Top Rated Palo Alto Zero Trust Alternatives
92 Palo Alto Zero Trust Reviews
Overall Review Sentiment for Palo Alto Zero Trust
Log in to view review sentiment.

It is very helpful to handle the various operational requirements of firewalls with Palo Alto. It allows you to build shared laws which can be enforced in many proxy servers. It also utilizes software actions to spot hostility and prevent our system. As each category of firewalls has different uses, Palo Alto helps to detect if there are unidentified devices that generate unwanted traffic and what sort of traffic it is. Also, filters introduced between organizational sessions in several areas are able to remain permanent. Review collected by and hosted on G2.com.
It is very helpful to handle the various operational requirements of firewalls with Palo Alto. It allows you to build shared laws which can be enforced in many proxy servers. It also utilizes software actions to spot hostility and prevent our system. As each category of firewalls has different uses, Palo Alto helps to detect if there are unidentified devices that generate unwanted traffic and what sort of traffic it is. Also, filters introduced between organizational sessions in several areas are able to remain permanent. Review collected by and hosted on G2.com.

Palo Alto Traps is very helpful for updating the majority of the software by a single tap. The Control Panel and the ACC provide helpful data to display all firewalls or to be able to select which one we want to work with. Review collected by and hosted on G2.com.
We switch from local to the cloud variant of Traps, as in the cloud version's there were almost no training alternatives, which have changed over time. Also, sometimes the PANOS extension to the firewalls merely stops working with no particular reason. In general, I think the system does not have a big customer environment. Also, it appears to be too severe (so much that’s unnecessary) when any small threat is detected. Review collected by and hosted on G2.com.
Traps has prevented anomalous behavior in our environment a couple of times. This has saved us a lot of trouble. The management interface is intuitive and easy to comprehend. Agent impact on performance in negligible. Review collected by and hosted on G2.com.
At the moment the rollout on MacOS Cataline gave us a little headache, but as of today Traps supports Cataline. Just make sure you update Traps first to the newest version. Otherwise you have to uninstall Traps and reinstall the new version.
I don't like to way to create Agent Installations. For every new version you create a new installation "package". You should never delete it as long as machines make use of that installation.Just hide them. But it feels this could be done easier. Review collected by and hosted on G2.com.
The ability to configure it and know that it will auto update without needing regular input. Review collected by and hosted on G2.com.
If a piece of software gets updated that you have whitelisted by hash control, it can re trigger after each update. This only happens with smaller oneoff software the system hasnt seen before, Review collected by and hosted on G2.com.
that with secdo our security team is really able to be proactive and not just handle alerts in a reactive way. Because we handle alerts faster, we have time to threat hunt – based on leads, IOCs or even behavioral IOCs we created in secdo.
And because they record all endpoint activity and store it for months – we can really hunt. We can find advanced, fileless, and in-memory attacks, and go deep into suspicious activity to identify anomalies that could lead to silent threats. Review collected by and hosted on G2.com.
I am waiting for them to add some features we asked for, but other than that - none. Review collected by and hosted on G2.com.
Most EDR vendors focus on the detection and prevention part. But our security team focuses on the part of collecting endpoint information, investigating alerts, responding to threats and hunt for new ones. Secdo is one of the only vendors who focuses on solving the real problems that SOC teams are facing. We have enough alerts coming in from all of our detection and prevention systems – the problem we have is dealing with them - and SECDO is very good at that. I really recommend Review collected by and hosted on G2.com.
It’s not that I dislike, but Secdo is meant to be used by matured SOC teams. If you are a “one man show” doing security operations – Secdo is probably not for you. Review collected by and hosted on G2.com.
We're aware of some of the top EDRs - None of them gives an automation layer that would allow insight to investigate incidents and alerts automatically.
That’s a game changer for us – instead of drilling into each alert and trying to match it with the relevant endpoint data – Secdo does that automatically for us (they call the algorithm that does that ‘causality analysis engine’). Review collected by and hosted on G2.com.
Orchestration would be a great add on for such a product Review collected by and hosted on G2.com.
Their endpoint visibility capabilities. From what I’ve seen in other EDR tools, they
have 3 advantages:
Thread level visibility (all others do process level visibility)
They keep all endpoint data that they collect for a minimum of 30 days (all
the other vendors keep it up to 30 days)
They collect way more endpoint activity types then other EDRs, so they also
cover uses cases as insider threats, business risk, user activity, policy
violations, System/File attribute violations, etc.) Review collected by and hosted on G2.com.
That they don’t also have an EPP solution. Review collected by and hosted on G2.com.

I’m pleased to introduce the ELEKS new security service portfolio powered by Secdo. Secdo’s preemptive incident response platform allows slashing the incident response time from months to minutes. We are happy to use this solution in-house as well as to recommend it to our customers. This partnership brings a strong security support to our business and allows us to offer improved security services to our clients. Review collected by and hosted on G2.com.
Often we need some additional functionality (flexible reporting for instance), more visibility into agents and their hardening from the solution itself. Anyway, Secdo team is amazingly professional and we have it within days or already in the product roadmap. Review collected by and hosted on G2.com.
We have used traps for 2 years now and the 5.0 platform solves so many of the current issues. The interface is 100x better and the application protects us the way it should. Review collected by and hosted on G2.com.
My only complaint is that you still cant use the traps client as a palo alto identity source for User ID. Review collected by and hosted on G2.com.