4.6
3432 Reviews (All time)
Review weighting

Browse Palo Alto Networks Reviews

Palo Alto Networks is present in 21 markets with 28 products. Palo Alto Networks has 3432 reviews with an overall average rating of 4.6.

Cloud Security Posture Management Tools

Cloud security posture management tools help in the identification and remediation of risks across cloud infrastructures, including Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). These tools continuously assess the security posture across multi-cloud environments by maintaining a current inventory of the cloud assets for proactive analysis and risk assessment to detect any misconfigurations. Once these misconfigurations are identified, security controls are developed and implemented. CSPM solutions also integrate with DevOps tools, streamlining the incident response process and ensuring continuous compliance with regulatory requirements and security frameworks by providing visibility of the cloud environment’s security posture.

Palo Alto Networks has 1 product in Cloud Security Posture Management Tools market

Cloud-Native Application Protection Platforms

Cloud-native application protection platforms (CNAPPs) are a unified and tightly integrated set of security and compliance capabilities designed to secure and protect cloud-native applications across development and production. CNAPPs consolidate a large number of previously siloed capabilities, including container scanning, cloud security posture management, infrastructure as code scanning, cloud infrastructure entitlement management, runtime cloud workload protection and runtime vulnerability/configuration scanning.

Palo Alto Networks has 1 product in Cloud-Native Application Protection Platforms market

Digital Experience Monitoring

DEM technologies monitor the availability, performance and quality of an end-user experience when using a Cloud, SaaS or web application. This can include employees such as users accessing their intranet or corporate CRM website and customers such as customers of a retail website. DEM technologies seek to observe and model users’ behavior as a continuous flow of interactions in the form of user journeys.

Palo Alto Networks has 2 products in Digital Experience Monitoring market

Endpoint Detection and Response Solutions

The Endpoint Detection and Response Solutions (EDR) market is defined as solutions that record and store endpoint-system-level behaviors, use various data analytics techniques to detect suspicious system behavior, provide contextual information, block malicious activity, and provide remediation suggestions to restore affected systems. EDR solutions must provide the following four primary capabilities: • Detect security incidents • Contain the incident at the endpoint • Investigate security incidents • Provide remediation guidance

Palo Alto Networks has 1 product in Endpoint Detection and Response Solutions market

Endpoint Protection Platforms

cca-logo

Gartner defines an endpoint protection platform (EPP) as security software designed to protect managed end-user endpoints — including desktop PCs, laptop PCs, and mobile devices — against known and unknown malicious attacks. Additionally, EPPs provide capabilities for security teams to investigate and remediate incidents that evade prevention controls. EPP products are delivered as software agents deployed to endpoints and connected to centralized security analytics and management interfaces.

Palo Alto Networks has 1 product in Endpoint Protection Platforms market

Extended Detection and Response

Extended detection and response (XDR) delivers security incident detection and automated response capabilities for security infrastructure. XDR integrates threat intelligence and telemetry data from multiple sources with security analytics to provide contextualization and correlation of security alerts. XDR must include native sensors, and can be delivered on-premises or as a SaaS offering. Typically, it is deployed by organizations with smaller security teams.

Palo Alto Networks has 1 product in Extended Detection and Response market

External Attack Surface Management

External Attack Surface Management (EASM) refers to the processes, technology and managed services deployed to discover internet-facing enterprise assets and systems and associated exposures which include misconfigured public cloud services and servers, exposed enterprise data such as credentials and third-party partner software code vulnerabilities that could be exploited by adversaries. EASM provides valuable risk prioritization and context and actionable information through regular or continuously monitoring and discovery for external-facing assets and systems. External attack surface management is a top priority for security teams and security risk managers.

Palo Alto Networks has 1 product in External Attack Surface Management market

Intrusion Detection and Prevention Systems

The network intrusion detection and prevention system (IDPS) appliance market is composed of stand-alone physical and virtual appliances that inspect defined network traffic either on-premises or in the cloud. They are often located in the network to inspect traffic that has passed through perimeter security devices, such as firewalls, secure Web gateways and secure email gateways. IDPS devices are deployed in-line and perform full-stream reassembly of network traffic. They provide detection via several methods — for example, signatures, protocol anomaly detection, behavioral monitoring or heuristics, advanced threat defense (ATD) integration, and threat intelligence (TI). When deployed in-line, IDPSs can also use various techniques to detect and block attacks that are identified with high confidence; this is one of the primary benefits of this technology. Next-generation IDPSs have evolved in response to advanced targeted threats that can evade first-generation IDPSs.

Palo Alto Networks has 1 product in Intrusion Detection and Prevention Systems market

IoT Security

The amount of information being transmitted from things continues to rise. Much of this data originates outside of the enterprise. The scale of security risks in the Internet of Things (IoT) era is therefore much greater than in the pre-IoT environment, and the 'attack surface' is much larger. Most sensor-based things have minimal computing resources, and the opportunities for antivirus, encryption and other forms of protection within things are more restricted. Therefore, IoT security products with a variety of capabilities emerged to help dispel some of these challenges.

Palo Alto Networks has 1 product in IoT Security market

Managed Detection and Response Services

Managed detection and response (MDR) services provide customers with remotely delivered security operations center (SOC) functions. These functions allow organizations to rapidly detect, analyze, investigate and actively respond through threat disruption and containment. They offer a turnkey experience, using a predefined technology stack that commonly covers endpoint, network, logs and cloud. Telemetry is analyzed within the provider’s platform using a range of techniques. This process allows for investigation by experts skilled in threat hunting and incident management, who deliver outcomes that businesses can act upon.

Palo Alto Networks has 1 product in Managed Detection and Response Services market

Microsegmentation

Gartner defines microsegmentation as the ability to insert a security policy into the access layer between any two workloads in the same extended data center. Microsegmentation technologies enable the definition of fine-grained network zones, down to individual assets and applications. Core capabilities include: - Flow mapping, which is the ability to gather and show North/South and East/West traffic flows and use them in the policy definition (it can present this data in a visual manner) - Workload isolation, which is isolation from other workloads based on security policy - Policy enforcement, including the definition of rules based on different factors - The ability to deploy in the virtualized and infrastructure as a service environments Some of the most frequent optional capabilities of microsegmentation technologies include: - Automation of the deployment as part of a continuous integration/continuous deployment (CI/CD) pipeline - Integration with cloud infrastructure to ease deployment, enforce rules or automate policy updates when new assets are deployed - Asset discovery: adjacent to the flow mapping, microsegmentation tools can show more advanced context for the assets - Policy recommendation engine: complementary to the asset discovery, microsegmentation technology can suggest policy rules to authorize discovered flows - Threat detection: based on threat intelligence, layer seven protocol inspection and anomaly detection - Interoperability through direct integration with third-party products, such as a firewall, and hardware, such as switches and routers - Internet of Things (IoT)/operational technology (OT) coverage — the solution supports microsegmentation for IoT/OT infrastructure - Kubernetes/Container coverage — the solution supports microsegmentation for containers/K8s

Palo Alto Networks has 1 product in Microsegmentation market

Mobile Threat Defense

cca-logo

Mobile threat defense (MTD) products protect organizations from threats on iOS and Android devices. MTD products protect at the device, network and application levels and focus on countering malicious actions.

Palo Alto Networks has 1 product in Mobile Threat Defense market

Network Firewalls

Gartner defines the network firewall market as the market for firewalls that use bidirectional stateful traffic inspection (for both egress and ingress) to secure networks. Network firewalls are enforced through hardware, virtual appliances and cloud-native controls. Network firewalls are used to secure networks. These can be on-premises, hybrid (on-premises and cloud), public cloud or private cloud networks. Network firewall products support different deployment use cases, such as for perimeters, midsize enterprises, data centers, clouds, cloud-native and distributed offices.

Palo Alto Networks has 4 products in Network Firewalls market

Operational Technology Security

Gartner defines operational technology (OT) as “hardware and software that detects or causes a change, through direct monitoring and/or control of industrial equipment, assets, processes and events”. OT security includes practices and technologies used to protect them, but these practices and technologies are now evolving into distinct categories to address the growing threats, security practices and vendor dynamics.

Palo Alto Networks has 1 product in Operational Technology Security market

SD-WAN

Gartner defines SD-WAN offerings as primarily used to connect branch locations to other enterprise and cloud locations. SD-WAN products provide dynamic path selection, based on business or application policy, routing, centralized orchestration of policy and management of appliances, virtual private network (VPN) and zero-touch configuration. SD-WAN products are WAN transport/carrier-agnostic and create secure paths across physical WAN connections. SD-WAN products replace traditional branch routers and enable connectivity between enterprise branch locations as well as the cloud. They facilitate WAN connectivity’s evolution from Multiprotocol Label Switching (MPLS)-centric to public internet-centric to support enterprise traffic shifts from private data centers to public cloud and SaaS.

Palo Alto Networks has 2 products in SD-WAN market

Security Orchestration, Automation and Response Solutions

Security orchestration, automation and response (SOAR) solutions combine incident response, orchestration and automation, and threat intelligence (TI) management capabilities in a single platform. SOAR tools are also used to document and implement processes (aka playbooks, workflows and processes); support security incident management; and apply machine-based assistance to human security analysts and operators. SOAR solutions must provide: - Highly customizable workflow process management that enables repeatable automated tasks to be turned into playbooks that run in isolation or joined together into more sophisticated workflows. - The ability to store (locally or in a third-party system) incident management data to support SecOps investigations. - Manually instigated and automated triggers that augment human security analyst operators to carry out operational tasks consistently. - A mechanism to collate and better operationalize the use of threat intelligence. - Support for a broad range of existing security technologies that supports improved analyst efficiency and acts as an abstraction layer between the desired outcomes and the custom-made set of solutions in place in your environment.

Palo Alto Networks has 1 product in Security Orchestration, Automation and Response Solutions market

Security Service Edge

cca-logo

Gartner defines security service edge (SSE) as a solution that secures access to the web, cloud services and private applications regardless of the location of the user or the device they are using or where that application is hosted. SSE protects users from malicious and inappropriate content on the web and provides enhanced security and visibility for the SaaS and private applications accessed by end users. Security service edge provides a primarily cloud-delivered solution to control access from end users and edge devices to applications (private or delivered via SaaS) as well as websites (and to a lesser extent general internet traffic). It provides a range of security capabilities, including adaptive access based on identity and context, malware protection, data security, and threat prevention as well as the associated analytics and visibility. It enables a hybrid workforce more efficiently than traditional on-premises solutions. Capabilities that are integrated across multiple traffic types and destinations allow a more seamless experience for both users and admins while maintaining a consistent security stance.

Palo Alto Networks has 2 products in Security Service Edge market

Security Solutions - Others

Reviews for 'Security Solutions - Others'

Palo Alto Networks has 1 product in Security Solutions - Others market

Security Threat Intelligence Products and Services

TI products and services deliver knowledge, information and data about cybersecurity threats and other organization-specific threat exposures, including but not limited to indicators of compromise (IOCs), threat actor attribution and campaigns. The output of these products and services aim to provide or assist in the curation of information about the identities, motivations, characteristics and methods of threats, commonly referred to as tactics, techniques and procedures (TTPs). The intent is to enable better decision making and improve security technology capabilities to reduce risk and the chance of being compromised.

Palo Alto Networks has 1 product in Security Threat Intelligence Products and Services market

Single-Vendor SASE

Gartner defines single-vendor secure access service edge (SASE) offerings as those that deliver multiple converged-network and security-as-a-service capabilities, such as software-defined wide-area network (SD-WAN), secure web gateway (SWG), cloud access security broker (CASB), network firewalling and zero trust network access (ZTNA). These offerings use a cloud-centric architecture and are delivered by one vendor.

Palo Alto Networks has 1 product in Single-Vendor SASE market

Zero Trust Network Access

Gartner defines zero trust network access (ZTNA) as products and services that create an identity and context-based, logical-access boundary that encompasses an enterprise user and an internally hosted application or set of applications. The applications are hidden from discovery, and access is restricted via a trust broker to a collection of named entities, which limits lateral movement within a network.

Palo Alto Networks has 2 products in Zero Trust Network Access market