Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Palo Alto Networks offers a cloud-native suite of integrated security services designed to safeguard your entire network, regardless of where users or devices connect. Utilizing Precision AI™ and global threat intelligence from over 70,000 customers, these services detect and block a wide range of threats including phishing, malware, ransomware, and command-and-control attacks in real time. Core components include Advanced Threat Prevention for intrusion detection, Advanced WildFire’s extensive malware analysis, and Advanced URL Filtering that stops phishing before it reaches users. The solution also features advanced DNS Security that provides double the threat coverage of competitors and actively prevents DNS hijacking. Their IoT/OT Security enforces zero trust across connected devices, while NG-CASB offers visibility and control over SaaS usage in your environment. AI Access Security further protects generative AI application usage with real-time monitoring and access controls. Backed by Palo Alto’s world-renowned Unit 42 research team, this cloud-delivered platform scales seamlessly to meet the evolving threat landscape. It empowers organizations to stay ahead of attacks with unmatched speed and accuracy.

Description

Traced MTD delivers a groundbreaking MTD (mobile threats defense) for businesses that gives you instant visibility and analysis of mobile threat. Every mobile device, whether it belongs to a business or a person, is a gateway for business data. It also provides a way to connect to your network. Traced Protected MTD and Traced App protects mobile devices, while Traced Trusted MTD provides your IT and Security teams with the tools needed to protect your business. Traced protects employees' devices from application-, network- and devicebased threats, including malware, phishing and rogue WiFi. It also protects against unauthorized screen, microphone and camera access, permission abuse, and device exploits. The Traced Deep Learning Engine detects malicious apps, both known and unknown. It provides you with vital information for analysis, investigation and response. WiFi protection alerts the device as well as Traced Trustd when a user connects a compromised or unsecure WiFi network.

API Access

Has API

API Access

Has API

Screenshots View All

No images available

Screenshots View All

Integrations

Microsoft 365

Integrations

Microsoft 365

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

£9/device/year
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Palo Alto Networks

Founded

2005

Country

United States

Website

www.paloaltonetworks.com

Vendor Details

Company Name

Traced

Founded

2019

Country

United Kingdom

Website

traced.app

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Product Features

Alternatives

Palo Alto ATP Reviews

Palo Alto ATP

Palo Alto

Alternatives

Palo Alto Networks WildFire Reviews

Palo Alto Networks WildFire

Palo Alto Networks
Certo Mobile Security Reviews

Certo Mobile Security

Certo Software