TrustRadius
Threat Review during ImplementationThreat Protection is being used on a multitude of levels- first all Internet traffic has active threat policies for protection from malicious sites and malware. Other locations utilize threat as a sanity check and second source for other IDS/IPS systems. We are continually tuning and working with Palo Alto to better their threat protection capabilities.,The threat engine has constant updates for important threats. Wildfire helps supplement the Threat engine to help protect against 0 day threats. The way the threat engine can be added at different levels to different zones and policies helps to ensure business essential traffic can have policies that are tuned to ensure traffic will flow.,Visibility into signatures and how they function/what triggers them would be very beneficial. Lacking customizability compared to other tools. Inability to write custom signatures easily and for traffic with small (less than 8 bit) signatures.,9,New deployment hasn't been fully calculated yet. With the addition of Panorama and central logging, event investigation has become more streamlined.,Palo Alto Networks WildFire, Palo Alto Networks Traps and Cisco Sourcefire SNORT,Palo Alto Networks WildFire, Palo Alto Panorama, HP Arcsight
Unspecified
Palo Alto Networks Threat Protection
4 Ratings
Score 8.6 out of 101
TRScore

Palo Alto Networks Threat Protection Reviews

Palo Alto Networks Threat Protection
4 Ratings
Score 8.6 out of 101
Show Filters 
Hide Filters 
Filter 4 vetted Palo Alto Networks Threat Protection reviews and ratings
Clear all filters
Overall Rating
Reviewer's Company Size
Last Updated
By Topic
Industry
Department
Experience
Job Type
Role
Reviews (1-1 of 1)
  Vendors can't alter or remove reviews. Here's why.
Alex Waitkus, CISSP-ISSAP, OSCP profile photo
November 09, 2017

Palo Alto Networks Threat Protection: "Threat Review during Implementation"

Score 9 out of 10
Vetted Review
Verified User
Review Source
Threat Protection is being used on a multitude of levels- first all Internet traffic has active threat policies for protection from malicious sites and malware. Other locations utilize threat as a sanity check and second source for other IDS/IPS systems. We are continually tuning and working with Palo Alto to better their threat protection capabilities.
  • The threat engine has constant updates for important threats.
  • Wildfire helps supplement the Threat engine to help protect against 0 day threats.
  • The way the threat engine can be added at different levels to different zones and policies helps to ensure business essential traffic can have policies that are tuned to ensure traffic will flow.
  • Visibility into signatures and how they function/what triggers them would be very beneficial.
  • Lacking customizability compared to other tools.
  • Inability to write custom signatures easily and for traffic with small (less than 8 bit) signatures.
I think threat prevention on a certain level could be used in all Palo Alto deployments (even if just alerting without blocking).
Read Alex Waitkus, CISSP-ISSAP, OSCP's full review

Palo Alto Networks Threat Protection Scorecard Summary

About Palo Alto Networks Threat Protection

Threats do not discriminate between application delivery vectors, requiring an approach that has full visibility into all application traffic, including SSL encrypted content, with full user context. Threat Prevention leverages the visibility of our next-generation firewall to inspect all traffic, automatically preventing known threats, regardless of port, protocol or SSL encryption.
Categories:  Intrusion Detection

Palo Alto Networks Threat Protection Technical Details

Operating Systems: Unspecified
Mobile Application:No