New user experience for threat prevention and Logging
What do you like best about the product?
The WildFire analysis for detecting zero-day malware is impressive. It quickly flagged a test malware file I uploaded, and I could see real-time analysis.
What do you dislike about the product?
The syntax isn’t intuitive for a new user. The logs are detailed but lack context for beginners. I had to refer to external documentation to understand why a session was blocked
What problems is the product solving and how is that benefiting you?
Other firewalls struggle to detect unknown or zero-day threats that don’t have existing signatures. WildFire analyzes suspicious files in a cloud-based sandbox and generates new security signatures in real-time
In most cloud environments, security teams lack clear insights into blocked threats, making incident response slow. After enabling Threat Prevention, I saw multiple intrusion attempts targeting exposed SSH ports.
The logs showed attack patterns (e.g., brute-force attempts from suspicious IPs in Russia & China).
In most cloud environments, security teams lack clear insights into blocked threats, making incident response slow. After enabling Threat Prevention, I saw multiple intrusion attempts targeting exposed SSH ports.
The logs showed attack patterns (e.g., brute-force attempts from suspicious IPs in Russia & China).
There are no comments to display