Palo Alto Networks Advanced Threat Prevention features highly rated include Wi-Fi capabilities, sandboxing, malware protection, next-generation firewall, application quality of service, content filtering, URL filtering, IP address management, intelligent firewalls, application control, vulnerability protection, simplicity, ease of management, threat database, machine learning, real-time response capability, behavioral analytics, and heuristic-based scanning. Users appreciate its stability, user-friendly interface, and comprehensive support for advanced threat detection and prevention strategies.
- "A strong point of Palo Alto Networks Advanced Threat Prevention is their product called GlobalProtect VPN, where if you enable this service, there is no other firewall available for this security profile because when you go outside of the computer network, you must connect to the Palo Alto VPN before accessing the internet, which means there will be complete security visibility."
- "Palo Alto Networks Advanced Threat Prevention provides protections against both known and unknown threats quickly, and they have great Cyber Threat Alliance integration, which allows anything that is even unknown to get to our systems quickly in terms of being patched."
- "I rate Palo Alto Networks Advanced Threat Prevention as nine out of ten."
Palo Alto Networks Advanced Threat Prevention could enhance email filtering, expand AI analytics, and address false positives. License costs and pricing require adjustment. The setup process and documentation need improvement. Technical support, particularly in Saudi Arabia, warrants enhancement. The interface should be more intuitive for users new to the platform. Additional features like SD-WAN and improved resource consumption are desired. Integration using ICAP protocol could provide seamless operation with other solutions.
- "While Palo Alto excels in certain setups, they need to improve the user experience in distributed working conditions."
- "The behavioral detection capabilities could be expanded to address all threats at the perimeter, reducing the reliance on endpoint detection and response systems."
- "There is a potential drawback with the lack of support for the ICAP protocol."