We offer IoT devices for applications such as fleet management solutions. When developing these devices, we want to explore security tools that can safeguard these types of device management solutions.
Enterprise Security Architect at Nish Tech
Has comprehensive features but needs a more centralized information management system
Pros and Cons
- "From a security standpoint, it provides a comprehensive range of standard security features that align with our requirements."
- "It would be beneficial to have a more centralized and user-friendly platform that could consolidate all the necessary information, which proved challenging during the initial POC phase."
What is our primary use case?
What is most valuable?
From a security standpoint, it provides a comprehensive range of standard security features that align with our requirements. The IoT security tool we selected has a distinct advantage in terms of its feature set as it allows us to perform security scans on a per-device basis and obtain comprehensive results for all our devices.
What needs improvement?
It would be beneficial to have a more centralized and user-friendly platform that could consolidate all the necessary information, which proved challenging during the initial POC phase. We would rate the comprehensiveness and visibility as a four out of five because certain challenges need to be addressed and improved.
For how long have I used the solution?
I have been using it for a year now.
Buyer's Guide
Palo Alto Networks IoT Security
March 2025

Learn what your peers think about Palo Alto Networks IoT Security. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
842,651 professionals have used our research since 2012.
How was the initial setup?
The initial setup was a smooth experience and it only took us a day or two to complete it.
What about the implementation team?
We deployed approximately twenty devices solely for the purpose of the POC.
What other advice do I have?
Overall, I would rate it seven out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Backup and Storage specialist at Bosch Global Software Technologies
Stable and scalable IoT security solution that provides easy access to engineers for support
Pros and Cons
- "This solution has been most valuable for establishing a VPN and implementing allow/deny rules. It has also enabled us to create security policies. It is an easy solution to customise when it comes to creating templates and pulling reports."
- "The reporting for this solution could be improved. The logs we receive are only saved for one week. We would like to have the database timeframe increased to a month or two for historical reporting as well as increased storage capabilities to support this data and reporting."
What is our primary use case?
We use this solution as a network firewall related to IoT.
What is most valuable?
This solution has been most valuable for establishing a VPN and implementing allow/deny rules. It has also enabled us to create security policies. It is an easy solution to customise when it comes to creating templates and pulling reports.
What needs improvement?
The reporting for this solution could be improved. The logs we receive are only saved for one week. We would like to have the database timeframe increased to a month or two for historical reporting as well as increased storage capabilities to support this data and reporting.
For how long have I used the solution?
I have used this solution for more than three years.
What do I think about the stability of the solution?
This is a stable solution.
What do I think about the scalability of the solution?
This is a scalable solution. We have approximately 10,000 users that this solution supports.
How are customer service and support?
We have received really good support from Palo Alto. It is easy to log a ticket and get hold of a Palo Alto engineer.
What other advice do I have?
I would rate this solution an eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner

Buyer's Guide
Download our free Palo Alto Networks IoT Security Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2025
Product Categories
IoT SecurityPopular Comparisons
Forescout Platform
Nozomi Networks
Microsoft Defender for IoT
Phosphorus Cybersecurity
Buyer's Guide
Download our free Palo Alto Networks IoT Security Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What does the Log4j/Log4Shell vulnerability mean for your company?
- What does 5G mean for IoT?
- What vendors are the main players in Industrial Internet of Things (IIoT)?
- When evaluating IoT Security, what aspect do you think is the most important to look for?
- What are your use cases for Enterprise Internet of Things (IoT)?
- What are the biggest enterprise IoT security challenges in 2021-2022?
- Why is IoT Security important for companies?