Palo Alto Networks WildFire

Palo Alto Networks WildFire

Score 8.4 out of 10
Palo Alto Networks WildFire


What is Palo Alto Networks WildFire?

Palo Alto Network’s WildFire is a malware prevention service. It specializes in addressing zero-day threats through dynamic and static analysis, machine learning, and advanced sandbox testing environments.
Read more

Recent Reviews

Read all reviews

Reviewer Pros & Cons

View all pros & cons

Video Reviews

Leaving a video review helps other professionals like you evaluate products. Be the first one in your network to record a review of Palo Alto Networks WildFire, and make your voice heard!

Return to navigation


View all pricing

What is Palo Alto Networks WildFire?

Palo Alto Network’s WildFire is a malware prevention service. It specializes in addressing zero-day threats through dynamic and static analysis, machine learning, and advanced sandbox testing environments.

Entry-level set up fee?

  • No setup fee


  • Free Trial
  • Free/Freemium Version
  • Premium Consulting / Integration Services

Would you like us to let the vendor know that you want pricing?

5 people want pricing too

Alternatives Pricing

What is in Boston offers their enterprise-grade log analytics application, oriented towards providing data security and eliminating the need for capacity management.

What is EclecticIQ Platform?

EclecticIQ Platform is an analyst-centric Threat Intelligence Platform (TIP). The vendor says it is optimized for the collection of intelligence data from open sources, commercial suppliers and industry partnerships into a single collaborative analyst workbench. EclecticIQ Platform aims to eliminate…

Return to navigation

Product Details

What is Palo Alto Networks WildFire?

Palo Alto Network’s WildFire is a malware prevention service. It specializes in addressing zero-day exploits and malware. WildFire utilizes a combination of dynamic and static analysis, as well as machine learning, to automate threat prevention. It shares real-time threat intelligence across the user base, and provides advanced sandbox testing environments to reveal zero-day threats before they get to users’ systems.

WildFire can be deployed on-premises, via the cloud, or as a hybrid system. It can integrate with third-party security tools. It is a cloud-based system to enable efficient scaling and optimizes with other Palo Alto product offerings.

Palo Alto Networks WildFire Video

Learn how WildFire offers advanced protection from unknown threats through native integration with our Next-Generation Security Platform. The service brings advanced threat detection and prevention to every security technology deployed throughout the network, endpoint and clou...
 Show More

Palo Alto Networks WildFire Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

Palo Alto Network’s WildFire is a malware prevention service. It specializes in addressing zero-day threats through dynamic and static analysis, machine learning, and advanced sandbox testing environments.

Reviewers rate Support Rating highest, with a score of 9.

The most common users of Palo Alto Networks WildFire are from Enterprises (1,001+ employees).
Return to navigation


View all alternatives
Return to navigation


(1-8 of 8)
Companies can't remove reviews or game the system. Here's why
Score 8 out of 10
Vetted Review
Verified User
So when we are talking about WildFire, first thing which comes in our mind is Zero Day Attack. Zero Day Attack means when a new type of attack happen and firewall don't have any signature of this. So in this case WildFire comes into picture. Basically firewall sends a copy of file to WildFire where it WildFire runs the file in various environment and analysis the file. If the file is harmful and malicious WildFire update the signature in all the firewall. So in this way it prevents future attack .
  • It prevents Zero Day Attack
  • It updates the signature base of all firewall when new attack is found.
  • It run the file in virtual environment so that local pc isn't affect .
  • It is use to analyse the file before any false decision.
  • The main pain is that we have to purchase the WildFire Licence separately. I think it should be by default available in Palo Alto Firewall.
  • Sometimes it takes much time to analyse the file.
  • It provides result after attack is happened.
WildFire is well suited in big Data centre where a lot of traffic hits daily. WildFire is suited where firewall is internet facing. WildFire is not suitable where lower number of traffic is there. Where user usually don't communicate towards internet because the cost of WildFire is little high so we should use only for internet facing.
Mst Rahima Khatun | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
WildFire, from Palo Alto Networks, is a cloud-based threat intelligence and sandboxing solution. We use it on our edge networks to protect against internet threats and dangers from our shared services environment or other customers who have been allowed to communicate. We protected our network in many layers, and we use wildfire to keep our cloud services secure across the company. Malware and evasive attacks on sensitive data were detected and prevented. To protect against malicious attacks, it employs an endpoint scanner that works in tandem with WildFire.
  • It can detect potentially dangerous files of various kinds and operating system executable files as well. Integration of AutoFocus with Palo Alto solutions is one click.
  • Ensuring that you're protected against the newest dangers, including zero-day attacks. This is called zero-day monitoring.
  • By using Palo Alto's threat protection capabilities, the tool helps to alleviate compliance issues by enabling on-site sandboxing of files.
  • Cost-wise, it's competitive with other comparable solutions on the market, and it integrated well with current Palo Alto systems. Scalability and management simplicity are also significant advantages.
  • WildFire, like other sandboxes, has to stay up with malware sandbox evasion techniques, which necessitates larger file size limits.
  • More file formats should be able to be submitted and scanned by WildFire, which needs improved initial administration and setup.
  • It's quite pricey, and there's no warning choice for performance on the cloud.
Palo Alto Networks Wildfire is safe that is capable of safeguarding our network from any harm. Using it, we'll be safe from the most recent types of malware. Cloud-based firewalls like WildFire are becoming more popular and for good reason. I'd suggest it as a Network Engineer for both compliance and management, depending on the situation. A disadvantage of this approach is that it is too costly for small and medium-sized enterprises (SMEs). In most cases, they are quick to respond and get the issue resolved within a few hours.
Score 7 out of 10
Vetted Review
Verified User

It's been used as an APT and zero day. It's leveraging the current Palo Alto deployment where they're located at perimeter, data center and cloud.

Main usage is for the perimeter defense for the whole organization.

Without WildFire, static analysis and file checks do not give the up-to-date protection level for current infrastructure. That's also assisting the SOC for threat detection and hunting. Autofocus integration is a plus for file trajectory. API integrations with different solutions enrich the product usability.

  • Integration with Palo Alto solutions (very easy and one-click).
  • Zero day detection.
  • AutoFocus integration.
  • Leveraging the Palo Alto threat prevention features.
  • API integration with different solutions (many of them already built-in configurations).
  • Unit 42 threat research team behind the WildFire.
  • Integration with 3rd-party feeds.
  • Upcoming solutions and acquisitions of Palo Alto are integrated and built-in capability of WF usage.
  • Local WF appliance is lacking in term of functionality like no bare metal analysis in local solution.
  • No new features coming to local WF appliances.
  • No built-in integration with GlobalProtect Agent.
  • Cloud WF does not have the option for specific regions to be used (compliance).
  • Cloud side does not have alarming option for [degraded] performance.
  • Lack of forensics (needs additional product or integration).

If an already implied Palo Alto Networks solutions, I'll definitely recommend.

From the cost perspective it's very competitive even from the scratch to get a Palo Alto Network firewall and open TP + WF. It'll surely cover your ATP needs.

Virtualwire integration with PAN firewall and WF works well and very easy to setup. Even it can be used additional 2nd layer of defense for enhancing current solutions.

Reports are magnificent.

Performance is great.

However for heterogeneous environments there are other solutions to take a look at.

For local-only solutions: Wildfire is not very suitable as it's lacking in terms of functionality.

PAN support is very good. You can get the reasonable and timely support on any conditions. When the product is already integrated with the PAN firewalls, you can choose the severity levels based on the effect. The customer service/TAC is very helpful, they even have additional recommendations of advises for product usability. Local partners are also assisting the cases and give their expertise.
Score 8 out of 10
Vetted Review
Verified User
We currently have a Palo Alto Networks WildFire subscription across all our Palo Alto Firewalls. It adds an extra layer of protection from addressing zero-day exploits and malware. It can be deployed on-prem or in the cloud. It is a relatively expensive license considering all Palo Alto customers get WildFire, but only the paid version get updates within one hour vs 24 hours. Overall it seems worth it.
  • Helps block zero-day exploits
  • You get the combined power of other users' Palo Alto Networks WildFire file scanning signatures as well
  • Seamless install and very little to manage
  • Need larger file size limits
  • They need to be able to submit and scan more file types
  • Rather expensive
It is definitely worth the extra protection on perimeter firewalls or datacenter type architectures. Very little to manage with regard to patches, updates, etc. Good integration with Traps Endpoint Security as well.
Score 10 out of 10
Vetted Review
Verified User
We are using Wildfire to protect our network at several layers, we're using it on our edge networks to protect from threats on the internet as well as protecting our internal client networks from threats that may exist in our shared services environment or each other in the case of a few specific clients who are allowed to talk to each other. Additionally we use it to protect our corporate presence from the internet as well as our remote hosting environment. Wildfire has proven to be a lifesaver through several zero-day events including wanna-cry.
  • Detecting malware
  • Zero-day threat prevention
  • Keeping you up to date with the latest threats
  • Cost
  • I would personally like to see more JSON support in the API rather than XML, but that's being very nitpicky
Palo Alto Networks Wildfire is well suited for pretty much anywhere that you need the latest and greatest network security. It is extremely good at protecting you from the latest malware threats that might pose a potential problem for your network/endpoints. We've been very please since we installed it and I would say cost of the Palo Altos is the only drawback. If money were no object I'd go with a Palo Alto with Wildfire every time. But unfortunately in some smaller branches it just doesn't make financial sense.
For the most part they're pretty responsive and the problem gets resolved in a few hours. We've had a few issues with having to replace an unusually high number of power supplies in our Palo Alto devices, but those tickets are normally resolved pretty quickly and other than that we really haven't had many issues. There has been maybe one or two incidents where it took a couple days to get to the root cause, but none of them have been production impacting as we've deployed our Palos in redundant pairs and the failover worked well for us.
Alex Waitkus, CISSP-ISSAP, OSCP | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
WildFire is a good product for sandboxing unknown files. Any exe, pdf, doc, etc file that originates from the interwebs is sent to the WF cloud. Internal info is sent to a WF appliance for internal assessment. Hashes from internal analysis is shared with the cloud but not the file.
  • WF helps identify potentially malicious files across a large range of types and operating system executable files.
  • WF + Traps helps catch things from a client that may traverse encrypted channels or that don't pass through a firewall.
  • WF Appliance helps address compliance concerns allowing sandboxing of files on site.
  • As all sand boxes, WF needs to stay on top of malware sandbox evasion techniques.
  • The initial management and setup of WF could be better.
  • Have had some bugs with WF code.
With the new integration to Traps and Virtual firewalls, the only place WF does not work is trying to analyze files that don't cross a firewall (1) and where Traps can't be installed (2). Other than that, there is no issue sandboxing everything that has an unknown hash.
Daniel J. Lewis | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Currently it is being used at our collocation. It helps identify and more importantly prevents malware and evasive attacks to high confidential and production data. It takes our existing Palo Alto devices and works with WildFire becoming end point sensor to help prevent malicious attacks. This helps resolve any foreseeable threat as well as provides potential clients with reports showing the security procedures taken by our company. This helps project our confidence that data stored is protected and secure.
  • This is could base and easily manageable for our collocation. While working within the could can review in live time potential treats that it has reported from other devices.
  • Worked very well with existing Palo Alto devices.
  • Another huge plus is the simplicity of managing and ease of scalability.
  • Its cost is competitive with similar/like products available.
  • Although it supports third party NGFW's I haven't tried and heard mixed reviews. I'd stay within the Palo Alto family of device.
  • Support could become cumbersome if not identified from the beginning. Even though it's purchased through a vendor which could offer support ultimately having support from Palo Alto would be ideal.
Depending on the environment being implemented in I'd recommend it for compliance purposes as well as managing it from a Network Engineer perspective. From my experience, firmware updates, patching and hardware integration have generally been smooth. Truth be told, cloud based firewall and networking compliance are becoming more and more mainstream and WildFire has a solid foundation.
Score 8 out of 10
Vetted Review
Verified User
We are using the WildFire cloud services across the organization to detect and block malware discovered by others for near-zero-day protection, as well as to upload files that haven't been seen in the wild for examination in case a new or unique threat enters our organization.
  • Quick definition downloads and updates. Version 7.1 can do one every 5 minutes. Zero day protection within 5 minutes is a huge plus.
  • Quick manual or automatic examination of files. Palo Alto's wildfire site supports API uploads or manual uploads that provide more detailed information than a Virustotal, for example.
  • Would be helpful if they supported more file types.
  • Would be helpful if they supported uploads of larger files.
It is well suited for organizations where zero-day exploits are likely or the impact will be large. Palo Alto Networks Wildfire can be relatively expensive, so smaller or extremely cost-sensitive organizations might not be able to justify the cost vs. waiting for daily antivirus updates that contain the intraday wildfire rollups.
Return to navigation