We performed a comparison between Palo Alto Networks WildFire, Trellix Network Detection and Response, and Zscaler Internet Access based on real PeerSpot user reviews.
Find out what your peers are saying about Microsoft, Palo Alto Networks, Fortinet and others in Advanced Threat Protection (ATP)."The most valuable feature is the cloud-based protection against zero-day malware attacks."
"It catches modified signatures of known viruses."
"They have many different options with Palo Alto WildFire and the set-up is quick. If you have all the details in hand, it does not take more than 15 minutes to deploy a firewall."
"It is the best device in comparison to other network products in the marketplace."
"The solution is scalable."
"For example, if a security Intel threat talks about an IOC. We can then go to our MSP and say, "Is there a signature for this particular type of malware that just came out?" And if they'll say yes, then we'll say, "Okay. Does it apply to these firewalls? And have we seen any hits on it?" There's absolutely value in it."
"I give the initial setup an eight out of ten."
"We have found that Palo Alto Networks WildFire is scalable. We currently have six thousand users for the product."
"The features that I find most valuable are the MIR (Mandiant Incident Response) for checks on our inbound security."
"The scalability has not been a problem. We have deployed the product in very high bandwidth networks. We have never had a problem with the FireEye product causing latency issues within our networks."
"It protects from signature-based attacks and signature-less attacks. The sandboxing technology, invented by FireEye, is very valuable. Our customers go for FireEye because of the sandboxing feature. When there is a threat or any malicious activity with a signature, it can be blocked by IPS. However, attacks that do not have any signatures and are very new can only be blocked by using the sandboxing feature, which is available only in FireEye. So, FireEye has both engines. It has an IPS engine and a sandbox engine, which is the best part. You can get complete network protection by using FireEye."
"Its ability to find zero-day threats, malware and anything malicious has greatly improved my customer's organization, especially for protecting the users' browser."
"The server appliance is good."
"The MVX Engine seems to be very capable against threats and the way it handles APTs is impressive."
"The most valuable feature is MVX, which tests all of the files that have been received in an email."
"We wanted to cross-reference that activity with the network traffic just to be sure there was no lateral movement. With Trellix, we easily confirmed that there was no lateral network involvement and that nothing else was infected. It helped us correlate the events and feel confident in our containment."
"The most valuable feature of the solution is SWG traffic."
"The solution is scalable and stable."
"Zscaler excels in security protection and the cloud is always up-to-date. It does not matter if you are a small or big organisation, you will receive the same security quality."
"Zscaler covers all the features needed to replace a VPN or proxy solution. They are good. They've been on the market for 15 years now, so they are mature enough."
"One feature that is valuable to me from an implementation point of view is that it's very easy to implement."
"After a proper implementation, the maintenance is very low."
"Zscaler Internet Access protects using data loss prevention. If you have a CASB exposing your cloud out into the network, then Zscaler Internet Access will go ahead and control that unknown cloud application in the CASB, protecting it. There is also data detection with exact data match. This improves the data coming into your cloud so you are protecting it."
"All internet access flows through the Zscaler proxy, regardless of whether people are in office or remote. I have greater control site access and I minimize the number of compromises that we experience to almost none."
"The free version does not have real-time updates. It is slow."
"The initial setup was complex."
"The cost of this solution could still be improved, in particular, giving product discounts for charitable causes."
"When comparing this solution to others it is not as good overall."
"The deployment model could be better."
"Any enhancements should likely be focused on the firewall appliance to further strengthen overall security capabilities, such as refining app and user identity features."
"I think it would be nice for Palo Alto to work without the connection to the cloud. It is 100% powerful when connected to the cloud. But, if you disconnect from the cloud, you only get 40-50% power."
"The data analytical system for deployment needs to improve."
"It would be a good idea if we could get an option to block based upon the content of an email, or the content of a file attachment."
"As far as future inclusions, it would be useful to display more threat intelligence, such as the actual area of the threat and the origin of the web crawling (Tor and Dark Web)."
"Improvements could be achieved through greater integration capabilities with different firewall solutions. Integrating with the dashboard itself for different firewalls so users can also pull tags into their firewall dashboard."
"Stability issues manifested in terms of throughput maximization."
"Technical support could be improved."
"If you want to search the hashes in the environment, you need to put in IOCs one by one, making it a very hectic job."
"Technical packaging could be improved."
"The product's integration capabilities are an area of concern where improvements are required."
"Do not expect to pay for the service and start using it, like Gmail. Zscaler requires a proper implementation to be done to make it successful."
"The reporting functionality could be a bit easier to use. There is a reporting function, but it's quite hard to do any good reporting, from a user-management perspective. For example, if a department manager wants to know how his department is using the web, there is a way to get the data, but it's quite cumbersome to get it and show it well. And that's true for comparing between departments."
"The price of the solution could be improved."
"Technical support could be better."
"The main issue with Zscaler Internet Access is proxy IP detection, which sometimes makes sites inaccessible."
"In terms of user experience, it could be better."
"We'd like to have more plugins and integration."
"If they can also integrate with the multi-factor authentication to prompt users to do another, second-factor authentication, that would be ideal."
More Trellix Network Detection and Response Pricing and Cost Advice →