Consultant at a tech services company with 11-50 employees
Consultant
Top 20
2021-08-06T20:35:13Z
Aug 6, 2021
The web is going towards everything HTTPS which means you can't see inside it anymore. PAN does the SSL decryption about as painlessly as it can be done. There's still a lot of unique use cases with the chain of trust and there's a balancing act as to what should be blocked. Our executive clients want to know what's going on but since everything's encrypted, you have to figure out how it works and how aggressive you want to get about it. I rate this solution a nine (9) out of ten (10).
Consultant at a tech services company with 501-1,000 employees
Reseller
2021-06-05T10:04:26Z
Jun 5, 2021
We're Palo Alto partners. There isn't an exact version number associated with the product. It's a SaaS. I'd recommend the solution to other users and companies. I'd rate the product at a ten out of ten.
Information Security Manager at a financial services firm with 501-1,000 employees
Real User
2019-02-12T10:09:00Z
Feb 12, 2019
Demo this first and then other competitors and you'll quickly see what's the right fit and which is the superior product. I would rate this solution a ten out of ten.
I would recommend using this solution as an enterprise-class security, including a firewall and protection for Microsoft Edge. This solution can also be used as a data center or file storage tool for workloads (small or large). I would rate this tool as a 7 out of 10.
Find out what your peers are saying about Palo Alto Networks, Check Point Software Technologies, Fortinet and others in Intrusion Detection and Prevention Software (IDPS). Updated: March 2024.
What Is an Intrusion Detection System? Intrusion detection systems (IDSes) analyze network traffic for signatures of known attackers. The systems can be hardware devices or software solutions. An IDS can mitigate existing malware, such as backdoors, rootkits, and trojans.The goal of an intrusion detection system is to detect an attack as it occurs. The system starts by analyzing inbound and outbound network traffic for signs of known attackers.
Some activities an IDS performs...
I would rate this solution as eight out of ten.
I would rate this solution at eight on a scale from one to ten.
The web is going towards everything HTTPS which means you can't see inside it anymore. PAN does the SSL decryption about as painlessly as it can be done. There's still a lot of unique use cases with the chain of trust and there's a balancing act as to what should be blocked. Our executive clients want to know what's going on but since everything's encrypted, you have to figure out how it works and how aggressive you want to get about it. I rate this solution a nine (9) out of ten (10).
We're Palo Alto partners. There isn't an exact version number associated with the product. It's a SaaS. I'd recommend the solution to other users and companies. I'd rate the product at a ten out of ten.
Demo this first and then other competitors and you'll quickly see what's the right fit and which is the superior product. I would rate this solution a ten out of ten.
I would recommend using this solution as an enterprise-class security, including a firewall and protection for Microsoft Edge. This solution can also be used as a data center or file storage tool for workloads (small or large). I would rate this tool as a 7 out of 10.