How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
We use Palo Alto Traps in our Windows-based environments. Currently, it only protects our desktops and we use it in conjunction with our Check Point firewall.
We use Palo Alto Networks Traps (Version 6) to protect our endpoints against NG malware via behavior analysis, artificial intelligence and machine learning. Both the PA Traps endpoint logs, our PA firewall traffic logs and the Wildfire sandbox are used to provide immediate threat response and feed this information to the PA Threat Intelligence cloud.
We used it for malware detection and to detect weird DNS calls. Overall, it was for endpoint protection.
The primary use case is endpoint security. The product is my main endpoint, IP, and threat management.
So far, we have only done a PoC of Palo Alto Traps. We deployed Traps on a few devices and then did the PoC. I also attend a workshop for Palo Alto Traps. I learned how it works and how it can block malicious files, etc.
I used the product at my previous company until November 2018.
We use it for primary endpoint protection.
Our primary use case is anti-malware and anti-exploit.
Advanced endpoint protection.