Palo Alto Networks WildFire Reviews

12 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>
Score 9.1 out of 101

Do you work for this company?

Overall Rating

Reviewer's Company Size

Last Updated

By Topic

Industry

Department

Experience

Job Type

Role

Reviews (1-4 of 4)

No photo available
Score 10 out of 10
Vetted Review
Verified User
Review Source
We are using Wildfire to protect our network at several layers, we're using it on our edge networks to protect from threats on the internet as well as protecting our internal client networks from threats that may exist in our shared services environment or each other in the case of a few specific clients who are allowed to talk to each other. Additionally we use it to protect our corporate presence from the internet as well as our remote hosting environment. Wildfire has proven to be a lifesaver through several zero-day events including wanna-cry.
  • Detecting malware
  • Zero-day threat prevention
  • Keeping you up to date with the latest threats
  • Cost
  • I would personally like to see more JSON support in the API rather than XML, but that's being very nitpicky
Palo Alto Networks Wildfire is well suited for pretty much anywhere that you need the latest and greatest network security. It is extremely good at protecting you from the latest malware threats that might pose a potential problem for your network/endpoints. We've been very please since we installed it and I would say cost of the Palo Altos is the only drawback. If money were no object I'd go with a Palo Alto with Wildfire every time. But unfortunately in some smaller branches it just doesn't make financial sense.
Read this authenticated review
Alex Waitkus, CISSP-ISSAP, OSCP profile photo
Score 9 out of 10
Vetted Review
Verified User
Review Source
WildFire is a good product for sandboxing unknown files. Any exe, pdf, doc, etc file that originates from the interwebs is sent to the WF cloud. Internal info is sent to a WF appliance for internal assessment. Hashes from internal analysis is shared with the cloud but not the file.
  • WF helps identify potentially malicious files across a large range of types and operating system executable files.
  • WF + Traps helps catch things from a client that may traverse encrypted channels or that don't pass through a firewall.
  • WF Appliance helps address compliance concerns allowing sandboxing of files on site.
  • As all sand boxes, WF needs to stay on top of malware sandbox evasion techniques.
  • The initial management and setup of WF could be better.
  • Have had some bugs with WF code.
With the new integration to Traps and Virtual firewalls, the only place WF does not work is trying to analyze files that don't cross a firewall (1) and where Traps can't be installed (2). Other than that, there is no issue sandboxing everything that has an unknown hash.
Read Alex Waitkus, CISSP-ISSAP, OSCP's full review
Daniel J. Lewis profile photo
Score 9 out of 10
Vetted Review
Verified User
Review Source
Currently it is being used at our collocation. It helps identify and more importantly prevents malware and evasive attacks to high confidential and production data. It takes our existing Palo Alto devices and works with WildFire becoming end point sensor to help prevent malicious attacks. This helps resolve any foreseeable threat as well as provides potential clients with reports showing the security procedures taken by our company. This helps project our confidence that data stored is protected and secure.
  • This is could base and easily manageable for our collocation. While working within the could can review in live time potential treats that it has reported from other devices.
  • Worked very well with existing Palo Alto devices.
  • Another huge plus is the simplicity of managing and ease of scalability.
  • Its cost is competitive with similar/like products available.
  • Although it supports third party NGFW's I haven't tried and heard mixed reviews. I'd stay within the Palo Alto family of device.
  • Support could become cumbersome if not identified from the beginning. Even though it's purchased through a vendor which could offer support ultimately having support from Palo Alto would be ideal.
Depending on the environment being implemented in I'd recommend it for compliance purposes as well as managing it from a Network Engineer perspective. From my experience, firmware updates, patching and hardware integration have generally been smooth. Truth be told, cloud based firewall and networking compliance are becoming more and more mainstream and WildFire has a solid foundation.
Read Daniel J. Lewis's full review
No photo available
Score 8 out of 10
Vetted Review
Verified User
Review Source
We are using the WildFire cloud services across the organization to detect and block malware discovered by others for near-zero-day protection, as well as to upload files that haven't been seen in the wild for examination in case a new or unique threat enters our organization.
  • Quick definition downloads and updates. Version 7.1 can do one every 5 minutes. Zero day protection within 5 minutes is a huge plus.
  • Quick manual or automatic examination of files. Palo Alto's wildfire site supports API uploads or manual uploads that provide more detailed information than a Virustotal, for example.
  • Would be helpful if they supported more file types.
  • Would be helpful if they supported uploads of larger files.
It is well suited for organizations where zero-day exploits are likely or the impact will be large. Palo Alto Networks Wildfire can be relatively expensive, so smaller or extremely cost-sensitive organizations might not be able to justify the cost vs. waiting for daily antivirus updates that contain the intraday wildfire rollups.
Read this authenticated review

About Palo Alto Networks WildFire

Palo Alto Network’s WildFire is a malware prevention service. It specializes in addressing zero-day exploits and malware. WildFire utilizes a combination of dynamic and static analysis, as well as machine learning, to automate threat prevention. It shares real-time threat intelligence across the user base, and provides advanced sandbox testing environments to reveal zero-day threats before they get to users’ systems.

WildFire can be deployed on-premises, via the cloud, or as a hybrid system. It can integrate with third-party security tools. It is a cloud-based system to enable efficient scaling and optimizes with other Palo Alto product offerings.

Palo Alto Networks WildFire Competitors

Cisco, CheckPoint, Fortinet

Palo Alto Networks WildFire Technical Details

Operating Systems: Unspecified
Mobile Application:No