Find out what your peers are saying about Fortinet, Darktrace, Check Point Software Technologies and others in Intrusion Detection and Prevention Software (IDPS).
Product | Market Share (%) |
---|---|
Palo Alto Networks URL Filtering with PAN-DB | 1.9% |
Fortinet FortiGate | 16.6% |
Darktrace | 13.8% |
Other | 67.7% |
Product | Market Share (%) |
---|---|
Rapid7 InsightIDR | 2.4% |
Wazuh | 10.2% |
Splunk Enterprise Security | 9.2% |
Other | 78.2% |
Product | Market Share (%) |
---|---|
Trend Micro Deep Discovery | 3.8% |
Fortinet FortiGate | 16.6% |
Darktrace | 13.8% |
Other | 65.8% |
Company Size | Count |
---|---|
Small Business | 5 |
Midsize Enterprise | 4 |
Large Enterprise | 4 |
Company Size | Count |
---|---|
Small Business | 20 |
Midsize Enterprise | 5 |
Large Enterprise | 6 |
Company Size | Count |
---|---|
Small Business | 14 |
Midsize Enterprise | 6 |
Large Enterprise | 9 |
Palo Alto Networks URL Filtering with PAN-DB is an advanced URL filtering solution that provides a way to control web access, as well as how users interact with online content. With this solution, your organization can prevent credential phishing theft by assuming strict control over which sites users can enter their corporate credentials into. Palo Alto Networks Advanced URL Filtering with PAN-DB provides web protection by using URL database capabilities to help you automatically detect and prevent new malicious and targeted web-based threats instantly.
Palo Alto Networks URL Filtering with PAN-DB Features
Palo Alto Networks URL Filtering with PAN-DB has many valuable key features. Some of the most useful ones include:
Palo Alto Networks URL Filtering with PAN-DB Benefits
There are many benefits to implementing Palo Alto Networks URL Filtering with PAN-DB. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Below are some reviews and helpful feedback written by PeerSpot users currently using the Palo Alto Networks URL Filtering with PAN-DB solution.
Consultant Michael V. says, “What I really like about PAN and what makes it a worthwhile solution is that rather than having an administrator constantly updating a list of prohibited URLs, you can do it by categories. Every one of these URLs gets meta-tagged as hate speech or antisemitic or pornography, or whatever it is, and when you set up the filter everything that's prohibited by HR policy is there. I don't have to maintain anything, it catches everything.”
PeerSpot user Darshil S., Consultant at a tech services company, mentions, “The multiple categorizations of URLs are quite helpful. For example, if a URL is a social media website, such as facebook.com, it can be classified at a certain risk level - from high to low.”
Karthikeyan S., Sr. Cloud Data Architect at Sun Cloud LLC, explains, "Palo Alto Networks URL Filtering with PAN-DB is easy to use, easy to operate, and easy to edit."
Parsing hundreds of trivial alerts. Managing a mountain of data. Manually forwarding info from your endpoints. Forget that. InsightIDR instantly arms you with the insight you need to make better decisions across the incident detection and response lifecycle, faster.
Trend Micro Deep Discovery provides an intuitive interface and extensive threat visibility. It enhances detection with sandboxing and custom virtual machine images. Integration with Trend Micro Office Scan and Vision One ensures robust defense and detailed threat analysis.
Trend Micro Deep Discovery is a comprehensive network security tool used for intrusion detection, malware analysis, and zero-day vulnerability sandboxing. It supports various platforms and can be integrated with email and server protection. It's particularly useful for compliance with regulatory requirements through signature-based behavior analysis and virtual patching. Users benefit from easy installation, management, and responsive technical support.
What are the key features of Trend Micro Deep Discovery?Trend Micro Deep Discovery is implemented across sectors requiring stringent security measures, such as finance, healthcare, and government. It's favored for its ability to analyze diverse network traffic and provide exceptional protection against sophisticated threats while ensuring compliance with strict data regulations. Industry reviews highlight its role in safeguarding sensitive information through robust security frameworks and adaptable deployment options.