We have implemented our own private cloud where we host different services for a number of internal companies that are part of a group. We have financial companies, hospitality, and construction companies; a large variety. We use Palo Alto to provide security protection for all these companies.
Manager IT Security & Infrastructure at Currimjee Jeewanjee & Co. Ltd.
Gives us visibility and reporting that we didn't have, improving our ability to monitor and secure our network
Pros and Cons
- "You can easily integrate it with Active Directory, and you can use the GlobalProtect VPN for internal and external purposes. The URL Filtering is also clear and the application filtering is a plus. The application filtering is much better when you compare it to FortiGate or other firewall vendors."
- "There has been a recent change in the graphical interface. For the monitoring part, they could have a better UI."
What is our primary use case?
How has it helped my organization?
Previously, with our old firewalls, we did not have any visibility. The application layer was zero. We didn't have any visibility there. And we also didn't have any reports. Now, we have good visibility and we are able to get reports and we can monitor the network much better. That's a big change for us and a big help.
What is most valuable?
There are a lot of helpful features
- monitoring
- reporting
- WiFi.
You can easily integrate it with Active Directory, and you can use the GlobalProtect VPN for internal and external purposes. The URL Filtering is also clear and the application filtering is a plus. The application filtering is much better when you compare it to FortiGate or other firewall vendors.
Also, the fact that Next-Gen Firewalls from Palo Alto embed machine learning in the core of the firewall to provide inline and real-time attack prevention is very important. Nowadays, all the modern attacks, hackers, and bad people are becoming more intelligent and automating attacks. Embedding AI is a good idea.
We have complete visibility through the logs and the alerting. It depends on how you configure the firewall. You can configure it to get alerts whenever there's an attack or whenever something is happening. That's how we can assess if the firewall is doing the job correctly or not. We are happy with the way the firewall does its job.
What needs improvement?
There has been a recent change in the graphical interface. For the monitoring part, they could have a better UI.
Buyer's Guide
Palo Alto Networks NG Firewalls
August 2025

Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
867,676 professionals have used our research since 2012.
For how long have I used the solution?
We have been using Palo Alto Networks NG Firewalls since 2012.
What do I think about the stability of the solution?
The big firewalls, like the PA-300 and the PA-3020, are very good, stable, and performant. They are very reliable. The smaller models are reliable, but the performance on their management plane is a bit slow. Even the management plane of the PA-850 is a bit slow when you compare it to some of the bigger models.
What do I think about the scalability of the solution?
Scaling is easy. We currently have about 1,000 endpoints.
How are customer service and support?
We haven't worked with their technical support.
Which solution did I use previously and why did I switch?
We replaced a Cisco ASA Firewall with Palo Alto, and then we started replacing all our other firewalls with Palo Alto. Cisco ASA was not a next-generation firewall at that time. And no firewall could beat the traffic monitoring and the visibility that we had on Palo Alto.
We did a PoC before going to Palo Alto. We placed the Palo Alto in virtual wire mode, meaning a transparent mode. Without changing our existing network infrastructure, we were able to plug the Palo Alto into our network where we could see all the incoming and all the outgoing traffic. Without creating any policies or any blocking, we were able to see all the traffic and we were impressed with that part and we decided to switch to Palo Alto.
How was the initial setup?
The first deployment was very complex. I was not the one who implemented it, it was an integrator, but it was a headache due to some difficulties. After that, things became easy. We have implemented six or seven Palo Altos, and things are easy because of our familiarity with the whole deployment process. The first time we were using this firewall we were not at ease with the product. After that, we got used to it and it became easier.
Because of the issues with the first one, it took one week for the deployment, for the complete transition from Cisco ASA to Palo Alto. Since then, all the deployments have been done in one day.
What was our ROI?
We have seen ROI as a result of the visibility and reporting. These are two things we didn't have, and now that we have the visibility, we can ensure that our network is secure.
What's my experience with pricing, setup cost, and licensing?
If you compare Palo Alto with other firewalls, it's a bit expensive.
Which other solutions did I evaluate?
At that time, Palo Alto was the leader and I think it was the only next-gen firewall.
We have looked into other firewalls since then. In 2017 or 2018, we decided to replace one Palo Alto with a Forcepoint Next-Gen Firewall. We placed that in the network but, after six months, we replaced it with Palo Alto.
What other advice do I have?
If someone is looking for the cheapest and fastest firewall, I would say the fastest is good, but not cheapest. Palo Alto Firewalls are not cheap.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Network Solutions Architect at a financial services firm with 10,001+ employees
Gives you a lot of information when you are monitoring traffic
Pros and Cons
- "It is critical that Palo Alto Networks NG Firewalls embeds machine learning in the core of the firewall to provide inline, real-time attack prevention. In my environments, we have an integration with a third-party vendor. As soon as there is new information about new threats and the destination that they are trying to reach on any of our network devices, that traffic will be stopped."
- "There is a bit of limitation with its next-generation capabilities. They could be better. In terms of logs, I feel like I am a bit limited as an administrator. While I see a lot of logs, and that is good, it could be better."
What is our primary use case?
We use it as an Internet-facing parameter firewall. In my environment, it has security and routing. It is on a critical path in terms of routing, where it does a deep inspection, etc.
How has it helped my organization?
There have been a lot of improvements from security to service.
It is critical that Palo Alto Networks NG Firewalls embeds machine learning in the core of the firewall to provide inline, real-time attack prevention. In my environments, we have an integration with a third-party vendor. As soon as there is new information about new threats and the destination that they are trying to reach on any of our network devices, that traffic will be stopped.
What is most valuable?
Setting up a VPN is quite easy.
It gives you a lot of information when you are monitoring traffic.
In terms of user experience, Palo Alto has very good user administration.
Machine learning is important. Although we have not exhausted the full capabilities of the firewall using machine learning, the few things that we are able to do are already very good because we have an integration with a third-party. We are leveraging that third-party to get threat intelligence for some destinations that are dangerous, as an example. Any traffic that tries to go to those destinations is blocked automatically. There is a script that was written, then embedded, that we worked on with the third-party. So, machine learning is actually critical for our business.
What needs improvement?
There is a bit of limitation with its next-generation capabilities. They could be better. In terms of logs, I feel like I am a bit limited as an administrator. While I see a lot of logs, and that is good, it could be better.
I wanted Palo Alto Networks engineering to look at the traffic log, because I see traffic being dropped that happens to be legitimate. It would be interesting for me to just right click on the traffic, select that traffic, and then create a rule to allow it. For example, you sometimes see there is legitimate traffic being dropped, which is critical for a service. That's when actually you have to write it down, copy, a rule, etc. Why not just right click on it and select that link since that log will have the source destination report number? I would like to just right click, then have it pop up with a page where I can type the name of the rule to allow the traffic.
For how long have I used the solution?
I started using Palo Alto in 2015.
What do I think about the stability of the solution?
It is very stable. We had two outages this year that were not good. They were related to OSPF bugs. Those bugs affected our service availability.
What do I think about the scalability of the solution?
It is quite scalable. I have been able to create a lot of zones to subinterfaces for a number of environments. I don't really have any issues regarding scalability. It meets my expectations.
How are customer service and support?
Palo Alto Networks NG Firewalls technical support is very poor. Three or four months ago, I had a bug where the database of the firewall was locked. You cannot do anything with it. We looked for documentation, giving us a procedure to follow, but the procedure didn't work. We logged a complaint with Palo Alto Networks, and they gave us an engineer. The engineer relied on documentation that doesn't work, and we had already tested. In the end, the engineer gave us an excuse, "No, we need this account to be able to unlock it." This happened twice. The way out of it was just to restart the firewall. You can restart the firewall and everything goes back to normal. Therefore, I think the support that we got was very poor.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have used Check Point and Cisco ASA.
Initially, when I started with Palo Alto, we had Cisco ASA, but Palo Alto Networks beat ASA hands down.
We have a multi-vendor environment with different providers. Our standard is that we can't have the same firewall for each parameter, so there is some kind of diversity.
We had ASA looking at one side of the network and Palo Alto Networks looking at the other side of the network. We also had Juniper looking at another side of the network. At the end of the day, ASA was very good, I don't dispute that. However, in terms of functionality and user experience, Palo Alto Networks was better.
Palo Alto Networks beat ASA because it was a next-generation firewall (NGFW), while ASA was not.
How was the initial setup?
When we bought Palo Alto, we had Juniper devices in our environment. We were told that it was a bit like Juniper, so we were happy. However, some people were a bit skeptical and scared of Juniper firewalls. Because of that, it took us a very long time to put them on the network. However, as soon as we did the implementation, we realized that we were just thinking too much. It was not that difficult.
We deployed Palo Alto Networks as part of a project for data center implementation. The implementation of the firewall didn't take long.
What about the implementation team?
We buy through a third-party. Our account is managed by IBM.
What was our ROI?
We have seen ROI. There is more visibility in the environment in terms of security. There was a time when we suspected a security breach, and this firewall was able to give us all the logs that we expected.
What's my experience with pricing, setup cost, and licensing?
Palo Alto is like Mercedes-Benz. It is quite expensive, but the price is definitely justified.
Which other solutions did I evaluate?
One thing is system administration. In our opinion, Palo Alto administration is easier compared to other vendors. I know other vendors who have Check Point. You have to manage Check Point, and it is a bit cumbersome. It is a very nice, powerful firewall, but you need more knowledge to be able to manage Check Point compared to Palo Alto. Palo Alto is very straightforward and nice to use.
In our environment, troubleshooting has been easy. Anybody can leverage the Palo Alto traffic monitoring. In Cisco ASA and Check Point, you also have these capabilities, but capturing the traffic to see is one thing, while doing the interpretation is another thing. Palo Alto is more user-friendly and gives us a clearer interpretation of what is happening.
One thing that I don't like with Palo Alto is the command line. There isn't a lot of documentation for things like the command line. Most documents have a graphic user interface. Cisco has a lot of documents regarding command lines and how to maneuver their command line, as there are some things that we like to do with the command line instead of doing them with the graphic interface. Some things are easy to do on a graphic interface, but not in the command line. I should have the option to choose what I want to do and where, whether it is in the command line or a graphic interface. I think Palo Alto should try to make an effort in that aspect, as their documentation is quite poor.
We would rather use Cisco Umbrella for DNS security.
I compared the price of Palo Alto Networks with Juniper Networks firewall. The Juniper firewall is quite cheap. Also, Palo Alto Networks is a bit expensive compared to Cisco Firepower. Palo Alto Networks is in the same class of Check Point NGFW. Those two firewalls are a bit expensive.
It gives us visibility. In my opinion, the first firewall that I would put on our network is Palo Alto Network and the second would be Check Point.
What other advice do I have?
Palo Alto Networks NG Firewalls is a very good firewall. It is one of the best firewalls that I have used.
I would rate Palo Alto Networks as nine out of 10.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Palo Alto Networks NG Firewalls
August 2025

Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
867,676 professionals have used our research since 2012.
Senior Manager Network Design at MEEZA, Managed IT Services Provider
Provides ease of deployment and helps us maintain a secure network environment
Pros and Cons
- "The product's most valuable features are the ease of deployment, regularly updated security information, and robust hardware."
- "Palo Alto's various products need better integration to ensure they work harmoniously."
What is our primary use case?
We use this firewall to segment our network into two parts and control traffic between them, providing a secure and efficient way to manage our network.
What is most valuable?
The product's most valuable features are the ease of deployment, regularly updated security information, and robust hardware.
What needs improvement?
Palo Alto's various products need better integration to ensure they work harmoniously.
For how long have I used the solution?
We have been using Palo Alto Networks NG Firewalls for the past six years.
What do I think about the stability of the solution?
The firewall is very stable; I rate it ten out of ten in terms of stability.
What do I think about the scalability of the solution?
The solution is highly scalable, accommodating around 5,000 users at our site. We plan to increase usage, which is a matter of purchasing new licenses without affecting current operations.
How are customer service and support?
While I have not used technical support service, my team has, and they have found it to be very good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We switched from AWS to Oracle Advanced Analytics because while AWS was easy to use, it was more expensive.
How was the initial setup?
The setup is easy but requires careful planning and expert design to ensure optimal deployment. The process involves planning, reviewing requirements, designing, implementing, and operating the firewall.
What other advice do I have?
Palo Alto NG Firewall effectively prevents threats and helps maintain a secure network environment.
I rate it a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Stable product with valuable technical support services
Pros and Cons
- "The initial setup process is quite easy."
- "Palo Alto Networks NG Firewalls work slowly for vulnerability management. Its performance could be faster."
What is most valuable?
The product’s most valuable feature is security.
What needs improvement?
Palo Alto Networks NG Firewalls work slowly for vulnerability management. Its performance could be faster.
For how long have I used the solution?
We have been using Palo Alto Networks NG Firewalls for five years.
What do I think about the stability of the solution?
The product is stable. I rate its stability a ten out of ten.
What do I think about the scalability of the solution?
I rate the product’s scalability a nine out of ten.
How are customer service and support?
The technical support services are good. They respond immediately.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used FortiGate earlier. We plan to switch again to FortiGate as per our vendor’s preference.
How was the initial setup?
The initial setup process is quite easy. It took less than a month to complete.
What's my experience with pricing, setup cost, and licensing?
I rate the product’s pricing an eight out of ten.
Which other solutions did I evaluate?
We evaluated Check Point. We decided to go to Palo Alto for better pricing.
What other advice do I have?
I rate Palo Alto Networks NG Firewalls a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
System Engineer at DLP
Has good ID management and the configuration is easy
Pros and Cons
- "The user experience is good and the configuration is very easy."
- "Technical support can be faster at responding."
What is our primary use case?
We use Palo Alto Networks NG Firewalls for our gateway security.
How has it helped my organization?
Embedded machine learning is important.
The user experience is good and the configuration is very easy.
Palo Alto Networks NG Firewalls provide a unified platform that natively integrates security capabilities.
What is most valuable?
IDM is the most valuable feature.
What needs improvement?
The process of applying updates to Palo Alto Networks NG Firewalls has room for improvement.
The price also has room for improvement and the technical support could respond faster.
For how long have I used the solution?
I have been using Palo Alto Networks NG Firewalls for one year.
What do I think about the stability of the solution?
The solution is extremely stable.
What do I think about the scalability of the solution?
The solution is scalable. We have 60 people that use the solution in our organization.
How are customer service and support?
The technical support is good but can sometimes be slow.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I previously used WatchGuard XTM firewalls, but I switched to Palo Alto Networks NG Firewalls because of their superior performance and features.
What was our ROI?
We have seen a good return on investment.
What's my experience with pricing, setup cost, and licensing?
Palo Alto Networks NG Firewalls are expensive compared to WatchGuard XTM firewalls.
What other advice do I have?
I give Palo Alto Networks NG Firewalls a ten out of ten.
We have to perform regular updates for the solution.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Deputy Project Leader for CVE at a tech services company with 1-10 employees
Saves our company time and resources, which equals money saved
Pros and Cons
- "Palo Alto Networks NG Firewalls saves us time."
- "I would like more reporting and metrics in the solution."
What is our primary use case?
We use Palo Alto Networks NG Firewalls mostly for firewalls.
How has it helped my organization?
Palo Alto Networks NG Firewalls saves our company time and resources, which equals money.
What is most valuable?
Palo Alto Networks NG Firewalls saves us time. The solution's firewalls have secured our company, and we don't have to worry about anything.
What needs improvement?
I would like more reporting and metrics in the solution.
For how long have I used the solution?
We have been using Palo Alto Networks NG Firewalls for two years.
What do I think about the stability of the solution?
It is a stable solution.
What do I think about the scalability of the solution?
It is a very scalable solution.
What was our ROI?
We have seen an ROI with Palo Alto Networks NG Firewalls because it saves us time. We haven't worried about any security issues and feel very protected with Palo Alto Networks NG Firewalls.
What's my experience with pricing, setup cost, and licensing?
It is expensive but is worth the price.
Which other solutions did I evaluate?
Before choosing Palo Alto Networks NG Firewalls, we did evaluate other options.
What other advice do I have?
We're fine with the firewall and not shopping around for a firewall.
The fact that it embeds machine learning in the core of the firewall to provide inline, real-time attack prevention is invaluable to me.
Palo Alto NGFW provides a unified platform that natively integrates all security capabilities, which is invaluable to me.
It does a great job of securing data centers consistently across all workplaces, i.e., from the smallest office to the largest data centers, and we have zero complaints.
Palo Alto Networks NG Firewalls have helped us reduce about twenty extra hours a week of downtime in our organization.
I rate the value we receive from attending an RSA Conference a ten out of ten.
Attending RSAC will surely have an impact on our organization's cybersecurity purchases made throughout the year afterward.
Overall, I rate the solution a ten out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer.
Information Security Analyst at a tech vendor with 10,001+ employees
Helps with audit and compliance, but it should be easier to gather evidence
Pros and Cons
- "I typically get involved with it when it comes to audit and compliance and having to gather evidence of those firewalls, routers, and rule sets. The evidence that I typically need is there."
- "I don't deal with it from a day-to-day perspective, but I can say that the evidence that I typically need is there, but sometimes, it's a task to actually get it and pull it out. They can make it easier to gather that evidence."
How has it helped my organization?
Solutions like firewalls and routers improve any company. If you don't have them, then I wouldn't be doing business with you.
Palo Alto has embedded machine learning in the core of the firewall to provide inline, real-time attack prevention. That's big. We're embedding that type of security and information into every part of our corporate network as well as our products.
It has helped to reduce downtime in our organization. The savings are probably in single digits.
What is most valuable?
I typically get involved with it when it comes to audit and compliance and having to gather evidence of those firewalls, routers, and rule sets. The evidence that I typically need is there.
We got a lot of integrations into it, but I don't know if it integrates with all.
What needs improvement?
I don't deal with it from a day-to-day perspective, but I can say that the evidence that I typically need is there, but sometimes, it's a task to actually get it and pull it out. They can make it easier to gather that evidence. From our NetOps team's perspective also, they can make it easier to manage and constantly update those rule sets.
For how long have I used the solution?
I don't know for how long exactly we have been using this solution, but I've been aware that we've had them probably since about 2016 or 2017.
What do I think about the stability of the solution?
It's very stable. They are highly ranked within their space.
What do I think about the scalability of the solution?
It's a good product for securing all types of workplaces. It's specifically good for data centers, which are all brick-and-mortar houses. Small businesses must also have it because they don't have the ability to have everything in a cloud or virtualized firewalls and other things like that.
How are customer service and support?
I haven't dealt with their support team.
How was the initial setup?
I was not involved in its initial deployment.
What was our ROI?
I am able to gather some of the evidence and things that I need. Our NetOps team uses it heavily, and they love it.
What's my experience with pricing, setup cost, and licensing?
I would assume that it's still within mid-range given its company structure and everything else. My guess is it's still okay.
What other advice do I have?
To someone at another company who says, “We are just looking for the cheapest and fastest firewall,” I would say that you just lost the customer because I'm not going to do business with somebody who is going for the cheapest. I'm always looking for a vendor or customer that has more input and cares about the security of their systems.
The value received from attending an RSA Conference includes prizes and other things, but on a personal level, I love the tech talks, knowing about a lot of industry changes, and different product solutions being showcased.
RSAC definitely has an impact on our organization’s cybersecurity purchases made throughout the year. One of my main roles is vendor due diligence, so I come to RSA quite often, and I have conversations with many different sales engineers who can explain the security of their products because that's what I focus on during our onboarding process.
Overall, I would rate this solution a seven out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Program Manager, Cybersecurity at a wholesaler/distributor with 1,001-5,000 employees
Provides good security and visibility, and integrates well with our SIEM
Pros and Cons
- "The most valuable feature is advanced URL filtering. Its prevention capabilities and DNS security are also valuable. It pinpoints any suspicious activities and also prevents the users from doing certain things."
- "Palo Alto should improve their support. It's sometimes difficult to get the right technician or engineer to fix the problem as soon as possible."
What is our primary use case?
We use Palo Alto as our perimeter firewall. We also use the GlobalProtect VPN solution.
How has it helped my organization?
It gives visibility into different threats. There is a wide range of threats that can be identified.
We collect logs from Palo Alto into our Rapid7 SIEM solution. It's pretty well integrated. This integration is important because we don't necessarily want a solution from the same vendor. I know Palo Alto has Cortex for collection. Being open to other vendors in order to ingest the data or logs is a great thing.
Palo Alto has embedded machine learning in the core of the firewall to provide inline, real-time attack prevention, which is important because AI is the future. All cybersecurity companies are going to start using it. It's definitely a good thing. We just need to make sure that there's still the human component because AI can still fail.
Palo Alto has a wide range of different appliances or virtual machines. It can be installed anywhere from a small branch to a data center. It helps to secure small businesses to large enterprises.
What is most valuable?
The most valuable feature is advanced URL filtering. Its prevention capabilities and DNS security are also valuable. It pinpoints any suspicious activities and also prevents the users from doing certain things. For example, DNS security prevents users from reaching certain websites, so it's really interesting.
What needs improvement?
Palo Alto should improve their support. It's sometimes difficult to get the right technician or engineer to fix the problem as soon as possible.
For how long have I used the solution?
We have been using Palo Alto for at least five years.
What do I think about the stability of the solution?
They're pretty robust. They also have Unit 42, which is their threat intelligence team. They make you feel safer because they can identify the threats and then implement protection from those into their firewall.
What do I think about the scalability of the solution?
Scalability is pretty good on the virtual side. Because the virtual environment licensing model is based on credit, if you don't wanna use UI protection tomorrow, you can get rid of it and use those credits for another product or another license.
How are customer service and support?
Because of the pandemic, there's a lot of turnover and the quality of the support technicians is not great. I hope they will improve. I would rate their support a seven out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I didn't use any other solution previously.
How was the initial setup?
It was straightforward. They have great documentation. We use Palo Alto in the Azure environment, and their Azure documentation is one of the best documentation I've ever seen. It's very detailed. It can be confusing sometimes because there's a lot of information, but it's definitely good. They're good at documenting, and their knowledge base is really interesting for troubleshooting. There's a lot of useful information.
What about the implementation team?
We deployed it ourselves. We didn't use any company to deploy it.
What was our ROI?
It's hard to tell. It's preventing attacks, but I don't have any specific case where I can say whether a particular attack would not have been blocked by another vendor.
What's my experience with pricing, setup cost, and licensing?
It can be quite expensive, but there's a good incentive for the three-year contracts. The part that is especially confusing is for the virtual environment. The credits or the licensing system can be very confusing.
Which other solutions did I evaluate?
We didn't evaluate any other options.
What other advice do I have?
As a result of my experience with Palo Alto NGFW, to a colleague at another company who says, “We are just looking for the cheapest and fastest firewall,” I would say that the cheapest and fastest means there is a potential risk of breach. Even though Palo Alto is quite expensive, it definitely makes you feel secure. The configuration of the appliances or virtual machines is pretty straightforward, so you don't need to be highly trained in order to be the administrator of the platform.
It's important to attend an RSA Conference even if you're already a customer. That's because you might not be necessarily aware of the new products, so going to an RSA Conference can help you identify new solutions that may be valuable for your company.
Attending an RSA Conference will have an impact on our organization’s cybersecurity purchases made throughout the year afterward. There are a lot of different vendors that I've found, and I will probably get in touch soon.
Overall, I would rate this solution a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Product Categories
FirewallsPopular Comparisons
Fortinet FortiGate
Netgate pfSense
Cisco Secure Firewall
Cisco Meraki MX
WatchGuard Firebox
Check Point Quantum Force (NGFW)
Azure Firewall
SonicWall TZ
Fortinet FortiGate-VM
Juniper SRX Series Firewall
SonicWall NSa
KerioControl
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Palo Alto the best firewall for an on-premise/cloud hybrid IT network?
- What are the main differences between Palo Alto and Cisco firewalls ?
- Expert Opinion on Palo-Alto Required.
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Features comparison between Palo Alto and Fortinet firewalls
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which is better - Palo Alto Networks NG Firewalls or Sophos XG?
- What are the main differences between Palo Alto firewalls and Cisco Secure Firepower?
- What is a better choice, Azure Firewall or Palo Alto Networks NG Firewalls?
- Which Palo Alto Networks NG Firewalls model is recommended for 1200 users?