Palo Alto Networks WildFire
Overview
What is Palo Alto Networks WildFire?
Recent Reviews
Reviewer Pros & Cons
View all pros & consVideo Reviews
Leaving a video review helps other professionals like you evaluate products. Be the first one in your network to record a review of Palo Alto Networks WildFire, and make your voice heard!
Pricing
View all pricingEntry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting / Integration Services
Would you like us to let the vendor know that you want pricing?
Alternatives Pricing
Product Details
- About
- Tech Details
- FAQs
What is Palo Alto Networks WildFire?
Palo Alto Network’s WildFire is a malware prevention service. It specializes in addressing zero-day exploits and malware. WildFire utilizes a combination of dynamic and static analysis, as well as machine learning, to automate threat prevention. It shares real-time threat intelligence across the user base, and provides advanced sandbox testing environments to reveal zero-day threats before they get to users’ systems.
WildFire can be deployed on-premises, via the cloud, or as a hybrid system. It can integrate with third-party security tools. It is a cloud-based system to enable efficient scaling and optimizes with other Palo Alto product offerings.
Palo Alto Networks WildFire Video
Palo Alto Networks WildFire Technical Details
Operating Systems | Unspecified |
---|---|
Mobile Application | No |
Frequently Asked Questions
Comparisons
View all alternativesCompare with
Palo Alto Networks Cortex XDR
Cisco Meraki MX
Check Point Quantum Security Gateway
Mimecast Secure Email Gateway
FortiAnalyzer
FortiGate
Cisco Secure Firewall
Microsoft Sentinel
Cisco Secure IPS
Palo Alto Networks Advanced Threat Prevention
Reviews and Ratings
Attribute Ratings
Reviews
(1-8 of 8)- Popular Filters
A short note about WildFire
- It prevents Zero Day Attack
- It updates the signature base of all firewall when new attack is found.
- It run the file in virtual environment so that local pc isn't affect .
- It is use to analyse the file before any false decision.
- The main pain is that we have to purchase the WildFire Licence separately. I think it should be by default available in Palo Alto Firewall.
- Sometimes it takes much time to analyse the file.
- It provides result after attack is happened.
- It can detect potentially dangerous files of various kinds and operating system executable files as well. Integration of AutoFocus with Palo Alto solutions is one click.
- Ensuring that you're protected against the newest dangers, including zero-day attacks. This is called zero-day monitoring.
- By using Palo Alto's threat protection capabilities, the tool helps to alleviate compliance issues by enabling on-site sandboxing of files.
- Cost-wise, it's competitive with other comparable solutions on the market, and it integrated well with current Palo Alto systems. Scalability and management simplicity are also significant advantages.
- WildFire, like other sandboxes, has to stay up with malware sandbox evasion techniques, which necessitates larger file size limits.
- More file formats should be able to be submitted and scanned by WildFire, which needs improved initial administration and setup.
- It's quite pricey, and there's no warning choice for performance on the cloud.
It's been used as an APT and zero day. It's leveraging the current Palo Alto deployment where they're located at perimeter, data center and cloud.
Main usage is for the perimeter defense for the whole organization.
Without WildFire, static analysis and file checks do not give the up-to-date protection level for current infrastructure. That's also assisting the SOC for threat detection and hunting. Autofocus integration is a plus for file trajectory. API integrations with different solutions enrich the product usability.
- Integration with Palo Alto solutions (very easy and one-click).
- Zero day detection.
- AutoFocus integration.
- Leveraging the Palo Alto threat prevention features.
- API integration with different solutions (many of them already built-in configurations).
- Unit 42 threat research team behind the WildFire.
- Integration with 3rd-party feeds.
- Upcoming solutions and acquisitions of Palo Alto are integrated and built-in capability of WF usage.
- Local WF appliance is lacking in term of functionality like no bare metal analysis in local solution.
- No new features coming to local WF appliances.
- No built-in integration with GlobalProtect Agent.
- Cloud WF does not have the option for specific regions to be used (compliance).
- Cloud side does not have alarming option for [degraded] performance.
- Lack of forensics (needs additional product or integration).
- Helps block zero-day exploits
- You get the combined power of other users' Palo Alto Networks WildFire file scanning signatures as well
- Seamless install and very little to manage
- Need larger file size limits
- They need to be able to submit and scan more file types
- Rather expensive
Working in Healthcare this has been a literal lifesaver.
- Detecting malware
- Zero-day threat prevention
- Keeping you up to date with the latest threats
- Cost
- I would personally like to see more JSON support in the API rather than XML, but that's being very nitpicky
WildFire burning through the wire
- WF helps identify potentially malicious files across a large range of types and operating system executable files.
- WF + Traps helps catch things from a client that may traverse encrypted channels or that don't pass through a firewall.
- WF Appliance helps address compliance concerns allowing sandboxing of files on site.
- As all sand boxes, WF needs to stay on top of malware sandbox evasion techniques.
- The initial management and setup of WF could be better.
- Have had some bugs with WF code.
Controlled Chaos = WildFire
- This is could base and easily manageable for our collocation. While working within the could can review in live time potential treats that it has reported from other devices.
- Worked very well with existing Palo Alto devices.
- Another huge plus is the simplicity of managing and ease of scalability.
- Its cost is competitive with similar/like products available.
- Although it supports third party NGFW's I haven't tried and heard mixed reviews. I'd stay within the Palo Alto family of device.
- Support could become cumbersome if not identified from the beginning. Even though it's purchased through a vendor which could offer support ultimately having support from Palo Alto would be ideal.
- Quick definition downloads and updates. Version 7.1 can do one every 5 minutes. Zero day protection within 5 minutes is a huge plus.
- Quick manual or automatic examination of files. Palo Alto's wildfire site supports API uploads or manual uploads that provide more detailed information than a Virustotal, for example.
- Would be helpful if they supported more file types.
- Would be helpful if they supported uploads of larger files.