KerioControl vs Palo Alto Networks Advanced Threat Prevention vs Trellix Intrusion Prevention System comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between KerioControl, Palo Alto Networks Advanced Threat Prevention, and Trellix Intrusion Prevention System based on real PeerSpot user reviews.

Find out what your peers are saying about Darktrace, Vectra AI, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS).
To learn more, read our detailed Intrusion Detection and Prevention Software (IDPS) Report (Updated: April 2024).
769,599 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"The most valuable features of Kerio Control are the IPS and traffic rules. The traffic rules are very user-friendly and the IPS is working well. Additionally, the anti-virus is effective with quick options, such as filtering.""When one of the employees of my customers is using the VPN Client, I have created for them that they will always get a message. When the VPN Client connects to Kerio Control from the outside, they will get an email so they know when they are connected and when they are disconnected what is happening to their network.""I like intrusion detection and prevention and bandwidth management. The routing part is also awesome. It is a good firewall. We never had a major breach from outside. We've never been impacted by ransomware, and our systems have never been infiltrated.""The comprehensiveness of the security features that Kerio Control provides us with is good. Before GFI had it, they would have more updates. The updates have been slower, but I like the things that they keep adding like the ability to block by country. I use pretty much every feature.""I want to have access to my computer from the outside and Kerio Control plays a role because it has a VPN... It is more reliable because it's a smaller group of computers to target for hackers and the like. The VPN works very well. I use it to work remotely very easily and exchange information, both to and from the location where it's deployed, and there have been no problems there.""The user interface and the ease of use are pretty good. Everything fits together so nicely.""The product is easy to use.""The flexibility of the system, the capacity to provide the right level of security, and the ability to be integrated into different kinds of infrastructures are the most valuable features."

More KerioControl Pros →

"You can scale the product.""With the IP address flag, I was able to see that I was being hacked. The moment there was an interaction between somebody on my network and that IP, the solution was able to flag it, and we were able to protect ourselves.""It's very easy to use and configure. What is nice about Palo Alto is that even if you don't understand how to use it, you can just click on upload and upload everything that needs to be blocked.""I find the malware protection very handy.""I like the solution's interface.""The user interface is a bit more professional than some free products.""The initial setup was straightforward. It's quite easy. Deployment took one to two weeks.""The sandboxing tools offer great prevention for cloud feeds."

More Palo Alto Networks Advanced Threat Prevention Pros →

"The most valuable features of the solution stem from the fact that it is a good product for dealing with DDoS attacks and for the inspection of network traffic.""The initial setup is straightforward.""The threat intelligence updates are very accurate.""Overall the solution is very good. It offers great protection and gives us a good overview of what is on the network.""The most valuable features in Trellix for me are the automated signature updates. It is a great and convenient feature.""The ability to centrally manage all the IPS sensors, track the different security events generated by it, and customize the different policies, depending on their location.""The product is worth the investment.""The feature I found most valuable is the network threat analyzer in the security platform. It also integrates with GTI, or Global Threat Intelligence. Otherwise, I just use the basic features."

More Trellix Intrusion Prevention System Pros →

Cons
"Filtering of pages and greater personalization in services need improvement.""I would like to see a little improvement in their technical support when you have a problem. I may be a little jaded because I came from Kerio when we could call and get a person on the phone who worked on the product. Every tech had their own demo setup. They had instant messaging capability with the developers. If we found a problem, then we could get a result for it quickly. Now, the product seems to be 24 hours. They have also gone to the model that if you need quicker support, then they now charge you additional for the exact same level of support that they used to give. I am assuming it's the exact same level of support that they say it is. I'm not paying extra for it. That's the biggest flaw with the product.""There were certain things I didn't know about it, but I've always been able to just contact our IT company. They've been able to walk me through certain things. It was quite a monumental task to set up a public site. Support really had to help me with setting up the VLANs and walk me through it. It was not possible for me to figure that out on my own, but that's what they're here for. That could have been a little bit easier laid out.""Kerio Control could improve content filtering.""If I would suggest anything, it would be to expand on its multifactor authentication to be a little bit more user-friendly. They should do multifactor authentications for the client itself perhaps, rather than served on a webpage, in a page hijack, that might be more user-friendly, but I don't have a lot of complaints about it. It's doing its job. You have to have a certain amount of skills to configure these things anyway, the ones that we use on-site doing point-to-point, and we've been tricked up a few times with their interfaces.""Improvements are needed to the Next Generation Firewall Protection, specifically with user-level protection.""The security part of the software, like virus scanning, website, traffic monitoring, things like that, can take a beating on the appliance. And when there's a lot of things going on, the system can get bogged down. The actual security functionality of it needs a little bit more work, which I believe they are remedying or attempting to remedy at this time, but that's the downfall at this time.""We'd like to have more integrations Kerio Operator."

More KerioControl Cons →

"The cost involves the price of the hardware, which is expensive. However, most of the Palo Alto solutions are expensive.""Palo Alto's maintenance needs to be improved.""Right now we are focusing on email. If Palo Alto can increase the features related to email filtering and the new malware, it would help us protect our systems.""It's not so easy to set up a test environment, because it's not so easy to get the test license. The vendor only gives you 90 days for a test license; it's a tough license to get.""The documentation needs to be improved. I need better information about how to configure it and what the best practices are.""Palo Alto Networks Threat Prevention could improve the commercial offing. Other solutions, such as Fortinet provide better commercial features.""Mission learning techniques should continue to expand and detect unknown threats on the fly.""We are attempting to improve the use of URL filtering beyond threat protection."

More Palo Alto Networks Advanced Threat Prevention Cons →

"The solution could improve some aspects of detection.""There are limited resources for configuration guidance.""The technical support must be improved.""Some of the documentation is not as straightforward as it could be.""The pricing could be improved.""The management component could be simplified.""The management console needs to be less complex and easier to navigate.""The area of concern where the tool needs improvement is how the product prompts users at a network level that helps prevent any wireless network attacks through alerts and notifications."

More Trellix Intrusion Prevention System Cons →

Pricing and Cost Advice
  • "Search and compare."
  • "Pricing is good, but the licensing took a lot of time."
  • "The price is inexpensive."
  • "It's very affordable."
  • "The pricing is in-line with our expectations in terms of the quality that we get for it."
  • "There is a yearly upkeep fee."
  • "My advice is to use your own hardware, and do not use theirs."
  • "It is a good fit for SMBs because of its maintainability. When you want to keep your costs low, then Kerio Control is a very good solution. It's not an expensive product that is well integrated. It has a complete set of features within it that make it a very strong product."
  • More KerioControl Pricing and Cost Advice →

  • "The pricing and the licensing are pretty competitive at this stage. As a reseller, I would like to see the price come down a little bit so I can compete better against other firewalls because we do that all the time."
  • "It's not too expensive."
  • "It is an expensive solution and I would like to see a drop in price."
  • "If you want to have all of the good features then you have to pay extra for licensing."
  • "The pricing has improved with the newer generation of their Firewalls, but the price could always be lower."
  • "The pricing could be lower."
  • "Palo Alto Networks Threat Prevention could improve by having consistent pricing at system levels."
  • "The cost involves the price of the hardware, which is expensive. However, most of the Palo Alto solutions are expensive."
  • More Palo Alto Networks Advanced Threat Prevention Pricing and Cost Advice →

  • "I rate the product’s pricing an eight out of ten."
  • "The tool is competitively priced."
  • More Trellix Intrusion Prevention System Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
    769,599 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:The solution provides feasibility regarding cyber privacy.
    Top Answer:The pricing is reasonable. We have to pay approximately EUR 175 for the product.
    Top Answer:The pricing of the product can be improved. The trial duration of the product should also be extended.
    Top Answer:Arbor would be the best bid, apart from Arbor, Palo Alto and Fortinet have good solutions. As this is an ISP, I would… more »
    Top Answer:The threat intelligence updates are very accurate.
    Top Answer:The tool is competitively priced. I rate the pricing a six out of ten.
    Top Answer:Network Threat Behavior Analysis must be improved. The technical support must be improved. The support team must provide… more »
    Ranking
    Views
    871
    Comparisons
    568
    Reviews
    7
    Average Words per Review
    276
    Rating
    7.7
    Views
    4,163
    Comparisons
    3,093
    Reviews
    7
    Average Words per Review
    415
    Rating
    8.4
    Views
    1,533
    Comparisons
    1,131
    Reviews
    5
    Average Words per Review
    298
    Rating
    8.4
    Comparisons
    Also Known As
    McAfee Network Security Platform, McAfee NSP, IntruShield Network Intrusion Prevention System, IntruShield Network IPS
    Learn More
    Trellix
    Video Not Available
    Overview

    Kerio Control is a popular security product for small and medium-sized businesses. It is a next-generation firewall that provides unified threat management without complexity. Kerio Control provides advanced anti-virus protection and industry-leading web and content application filtering, and has a secure VPN.

    With Kerio Control you can:

    • Preserve the integrity of your network.
    • Manage bandwidth to streamline traffic flows.
    • Improve productivity with filtering capabilities.

    Kerio Control Features

    Some of Kerio Control’s most valuable features include:

    High availability, deployment flexibility, deep packet inspection, advanced routing, usage reporting, quick administering, intrusion detection and prevention (IPS), gateway anti-virus, VPN, web and content application filtering, and centralized administration with MyKerio.

    Kerio Control Benefits

    • Eliminate downtime risks: Because Kerio Control offers high availability and failover protection, you can eliminate the risk and cost of connectivity or threat protection downtime.

    • Detailed reports: Kerio Control makes it easy to view individual users’ internet activity through detailed reports.

    • Traffic monitoring: Traffic monitoring allows you to manage bandwidth and makes it possible for you to control access to streaming video and peer-to-peer networks.

    • Server protection: Using Kerio Control’s advanced networking routing and deep packet inspection, you can protect servers.

    • Easily create policies: With Kerio Control, you can create both inbound and outbound traffic policies, and can also restrict communication by specific URLs, applications, traffic type, content category, or even time of day.

    • Snort-based analysis: Kerio Control gives you the ability to add a transparent layer of intrusion prevention with snort-based analysis along with a database of rule and blacklisted IP addresses that is regularly refreshed.

    • Optionally integrated anti-virus: WIth this feature, you can prevent viruses, Trojans, or spyware from entering your networks.

    Reviews from Real Users

    Here is some feedback from some of our users who are currently using the solution:

    PeerSpot user Brian C., Senior Technology Specialist, VP at Unified Technology Solutions, writes "It is very comprehensive and simple. It has all the active protections. It's updated. We love that you can set how often it is updated so you can work on what is right for you. A large company with a lot of bandwidth can update the virus definitions and security definitions hourly, if they want. A smaller site that's remote, where maybe updating the definitions will eat into the bandwidth, we can schedule those more to go later at night. It's very flexible and works for us in all types of situations. This is great because then we don't have to learn seven different products to be able to work with seven different scenarios."

    Andy D., IT Manager at Flare Technologies, praises how easy it is to use and says, "One thing we use quite a lot, as well, is the DHCP Server, because we do a lot of work where all our devices need to have static IP addresses. Rather than going around and configuring every box, we do it all through DHCP reservations. It's easier. We've got a record of it. We can manipulate it if we need to change something or change some hardware. It's all easy. Even guys who are not used to using it can pick it up quite quickly."



    Palo Alto Networks Advanced Threat Prevention is a cloud-based security service that combines cutting-edge technologies, including machine learning, artificial intelligence, and expert human monitoring, to effectively thwart advanced threats like malware, zero-day attacks, and command-and-control threats. It offers inline protection, scrutinizing all network traffic irrespective of port, protocol, or encryption. An integral component of Palo Alto Networks' security platform, it enjoys widespread adoption across diverse organizations. With its robust security capabilities, it's an ideal choice for entities of all sizes, particularly those in high-risk sectors such as finance, healthcare, and government agencies, seeking to safeguard their networks from a broad spectrum of advanced threats.

    Block More Intrusions
    Stop new and unknown attacks with signature-based and signature-less intrusion prevention systems. Signature-less intrusion detection finds malicious network traffic and stops attacks where no signatures exist.

    Unify Virtual and Physical Security
    Support network virtualization across private and public cloud platforms to scale security and evolve with changing IT dynamics.

    Maximize Security and Performance
    Scale hardware performance to speeds up to 100 Gbps and leverage data from multiple products.

    Sample Customers
    Triton Technical, McDonald's
    University of Arkansas, JBG SMITH, SkiStar AB, TRI-AD, Temple University, Telkom Indonesia
    Desjardins Group, HollyFrontier, Nubia, Agbar, WNS Global Services, INAIL, Universidad de Las Américas Puebla (UDLAP), Cook County, China Pacific Insurance, Bank Central Asia, California Department of Corrections and Rehabilitation, City of Chicago, Macquarie Telecom, Sutherland Global Services, Texas Tech University Health Sciences Center, United Automotive Electronic Systems
    Top Industries
    REVIEWERS
    Computer Software Company15%
    Financial Services Firm12%
    Manufacturing Company12%
    Comms Service Provider12%
    VISITORS READING REVIEWS
    Computer Software Company22%
    Comms Service Provider13%
    Media Company7%
    Financial Services Firm7%
    REVIEWERS
    Financial Services Firm27%
    Comms Service Provider27%
    Computer Software Company13%
    Retailer7%
    VISITORS READING REVIEWS
    Computer Software Company17%
    Financial Services Firm9%
    Manufacturing Company8%
    Government8%
    VISITORS READING REVIEWS
    Computer Software Company18%
    Government10%
    Financial Services Firm8%
    Manufacturing Company8%
    Company Size
    REVIEWERS
    Small Business80%
    Midsize Enterprise17%
    Large Enterprise4%
    VISITORS READING REVIEWS
    Small Business37%
    Midsize Enterprise18%
    Large Enterprise45%
    REVIEWERS
    Small Business23%
    Midsize Enterprise18%
    Large Enterprise59%
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise17%
    Large Enterprise61%
    REVIEWERS
    Small Business27%
    Midsize Enterprise40%
    Large Enterprise33%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise12%
    Large Enterprise68%
    Buyer's Guide
    Intrusion Detection and Prevention Software (IDPS)
    April 2024
    Find out what your peers are saying about Darktrace, Vectra AI, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS). Updated: April 2024.
    769,599 professionals have used our research since 2012.