Try our new research platform with insights from 80,000+ expert users
reviewer2063289 - PeerSpot reviewer
Senior information technology consultant at a tech services company with 11-50 employees
Consultant
An extremely strong security tool, with machine learning capabilities for advanced threat detection
Pros and Cons
  • "We have found the SSL decryption within this solution to be great; you can enable this feature and have the ability to see more of what is happening across your network."
  • "We would like to see improvement in the web interface for this solution, so that it can handle updates without manual intervention to put the data in order."

What is our primary use case?

Our main use of this solution is to create micro segmentations only in the public cloud, and use the data we receive to see threats passing through the Vnets.

How has it helped my organization?

We have found that this solution has improved not only the level of security that is in place, but also reduced the amount of operational time needed for us to handle cloud-based security.

What is most valuable?

We have found the SSL decryption within this solution to be great; you can enable this feature and have the ability to see more of what is happening across your network.

We also really like the Wi-Fi service feature of this solution.  It has a great base of information, and uses machine learning to improve recognition of issues and threats.

What needs improvement?

We would like to see improvement in the web interface for this solution, so that it can handle updates without manual intervention to put the data in order.

Buyer's Guide
Palo Alto Networks NG Firewalls
January 2025
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.

For how long have I used the solution?

We have been working with this solution for two years.

What do I think about the stability of the solution?

We have found this to be a stable solution during our time working with it.

What do I think about the scalability of the solution?

As it is cloud-based, the solution is easily scalable.

How are customer service and support?

We have found the technical support for this solution to be very good; we just open a support chat window and we have assistance when we need it.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used Fortinet, and changed to this solution because of the superior performance.

How was the initial setup?

The initial setup of this solution was very easy, and the deployment took just under two weeks to complete.

What about the implementation team?

We used a consultancy team from Add Valley Services for our implementation of this solution, and their service was great.

What's my experience with pricing, setup cost, and licensing?

We would advise that this solution has a higher price point than other comparable products, however, the license fee covers all the features that the solution can provide and there are not extra costs involved.

What other advice do I have?

We would recommend that organizations implementing this solution use a good consulting service and plan extensively up front, before implementation, in order to ensure a smooth deployment with no issues.

We would rate this solution as 10 out of 10.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Vice President & Head Technology Transition at a tech services company with 10,001+ employees
Real User
The solution is generally stable, and easily scalable
Pros and Cons
  • "The solution is scalable"
  • "The support could be improved."

What is our primary use case?

We have multiple IPS applications, and other multiple use cases.

What is most valuable?

We are using pretty much all of the features. This is deployed in our parameter and pretty much provides for different functionalities, for all incoming traffic and outgoing traffic.

What needs improvement?

The support could be improved.

The next release could use more configuration monitoring on this one, and additional features on auditing.

For how long have I used the solution?

I've been using the solution for three years.

What do I think about the stability of the solution?

The solution is generally stable. There are no issues. We have forty-thousand users.

What do I think about the scalability of the solution?

The solution is scalable, yes. We don't plan on increasing usage.

How are customer service and technical support?

We are being provided with decent support but some of the RCS, some of the issues can be resolved much faster.

Which solution did I use previously and why did I switch?

We were using Check Point. We switched because of certain features: entire equity, ideas, application visibility, single interfacing, etc.

How was the initial setup?

The initial setup was complex. We're in the process of replacing it in seventy or so locations, and setup is still ongoing, but going well. It was complex because of the multiple zones that we had to create. We had multiple interfaces so there are multiple complexities that we had to address. We don't require extra staff to maintain the solution.

What about the implementation team?

We implemented through a system integrator.

What was our ROI?

We have seen a return on investment. 

I don't have data points, but some of the use cases that we have already delivered to the organization have shown that a lot of threats have been identified and has been blocked. I don't know how you can quantify that. At the same time, the effort was significantly reduced on the deployment of new routes based on this.

What's my experience with pricing, setup cost, and licensing?

I think, if you compare, they're a little costly next to Cisco of Check Point, but they offer a lot of other additional features to look at. The licensing is annual, and there aren't any additional fees on top of that.

Which other solutions did I evaluate?

We actually did not but we were using two or three other products already, so we had a good idea of what to expect.

What other advice do I have?

I'd say the blueprint of the implementation needs to be ready before you start the implementation of the product. The product is generally stable and the team provides a good presence on it, but at the end, if you're putting it in the mission-critical data center, the planning needs to be extensive.

I would rate this solution an eight and a half out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Palo Alto Networks NG Firewalls
January 2025
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: January 2025.
831,265 professionals have used our research since 2012.
reviewer1001214 - PeerSpot reviewer
Sr. Engineer at a comms service provider with 51-200 employees
Real User
Reliable with a straightforward setup and good security features
Pros and Cons
  • "It's one of the best products I've worked with. It's typically a market leader on Gartner. It's a very respected brand."
  • "The pricing of the solution is quite high. It's one of the most expensive firewall solutions on the market."

What is our primary use case?

The solution is typically used for antivirus and antimalware purposes, to help protect an organization against attacks.

What is most valuable?

The solution offers many different capabilities.

It's one of the best products I've worked with. It's typically a market leader on Gartner. It's a very respected brand.

The solution offers very good security, especially in relation to antivirus activities.

The initial setup is pretty straightforward.

The product is extremely reliable.

What needs improvement?

The pricing of the solution is quite high. It's one of the most expensive firewall solutions on the market.

Clients are typically looking for a solution that's more aggressive in the market.

For example, with Fortinet, they have an SD-WAN that really has many capabilities. For example, it can inject a GSL SIM card along with the MPLS connection. It connects the system within one product. Palo Alto doesn't offer this. This is one area that will need to improve. In Indonesia, the market is growing strategically. Palo Alto has this one product, however, with the limitation of the GSM sim card they are getting left behind. 

For how long have I used the solution?

I started using the solution around 2012 or 2013. It may have been eight years or so. Sometimes I am doing a POC or implementing the solution, so it has been on and off.

What do I think about the stability of the solution?

While the solution itself is okay in terms of stability, there could be issues if the hardware is affected. We have hardware that gets affected by humidity, for example, which can end up affecting a wide range of infrastructure. If the environment is good, the solution will be okay. If we talking about Palo Alto's series starting from the 3,000 to 5,000 or 7,000, Palo Alto has a really stable product.

What do I think about the scalability of the solution?

We set up this solution for companies of all sizes, from small to large enterprises. One of our clients is a telecom, which is quite sizable. They have the most complex configuration. The solution, however, is able to work for any company, no matter what the size. In that sense, it's a scalable option.

That said, the NG firewall is not a typical product that we can scale up on a whim. If we want to scale up in this product, we need to buy a higher series. We have to replace it. If we want to scale out this product, we can do a roll out in another location. Therefore, you can expand it out, however, you do need to change the sizing, which means getting a size or two up.

How are customer service and technical support?

I haven't contacted technical support recently. The last time I spoke to the tech support team was five years ago or maybe as an Operation Engineer three or five years ago. Generally, I found that they were really good at understanding the product. In my experience, they were really helpful. I'd say I was satisfied with their support.

Which solution did I use previously and why did I switch?

I've also used Juniper, however, that may have been three or four years ago or so.

How was the initial setup?

In my case, I have a lot of experience with Palo Alto and the implementation process. Therefore, I don't find it too complex. It's rather straightforward for me. However, I have a long history with the solution. I find the hierarchy of the configuration fairly easy to understand, especially if you compare it to a solution such as Juniper. Juniper is a bit more complex to set up. Whereas, Palo Alto is a bit more straightforward.

How long deployment takes can vary. It really depends on the complexity of the configuration and the environment.

If a client only buys the implementation, they will have to handle the maintenance of the product. It's a good idea to have that type of person in-house.

What's my experience with pricing, setup cost, and licensing?

We find the cost of the solution to be very high. It's quite expensive, and one of the most expensive on the market.

The pricing is related to the complexity of the environment. The more complex the company's requirements, the more it will cost.

What other advice do I have?

We have a partnership with Palo Alto.

I am in pre-sales and often do POCs or do some aspect of evaluating the solution for clients to help them understand the usefulness.

Overall, I really do prefer Palo Alto to other options. I'm the most comfortable with it and I understand it the best out of other solutions such as Juniper or Fortinet.

I'd suggest organizations consider the solution. Yes, it is quite expensive. However, it is also very reliable and is always marked highly in Gartner due to its feature set and usability. It's easy to configure and it's very easy to add more features into your roadmap if you need to. It can easily integrate into a larger holistic security system to help keep a company safe.

In general, I would rate the solution at a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Assistant Manager at Net One Systems
Real User
Security is a lot easier than its competitors and it has well-integrated software
Pros and Cons
  • "I like that it has high security."
  • "The whole performance takes a long time. It takes a long time to configure."

What is our primary use case?

Our primary use case was to configure our PSAs for our customized configuration. 

What is most valuable?

I like that it has high security. 

What needs improvement?

The whole performance takes a long time. It takes a long time to configure. 

For how long have I used the solution?

I have been using Palo Alto for six years. 

How are customer service and technical support?

I contact Palo Alto by email or by phone. Their support is good. 

Which solution did I use previously and why did I switch?

I have previously worked with Cisco ASA. Palo Alto is a lot easier especially in regards to security. It is a well-integrated software.

How was the initial setup?

The difficulty of the deployment depends on our clients' environment and their requests.

We require a two-member team for support. 

In terms of how long it takes to deploy, again, it depends on the customers' environment. If the request is easy, it can take around two weeks.

What other advice do I have?

I would rate Palo Alto a nine out of ten. 

In the next release, they should simplify the deployment process. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
PeerSpot user
PeerSpot user
Vice President, Security Engineering at a financial services firm with 1,001-5,000 employees
Real User
Provides us with Zero Trust segmentation and an easy-to-use centralized control
Pros and Cons
  • "This solution not only provides better security than flat VLAN segments but allows easy movement through the lifecycle of the server."
  • "I wish that the Palos had better system logging for the hardware itself."

What is our primary use case?

We use this solution for Zero Trust Data Center Segmentation with layer 2 Palo Alto firewalls. Segmentation has allowed us to put servers into Zones based off VLAN tags applied at the Nutanix level and can change "personalities" with the change of a VLAN tag. Palo Alto calls the "Layer 2 rewrite". By default, all traffic runs through a pair of 5000 series PAs and nothing is trusted. All North and South, East and West traffic is untrusted. No traffic is passed unless it matched a rule in the firewalls. There is a lot of upfront work to get this solution to work but once implemented adds/moves/changes are easy.

How has it helped my organization?

This solution not only provides better security than flat VLAN segments but allows easy movement throughout the lifecycle of the server.

What is most valuable?

The most valuable feature is the ease of use of the central Panorama to control all firewalls as one unit for baseline rules and then treat each firewall separately when needed.

What needs improvement?

I wish that the Palos had better system logging for the hardware itself.

For how long have I used the solution?

We have been using this solution for four years.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Sales Solutions Engineer at a tech services company with 201-500 employees
Reseller
Enables us to evaluate traffic in the customer environment by providing detailed reporting on the traffic and applications
Pros and Cons
  • "One of the best firewalls on the market."
  • "The user interface is a bit clumsy and not very user-friendly."

What is our primary use case?

The primary use for this product is for security as a firewall by a sales engineer for the guest environment.

How has it helped my organization?

It allowed us to evaluate traffic in the customer environment by providing detailed reporting on the traffic and applications.

What is most valuable?

The WildFire feature is one of the best features in this firewall. WildFire extends the capabilities of Palo Alto firewalls to block malware. The best feature for the reseller is Service Lifecycle Reviewer, SLR. You deploy Palo Alto Network Firewall to the customer environment and it collects data about customer environment, customer traffic. After a week, Palo Alto generates a report to review the traffic. The report tells what applications were touched and how users used these applications in the environment, as well as additional details. So for resellers, you just go to the customer, deploy the Palo Alto in the basic mode so the customer doesn't need to customize anything in their environment because Palo Alto works to meter traffic out of the box.

Of course, the reports register app ID, user ID, the space of the app IDs, the database of these app IDs and other common data. It is a great feature in the Palo Alto product.

What needs improvement?

The manufacturer can improve the product by improving the configuration. Some of the menus are difficult to navigate when trying to find particular features. It is not entirely intuitive or convenient. You might need to configure a feature in one menu and next you need to go to another tab and configure another part of the feature in another tab. It's not very user-friendly in that way. On the other hand, it's still more user-friendly than using the console. But this is certainly one feature they can improve.

What do I think about the stability of the solution?

It's a great firewall, really one of the best in the market. It is one of few firewalls that can claim to be better than Cisco. It functions well, is very stable, and its reputation is known in the market.

What do I think about the scalability of the solution?

I think that the product is very customizable. If you don't need to protect a lot of assets, you can buy a small firewall at a low price for small needs, but if you need you can buy a bigger solution with more features. Scalability is very easy with Palo Alto Networks.

Which solution did I use previously and why did I switch?

Actually, I have moved away from using this product because of changes in duties.

How was the initial setup?

Installation is really very straightforward. You just need to plug it in and connect to the environment and that's all. Deployment time depends on the size of the environment and customer needs. Some customers just need two or three policies and that's all. But some customers need more policies designed to cover the needs of specific departments. So deployment depends on the size of your environment. If it's a small company, it's not very hard to deploy the main features of Palo Alto, it may take an hour but not more than a day. It depends on the customer needs and size of the environment.

What about the implementation team?

I work as the system integrator, so I install instances of Palo Alto myself. It was the first security product that I learned to work with.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller.
PeerSpot user
reviewer1132443 - PeerSpot reviewer
Works at a computer software company with 201-500 employees
Real User
Country blocking, URL filtering, reporting, and visibility help to enforce our acceptable use policies
Pros and Cons
  • "One of the things I really like about it is that we have the same features and functions available on the entry-level device (PA-220), as do large corporations with much more costly appliances."
  • "The initial configuration is complicated to set up."

What is our primary use case?

I use the PA-220 to protect the LAN at my small-ish (about twenty people) office. We have several remote users who use the GlobalProtect VPN. As we move into a data center for hosting, I'll buy a second PA-220 to set up a site-to-site VPN. We also have a VM-50 for internal testing and lab use. 

How has it helped my organization?

I'm writing this review because it's a great product and I think it's ranked much too low on the review ratings. One of the things I really like about it is that we have the same features and functions available on the entry-level device (PA-220), as do large corporations with much more costly appliances.

With all the bells and whistles turned on, I can block access to websites based on their location (country), content, or other criteria. The reporting is really useful and shows me the most frequently used applications, and provides me with great visibility as to what my network users are doing on the internet. With this firewall in place, I can finally enforce the variety of acceptable use policies which have existed only on paper. 

What is most valuable?

The most valuable features are blocking traffic by country, and URL filtering to improve policy compliance and our overall cybersecurity posture. The ad blocker is also pretty handy. Moreover, the VPN client has turned out to be more useful than I initially thought, and the users love the 'one-click' connect. 

What needs improvement?

The initial configuration is complicated to set up. You really have to know what you're doing. I attribute that to all of the features and functions that are built into the product. Luckily, Palo Alto has a great support site and you can find contractors who are knowledgeable in the technology.

For how long have I used the solution?

One year.

How are customer service and technical support?

Technical support for this solution is great.

Which solution did I use previously and why did I switch?

Previously we used a pfSense firewall. I was very unhappy with it, as it had a limited feature set and was not intuitive to configure. 

How was the initial setup?

The initial setup is complex, due to all the features offered. You really have to know what you're doing.

What about the implementation team?

Implemented through a vendor who was knowledgeable with the product. It took at least a few months of tweaking before we got the firewall to the point it's currently at. 

What's my experience with pricing, setup cost, and licensing?

It will be worth your time to hire a contractor to set it up and configure it for you, especially if you are not very knowledgeable with PA firewalls. 

Which other solutions did I evaluate?

We looked at Cisco Meraki, but I wasn't really all that happy with it. 

What other advice do I have?

I've used it and I'm very happy. Frankly, I think this site under-rates the technology, as it should be in at least the top three.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
Network Security Engineer at Data Consult
Real User
Gives us visibility and protection for the entire network
Pros and Cons
  • "I like to install Palo Alto mainly on the data center side to have visibility into all VLANs. That gives full visibility into the core."
  • "I'm thinking about a new feature. They have decryption. It's a good idea to use decryption on Palo Alto. It would be good if they had offloading of the traffic, and if they could decrypt the traffic and offload it. Like, for example, ASM on our site. We have an SSL decryption to offload the traffic. We could use that on Palo Alto."

What is our primary use case?

I used Palo Alto firewalls for plenty of projects and have many use cases.

When working with App-ID, it is important to understand that each App-ID signature may have dependencies that are required to fully control an application. For example, with Facebook applications, the App‑ID Facebook‑base is required to access the Facebook website and to control other Facebook applications. For example, to configure the firewall to control Facebook email, you would have to allow the App-IDs Facebook-base and Facebook-mail.

How has it helped my organization?

I like to install Palo Alto mainly on the data center side to have visibility and protection into the network because we can configure the SVI (layer 3) on Palo Alto instead of the core switch.

It gives us full visibility and protection for the core of the network.

What is most valuable?

Visibility and Protection

It gives us good visibility into the network, and this is very important because it's the core of the network. All the packets go through the firewall.

MFA is a new feature in Palo Alto and it's good to use it.

What needs improvement?

I'm thinking about a new feature. They have decryption. It's a good idea to use decryption on Palo Alto. It would be good if they can offload the traffic.
Like, for example, SSL Offloading on F5. They have an SSL decryption to offload the traffic. 

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

Palo Alto is very stable. I worked on Cisco products like FTD and Firepower, and they are not as stable as Palo Alto. Also, some Fortigates are not stable. Palo Alto, as far as I know, is the most stable firewall compared to these others.

What do I think about the scalability of the solution?

The solution is scalable because they are now using the next generation security network. They are integrating with endpoint protection. Palo Alto now has traps, so they integrate their traps and the next generation with the cloud. So it is scalable.

How are customer service and technical support?

Technical support in Cisco is better than Palo Alto. In Cisco, you can directly talk to the top engineers.

Which solution did I use previously and why did I switch?

We were using Cisco ASA. When Cisco moved to the next generation firewall or tried to move to the next generation firewall when they acquired Sourcefire, and they announced Firepower on ASA, it was not a good option.
They had tool management so you could configure ASA from the CLI and you could configure it on the Firepower. You need to redirect the traffic from ASA to Firepower. It was not a good idea. The packets were processed but there was latency in the packets. 
Nowdays, FTD has many problems and bugs.

When selecting a vendor, the important criteria is how much the appliance is powerful and if it gives me the feature that I want, not an appliance that does everything and it will affect the throughput. Also, the value of the product, the price. 

There has to be a match between the price and the features.

Which other solutions did I evaluate?

Palo Alto, Cisco.

What other advice do I have?

Buy Palo Alto and try its features. In Palo Alto, you have select prevention, scan over AV, anti-spyware, vulnerability protection. and file blocking. you have good feature like WildFire to protect against unknown malware.

I rate Palo Alto at eight out of 10 because it gives me visibility and protection. This visibility and protection are very important nowadays to protect you from hackers.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2025
Product Categories
Firewalls
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros sharing their opinions.