Please share with the community what you think needs improvement with Palo Alto Networks URL Filtering with PAN-DB.
What are its weaknesses? What would you like to see changed in a future version?
One of the less favorite features is the cost of the solution. For example, ~5K for a PA-820 AND ~$1K EACH *per year* for Premium Support, Threat Prevention, and PANDB URL filtering. We also implement other solutions. We tell customers that if they want to have the best possible perimeter security, they're going to have to pay for it. Some smaller entities don't have the budget for it, so we'll suggest Fortinet or something that has similar but inferior capabilities, but is less expensive.
It would be ideal if this solution could be a separate product rather than have to have it deploy through a firewall. If it was a separate product, many of our customers would be happier as most just require a URL filtering option. They do not require a firewall. They do not require any threat prevention or anything. If it was a separate product, we could deploy it to branch offices or any of our customer locations in which different firewalls are being used. The solution is a bit expensive.
What do you like most about Palo Alto Networks URL Filtering with PAN-DB?
Thanks for sharing your thoughts with the community!
There are many cybersecurity tools available, but some aren't doing the job that they should be doing.
What are some of the threats that may be associated with using 'fake' cybersecurity tools?
What can people do to ensure that they're using a tool that actually does what it says it does?