Try our new research platform with insights from 80,000+ expert users

Palo Alto Networks Advanced Threat Prevention vs Threat Stack Cloud Security Platform [EOL] comparison

 

Comparison Buyer's Guide

Executive SummaryUpdated on May 4, 2025

Review summaries and opinions

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
 

ROI

Sentiment score
7.5
Palo Alto Networks Advanced Threat Prevention offers fast, comprehensive security, boosting user satisfaction and revenue despite high costs.
Sentiment score
7.3
Threat Stack Cloud Security boosted compliance and revenue, reduced staffing needs, enhanced security, and expanded infrastructure dramatically.
It offers insights into security threats, despite the inability to quantify its impact in numbers.
 

Customer Service

Sentiment score
6.4
Palo Alto Networks' support is generally effective despite communication issues and regional differences, with most users rating it positively.
Sentiment score
7.4
Threat Stack Cloud Security Platform's support is praised for responsiveness, precise solutions, and effective communication with technical representatives.
 

Scalability Issues

Sentiment score
7.9
Palo Alto Networks Advanced Threat Prevention is highly scalable, adaptable across environments, but cost considerations may affect scalability.
Sentiment score
8.2
Threat Stack Cloud Security Platform is scalable, easy to deploy, and efficient across AWS accounts, with minor configuration concerns.
Palo Alto Networks Advanced Threat Prevention is scalable and works well wherever enforcement points exist.
 

Stability Issues

Sentiment score
7.9
Palo Alto Networks Advanced Threat Prevention is preferred for its stability, outperforming competitors, and requires proper firewall sizing.
Sentiment score
7.5
Threat Stack Cloud Security Platform [EOL] is stable and efficient, with minor GUI and agent issues for some users.
Proper sizing of the firewall models ensures that the system does not experience crippling performance issues.
 

Room For Improvement

Palo Alto Networks needs improvements in email security, user support, and analytics, while addressing complexity, false positives, and integration.
Threat Stack Cloud Security Platform needs UI improvements, better API alignment, and enhanced integrations, especially for serverless and container environments.
The behavioral detection capabilities could be expanded to address all threats at the perimeter, reducing the reliance on endpoint detection and response systems.
 

Setup Cost

Palo Alto Networks Advanced Threat Prevention is costly yet valued for its features, particularly in threat detection and scalability.
Threat Stack Cloud Security Platform offers value with transparent pricing, ranging $15-$20 monthly, seen as competitively priced by users.
Palo Alto Networks Advanced Threat Prevention requires an add-on license and is considered expensive compared to competitors like Cisco AMP and FortiGate firewalls.
 

Valuable Features

Palo Alto Networks Advanced Threat Prevention provides intuitive threat prevention with machine learning, excellent reporting, and seamless integration with other tools.
Threat Stack Cloud Security platform is esteemed for its configurability, integration, monitoring capabilities, and effective alert management.
As traditional signature-based mechanisms become less effective due to the evolving nature of attacks, this solution's focus on behavioral analysis is crucial.
 

Categories and Ranking

Palo Alto Networks Advanced...
Average Rating
8.6
Reviews Sentiment
6.9
Number of Reviews
27
Ranking in other categories
Intrusion Detection and Prevention Software (IDPS) (6th)
Threat Stack Cloud Security...
Average Rating
8.2
Reviews Sentiment
7.1
Number of Reviews
8
Ranking in other categories
No ranking in other categories
 

Featured Reviews

Carlos Bracamonte - PeerSpot reviewer
Robust, reliable, simple to install and good technical support
We are attempting to improve the use of URL filtering beyond threat protection. I'm not sure what the remaining threat protection features are off the top of my head. But beyond that, we use URL filtering. We have three approved cases for using external dynamic lists that are stored in a bucket repository. Then, for each URL site that needs to be whitelisted, we add it to the external dynamic list in order to gain access to this email. I would like Wildfire to be implemented. We use the equivalent in Cisco is the integration policies. We have the Wildfire but we are not currently implementing it. We don't have the license to use it, but we are not currently implementing it until we present the use cases that the company gives some value to and they approve the use of it.
SC
SecOps program for us, as a smaller company, is amazing; they know what to look for
They could give a few more insights into security groups and recommendations on how to be more effective. That's getting more into the AWS environment, specifically. I'm not sure if that's Threat Stack's plan or not, but I would like them to help us be efficient about how we're setting up security groups. They could recommend separation of VPCs and the like - really dig into our architecture. I haven't seen a whole lot of that and I think that's something that, right off the bat, could have made us smarter. Even as part of the SecOps Program, that could be helpful; a quick analysis. They're analyzing our whole infrastructure and saying, "You have one VPC and that doesn't make a lot of sense, that should be multiple VPCs and here's why." The architecture of the servers in whatever cloud-hosting provider you're on could be helpful. Other than that, they should continue to expand on their notifications and on what's a vulnerability. They do a great job of that and we want them to continue to do that. It would be cool, since the agent is already deployed and they know about the server, they know the IP address, and they know what vulnerability is there, for them to test the vulnerability and see if they can actually exploit it. Or, once we patch it, they could double-check that it can't be. I don't know how hard that would be to build. Thinking on it off the top off my head, it could be a little challenging but it could also be highly interesting. It would also be great if we could test a couple of other features like hammering a server with 100 login attempts and see what happens. Real test scenarios could be really helpful. That is probably more something close to what they do with the SOC 2 audit or the report. But more visualization of that, being able to test things out on our infrastructure to make sure we can or can't hit this box could be interesting.
report
Use our free recommendation engine to learn which Intrusion Detection and Prevention Software (IDPS) solutions are best for your needs.
850,747 professionals have used our research since 2012.
 

Top Industries

By visitors reading reviews
Computer Software Company
16%
Financial Services Firm
10%
Manufacturing Company
10%
Government
9%
Computer Software Company
22%
Real Estate/Law Firm
12%
Manufacturing Company
9%
Financial Services Firm
8%
 

Company Size

By reviewers
Large Enterprise
Midsize Enterprise
Small Business
 

Questions from the Community

Which is the best DDoS protection solution for a big ISP for monitoring and mitigating?
Arbor would be the best bid, apart from Arbor, Palo Alto and Fortinet have good solutions. As this is an ISP, I would prefer Arbor.
What is your experience regarding pricing and costs for Palo Alto Networks Threat Prevention?
The pricing is competitive, and with current campaigns and discounts, it provides an excellent device for a reasonable price.
Ask a question
Earn 20 points
 

Also Known As

No data available
Threat Stack, CSP,
 

Overview

 

Sample Customers

University of Arkansas, JBG SMITH, SkiStar AB, TRI-AD, Temple University, Telkom Indonesia
StatusPage.io, Walkbase, Spanning, DNAnexus, Jobcase, Nextcapital, Smartling, Veracode, 6sense
Find out what your peers are saying about Darktrace, Check Point Software Technologies, Vectra AI and others in Intrusion Detection and Prevention Software (IDPS). Updated: April 2025.
850,747 professionals have used our research since 2012.