PALO ALTO WILDFIRE SUB F/DEV 3Y
Mfg.Part: PAN-PA-5050-WF-3YR-HA2 | CDW Part: 3107191
Lease Option ($866.67/month)
Note: Leasing is available to organizations only. Leasing is not available to individuals.
PALO ALTO WILDFIRE SUB F/DEV 3Y
PALO ALTO WILDFIRE SUB F/DEV 3Y is rated out of 5 by 7.
Rated 4 out of 5 by Brent Addis from Was instrumental in blocking new threats before other anti-virus tools were able to detect them. Valuable Features:Dynamic analysis.Improvements to My Organization:WildFire has been instrumental in blocking a number of new threats, before common desktop anti-virus tools were able to detect them. When Wannacry first came out, wildfire was detecting it and dropping incoming threats within seconds. We were dropping over 10,000 files per day with no additional firewall load at all.Room for Improvement:I am very happy with WildFire and can see no obvious areas of improvement at this point.Use of Solution:We have been using this solution for over four years.Deployment Issues:There were no issues with deployment. The configuration is very simple.Stability Issues:This product is rock solid in terms of stability.Scalability Issues:There were no problems with scalability. We have rolled out more firewalls to clients, and no scalability issues were found.Technical Support:Technical support is fine. We have never needed to contact them regarding WildFire.Previous Solutions:We previously used Fortinet. However, we found it to miss a lot of incoming viruses, because at the time, they had no sandbox style service.Initial Setup:The setup was very easy. Simply license the feature and enable it within your scanning profiles.Implementation Team:This feature is implemented in-house.ROI:As soon as it began dropping incoming threats, measured in days, that desktop scanners could not find, it hit its ROI.Cost and Licensing Advice:It's not particularly cheap, but it is absolutely worth it.Other Solutions Considered:We evaluated Fortinet and Cisco.Other Advice:Do it.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2017-09-11
Rated 5 out of 5 by Azadur Sarker from The IDA and IPS system filtering provide an enhancing network and endpoint security for the client. Valuable Features:The most valuable features are:* High availability with active-active and active-passive modes.* Redundant power input for increased reliability.* Fan-less design.Improvements to My Organization:It provides the enhancing network and endpoint security for the client through its IDA and IPS system filtering.Room for Improvement:The data analytical system for deployment needs to improve.Use of Solution:We have been selling this solution to clients since the last 9 months as a vendor specialist.Technical Support:Technical support is excellent, I would rate it a 10/10.Initial Setup:It is quite easy to set up.Pricing, Setup Cost and Licensing:The pricing and licensing option should be categorized for various countries such as for Bangladesh.Other Solutions Considered:We looked at Forcepoint NGFW.Other Advice:Technical support is excellent and it is a promising option.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2017-07-19
Rated 5 out of 5 by LuisFuentes from Provides credential-based attack prevention. Valuable Features:* App-ID* Easy migration* Credential-based attack prevention* PBF easily configured* Whole team can use the firewall and understand itImprovements to My Organization:* Much more visibility during an attack lifecycle; found a lot of infected hosts and vulnerabilities.Room for Improvement:The GUI is better in 8.0, but I still feel it lacks the fast response most of us desire. Logs are much quicker.Use of Solution:I have used it for five years.Deployment Issues:We have not encountered any deployment issues.Stability Issues:We have not encountered any stability issues.Scalability Issues:We have not encountered any scalability issues.Customer Service:Customer service is excellent. Their support is top-tier for sure.Technical Support:Technical support is excellent. Their support is top-tier for sure.Previous Solutions:We previously used legacy Cisco ASA. We switched because it was buggy and had no visibility; it was not easy for the rest of my team to use.Initial Setup:Initial setup was straightforward.Implementation Team:A vendor team implemented it. They were amazing.Cost and Licensing Advice:It IS a bit expensive, but I think you get what you pay for. Value is there.Other Solutions Considered:Before choosing this product, we also evaluated Check Point, Cisco, and Fortinet.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2017-05-02
Rated 4 out of 5 by Jesús Guadalupe Torres Araujo from The way that the product process or handle the traffic, is one of the best in the industry. Valuable Features:It has one of the best WebUIs that I have used, because at a glance looks simple, but offers us a lot of options to secure all the traffic that is passing through the device (or all traffic that the user decides to pass through). Besides, the way that scan the applications to detect what kind of application is do not affect anything about the device's performance. The way that the product process or handle the traffic, is one of the best in the industry.Improvements to My Organization:Well, I work as a security consultant, so one of my functions is to help and provide to the end users with recommendations about technologies or process to secure their network. So, one of my customer decide to migrate from TMG/UMG to Palo Alto, it took a while, but during this process, I showed them many ways to improve their current security with Palo Alto, and after a while, they are very comfortable with the technology, for them now, it is easier to apply some kind of web filtering or application filtering than the past.Room for Improvement:I'd like to see a wizard to create IPSec VPNs. They need to improve the graphics to show the network behavior.Deployment Issues:Deployment is easy.Stability Issues:The stability is acceptable.Scalability Issues:It depends about the project, but offers a good HA option.Other Advice:Always show to the customer what the product can do for them and what not, is a good practice, because they can open their eyes and to be sure what are the benefits of that technology. Always analyze the network topology, using the customer's network diagram and ask every doubt that you have, for my experience a good analysis and deployment plan give us a successful implementation.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-03-27
Rated 4 out of 5 by Zekai Tekin from Palo Alto is an easy to manage firewall. Palo Alto is an easy to manage firewall. It connects successfully in AD and LADP for user based policy. It has rich application info for app.based policies and it gives enough IDS performance. New policy compile is speedy.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2016-02-22
Rated 4 out of 5 by Christopher Butler from A custom script is required to put the SSL Decryption certificate into Mozilla Firefox but it is a very comprehensive and secure firewall. Valuable Features:User identification and the Applipedia are the most useful. The integration of the Applipedia with the application identification at layer seven makes it a very comprehensive, and secure, firewall.Improvements to My Organization:We have the ability to see what traffic is coming and going in a much deeper and more detailed fashion. We have also found, and stopped, several malware applications before they infected the endpoints.Use of Solution:I've used it for five months.Deployment Issues:During initial testing we were too strict on what was allowed outbound. We ended up needing to open up more broad categories. We also found that several websites do not function well with the SSL Decryption feature. We also found that a custom script is required to put the SSL Decryption certificate into Mozilla Firefox.Stability Issues:No the product has been very stable and reliable.Scalability Issues:We implemented it in a smaller environment but, find that the 3000 series has plenty of power and has the ability to grow with us as we provide north-south as well as east-west security between internal environments.Customer Service:Customer service is very friendly and responsive to any request.Technical Support:I have found the tech support to be impressive. Support agents are available 24/7, and I have never waited for more than an hour to speak with an agent. I would consider the first team you call to be equivalent to most level two or three engineers.Previous Solutions:Previously we used Cisco ASA 5510 and Fortinet. Fortinet was an old version and was phased out due to this. The Cisco ASA was replaced do to the limited capability of the out of box functionality and reporting.Initial Setup:Initial set-up was straightforward and easy. We were able to get both devices on the network and set-up to look at traffic within a few hours on split up time. The products complexity came from the terms and the overall thinking of how the product works.Implementation Team:We did it in-house.Other Solutions Considered:Before choosing Palo Alto we also reviewed Cisco ASA, Fortinet, and Sophos.Other Advice:The product is straightforward to implement, though if you are looking for a quick implementation, I would suggest bringing in an expert.Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2015-04-13
Rated 2 out of 5 by Eric McWilliams from The deployment of Wildfire was surprisingly easy but inspection over different protocols needs to be improved. Valuable Features:Being able to discover malicious files unknown to most AV vendors.Improvements to My Organization:It has allowed me to stop new attacks before they could gain a foothold in my network.Room for Improvement:* Inspection over different protocols (not just HTTP/FTP)* Inspecting more file types* Providing information back to the community that it uses to support its product.Use of Solution:I've used it for three years. However, my current company isn't using the product. I took a different engineering route into the company and I decided to use other protection solutions and not Wildfire.Deployment Issues:The deployment of Wildfire was surprisingly easy.Stability Issues:Wildfire itself was a very stable product.Scalability Issues:I never had any issues with scalability. When I enabled it, it seemed to work in the environment that the firewall was already servicing.Customer Service:Great when I was at a large company but average or less than average at a small company.Technical Support:Overall their support people are better than most tech companies.Previous Solutions:There was no solution in this space before Wildfire. Both FireEye and Wildfire came onto the market right around the same time.Initial Setup:It was straightforward as I could, literally, turn on the firewall settings in five minutes or less.Implementation Team:You really don't need to pay to turn it on. The configuration is very simple.ROI:There are two levels of Wildfire.* The free version which is great, so I would guess there is no ROI on this version* Then there is the subscription version of the service and this is a very affordable yearly subscription per firewallCost and Licensing Advice:Initially, the product doesn't cost anything for the first tier of usage you can prove the product before buying it.Other Solutions Considered:* FireEye* Blue Coat* ProofPoint.* Even as the more the list of products I look at each year is pretty long.Other Advice:If you're running Palo Alto firewalls there is no reason not to use it at the free level. Once you have run it for a while at the basic level, you can make an educated decision if it's worth paying for the subscription (it is).Disclaimer: I am a real user, and this review is based on my own experience and opinions.
Date published: 2015-03-31