Palo Alto Networks Advanced Threat Prevention vs. Powertech Exit Point Manager for IBM i

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Palo Alto Networks Advanced Threat Prevention
Score 8.5 out of 10
N/A
Palo Alto Networks Advanced Threat Prevention is an intrusion prevention system (IPS) used to stop zero-day attacks inline in real-time. In addition to the prevention of known threats, the solution helps to stop never-before-seen exploit attempts and command and control with its inline deep learning engines that aims to provide prevention of zero-day injection attacks and evasive command and control.N/A
Powertech Exit Point Manager for IBM i
Score 9.5 out of 10
N/A
Powertech Exit Point Manager for IBM i from HelpSystems allows users to reduce the risk of unauthorized and unaudited server access with system access monitoring, tracking and control software for IBM i.N/A
Pricing
Palo Alto Networks Advanced Threat PreventionPowertech Exit Point Manager for IBM i
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Palo Alto Networks Advanced Threat PreventionPowertech Exit Point Manager for IBM i
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Palo Alto Networks Advanced Threat PreventionPowertech Exit Point Manager for IBM i
Best Alternatives
Palo Alto Networks Advanced Threat PreventionPowertech Exit Point Manager for IBM i
Small Businesses
LevelBlue USM Anywhere
LevelBlue USM Anywhere
Score 7.5 out of 10
LevelBlue USM Anywhere
LevelBlue USM Anywhere
Score 7.5 out of 10
Medium-sized Companies
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
Enterprises
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
CrowdStrike Falcon
CrowdStrike Falcon
Score 9.1 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Palo Alto Networks Advanced Threat PreventionPowertech Exit Point Manager for IBM i
Likelihood to Recommend
8.5
(6 ratings)
10.0
(1 ratings)
Usability
8.5
(2 ratings)
-
(0 ratings)
User Testimonials
Palo Alto Networks Advanced Threat PreventionPowertech Exit Point Manager for IBM i
Likelihood to Recommend
Palo Alto Networks
Palo Alto NTP is an appropriate suite of protection for any enterprise environment or anyone that truly needs some serious perimeter protection in a one-stop, all-in-one unit. There are no modules or add-ons or clunky interfaces to deal with it; everything works out of one management plane, licensing, implementation, monitoring. updating, etc. As a network admin, that is immensely valuable to me. Additionally, I get real-time reporting on all the stuff NTP is catching, and it is nothing to shirk at. The real value in NTP comes in only after you begin doing SSL-decryption, however, to truly inspect the traffic. Short of that, you are just seeing a bunch of encrypted data and the NTP suite of tools isn't going to avail you. NTP plus decryption, though, is invaluable!
Read full review
Fortra
As specified earlier, the product is very helpful to monitor the FTP, ODBC, JDBC, SQL and remote commands. What queries are coming to the system and who is issuing the commands so that we can analyze the and restrict their access if its not required. It helped us catch [a lot of] unauthorized users.
Read full review
Pros
Palo Alto Networks
  • The threat engine has constant updates for important threats.
  • Wildfire helps supplement the Threat engine to help protect against 0 day threats.
  • The way the threat engine can be added at different levels to different zones and policies helps to ensure business essential traffic can have policies that are tuned to ensure traffic will flow.
Read full review
Fortra
  • Restricted FTP users
  • ODBC/JDBC connection restrictions
  • Exit Point Security Performance, Flexibility
Read full review
Cons
Palo Alto Networks
  • Cost is high, but it is a premium product
  • Endpoints are still vulnerable.
  • TAC engineers aren't always equipped with ATP knowledge
Read full review
Fortra
  • Adding a user to the exit point manger and then specifying the same user to restrict for particular service is bit complex i feel, instead of that making only one entry to restriction would be good.
  • All Features are good
  • Can maintain all systems from central system.
Read full review
Usability
Palo Alto Networks
The reason to give ATP this rating is it specialises in detecting command control traffic whose primary role is to identify unusual outbound traffic patterns which blocks the command control communication and notifies to different security team to take necessary actions. ATP Global protect holds the responsibility of inspecting all the inbound and outbound traffic going to and from corporate system regardless of the network they are on. ATP plays a major role to identify the threats that blocks threats that could lead to data breach also it identifies any malicious file enter the system will be blocked proactively
Read full review
Fortra
No answers on this topic
Alternatives Considered
Palo Alto Networks
Having used Palo Alto Firewalls for years, implementing threat protection was the next step in perimeter security. Works much better than the few competitors I have personally used. Frequent content updates occur which may impact some policy rules, but that is normal across most vendors.
Read full review
Fortra
Helpsystems was one of the best leading third-party service provider in the Market for IBM i. Since we are already customer for the Helpsystems and their support is awesome. We need the best products in market and Helpsystems has all the good tools that suits to my environment. All we need is the best support when its required which Helpsystems support team doing at its best.

is
be identical or equivalent to
More (Definitions, Synonyms, Translation)
Read full review
Return on Investment
Palo Alto Networks
  • After adding PA Threat Protection, we are now getting our network traffic completely inspected.
  • We are now applying security checks and scans like AV scan and Anti Spyware checks.
  • This is also giving visibility into threat and attack vectors that are using vulnerabilities and exploits to enter our environment.
Read full review
Fortra
  • Controlling of unauthorized access
  • Monitoring the exit point manger logs to restrict data access only to authorized people.
  • Monitor of FTP, ODBC, SQL, Remote Commands and block attacks on IBM i DB2
Read full review
ScreenShots