Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 2 Ratings

Total
ease
features
design
support

Description

In the realm of cybersecurity, speed is of the essence, and Intrusion provides you with rapid insights into the most significant threats present in your environment. You can access a live feed of all blocked connections and delve into individual entries for detailed information, including reasons for blocking and the associated risk levels. Additionally, an interactive map allows you to visualize which countries your organization interacts with most frequently. It enables you to quickly identify devices that experience the highest number of malicious connection attempts, allowing for prioritized remediation actions. Any time an IP attempts to connect, it will be visible to you. Intrusion ensures comprehensive, bidirectional traffic monitoring in real time, affording you complete visibility of every connection occurring on your network. No longer do you need to speculate about which connections pose real threats. Drawing on decades of historical IP data and its esteemed position within the global threat landscape, it promptly flags malicious or unidentified connections within your network. This system not only helps mitigate cybersecurity team burnout and alert fatigue but also provides autonomous, continuous network monitoring and round-the-clock protection, ensuring your organization remains secure against evolving threats. With Intrusion, you gain a strategic advantage in safeguarding your digital assets.

Description

Palo Alto Networks’ Next-Generation Firewalls leverage machine learning-powered deep learning capabilities to proactively stop unknown and sophisticated cyber threats in real time. These NGFWs quickly distribute zero-delay signature updates, ensuring that every firewall in the network is instantly armed against emerging risks. The solution offers comprehensive visibility across IoT devices by accurately profiling device details like vendor, model, and firmware, improving overall asset management. Using AI-driven operations, the platform helps organizations improve security posture, predict firewall health, and reduce operational downtime without the need for additional staff or hardware. It has been repeatedly recognized as an industry leader, outperforming competitors in rigorous testing. The NGFWs secure a variety of environments including branch offices, campuses, data centers, public clouds, and 5G mobile networks. Its unified architecture simplifies security management while supporting Zero Trust principles for modern enterprises. With automated threat detection and response, it empowers businesses to think ahead, not just react.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Alibaba Cloud Anti-Bot Service
Alibaba Cloud SSL Certificates Service
Azure Marketplace
Azure Spring Apps
Blink
Checkmk
Comarch Business Intelligence
Comarch EDI
Comarch Social Mining
Darktrace
Jellyfish
Medigate
Netreo
Nozomi Networks
Observo AI
Picus
Proofpoint Emerging Threat (ET) Intelligence
Smokescreen
ThreatConnect Risk Quantifier (RQ)
Titania Nipper

Integrations

Alibaba Cloud Anti-Bot Service
Alibaba Cloud SSL Certificates Service
Azure Marketplace
Azure Spring Apps
Blink
Checkmk
Comarch Business Intelligence
Comarch EDI
Comarch Social Mining
Darktrace
Jellyfish
Medigate
Netreo
Nozomi Networks
Observo AI
Picus
Proofpoint Emerging Threat (ET) Intelligence
Smokescreen
ThreatConnect Risk Quantifier (RQ)
Titania Nipper

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Intrusion

Country

United States

Website

www.intrusion.com/products/on-premise-network-protection/

Vendor Details

Company Name

Palo Alto Networks

Founded

2005

Country

United States

Website

www.paloaltonetworks.com/network-security/next-generation-firewall

Product Features

Network Traffic Analysis (NTA)

Anomalous Behavior Detection
High Bandwidth Usage Monitoring
Historical Behavior Data
Identify High Network Traffic Sources
Network Transaction Visibility
Stream Data to IDR or Data Lake
Traffic Decryption

Product Features

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Alternatives

ExtraHop RevealX Reviews

ExtraHop RevealX

ExtraHop Networks

Alternatives

Palo Alto Networks Cloud NGFW Reviews

Palo Alto Networks Cloud NGFW

Palo Alto Networks