat database that is used is one of the best.

Carlos Bracamonte - PeerSpot reviewer
MSP
Top 5
2023-03-15T21:37:13Z
Mar 15, 2023

We are currently using the URL filtering feature, which is the most popular.

RG
Real User
Top 20
2022-12-08T17:33:32Z
Dec 8, 2022

The sandboxing tools offer great prevention for cloud feeds.

Leandro Soares Costa - PeerSpot reviewer
Real User
Top 5
2022-05-19T10:46:42Z
May 19, 2022

You can scale the product.

Find out what your peers are saying about Palo Alto Networks, Darktrace, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS). Updated: March 2024.
765,386 professionals have used our research since 2012.
MS
Real User
Top 5
2022-03-31T07:45:00Z
Mar 31, 2022

It's very easy to use and configure.

What is nice about Palo Alto is that even if you don't understand how to use it, you can just click on upload and upload everything that needs to be blocked.

AS
Reseller
Top 20
2022-03-29T14:16:21Z
Mar 29, 2022

The stability of Palo Alto Networks Threat Prevention is good.

M.
Real User
2021-08-13T08:48:54Z
Aug 13, 2021

I like the solution's interface.

DD
Real User
2020-09-30T08:03:00Z
Sep 30, 2020

Edge protection is a valuable feature.

GG
Real User
2020-03-30T07:58:00Z
Mar 30, 2020

The most valuable features are that it's user-friendly, has interesting features, URL filtering, and threat prevention.

RS
Real User
2020-03-29T08:27:00Z
Mar 29, 2020

For those who want a next-gen firewall that's easy to configure and easy to operate, I think you should go for Palo Alto.

SA
Consultant
2019-10-06T16:38:00Z
Oct 6, 2019

With the IP address flag, I was able to see that I was being hacked. The moment there was an interaction between somebody on my network and that IP, the solution was able to flag it, and we were able to protect ourselves.

MV
Real User
Top 20
2019-09-29T07:27:00Z
Sep 29, 2019

The most valuable features are the simplicity, transparency, and overall ease of management.

TS
MSP
2019-09-29T07:27:00Z
Sep 29, 2019

I find the malware protection very handy.

VG
Real User
Top 20
2019-09-08T09:50:00Z
Sep 8, 2019

The application control and vulnerability protection are the most valuable features.

PW
Consultant
2019-09-03T08:57:00Z
Sep 3, 2019

The initial setup was straightforward. It's quite easy. Deployment took one to two weeks.

it_user810594 - PeerSpot reviewer
Real User
2019-04-11T10:03:00Z
Apr 11, 2019

The most valuable feature of Palo Alto Threat Prevention for our company is the next generation firewall.

SA
Real User
2019-04-11T10:03:00Z
Apr 11, 2019

Most of the features of Palo Alto Threat Prevention are alright. I recommend features like content filtering, IP address, & intelligent firewalls. The reporting feature is very good.

AS
Real User
2019-03-03T11:18:00Z
Mar 3, 2019

One of the most valuable features is the anti-malware protection.

JB
Reseller
2019-02-10T10:06:00Z
Feb 10, 2019

It's a monster, it's got so many beautiful features. We do deal with other firewalls and we've got a better idea of what other firewalls' capabilities are, any comparison with the Palo Alto I liked the quality of service on the applications that you can control the amount of bandwidth an application is allowed to consume. The best feature is the quality of the application quality of service.

Intrusion Detection and Prevention Software (IDPS)
What Is an Intrusion Detection System? Intrusion detection systems (IDSes) analyze network traffic for signatures of known attackers. The systems can be hardware devices or software solutions. An IDS can mitigate existing malware, such as backdoors, rootkits, and trojans.The goal of an intrusion detection system is to detect an attack as it occurs. The system starts by analyzing inbound and outbound network traffic for signs of known attackers. Some activities an IDS performs...
Download Intrusion Detection and Prevention Software (IDPS) ReportRead more