Palo Alto Networks AutoFocus

AutoFocus contextual threat intelligence service accelerates analysis, correlation and prevention workflows. Unique, targeted attacks are automatically prioritized with full context, allowing security teams to respond to critical attacks faster, without additional IT security resources.

Languages supported:

8.6/10 (Expert Score) ★★★★★
Product is rated as #31 in category Threat Intelligence Software
Ease of use
Support
Ease of Setup

AutoFocus contextual threat intelligence service accelerates analysis, correlation and prevention workflows. Unique, targeted attacks are automatically prioritized with full context, allowing security teams to respond to critical attacks faster, without additional IT security resources.

Palo Alto Networks AutoFocus
Palo Alto Networks AutoFocus

Show more categories

Customer Reviews

Palo Alto Networks AutoFocus Reviews

User in Information Technology and Services

Advanced user of Palo Alto Networks AutoFocus
★★★★★
Great Identification Tool

What do you like best?

Palo Alto Networks AutoFocus is incredibly while suited for empowering companies and customers to identify and prevent targeted attacks on a a network. I really like the Dashboard, which provides advanced statistical breakdowns on pretty much every facet of the network, including DNS, downloads, requests, applications, and even maps.

What do you dislike?

It is hard to dislike this software because it provides for pretty much every use-case I have. The user interface could be a little bit better in terms of UX, but it is a beautiful dashboard. The tool really allows you to see things at a surface level and then dig deeper as necessary.

Recommendations to others considering the product:

This is an incredibly complete solution by a company that provides for the likes of Microsoft. You can trust this solution and its quality to deliver, even at companies with 10,000+ employees.

What problems are you solving with the product? What benefits have you realized?

Prevention of Malware/targeted attacks on a network. Threat/Risk removal from our business and our business intelligence.

Review source: G2.com

Leave a reply

Your total score

B2B Software Guide