Palo Alto Networks Threat Prevention

Threats do not discriminate between application delivery vectors, requiring an approach that has full visibility into all application traffic, including SSL encrypted content, with full user context. Threat Prevention leverages the visibility of our next-generation firewall to inspect all traffic, automatically preventing known threats, regardless of port, protocol or SSL encryption.

Languages supported:

10.0/10 (Expert Score) ★★★★★
Product is rated as #2 in category Intrusion Detection and Prevention Systems (IDPS)
Ease of use
Support
Ease of Setup

Threats do not discriminate between application delivery vectors, requiring an approach that has full visibility into all application traffic, including SSL encrypted content, with full user context. Threat Prevention leverages the visibility of our next-generation firewall to inspect all traffic, automatically preventing known threats, regardless of port, protocol or SSL encryption.

Palo Alto Networks Threat Prevention
Palo Alto Networks Threat Prevention

Show more categories

Customer Reviews

Palo Alto Networks Threat Prevention Reviews

Consultant in Oil & Energy

Advanced user of Palo Alto Networks Threat Prevention
★★★★★
PANOS Threat Prevention Benefits

What do you like best?

I like the PANOS Threat Prevention service provided in Palo Alto Firewalls which are very easy to configure and use.

Updates are really very quick and there is no need of manual intervention require and excellent protection from zero day threats

What do you dislike?

As of now there is nothing to dislike. Features are up to date

Recommendations to others considering the product:

Palo Alto Threat Prevention Feature is world class technique to deploy in any organization that prevent all components of network risk free and away from threats and worms

What problems are you solving with the product? What benefits have you realized?

Problems and issues related to threats and worms either inside or outside in organization are perfectly controlled and prevented using this feature.

After using this feature , we observe that things are stable and no suspicious behaviour in our network

Review source: G2.com

Leave a reply

Your total score

B2B Software Guide