2019-02-03T08:25:00Z

What needs improvement with Palo Alto Networks URL Filtering with PAN-DB?

Julia Miller - PeerSpot reviewer
  • 1
  • 18
PeerSpot user
7

7 Answers

Remy Ma - PeerSpot reviewer
Real User
Top 5
2023-02-09T04:32:34Z
Feb 9, 2023

URL Filtering with Palo Alto Networks PAN-DB can help you protect your networks and users from malicious URLs, but it's not perfect. For starters, the database needs to be constantly updated to accurately identify new threats. Additionally, its categorization of websites is sometimes too broad or specific for organizations' needs. Finally, many features like granular controls and multi-category assignments are only available with paid licenses. With all these limitations, it's clear that Palo Alto Networks' URL Filtering could use some improvement. But thankfully, the company is continually striving to improve its offerings to keep networks secure from malicious URLs.

URL Filtering with Palo Alto Networks PAN-DB can help you protect your networks and users from malicious URLs, but it's not perfect. For starters, the database needs to be constantly updated to accurately identify new threats. Additionally, its categorization of websites is sometimes too broad or specific for organizations' needs. Finally, many features like granular controls and multi-category assignments are only available with paid licenses. With all these limitations, it's clear that Palo Alto Networks' URL Filtering could use some improvement. But thankfully, the company is continually striving to improve its offerings to keep networks secure from malicious URLs.

Search for a product comparison
NV
Real User
2021-12-17T17:58:00Z
Dec 17, 2021

An area for improvement would be the technical support, which can be slow.

KS
Real User
2021-09-07T20:59:18Z
Sep 7, 2021

We have been trying make Palo Alto Networks URL Filtering with PAN-DB work with ELK stack. We have had some challenges with that because we are getting limited SNMP. It would be good if it worked better with ELK stack. I'm only able to do it faster when I log into the device and not through Panorama.

MV
Consultant
Top 20
2021-08-06T20:35:13Z
Aug 6, 2021

One of the less favorite features is the cost of the solution. For example, ~5K for a PA-820 AND ~$1K EACH *per year* for Premium Support, Threat Prevention, and PANDB URL filtering. We also implement other solutions. We tell customers that if they want to have the best possible perimeter security, they're going to have to pay for it. Some smaller entities don't have the budget for it, so we'll suggest Fortinet or something that has similar but inferior capabilities, but is less expensive.

DS
Reseller
2021-06-05T10:04:26Z
Jun 5, 2021

It would be ideal if this solution could be a separate product rather than have to have it deploy through a firewall. If it was a separate product, many of our customers would be happier as most just require a URL filtering option. They do not require a firewall. They do not require any threat prevention or anything. If it was a separate product, we could deploy it to branch offices or any of our customer locations in which different firewalls are being used. The solution is a bit expensive.

CS
Real User
2019-02-12T10:09:00Z
Feb 12, 2019

Performance monitoring could use improvement.

Find out what your peers are saying about Palo Alto Networks, Check Point Software Technologies, Fortinet and others in Intrusion Detection and Prevention Software (IDPS). Updated: March 2024.
765,386 professionals have used our research since 2012.
AA
Real User
2019-02-03T08:25:00Z
Feb 3, 2019

One way Palo Alto can improve is by offering sandboxing. I don't know if they currently offer a sandboxing feature together with the firewall or not. They should provide secure sandboxing with the firewalls.

Intrusion Detection and Prevention Software (IDPS)
What Is an Intrusion Detection System? Intrusion detection systems (IDSes) analyze network traffic for signatures of known attackers. The systems can be hardware devices or software solutions. An IDS can mitigate existing malware, such as backdoors, rootkits, and trojans.The goal of an intrusion detection system is to detect an attack as it occurs. The system starts by analyzing inbound and outbound network traffic for signs of known attackers. Some activities an IDS performs...
Download Intrusion Detection and Prevention Software (IDPS) ReportRead more