IT Central Station is now PeerSpot: Here's why
2019-03-03T11:18:00Z

What needs improvement with Palo Alto Networks Threat Prevention?

Miriam Tover - PeerSpot reviewer
Service Delivery Manager at PeerSpot (formerly IT Central Station)
25

Please share with the community what you think needs improvement with Palo Alto Networks Threat Prevention.

What are its weaknesses? What would you like to see changed in a future version?

PeerSpot user
Guest
1212 Answers

Leandro Soares Costa - PeerSpot reviewer
Top 5Real User

The initial setup is complex. We'd like more APIs to manage programmatically the IPS to orchestrate it and avoid logging into the graphical user interface console. We'd like to have some robots to manage the solution's tasks.

2022-05-19T10:46:42Z
Marhaendy . - PeerSpot reviewer
Top 5Real User

The resource consumption should be addressed. The technology firewall anomaly network could stand improvement. The pricing could be better.

2021-08-13T08:48:54Z
reviewer1248363 - PeerSpot reviewer
Real User

We use four Palo Alto solutions in stand-alone mode and but it's hard to use when I use it in Panorama. Palo Alto's maintenance needs to be improved.

2020-03-30T07:58:00Z
reviewer1298478 - PeerSpot reviewer
Real User

The documentation needs to be improved. I need better information about how to configure it and what the best practices are.

2020-03-29T08:27:00Z
Samuel-Akindele - PeerSpot reviewer
Consultant

The solution needs to improve Reverse DNS functionalities. Right now, when you check the IP address, it tells all. It assumes that that IP address is locally available on the inside. When the request is going back to me it's supposed to do what we call rights. Instead of giving me the public IP address in my response, it's supposed to give me the private IP address or the local IP address so that I can reach the device locally. That's the challenge right now. Sometimes when you want to group a set of ports, and communicate with Palo Alto, you cannot group TCP and UDP ports together. This needs to be adjusted.

2019-10-06T16:38:00Z
reviewer1148964 - PeerSpot reviewer
Top 5Real User

The price of licenses should be lowered to make it less costly to scale our solution. I would like to see consolidated licensing for on-premises solutions. This would give us all of the features available for the one box.

2019-09-29T07:27:00Z
ThineshSiva - PeerSpot reviewer
MSP

I think they can use some improvement on FID. There are lots of false positives and those can be eradicated. Sometimes you can't identify a 10-year-old doc, but they can probably update those signatures and false positives, so it would be helpful and save us a lot of time.

2019-09-29T07:27:00Z
Vishal Goorye - PeerSpot reviewer
Real User

The IPS can be improved on the solution. The itineration, for example. Also, if additional features, like SD Wan, etc. can be added. This would be helpful. Other additional features that could be added include Individual Traps. In terms of enhancement for overall protection, we would like more Traps or other solutions that are developing within the firewall. The solution needs to improve its local technical support services. There is no premium support offered in our market.

2019-09-08T09:50:00Z
Consulti678 - PeerSpot reviewer
Consultant

It's not so easy to set up a test environment because it's not so easy to get the test license. The vendor only gives you 90 days for a test license; it's a tough license to get.

2019-09-03T08:57:00Z
it_user810594 - PeerSpot reviewer
Real User

The organization mail security solutions could be improved. There is no mail security solution available.

2019-04-11T10:03:00Z
SHAIKAHMED - PeerSpot reviewer
Real User

In most areas, Palo Alto Threat Prevention is a fine choice. The application is very good. The most important feature we find to be the NCR Reader. It is best for application security. I don't know how they could improve it more. The application is already working fine with good results. Support is really good with Palo Alto and we are resellers of the software to our customers. They will let us know how they find it valuable after we implement it. Most of our customers have found Palo Alto Threat Prevention very good to use. We have a number of customers in the market. Everybody is happy with the product. Overall, Palo Alto Threat Prevention doesn't need much more. From a general point of view, you get everything. If it is content filtering, it should be no problem.

2019-04-11T10:03:00Z
Ang Sokroeurn - PeerSpot reviewer
Real User

Right now we are focusing on email. If Palo Alto can increase the features related to email filtering and the new malware, it would help us protect our systems.

2019-03-03T11:18:00Z
Buyer's Guide
Intrusion Detection and Prevention Software (IDPS)
July 2022
Find out what your peers are saying about Palo Alto Networks, Darktrace, Trend Micro and others in Intrusion Detection and Prevention Software (IDPS). Updated: July 2022.
621,327 professionals have used our research since 2012.