2019-02-03T08:25:00Z

What advice do you have for others considering Palo Alto Networks URL Filtering with PAN-DB?

Miriam Tover - PeerSpot reviewer
  • 0
  • 0
PeerSpot user
6

6 Answers

NV
Real User
2021-12-17T17:58:00Z
Dec 17, 2021

I would rate this solution as eight out of ten.

Search for a product comparison
KS
Real User
2021-09-07T20:59:18Z
Sep 7, 2021

I would rate this solution at eight on a scale from one to ten.

MV
Consultant
Top 20
2021-08-06T20:35:13Z
Aug 6, 2021

The web is going towards everything HTTPS which means you can't see inside it anymore. PAN does the SSL decryption about as painlessly as it can be done. There's still a lot of unique use cases with the chain of trust and there's a balancing act as to what should be blocked. Our executive clients want to know what's going on but since everything's encrypted, you have to figure out how it works and how aggressive you want to get about it. I rate this solution a nine (9) out of ten (10).

DS
Reseller
2021-06-05T10:04:26Z
Jun 5, 2021

We're Palo Alto partners. There isn't an exact version number associated with the product. It's a SaaS. I'd recommend the solution to other users and companies. I'd rate the product at a ten out of ten.

CS
Real User
2019-02-12T10:09:00Z
Feb 12, 2019

Demo this first and then other competitors and you'll quickly see what's the right fit and which is the superior product. I would rate this solution a ten out of ten.

AA
Real User
2019-02-03T08:25:00Z
Feb 3, 2019

I would recommend using this solution as an enterprise-class security, including a firewall and protection for Microsoft Edge. This solution can also be used as a data center or file storage tool for workloads (small or large). I would rate this tool as a 7 out of 10.

Find out what your peers are saying about Palo Alto Networks, Check Point Software Technologies, Fortinet and others in Intrusion Detection and Prevention Software (IDPS). Updated: March 2024.
765,386 professionals have used our research since 2012.
Intrusion Detection and Prevention Software (IDPS)
What Is an Intrusion Detection System? Intrusion detection systems (IDSes) analyze network traffic for signatures of known attackers. The systems can be hardware devices or software solutions. An IDS can mitigate existing malware, such as backdoors, rootkits, and trojans.The goal of an intrusion detection system is to detect an attack as it occurs. The system starts by analyzing inbound and outbound network traffic for signs of known attackers. Some activities an IDS performs...
Download Intrusion Detection and Prevention Software (IDPS) ReportRead more