Check Point ThreatCloud vs. Palo Alto Networks Advanced Threat Prevention

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Check Point ThreatCloud
Score 8.9 out of 10
N/A
Check Point Software Technologies provides threat intelligence via the Check Point ThreatCloud.N/A
Palo Alto Networks Advanced Threat Prevention
Score 8.4 out of 10
N/A
Palo Alto Networks Advanced Threat Prevention is an intrusion prevention system (IPS) used to stop zero-day attacks inline in real-time. In addition to the prevention of known threats, the solution helps to stop never-before-seen exploit attempts and command and control with its inline deep learning engines that aims to provide prevention of zero-day injection attacks and evasive command and control.N/A
Pricing
Check Point ThreatCloudPalo Alto Networks Advanced Threat Prevention
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Check Point ThreatCloudPalo Alto Networks Advanced Threat Prevention
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Check Point ThreatCloudPalo Alto Networks Advanced Threat Prevention
Best Alternatives
Check Point ThreatCloudPalo Alto Networks Advanced Threat Prevention
Small Businesses
Egnyte
Egnyte
Score 9.4 out of 10
LevelBlue USM Anywhere
LevelBlue USM Anywhere
Score 7.0 out of 10
Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.0 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.0 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.0 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Check Point ThreatCloudPalo Alto Networks Advanced Threat Prevention
Likelihood to Recommend
8.6
(2 ratings)
8.5
(6 ratings)
Usability
-
(0 ratings)
8.5
(2 ratings)
User Testimonials
Check Point ThreatCloudPalo Alto Networks Advanced Threat Prevention
Likelihood to Recommend
Check Point Software Technologies
If you have the Check Point environment and want to utilize the Checkpoint environment, you should use the [Check Point] ThreatCloud. Without [Check Point] ThreatCloud, there’s no way to stop the 0days or APTs. However, [Check Point] ThreatCloud relies on the Checkpoint infrastructure to be used and integrated. If you have other firewall and/or endpoint vendors, [Check Point] ThreatCloud is not the best service to be used. Checkpoint also offers 24x7 threat cloud-managed security services to [...] organizations. Threat cloud-managed security services leverage the threat cloud decreasing the detection time and false-positive rates via increasing protection rates.
Read full review
Palo Alto Networks
Palo Alto NTP is an appropriate suite of protection for any enterprise environment or anyone that truly needs some serious perimeter protection in a one-stop, all-in-one unit. There are no modules or add-ons or clunky interfaces to deal with it; everything works out of one management plane, licensing, implementation, monitoring. updating, etc. As a network admin, that is immensely valuable to me. Additionally, I get real-time reporting on all the stuff NTP is catching, and it is nothing to shirk at. The real value in NTP comes in only after you begin doing SSL-decryption, however, to truly inspect the traffic. Short of that, you are just seeing a bunch of encrypted data and the NTP suite of tools isn't going to avail you. NTP plus decryption, though, is invaluable!
Read full review
Pros
Check Point Software Technologies
  • anti virus
  • anti bot
Read full review
Palo Alto Networks
  • The threat engine has constant updates for important threats.
  • Wildfire helps supplement the Threat engine to help protect against 0 day threats.
  • The way the threat engine can be added at different levels to different zones and policies helps to ensure business essential traffic can have policies that are tuned to ensure traffic will flow.
Read full review
Cons
Check Point Software Technologies
  • SOAR integration, Checkpoint does not have built in SOAR
  • Automation throughout the findings of [Check Point] ThreatCloud
  • Special team for threat intelligence
  • K8s threat cloud integration and K8S forensics
  • Native SIEM integration
Read full review
Palo Alto Networks
  • Cost is high, but it is a premium product
  • Endpoints are still vulnerable.
  • TAC engineers aren't always equipped with ATP knowledge
Read full review
Usability
Check Point Software Technologies
No answers on this topic
Palo Alto Networks
The reason to give ATP this rating is it specialises in detecting command control traffic whose primary role is to identify unusual outbound traffic patterns which blocks the command control communication and notifies to different security team to take necessary actions. ATP Global protect holds the responsibility of inspecting all the inbound and outbound traffic going to and from corporate system regardless of the network they are on. ATP plays a major role to identify the threats that blocks threats that could lead to data breach also it identifies any malicious file enter the system will be blocked proactively
Read full review
Alternatives Considered
Check Point Software Technologies
As Checkpoint next generation firewalls were already implemented in the network, ThreatCloud was easy to implement and had better features and reputation than competitors
Read full review
Palo Alto Networks
Having used Palo Alto Firewalls for years, implementing threat protection was the next step in perimeter security. Works much better than the few competitors I have personally used. Frequent content updates occur which may impact some policy rules, but that is normal across most vendors.
Read full review
Return on Investment
Check Point Software Technologies
  • High score rates [are] seen on breach systems after deploying systems integrated with [Check Point] ThreatCloud
  • Catch rates are very high compared to other vendors
  • One missing thing is the detection for localized URLs and IPs
  • Purchasing within the 3-year perspective is cheap compared to other solutions; ROI is generally six months
  • [Check Point] ThreatCloud eliminates the need [for] other additional services that may need to be deployed like dedicated IPS, Dedicated Sandbox, DNS solution, etc.
Read full review
Palo Alto Networks
  • After adding PA Threat Protection, we are now getting our network traffic completely inspected.
  • We are now applying security checks and scans like AV scan and Anti Spyware checks.
  • This is also giving visibility into threat and attack vectors that are using vulnerabilities and exploits to enter our environment.
Read full review
ScreenShots