Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

Palo Alto Networks Threat Prevention

5.0
(3)

Threats do not discriminate between application delivery vectors, requiring an approach that has full visibility into all application traffic, including SSL encrypted content, with full user context. Threat Prevention leverages the visibility of our next-generation firewall to inspect all traffic, automatically preventing known threats, regardless of port, protocol or SSL encryption.

Work for Palo Alto Networks Threat Prevention?

Learning about Palo Alto Networks Threat Prevention?

We can help you find the solution that fits you best.

Palo Alto Networks Threat Prevention Reviews

Ask Palo Alto Networks Threat Prevention a Question
Write a Review
Filter Reviews
Filter Reviews
  • Ratings
  • Company Size
  • User Role
  • Industry
Ratings
Company Size
User Role
Industry
Showing 3 Palo Alto Networks Threat Prevention reviews
LinkedIn Connections
Palo Alto Networks Threat Prevention review by Consultant in Information Technology and Services
Consultant in Information Technology and Services
Validated Reviewer
Review Source
content

"PANOS Threat Prevention Benefits"

What do you like best?

I like the PANOS Threat Prevention service provided in Palo Alto Firewalls which are very easy to configure and use.

Updates are really very quick and there is no need of manual intervention require and excellent protection from zero day threats

What do you dislike?

As of now there is nothing to dislike. Features are up to date

Recommendations to others considering the product

Palo Alto Threat Prevention Feature is world class technique to deploy in any organization that prevent all components of network risk free and away from threats and worms

What business problems are you solving with the product? What benefits have you realized?

Problems and issues related to threats and worms either inside or outside in organization are perfectly controlled and prevented using this feature.

After using this feature , we observe that things are stable and no suspicious behaviour in our network

Sign in to G2 to see what your connections have to say about Palo Alto Networks Threat Prevention
Palo Alto Networks Threat Prevention review by Administrator
Administrator
Validated Reviewer
Verified Current User
Review Source
content

"Threat mitigation in a hacker-filled world"

What do you like best?

Auto updates on the appliance are great. The ability to setup custom rules and policies for individual threats is good also.

What do you dislike?

Palo alto offers a great product, however, we have a fire eye appliance sitting behind the palo alto which will OCCASIONALLY catch something that passes through. This does NOT happen often.

Recommendations to others considering the product

Switch to Palo Alto, you won't regret it.

What business problems are you solving with the product? What benefits have you realized?

Threat prevention helps us take control of web server attacks as well as mitigate risks of users on the internet.

What Other IT Security solution do you use?

Thanks for letting us know!
Palo Alto Networks Threat Prevention review by Administrator in Internet
Administrator in Internet
Validated Reviewer
Review Source
content

"Best firewall with great IDS/IPS capabilities"

What do you like best?

The best thing about this single pass architecture and provide high performance even with the multiple security profiles (Threat prevention) enabled. This is the best security focused firewall in today's market.

What do you dislike?

Of course, the bad part is renewal of licenses. But we cannot get this highly featured product any where, so, its worth paying it.

What business problems are you solving with the product? What benefits have you realized?

With this product we are able to secure our corporate and production traffic in a very secure manner. Highly useful for our organization

There are not enough reviews of Palo Alto Networks Threat Prevention for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Darktrace Logo
Darktrace
4.1
(24)
The enterprise immune system
2
Esker on Demand Logo
Esker on Demand
4.6
(16)
Esker on Demand is a cloud-based document process and information exchange service that enables companies to automate the processing and exchange of crucial business documents it include rapid project go live, increased profitability, pay only for what you use, and low risk.
3
Apple Support Number Logo
Apple Support Number
4.4
(14)
Apple Support Number offers Apple customer service for MacBook, iPad, iPhone and iTunes.
4
Outlook Password Recovery Logo
Outlook Password Recovery
3.7
(7)
Outlook Password Recovery software is a software that can to reset forgotten Outlook PST password, support to recover longer and multilingual password and unlock protected PST file within seconds and get data from protected PST file without any data defeat.
5
Prey Logo
Prey
4.6
(6)
Prey is an Anti-Theft and management application that helps you keep track and secure your laptop, phone and tablet.
6
Palo Alto Networks URL Filtering PAN-DB Logo
Palo Alto Networks URL Filtering PAN-DB
4.8
(6)
The majority of attacks and exposure to malicious content occurs during the normal course of web browsing activities, which requires the ability to allow safe, secure web access for all users. URL Filtering with PAN-DB automatically prevents attacks that leverage the web as an attack vector, including phishing links in emails, phishing sites, HTTP-based command and control, malicious sites and pages that carry exploit kits.
7
Palo Alto Networks Wildfire Logo
Palo Alto Networks Wildfire
4.1
(6)
WildFire cloud-based threat analysis service is the industrys most advanced analysis and prevention engine for highly evasive zero-day exploits and malware. The cloud-based service employs a unique multi-technique approach combining dynamic and static analysis, innovative machine learning techniques, and a groundbreaking bare metal analysis environment to detect and prevent even the most evasive threats.
8
Stellar Phoenix Mac Data Recovery Logo
Stellar Phoenix Mac Data Recovery
4.4
(4)
This is a rescue application which retrieves deleted data from a Mac hard drive. A number of storage devices it can support ranges from SSDs, USB, external hard drives, Time Machine and password protected media. Compatible with macOS Sierra 10.12.
9
AWS Security Hub Logo
AWS Security Hub
3.7
(4)
AWS Security Hub gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts.
10
Rocket Servergraph Logo
Rocket Servergraph
5.0
(3)
Rocket Servergraph reduces the cost and complexity of monitoring/reporting of backup environment across heterogeneous platforms and applications.
Show more
Kate from G2

Learning about Palo Alto Networks Threat Prevention?

I can help.
* We monitor all Palo Alto Networks Threat Prevention reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. Validated reviews require the user to submit a screenshot of the product containing their user ID, in order to verify a user is an actual user of the product.