We performed a comparison between Check Point IPS and Palo Alto Networks Advanced Threat Prevention based on real PeerSpot user reviews.
Find out in this report how the two Intrusion Detection and Prevention Software (IDPS) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."The most valuable feature of Check Point IPS is the management of devices and policies."
"Check Point Intrusion Prevention System has great profiles, and we can continuously create, modify, activate, deactivate or configure any specific setting to allow the profile to focus on just one thing or for certain attacks."
"Real-time protection has blocked most threats that could affect system operations."
"It protects against specific known exploits but also, with SandBlast integration, it is able to protect against unknown or zero-day attacks at the perimeter level."
"I can easily monitor all of our connected devices and I get instant notification of reconnections and new connections, which removes some of the monitoring burden."
"The solution is user-friendly and the interface is easy to configure."
"User-friendly and easy to implement."
"The product's initial setup is easy."
"It's a monster, it's got so many beautiful features. We do deal with other firewalls and we've got a better idea of what other firewalls' capabilities are, any comparison with the Palo Alto I liked the quality of service on the applications that you can control the amount of bandwidth an application is allowed to consume. The best feature is the quality of the application quality of service."
"For those who want a next-gen firewall that's easy to configure and easy to operate, I think you should go for Palo Alto."
"The initial setup was straightforward. It's quite easy. Deployment took one to two weeks."
"The user interface is a bit more professional than some free products."
"It's very easy to use and configure. What is nice about Palo Alto is that even if you don't understand how to use it, you can just click on upload and upload everything that needs to be blocked."
"Most of the features of Palo Alto Threat Prevention are alright. I recommend features like content filtering, IP address, & intelligent firewalls. The reporting feature is very good."
"The application control and vulnerability protection are the most valuable features."
"With the IP address flag, I was able to see that I was being hacked. The moment there was an interaction between somebody on my network and that IP, the solution was able to flag it, and we were able to protect ourselves."
"Sometimes we had false positives where packages that were legitimate for us were blocked and we had to unblock them through exceptions."
"It is generally good, but improving the performance would be the one thing I'd take a look at right now."
"In my opinion, the Check Point software engineers should works on the performance of the blade - when it is activated with the big number of the protections in place, the monitoring shows us the significant increase in the CPU utilization for the gateway appliances - up to 30 percents, even so we are cherry-picking only the profiles that we really needed."
"Having additional reports available would be helpful."
"After the R80 release, there are almost all feature sets available under IPS Configuration. However, further to this, adding a direct vulnerability scan based on ports and protocol for every zone (LAN, DMZ, or Outside) will make Check Point very different compared to other vendors on the market."
"I hear from my admin that the firmware upgrade process is quite cumbersome."
"The cost is a bit high but it is worth it."
"Support is the biggest area for improvement."
"The organization mail security solutions could be improved. There is no mail security solution available."
"It's not so easy to set up a test environment, because it's not so easy to get the test license. The vendor only gives you 90 days for a test license; it's a tough license to get."
"The application’s pricing and dashboard need improvement. It could be user-friendly."
"Sometimes when you want to group a set of ports, and communicate with Palo Alto, you cannot group TCP and UDP ports together. This needs to be adjusted."
"Generally, to deploy it will take some downtime, about a day."
"The solution needs to improve its local technical support services. There is no premium support offered in our market."
"The documentation needs to be improved. I need better information about how to configure it and what the best practices are."
"The pricing has improved with the newer generation of their Firewalls, but the price could always be lower. In comparison with other solutions, I believe they're quite competitive."
More Palo Alto Networks Advanced Threat Prevention Pricing and Cost Advice →
Check Point IPS is ranked 3rd in Intrusion Detection and Prevention Software (IDPS) with 45 reviews while Palo Alto Networks Advanced Threat Prevention is ranked 6th in Intrusion Detection and Prevention Software (IDPS) with 24 reviews. Check Point IPS is rated 8.6, while Palo Alto Networks Advanced Threat Prevention is rated 8.8. The top reviewer of Check Point IPS writes "Great for detection and access with the capabilities of defining specific rules". On the other hand, the top reviewer of Palo Alto Networks Advanced Threat Prevention writes "A good amount of granularity and advanced URL filtering capabilities". Check Point IPS is most compared with Darktrace, Palo Alto Networks URL Filtering with PAN-DB, Trend Micro TippingPoint Threat Protection System, Cisco NGIPS and Fortinet FortiGate IPS, whereas Palo Alto Networks Advanced Threat Prevention is most compared with Fortinet FortiGate IPS, Arista NDR, Forcepoint Next Generation Firewall, Trend Micro TippingPoint Threat Protection System and Darktrace. See our Check Point IPS vs. Palo Alto Networks Advanced Threat Prevention report.
See our list of best Intrusion Detection and Prevention Software (IDPS) vendors.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.