{"id":5973,"date":"2023-04-11T23:01:43","date_gmt":"2023-04-11T23:01:43","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2018\/09\/18\/check-point-vs-palo-alto-networks-top-ngfws-compared\/"},"modified":"2023-07-14T13:26:46","modified_gmt":"2023-07-14T13:26:46","slug":"check-point-vs-palo-alto-networks","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/","title":{"rendered":"Check Point vs Palo Alto Networks: Top NGFWs Compared"},"content":{"rendered":"\n<p>Check Point and Palo Alto Networks are two of the top next-generation firewall vendors (NGFWs) and both appear on <em>eSecurity Planet<\/em>\u2019s list of the <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\"><strong>top NGFW products<\/strong><\/a> and the <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-cybersecurity-companies\/\">top cybersecurity companies<\/a> too.<\/p>\n\n\n\n<p>Security buyers in the market for NGFWs often compare the two, and with good reason. Palo Alto and Check Point are both Leaders in Gartner\u2019s recent network firewall Magic Quadrant \u2014 the only other leader is Fortinet. Firewalls from both have scored high in independent testing from Cyber Ratings. Check Point and Palo Alto also receive good ratings from users, so buyers of either company\u2019s products can have confidence that they\u2019re getting some of the best security possible.<\/p>\n\n\n\n<p>Not surprisingly, both are priced higher than more value-conscious solutions. Both are aimed at enterprises that have above average security needs, and for those use cases, they deliver. Nonetheless, there are some differences between the two, and we\u2019ll address those here. Before we get into the details, here\u2019s a high-level analysis of the use cases each vendor serves best:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Check Point is good for both SMB and large-scale environments and gets high marks for ease of use.<\/li>\n\n\n\n<li>Check Point\u2019s wide range of security offerings makes it a good fit for a company seeking a broad, integrated approach for complex and hybrid environments.<\/li>\n\n\n\n<li>Palo Alto can serve those markets too, but also has an edge in cloud, container and <a href=\"https:\/\/www.esecurityplanet.com\/cloud\/firewalls-as-a-service-fwaas\/\">FWaaS<\/a> use cases, in addition to a comprehensive security product portfolio.<\/li>\n\n\n\n<li>Palo Alto\u2019s solution fits best when features, management and performance are the most important factors.<\/li>\n\n\n\n<li>If you\u2019re just looking for a firewall with good security, either will do, as both are top rated by Gartner, users and independent testers.<\/li>\n<\/ul>\n\n\n\n<p>What follows is a look at the core functionality of each solution as well as some critical strengths and weaknesses.<\/p>\n\n\n\n<p><strong>Also read:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/networks\/fortinet-vs-palo-alto-networks\/\">Fortinet vs Palo Alto: Compare Top Next-Generation Firewalls<\/a><\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d6cf0dc585c\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d6cf0dc585c\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#Check-Point-vs-Palo-Alto-NGFWs-at-a-Glance\" title=\"Check Point vs Palo Alto NGFWs at a Glance\">Check Point vs Palo Alto NGFWs at a Glance<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#Best-for-Pricing-Palo-Alto\" title=\"Best for Pricing: Palo Alto\">Best for Pricing: Palo Alto<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#Best-for-Ease-of-Use-Check-Point\" title=\"Best for Ease of Use: Check Point\">Best for Ease of Use: Check Point<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#Best-for-Security-Check-Point\" title=\"Best for Security: Check Point\">Best for Security: Check Point<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#Best-for-Cloud-and-Complex-Use-Cases-Palo-Alto\" title=\"Best for Cloud and Complex Use Cases: Palo Alto\">Best for Cloud and Complex Use Cases: Palo Alto<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#Top-Check-Point-Palo-Alto-Alternatives\" title=\"Top Check Point &amp; Palo Alto Alternatives\">Top Check Point &amp; Palo Alto Alternatives<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#How-We-Evaluated-Check-Point-vs-Palo-Alto-NGFWs\" title=\"How We Evaluated Check Point vs Palo Alto NGFWs\">How We Evaluated Check Point vs Palo Alto NGFWs<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#The-Bottom-Line-Check-Point-vs-Palo-Alto-Networks\" title=\"The Bottom Line: Check Point vs Palo Alto Networks\">The Bottom Line: Check Point vs Palo Alto Networks<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Check-Point-vs-Palo-Alto-NGFWs-at-a-Glance\"><\/span><strong>Check Point vs Palo Alto NGFWs at a Glance<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Here\u2019s how Check Point and Palo Alto NGFWs compare at a glance:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Pricing<\/strong><\/td><td>Palo Alto&nbsp;<\/td><\/tr><tr><td><strong>Ease of Deployment<\/strong><\/td><td>Palo Alto&nbsp;<\/td><\/tr><tr><td><strong>Ease of Use<\/strong><\/td><td>Check Point<\/td><\/tr><tr><td><strong>Security<\/strong><\/td><td>Check Point<\/td><\/tr><tr><td><strong>Service and Support<\/strong><\/td><td>Palo Alto<\/td><\/tr><tr><td><strong>Network Firewall Use Cases<\/strong><\/td><td>Palo Alto&nbsp;<\/td><\/tr><tr><td><strong>Best for Small Businesses<\/strong><\/td><td>Check Point<\/td><\/tr><tr><td><strong>Best for Cloud Use Cases<\/strong><\/td><td>Palo Alto&nbsp;<\/td><td><\/td><\/tr><tr><td><strong>Breadth of Features<\/strong><\/td><td>Check Point<\/td><td><\/td><\/tr><tr><td><strong>Overall Capabilities<\/strong><\/td><td>Palo Alto<\/td><td><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Best-for-Pricing-Palo-Alto\"><\/span><strong>Best for Pricing: Palo Alto<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Palo Alto and Check Point are similarly priced, but we&#8217;ll give the edge to Palo Alto for reasons we&#8217;ll get to in a moment.<\/p>\n\n\n\n<p>Palo Alto firewalls are not cheap, of course. The Palo Alto PA hardware firewall series starts around $1,000 for the PA-410, while the high-end PA-7000 series firewalls start at around $200,000 (and can cost much more with support and subscriptions). There are many options in between, as well as a ruggedized model. Palo Alto also offers virtual, container and cloud firewalls, plus other features like AIOps and <a href=\"https:\/\/www.esecurityplanet.com\/networks\/sd-wan\/\">SD-WAN<\/a>.<\/p>\n\n\n\n<p>Check Point\u2019s pricing is based on the cost of the server and security gateways required, starting under $2,000 for entry level Quantum gateways, while the high-end models start at around $200,000 and up.<\/p>\n\n\n\n<p>Pricing for both vendors is in a similar range. Product selection based on price, therefore, will find Palo Alto having the edge at certain times, while at other times, Check Point is a little cheaper.<\/p>\n\n\n\n<p>But according to Cyber Ratings tests of <a href=\"https:\/\/www.cyberratings.org\/reports\/enterprise-firewall\/\" target=\"_blank\" rel=\"noreferrer noopener\">enterprise firewalls<\/a> and <a href=\"https:\/\/www.cyberratings.org\/reports\/cloud-network-firewall\/\" target=\"_blank\" rel=\"noreferrer noopener\">cloud network firewalls<\/a>, the total cost of ownership per Mbps for Check Point has been higher than that of Palo Alto in their tests, hence the edge to Palo Alto.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"564\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/10\/PAN-OS-1024x564.jpg\" alt=\"Palo Alto Networks PAN-OS traffic dashboard\" class=\"wp-image-25536\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/PAN-OS-1024x564.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/PAN-OS-300x165.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/PAN-OS-768x423.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/PAN-OS-1536x845.jpg 1536w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/PAN-OS-150x83.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/PAN-OS-696x383.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/PAN-OS-1068x588.jpg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/PAN-OS.jpg 1659w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Best-for-Ease-of-Use-Check-Point\"><\/span><strong>Best for Ease of Use: Check Point<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>In Gartner Peer Insights reviews over the last year, users gave Palo Alto an impressive 4.7 for Integration &amp; Deployment while Check Point earned a 4.4. On G2, Check Point came out ahead on ease of use and admin, and the two were tied for ease of setup.<\/p>\n\n\n\n<p>Ease of use has come a long way in recent years, as terms like \u201ceasy to use,\u201d \u201cuser-friendly\u201d and \u201cintuitive\u201d show up in reviews of both companies\u2019 firewalls.<\/p>\n\n\n\n<p>Gartner noted in its December 2022 Magic Quadrant: \u201cPalo Alto Networks\u2019 cloud-based firewall manager, used for distributed-office and centralized-management use cases, is not on a par with on-premises management. Its cloud-based manager is used primarily for the Prisma Access product line and \u2018generation 4\u2019 models of hardware.\u201d<\/p>\n\n\n\n<p>Check Point reviews mention ease of use a little more often than Palo Alto but there is not much difference between the two. While users praise Palo Alto\u2019s robust security, some say managing that ability can be too complex for a generalist.<\/p>\n\n\n\n<p>Users of both systems say their setup process requires a little more knowledge and advanced planning than most. Once up and running, many Check Point users single out the solution\u2019s management interface as a key strength. Palo Alto users praise the rich management features of the company\u2019s firewalls, but some say they require some expertise to get the most from them.<\/p>\n\n\n\n<p>So in short, we give Check Point the advantage in ease of use, and Palo Alto the edge in ease of deployment. If you run into issues, neither vendor scores high in support, but Palo Alto has the edge in support scores from users.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"595\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/10\/check-point-quantum-1024x595.jpg\" alt=\"Image of three different sizes of Check Point Quantum gateways.\" class=\"wp-image-25535\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/check-point-quantum-1024x595.jpg 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/check-point-quantum-300x174.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/check-point-quantum-768x446.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/check-point-quantum-150x87.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/check-point-quantum-696x405.jpg 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/check-point-quantum-1068x621.jpg 1068w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/check-point-quantum.jpg 1342w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Best-for-Security-Check-Point\"><\/span><strong>Best for Security: Check Point<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Both vendors offer very strong security, and independent tests for both have been consistently strong.<\/p>\n\n\n\n<p>Gartner says Check Point\u2019s offering is a particularly good match for companies seeking an integrated and consolidated approach to security, thanks to its wide range of <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">network<\/a>, mobile, and <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">endpoint security<\/a> products.<\/p>\n\n\n\n<p>Check Point was graded as a Leader in the latest Gartner Magic Quadrant (MQ) for next generation firewalls. However, it scored a little below Palo Alto. Gartner noted that Check Point offers \u201ca comprehensive security portfolio,\u201d and that the company is a good candidate for organizations with a mix of on-premises and infrastructure-as-a-service (IaaS) security needs.<\/p>\n\n\n\n<p>Recent releases include an SD-WAN blade and Check Point Quantum Titan, which adds<strong> <\/strong>threat prevention from new AI Deep Learning engines, autonomous IoT security, and the ability to automatically scale or prioritize performance for peak workloads and mission critical applications.<\/p>\n\n\n\n<p>Gartner also placed Palo Alto in the Leaders quadrant and gave it the highest ratings in its latest next-generation firewall Magic Quadrant (MQ). And it was named a Leader in a Forrester Wave for Enterprise Firewalls. Gartner says Palo Alto Networks boasts high customer satisfaction and is a solid contender for all enterprises, particularly when features and management quality are more important than price.<\/p>\n\n\n\n<p>Palo Alto\u2019s Pan-OS enables a platform&nbsp;approach. It comes with strong threat detection and prevention\/advanced WildFire, AIOps, URL filtering, DNS security, <a href=\"https:\/\/www.esecurityplanet.com\/products\/casb-security-vendors\/\">CASB<\/a>, IoT including Medical IoT Security, Enterprise IoT, and Zero Trust OT Security.&nbsp;It has introduced natively integrated web proxy capabilities for NGFW customers migrating from legacy on-premises proxy solutions to a single management platform with consistent security across touchpoints. AIOps for its NGFW processes 29 billion metrics every month across 50,000+ firewalls and shares 24,000 misconfigurations and other issues with customers for immediate resolution.<\/p>\n\n\n\n<p>We give Check Point the edge due to its higher security scores in Cyber Ratings tests, even as Palo Alto came out ahead in value.<\/p>\n\n\n\n<p>Check Point also came out on top in recent <a href=\"https:\/\/resources.checkpoint.com\/network-security\/2023-miercom-top-firewalls-security-benchmark-infographic?utm_term=hushly\" target=\"_blank\" rel=\"noreferrer noopener\">Miercom firewall benchmark tests<\/a> sponsored by Check Point, which scored a 99.7% malware block rate versus 72.7% for the nearest competitor. Check Point also scored a 99.9% phishing prevention rate and 0.1% False Positive Detection rate.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Best-for-Cloud-and-Complex-Use-Cases-Palo-Alto\"><\/span><strong>Best for Cloud and Complex Use Cases: Palo Alto<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Palo Alto has a clear edge in cloud use cases and the needs of complex enterprises. The sheer range of Palo Alto\u2019s firewalls is impressive, spanning small offices, campuses and businesses, mid-sized organizations and enterprises, and high performance and harsh environment needs.<\/p>\n\n\n\n<p>Palo Alto&#8217;s cloud lineup stands out, and it has the edge in container and cloud firewalls. AIOps and SD-WAN support are also standout features. Not surprisingly, Palo Alto\u2019s customer base is skewed toward the midrange and large enterprises. Additionally, it launched a managed next-gen firewall service for AWS \u2013 Cloud NGFW for AWS \u2013 to accelerate the enterprise journey to cloud. Further standouts: its ability to translate firewall policy into best practices and offer clients a single firewall provider for hardware, software, cloud, FWaaS).<\/p>\n\n\n\n<p>Check Point\u2019s customer base includes a large enterprise presence too, but also a healthy number of small businesses, and ease of use adds to its small business appeal. The company provides a range of offerings for different use cases and markets but not quite as wide as Palo Alto. Both are strong contenders for cloud needs, offering virtual appliances and a wide range of cloud functionality. Check Point is behind Palo Alto on container firewalls, as it was later to the market.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Top-Check-Point-Palo-Alto-Alternatives\"><\/span><strong>Top Check Point &amp; Palo Alto Alternatives<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Check Point and Palo Alto Networks firewalls aren\u2019t for everyone. For those seeking top performance, Fortinet is a worthy competitor, and was named by Gartner as a Leader in NGFW, along with Palo Alto and Check Point. Fortinet also offers good value. A number of other NGFW vendors may be able to compete on price, among them Cisco, Versa, Juniper, SonicWall, Sophos and Forcepoint.<\/p>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-vertical\">\n            <!--\n            ICP Plugin - body vertical\n            ----------\n            Category: SEC-NGFW\n            Count: 3\n            Country: HK\n        -->\n    <\/div><!-- ICP Plugin: End -->\n\n\n\n<p>See our full list of the&nbsp;<a href=\"https:\/\/www.esecurityplanet.com\/products\/top-ngfw\/\">Best Next-Generation Firewall (NGFW) Vendors<\/a>&nbsp;for additional buying guidance.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How-We-Evaluated-Check-Point-vs-Palo-Alto-NGFWs\"><\/span><strong>How We Evaluated Check Point vs Palo Alto NGFWs<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>For our analysis, we evaluated firewall features, product breadth, performance and security test data, vendor specs, pricing data from resellers, use cases, user reviews, analyst reports, and overall vendor strength and vision.<\/p>\n\n\n\n<p>Real-world performance can, of course, differ from product and lab specs. And no security product can stop everything, so defense-in-depth and layered detection and response technologies are things every organization needs.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"The-Bottom-Line-Check-Point-vs-Palo-Alto-Networks\"><\/span><strong>The Bottom Line: Check Point vs Palo Alto Networks<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The differences between Check Point and Palo Alto are small but still significant.<\/p>\n\n\n\n<p>Check Point gets the edge on ease of use, security, breadth of features, and SME use cases. Check Point\u2019s NGFWs leverage an application library of thousands of web applications to identify, allow, block, or limit usage of applications and the features within them, enabling safe internet use while protecting against threats and malware. The company\u2019s SmartLog analyzer provides real-time visibility into billions of log records over multiple time periods and domains.<\/p>\n\n\n\n<p>Recently, Check Point expanded its NGFW product lines with the introduction of new high-end platforms, and launched the Check Point Infinity Security Architecture, which is designed to protect a company\u2019s entire IT infrastructure. Software features include autonomous threat prevention, simplified configuration, and TLS 1.3 support with detection of fake Server Name Indication (SNI).<\/p>\n\n\n\n<p>Check Point provides several firewall lines: Quantum Security Gateway hardware appliances such as the Maestro Hyperscale product line and Lightspeed Firewall products, CloudGuard virtual appliances and cloud security products, the Harmony firewall as a service (<a href=\"https:\/\/www.esecurityplanet.com\/cloud\/firewalls-as-a-service-fwaas\/\">FWaaS<\/a>) line, and recent container-based firewalls. These features have been further expanded with the recent release of Quantum Titan.<\/p>\n\n\n\n<p>Palo Alto gets the edge on overall capabilities, ease of deployment, service and support, and cloud and complex use cases. Palo Alto can serve appliance-based distributed enterprise and branch office needs too, but has an edge in cloud, container and FWaaS use cases, plus a comprehensive security product portfolio.<\/p>\n\n\n\n<p>Palo Alto Networks\u2019 NGFWs monitor applications, threats, and content and tie them to the user regardless of location or device type. The company\u2019s NGFWs are available in purpose-built hardware appliances ranging from the PA-200 to the high-end PA-7000 Series, with threat prevention throughput of 100Gbps, and as virtual appliances supporting a wide range of cloud environments. Its next-generation firewalls run on its PAN-OS. The NGFWs classify all traffic, including encrypted traffic, based on application, application function, user, and content.&nbsp;<\/p>\n\n\n\n<p>Palo Alto&#8217;s Application Command Center includes visibility of sanctioned and unsanctioned software-as-a-service (SaaS) applications. Combined with automated event aggregation and filtering and drill-down options, this makes it easier to understand application flows and related risks. Such features earned Palo Alto Networks a place as a Leader in the Gartner Magic Quadrant for Network Firewalls for 11 years in a row.<\/p>\n\n\n\n<p>The differences between the two are small and largely come down to which one best meets your needs and price points. Users can have confidence in both vendors. They may cost more than competitive offerings, but good security pays for itself in the cost savings of avoided breaches.<\/p>\n\n\n\n<p><strong>Read next:<\/strong> <a href=\"https:\/\/www.esecurityplanet.com\/products\/sophos-xg-vs-fortinet-fortigate\/\">Sophos XGS vs Fortinet FortiGate: Top NGFWs Compared<\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6cf0d97808-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6cf0d97808\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6cf0d97808\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6cf0d97808\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6cf0d97808\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6cf0d97808\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6cf0d97808\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Check Point and Palo Alto Networks are two of the top next-generation firewall vendors (NGFWs) and both appear on eSecurity Planet\u2019s list of the top NGFW products and the top cybersecurity companies too. Security buyers in the market for NGFWs often compare the two, and with good reason. Palo Alto and Check Point are both [&hellip;]<\/p>\n","protected":false},"author":213,"featured_media":29586,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[6445,30582,31051],"b2b_audience":[34],"b2b_industry":[],"b2b_product":[395],"class_list":["post-5973","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-next-generation-firewall","tag-ngfw","tag-ngfw-comparison","b2b_audience-evaluation-and-selection","b2b_product-firewalls-and-intrusion-prevention-and-detection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Check Point vs Palo Alto Networks: Top NGFWs Compared<\/title>\n<meta name=\"description\" content=\"A comparison of Check Point&#039;s and Palo Alto&#039;s next-generation firewalls, two of the best - and priciest - NGFW vendors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Check Point vs Palo Alto Networks: Top NGFWs Compared\" \/>\n<meta property=\"og:description\" content=\"A comparison of Check Point&#039;s and Palo Alto&#039;s next-generation firewalls, two of the best - and priciest - NGFW vendors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-11T23:01:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-14T13:26:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/checkpoint-vs-palo-alto.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Drew Robb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Drew Robb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/\"},\"author\":{\"name\":\"Drew Robb\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\"},\"headline\":\"Check Point vs Palo Alto Networks: Top NGFWs Compared\",\"datePublished\":\"2023-04-11T23:01:43+00:00\",\"dateModified\":\"2023-07-14T13:26:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/\"},\"wordCount\":2102,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/checkpoint-vs-palo-alto.png\",\"keywords\":[\"next generation firewall\",\"ngfw\",\"ngfw comparison\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/\",\"name\":\"Check Point vs Palo Alto Networks: Top NGFWs Compared\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/checkpoint-vs-palo-alto.png\",\"datePublished\":\"2023-04-11T23:01:43+00:00\",\"dateModified\":\"2023-07-14T13:26:46+00:00\",\"description\":\"A comparison of Check Point's and Palo Alto's next-generation firewalls, two of the best - and priciest - NGFW vendors.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/checkpoint-vs-palo-alto.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/checkpoint-vs-palo-alto.png\",\"width\":1080,\"height\":1080,\"caption\":\"Checkpoint vs Palo Alto Networks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Check Point vs Palo Alto Networks: Top NGFWs Compared\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\",\"name\":\"Drew Robb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"caption\":\"Drew Robb\"},\"description\":\"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Check Point vs Palo Alto Networks: Top NGFWs Compared","description":"A comparison of Check Point's and Palo Alto's next-generation firewalls, two of the best - and priciest - NGFW vendors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/","og_locale":"en_US","og_type":"article","og_title":"Check Point vs Palo Alto Networks: Top NGFWs Compared","og_description":"A comparison of Check Point's and Palo Alto's next-generation firewalls, two of the best - and priciest - NGFW vendors.","og_url":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/","og_site_name":"eSecurity Planet","article_published_time":"2023-04-11T23:01:43+00:00","article_modified_time":"2023-07-14T13:26:46+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/checkpoint-vs-palo-alto.png","type":"image\/png"}],"author":"Drew Robb","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Drew Robb","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/"},"author":{"name":"Drew Robb","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2"},"headline":"Check Point vs Palo Alto Networks: Top NGFWs Compared","datePublished":"2023-04-11T23:01:43+00:00","dateModified":"2023-07-14T13:26:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/"},"wordCount":2102,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/checkpoint-vs-palo-alto.png","keywords":["next generation firewall","ngfw","ngfw comparison"],"articleSection":["Products"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/","url":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/","name":"Check Point vs Palo Alto Networks: Top NGFWs Compared","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/checkpoint-vs-palo-alto.png","datePublished":"2023-04-11T23:01:43+00:00","dateModified":"2023-07-14T13:26:46+00:00","description":"A comparison of Check Point's and Palo Alto's next-generation firewalls, two of the best - and priciest - NGFW vendors.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/checkpoint-vs-palo-alto.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/04\/checkpoint-vs-palo-alto.png","width":1080,"height":1080,"caption":"Checkpoint vs Palo Alto Networks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/check-point-vs-palo-alto-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Check Point vs Palo Alto Networks: Top NGFWs Compared"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2","name":"Drew Robb","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","caption":"Drew Robb"},"description":"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.","url":"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/5973"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/213"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=5973"}],"version-history":[{"count":1,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/5973\/revisions"}],"predecessor-version":[{"id":31085,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/5973\/revisions\/31085"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/29586"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=5973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=5973"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=5973"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=5973"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=5973"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=5973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}