


Find out what your peers are saying about Fortinet, Darktrace, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS).
Other NDR solutions provide virtual appliances that can be deployed on virtualization servers to get up and running quickly.
Using this solution provides financial benefits by securing from server attacks, which offers indirect savings.
It offers insights into security threats, despite the inability to quantify its impact in numbers.
The solution can save costs by improving incident resolution times and reducing security incident costs.
The technical support from Darktrace is of high quality.
Darktrace provides excellent technical support with a monthly meeting to review platform incidents, ensuring the system functions as expected.
The challenge lies in waiting for a response after logging a ticket.
I rate technical support from Palo Alto as eight out of ten.
I have proof of this rating - when I escalate a case, I receive a reply from TAC support after two days.
Overall, I find the technical support from Palo Alto Networks quite good, although getting a hold of the TAC can be challenging and sometimes requires long phone calls.
Mission-critical offering a dedicated team, proactive monitoring, and fast resolution.
From the responsiveness perspective, Splunk is very responsive with SLA-bound support for premium tiers.
I would rate their technical support as 8.5 out of 10.
Darktrace has high scalability, and I would rate it a nine out of ten.
Since it's cloud-based, it expands easily.
There is still a gap in terms of storage, and we are trying to figure out how to increase that capacity for regulated environments, which require data retention for 5 to 6 years.
Palo Alto Networks Advanced Threat Prevention is scalable and works well wherever enforcement points exist.
Splunk User Behavior Analytics is highly scalable, designed for enterprise scalability, allowing expansion of data ingestion, indexing, and search capabilities as log volumes grow.
The stability of Darktrace is excellent, rated ten out of ten.
The appliance itself has never let me down.
For stability, I would rate Darktrace an eight out of ten.
Proper sizing of the firewall models ensures that the system does not experience crippling performance issues.
With built-in redundancy across zones and regions, 99.9% uptime is achievable.
Splunk User Behavior Analytics is a one hundred percent stable solution.
Splunk User Behavior Analytics is highly stable and reliable, even in large-scale enterprise environments with high log injection rates.
There is no dedicated salesperson in Egypt, and having one would help to improve focus on this market.
They say they can integrate with most firewalls, but when we did an integration with Meraki MX firewalls, that integration didn't work and still doesn't work to this day.
We need Darktrace on each branch to get the data out, and I suggest having some kind of a centralized product that gets data from multiple sources to aggregate and provide the data.
Palo Alto needs to focus on how to bring that technology to end users and how easy it is to use, especially in a hybrid environment where users work from various locations.
The behavioral detection capabilities could be expanded to address all threats at the perimeter, reducing the reliance on endpoint detection and response systems.
Global reach allows deployment of apps and services closer to users worldwide, but data sovereignty concerns exist and region selection must align with compliance requirements.
I encountered several issues while trying to create solutions for this advanced version, which seem unrelated to query or data issues.
High data ingestion costs can be an issue, especially for large enterprises, as Splunk charges based on the amount of data processed.
The product is considered expensive compared to others.
The pricing is costly in USD, and they charge based on device counts.
The licensing cost is approximately eight dollars a year.
Palo Alto Networks Advanced Threat Prevention requires an add-on license and is considered expensive compared to competitors like Cisco AMP and FortiGate firewalls.
Reserved instances with one or three-year commitments offer lower rates, providing up to 70% savings.
Compared to all other products in the market, it is the most expensive one in all aspects including professional service and licenses, even the cloud version.
Comparing with the competitors, it's a bit expensive.
It is capable of responding to lateral movement and ransomware deployment within environments where there is data exfiltration.
I do not need to manually process incidents as Darktrace provides an incident summary, potential detection paths, and other details, all exportable with just a click.
If I am in a data center where I don't have layer two, it becomes an issue because the autonomous response is reliant on sending spoofed TCP resets to my core switch to block traffic, which is a major issue.
As traditional signature-based mechanisms become less effective due to the evolving nature of attacks, this solution's focus on behavioral analysis is crucial.
We are satisfied with the analytic capabilities of Palo Alto Networks Advanced Threat Prevention, especially the reporting features available in the Palo Alto portal in terms of their application visibility interface, which is very good for us to get visibility on all critical applications and the associated users, as well as the risks associated with every category of traffic.
I also utilize it for anomaly detection and behavior analysis, particularly using Splunk's machine learning environment.
The dashboards themselves are nice, very good, and very helpful, but the accuracy of the data or the information that will be presented on the dashboard is something that needs to be questioned.
Features like alerts and auto report generation are valuable.
| Product | Mindshare (%) |
|---|---|
| Darktrace | 10.8% |
| Palo Alto Networks Advanced Threat Prevention | 4.8% |
| Splunk User Behavior Analytics | 2.7% |
| Other | 81.7% |

| Company Size | Count |
|---|---|
| Small Business | 45 |
| Midsize Enterprise | 19 |
| Large Enterprise | 29 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 4 |
| Large Enterprise | 14 |
| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 6 |
| Large Enterprise | 12 |
Darktrace revolutionizes network security with AI-driven alerts, anomaly detection, and robust visibility across networks. It autonomously detects threats, minimizing the need for human oversight, and offers efficient IP identification with minimal false positives.
Darktrace uses advanced AI analytics to enhance network protection. Its powerful real-time threat response capabilities and self-learning enable thorough monitoring and insightful analysis of network activities. While providing scalable and reliable security, users seek improvements in false positive reduction, user-friendly interfaces, and pricing. Enhanced third-party integration, more effective dashboards, and centralized automation features remain top priorities. Users benefit greatly from its Antigena feature, offering automated responses like blocking suspicious connections for robust network defense.
What Are Darktrace's Key Features?In industries employing Darktrace, it is pivotal in securing LAN networks, analyzing behavioral patterns, and detecting internal and external threats. Adoption alongside platforms like F5 and SAP enhances incident response, traffic analysis, and threat identification, utilizing Antigena for proactive security measures.
Palo Alto Networks Advanced Threat Prevention provides comprehensive security with application control, real-time threat detection, and seamless integration with cloud services. Known for its high performance and ease of use, it addresses diverse security challenges for modern organizations.
Palo Alto Networks Advanced Threat Prevention integrates machine learning, behavioral analysis, anti-malware protection, and WildFire sandboxing to deliver proactive defense against threats. Its features include advanced firewall capabilities, comprehensive bandwidth management, and robust reporting. Integration with cloud-based URL filtering enhances organizational security efforts. While the tool offers significant protection, areas like pricing, ease of use, false positive management, and documentation clarity require improvement. Expanding AI capabilities and optimizing support will enhance threat prevention and user experience.
What are the most important features?Palo Alto Networks Advanced Threat Prevention is implemented across industries for server protection and LAN/WAN traffic security, providing solutions for network testing and application control. Organizations benefit from features like GlobalProtect VPN, anti-spyware, and vulnerability protections, ensuring security through efficient deployment both on-premises and in the cloud.
Splunk User Behavior Analytics focuses on data aggregation and threat detection with automation, deepening insights into user behavior. It offers usability, stability, and strong integration capabilities, making it a preferred choice for organizations needing comprehensive security management.
This platform enhances security management through customizable dashboards and real-time updates. Advanced analytics for anomaly detection and behavioral profiling, coupled with powerful indexing and search capabilities, enable thorough user behavior analysis. Users experience streamlined integration with Active Directory and other monitoring tools. However, improvements are needed in dashboard customization, customer support, and analytics tools to boost user experience. Organizations use Splunk User Behavior Analytics primarily for monitoring and analyzing user behavior, integrating various data sources for effective threat detection while maintaining governance.
What are the key features of Splunk User Behavior Analytics?Splunk User Behavior Analytics is widely implemented across industries for threat detection and insider threat identification. By integrating with tools like Active Directory for monitoring and anomaly detection, organizations benefit from robust security management and effective log analysis. It underpins efforts in security, data indexing, and combining data for comprehensive threat prevention.