An NG firewall provides an additional level of network security and vigilance. It also helps us manage activities using privileges and a zero-trust approach.
Analyst at a non-tech company
Provide an additional level of network security and vigilance
Pros and Cons
- "I like the firewall's vulnerability management features, which give you reminders to update your system and update your OS."
- "The built-in machine learning features provide some automation, but I think there should be an option for manual review because nothing replaces the human eye."
What is our primary use case?
What is most valuable?
I like the firewall's vulnerability management features, which give you reminders to update your system and update your OS. Palo Alto Networks NG Firewalls provide a unified platform that integrates all security capabilities. It provides pretty good consistency across locations.
What needs improvement?
The built-in machine learning features provide some automation, but I think there should be an option for manual review because nothing replaces the human eye.
For how long have I used the solution?
We have used NG Firewalls for a little more than a year and a half.
Buyer's Guide
Palo Alto Networks NG Firewalls
November 2024
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
What do I think about the stability of the solution?
Palo Alto Networks NG Firewalls are pretty stable.
What do I think about the scalability of the solution?
Palo Alto Networks NG Firewalls scale up enough for my workplace. Beyond that, I could not say.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Engineer at a tech services company with 1,001-5,000 employees
Enables us to monitor VPN compliance and integrate with multiple vendors
Pros and Cons
- "With App-ID, we can identify exact traffic. Even if someone tries to fool the firewall with a different port number, or with the correct port number, Palo Alto is able to identify what kind of traffic it is."
- "The solution has normal authentication, but does not have two-factor or multi-factor authentication. There is room for development there."
What is our primary use case?
These firewalls are only used for perimeter purposes, in gateway mode.
How has it helped my organization?
In addition to our environment being secure, we can monitor compliance of VPN users. Security and monitoring are the two big benefits.
It's also very critical for us that it provides a unified platform that natively integrates all security capabilities. We have multiple vendors and multiple solutions. Palo Alto has to work with them. For example, when it comes to authentication, we can integrate LDAP and RADIUS, among others. And in one of our customer's environments, we have integrated a new, passwordless authentication.
What is most valuable?
Apart from the security, Palo Alto NG Firewalls have nice features like App-ID and User-ID. These are the two most useful features.
With App-ID, we can identify exact traffic. Even if someone tries to fool the firewall with a different port number, or with the correct port number, Palo Alto is able to identify what kind of traffic it is.
With User-ID, we can configure single sign-on, which makes things easy for users. There is no need for additional authentication for a user. And for documentation and reporting purposes, we can fetch user-based details, based on User-ID, and can generate new reports.
Another good feature is the DNS Security. With the help of DNS security, we can block the initial level of an attack, and we can block malicious things from a DNS perspective.
The GlobalProtect VPN is also very useful.
What needs improvement?
The solution has normal authentication, but does not have two-factor or multi-factor authentication. There is room for development there.
For how long have I used the solution?
We have been using Palo Alto Networks NG Firewalls for two years. I've worked on the 800 Series and the 3000 Series.
What do I think about the stability of the solution?
It's quite stable. They are launching a new firmware version, but compared to other products, Palo Alto is quite stable.
How are customer service and support?
I have worked with Palo Alto's support many times and it is quite good. Whenever we create a support ticket, they are on time and they update us in a timely manner. In terms of technical expertise, they have good people who are experts in it. They are very supportive of customers.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial deployment is straightforward; very simple. The primary access for these firewalls is quite simple. We can directly access them, after a few basic steps, and start the configuration. Even the hardware registration process and licensing are quite simple.
The time it takes to deploy a firewall depends upon hardware and upon the customer's environment. But a basic to intermediate deployment takes two to three months.
What was our ROI?
Our customers definitely see ROI with Palo Alto NG Firewalls, although I don't have metrics.
What's my experience with pricing, setup cost, and licensing?
I am not involved in the commercial side, but I believe that Palo Alto is quite expensive compared to others.
Which other solutions did I evaluate?
One of the pros of Palo Alto is the GlobalProtect, which is a VPN solution. GlobalProtect has broader compliance checks. I have worked on Check Point and FortiGate, but they don't have this kind of feature in their firewalls. Also, Check Point does not have DNS Security, which Palo Alto has.
What other advice do I have?
If you're going with Palo Alto, you have to use all its features, including the DNS Security, App-ID, and SSL decryption. Otherwise, there is no point in buying Palo Alto.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Buyer's Guide
Palo Alto Networks NG Firewalls
November 2024
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
Network Engineer at Vibs
Stable, good technical support, and there are helpful use case description on the website
Pros and Cons
- "The scalability is very good."
- "This is a difficult product to manage, so the administrator needs to have a good knowledge of it, otherwise, they will not be able to handle it properly."
What is our primary use case?
We are a solution provider and this is one of the firewalls that we implement for our clients.
What needs improvement?
This is a difficult product to manage, so the administrator needs to have a good knowledge of it, otherwise, they will not be able to handle it properly.
What do I think about the scalability of the solution?
The scalability is very good.
We have a small number of clients with this solution in place.
How are customer service and technical support?
The support is good.
Which solution did I use previously and why did I switch?
I have experience with multiple firewall vendors and I have seen that products from other vendors have bugs. My feeling is that Palo Alto does not have this problem.
Some of the vendors that I have worked with are Fortinet and Sophos. The setup and management of these products are easy compared to Palo Alto.
How was the initial setup?
Implementing this product can be a little bit difficult. The configuration is difficult compared to other products, so it would be nice if there were videos are other instructions available. It can be very time consuming for the network administrator.
What's my experience with pricing, setup cost, and licensing?
The pricing is very high.
What other advice do I have?
My advice for anybody who is implementing this firewall is to follow the guide or instructions that are available. There are multiple resources and examples of use cases available on the Palo Alto website, and you can directly follow them.
I would rate this solution a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
Network Security Engineer at Data Consult
Gives us visibility and protection for the entire network
Pros and Cons
- "I like to install Palo Alto mainly on the data center side to have visibility into all VLANs. That gives full visibility into the core."
- "I'm thinking about a new feature. They have decryption. It's a good idea to use decryption on Palo Alto. It would be good if they had offloading of the traffic, and if they could decrypt the traffic and offload it. Like, for example, ASM on our site. We have an SSL decryption to offload the traffic. We could use that on Palo Alto."
What is our primary use case?
I used Palo Alto firewalls for plenty of projects and have many use cases.
When working with App-ID, it is important to understand that each App-ID signature may have dependencies that are required to fully control an application. For example, with Facebook applications, the App‑ID Facebook‑base is required to access the Facebook website and to control other Facebook applications. For example, to configure the firewall to control Facebook email, you would have to allow the App-IDs Facebook-base and Facebook-mail.
How has it helped my organization?
I like to install Palo Alto mainly on the data center side to have visibility and protection into the network because we can configure the SVI (layer 3) on Palo Alto instead of the core switch.
It gives us full visibility and protection for the core of the network.
What is most valuable?
Visibility and Protection
It gives us good visibility into the network, and this is very important because it's the core of the network. All the packets go through the firewall.
MFA is a new feature in Palo Alto and it's good to use it.
What needs improvement?
I'm thinking about a new feature. They have decryption. It's a good idea to use decryption on Palo Alto. It would be good if they can offload the traffic.
Like, for example, SSL Offloading on F5. They have an SSL decryption to offload the traffic.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
Palo Alto is very stable. I worked on Cisco products like FTD and Firepower, and they are not as stable as Palo Alto. Also, some Fortigates are not stable. Palo Alto, as far as I know, is the most stable firewall compared to these others.
What do I think about the scalability of the solution?
The solution is scalable because they are now using the next generation security network. They are integrating with endpoint protection. Palo Alto now has traps, so they integrate their traps and the next generation with the cloud. So it is scalable.
How are customer service and technical support?
Technical support in Cisco is better than Palo Alto. In Cisco, you can directly talk to the top engineers.
Which solution did I use previously and why did I switch?
We were using Cisco ASA. When Cisco moved to the next generation firewall or tried to move to the next generation firewall when they acquired Sourcefire, and they announced Firepower on ASA, it was not a good option.
They had tool management so you could configure ASA from the CLI and you could configure it on the Firepower. You need to redirect the traffic from ASA to Firepower. It was not a good idea. The packets were processed but there was latency in the packets.
Nowdays, FTD has many problems and bugs.
When selecting a vendor, the important criteria is how much the appliance is powerful and if it gives me the feature that I want, not an appliance that does everything and it will affect the throughput. Also, the value of the product, the price.
There has to be a match between the price and the features.
Which other solutions did I evaluate?
Palo Alto, Cisco.
What other advice do I have?
Buy Palo Alto and try its features. In Palo Alto, you have select prevention, scan over AV, anti-spyware, vulnerability protection. and file blocking. you have good feature like WildFire to protect against unknown malware.
I rate Palo Alto at eight out of 10 because it gives me visibility and protection. This visibility and protection are very important nowadays to protect you from hackers.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Professional Services Consultant at a tech services company with 201-500 employees
Everything is available in a single, easy-to-use platform
Pros and Cons
- "Palo Alto Networks NG Firewalls have a Single Pass Parallel Processing (SP3) Architecture, which has a different kind of code doing the work. It increases the packet processing rate. Whereas, without the SP3 Architecture, you are waiting for each job to complete, even if you have 100 jobs assigned."
- "When there was change from IPv4 to IPv6, some of the firewalls still didn't support IPv6. In North America, we have seen most customers are using IPv6, as they are getting the IPv6 IPs from their ISPs. Sometimes, when they go through the firewall, it denies the traffic."
What is our primary use case?
We use it to see and detect malware. It is also used for antivirus, anti-spyware, anti-malware, vulnerability, and Wildfire analysis. We support different kinds of authentication as well: Kerberos, LDAP, TACACS, and SAML. All in all, it is a security device that you can have anywhere on your network, as per the design considerations.
It is deployed in two different ways, either on-premises or on the cloud, which may require a different hypervisor.
How has it helped my organization?
Nowadays, because of the pandemic, everyone is working from home or users are not sitting in the office to work. So, security has become a challenge. For that, we provide GlobalProtect, which is a VPN solution. This will connect to your organization's network, and then you can access anything that is required. This is the most widely used tool that we provide, and it is used worldwide. During the pandemic, it was a massive success for us.
Palo Alto NGFW provides a unified platform that natively integrates all security capabilities which is really important from the end customer point of view. If I have to set up an organization, I will go ahead and buy different devices or platforms. However, if I go ahead and buy Next-Generation Firewalls and put them on the edge of the network where I connect with ISPs, my Next-Generation Firewalls will take care of the security parameters. I don't need to worry about it that much anymore.
What is most valuable?
Its security profiles are a valuable feature.
All the logs can be stored in a single place.
Panorama lets all the devices be managed centrally in a single place. This provides the best view for admins into any particular firewall, which decreases those admins' tasks because they can view everything in a single place.
The machine learning tracks how many packets per second are coming into the firewall.
Any request coming in will go into the DNS sinkhole first, not to the user. We protect our users that way.
Within this one platform, you are getting everything that you want. This single device can provide you with antivirus, anti-spyware, volumetric protection, URL filtering where decryption is required, and file blocking with Wildfire analysis.
Palo Alto Networks NG Firewalls have a Single Pass Parallel Processing (SP3) Architecture, which has a different kind of code doing the work. It increases the packet processing rate. Whereas, without the SP3 Architecture, you are waiting for each job to complete, even if you have 100 jobs assigned.
What needs improvement?
There is always scope for improvement on any particular device in any particular organization. For example, when there was change from IPv4 to IPv6, some of the firewalls still didn't support IPv6. In North America, we have seen most customers are using IPv6, as they are getting the IPv6 IPs from their ISPs. Sometimes, when they go through the firewall, it denies the traffic.
For how long have I used the solution?
It has been almost three years.
What do I think about the stability of the solution?
From a stability point of view, the firewall is very stable because the PAN-OS version doesn't change very often. If a new PAN-OS version is out in the market, our engineering team checks it multiple times.
The network performance is never compromised.
What do I think about the scalability of the solution?
It is scalable. We have small and big clients.
For small clients, there is the PA-220 device, which is very small but still very productive and secure.
How are customer service and support?
I have worked with one of the TACs, where there are almost 500 TAC engineers present. They have different rules for case priority when a customer opens something. If a customer is paying more to get support, then we have a dedicated engineer assigned to that particular customer. This is much easier for the customer, as they are getting one of the best engineers out there to troubleshoot their network. They never compromise on that.
Sometimes, due to some issues, tickets don't get assigned. Or, they assign the tickets manually if something goes wrong, which is a very odd case. Customers don't understand that. So, we always apologize to customers, and say, "How can we help you out?"
Support is 10 out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We ask the end customer, whosoever has the legacy network in their organization, if they don't need all their extra devices in order to cut down on costs. We then do an IPSec tunnel on the cloud as a gateway. From there, they can route the traffic to the Internet or wherever they would like.
Palo Alto is a unified device with a very streamlined voice. I have worked on Cisco routers and ASA as well, where you have to do a lot of stuff through the CLI and Linux shell scripting. With Palo Alto, those things are streamlined and engineering takes care of everything.
How was the initial setup?
The initial setup is pretty straightforward. It is very user-friendly. Everyone in an organization can learn the platform quickly. When we give training to our new candidates, they learn it very quickly. So, it is a streamlined device.
There is an interface type called V-Wire. You just connect it to your network. It will not disturb anything. You don't need to provide IPs. It doesn't need a separate Mac address. It just connects to a particular interface as a bump in the wire. It inspects your traffic, giving you an overall idea of what applications your organization is using and what user is doing what. If needed, you can deploy it in your network later on. This makes it very easy for our customer to deploy the product in their network before they buy it.
When it comes to installing a new PAN-OS version, it doesn't require you to go to Linux and write tons of commands in order to download and activate the latest PAN-OS version. You just have to download it, click the download tab, click the install tab, and then you are done. Therefore, it is hassle-free and super easy like Windows.
What about the implementation team?
We have a very large team for deployment.
What was our ROI?
If you buy Palo Alto Next-Generation Firewalls, everything is in a single platform. You don't need to go and buy the Wildfire analysis to track zero-day attacks and lots of other things. Therefore, cost is cut down by 50% to 60% if you go for Palo Alto Next-Generation Firewalls.
What's my experience with pricing, setup cost, and licensing?
If someone doesn't have a security platform in their network, then the following licenses will be required: antivirus, anti-spyware, vulnerability, and Wildfire analysis. There are also licenses for GlobalProtect and support.
Which other solutions did I evaluate?
Overall, Palo Alto Networks NG Firewalls is a market leader.
With other devices, you need a controller and console to manage them. That is not the case with Palo Alto Networks NG Firewalls, where most of the work is done through the GUI. If you want to deep dive, then you go to the CLI.
Cisco ASAs give some information on the Nexus Firewall, but they are not streamlined. Whereas, Palo Alto Networks NG Firewalls is a streamlined device and easy to use.
What other advice do I have?
If someone is in a routing and switching domain and wants to come up to a security domain, they should choose Palo Alto Network NG Firewalls.
We are happy to assist customers whenever support is missing. Over a period of time, we see customers raise tickets because they are looking for a particular feature that is not available on the platform. We don't say to our customers, "We don't support this." Instead, we take it as an opportunity, giving that information to our engineering team.
I would rate the solution as nine out of 10. I am leaving room for improvement.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Network Security Engineer at a tech services company with 51-200 employees
The best firewall with easy configuration, excellent support, and good security and protection features
Pros and Cons
- "IoT security is most valuable in the current version. Content IDs, DDoS protection, zone protection, and DLP are the most prominent features in Palo Alto Networks NG Firewall. It is easier to configure than other solutions."
- "People sometimes find it more expensive as compared to other solutions. There are also fewer training opportunities for Palo Alto than Cisco and other vendors."
What is our primary use case?
We shifted an existing network from Cisco to Palo Alto. It was like a branch to head office network.
We have done public and private cloud deployments as well as on-prem deployments. We are using versions 8, 9, and 10.
What is most valuable?
IoT security is most valuable in the current version. Content IDs, DDoS protection, zone protection, and DLP are the most prominent features in Palo Alto Networks NG Firewall. It is easier to configure than other solutions.
What needs improvement?
People sometimes find it more expensive as compared to other solutions. There are also fewer training opportunities for Palo Alto than Cisco and other vendors.
For how long have I used the solution?
I have been using this solution for the last four or five years.
What do I think about the stability of the solution?
It is working fine.
What do I think about the scalability of the solution?
Its scalability has been fine for our use cases. It is good for large-scale environments, and there are no problems.
How are customer service and technical support?
Their technical support is excellent.
How was the initial setup?
It is very straightforward. They also have a very good script, so it runs very smoothly.
What's my experience with pricing, setup cost, and licensing?
It is expensive as compared to other brands.
What other advice do I have?
If we are comparing firewalls, this is the best firewall. I would rate Palo Alto Networks NG Firewall a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Engineer at Acliv Technologies Pvt Ltd
Secures and deeply analyzes connections
Pros and Cons
- "The most valuable feature is the ability to deeply analyze the connection or connection type."
- "Overall it is good. It is reliable and easy to understand. However, the monitoring feature could be improved."
What is our primary use case?
We use this solution to block malicious or suspicious activity by creating policies that define which action should be blocked or allowed.
How has it helped my organization?
The firewall is a security device. We use this solution to create policies like ISPs for a specific purpose. We only allow the policies for a particular application, so this is a way for the firewall to secure an unwanted connection.
What is most valuable?
The most valuable feature is the ability to deeply analyze the connection or connection type.
What needs improvement?
Overall it is good. It is reliable and easy to understand. However, the monitoring feature could be improved.
They have many solutions already. I don't think I have seen any missing features. Every device has different functions, but as a firewall, this solution has a lot.
For how long have I used the solution?
I have been using this for three years.
What do I think about the stability of the solution?
Stability is good.
What do I think about the scalability of the solution?
There are no scalability issues to date.
We have about 2,500 users behind the firewall using this solution. I think we don't have any requirement to increase usage. Currently, we have around 2,500 users, but if this increases, we may need a new requirement.
We hired one or two people to maintain the solution.
How are customer service and technical support?
Technical support is good. Once you call up with your issue, it takes around one or two hours for them to contact and give you a solution accordingly.
Which solution did I use previously and why did I switch?
We were using Cisco ASA. We switched because of legal reasons and difficulty to understand. That's why they had decided to change to Firewall.
How was the initial setup?
It is very easy to use. It's straightforward, easy to understand, and easy to configure.
What about the implementation team?
Deployment time depends on your requirements. If you talk about the system requirements, it hardly takes up to 15 or 20 minutes for the configuration.
That said, it totally depends on your requirements: What kind of policy you require that supports what kind of block, etc.
The deployment time would change based on these requirements, but the system configuration: accessing the internet and creating policies hardly takes 20 minutes.
Deployment is configured by administrators, so if we have any kind of issue in policies or any confusion, we get tech support.
What's my experience with pricing, setup cost, and licensing?
Pricing is yearly, but it depends. You could pay on a yearly basis or every three years.
If you want to add a device or two, there would be an additional cost. Also, if you want to do an assessment or another similar add-on you have to pay accordingly for the additional service.
Which other solutions did I evaluate?
We also evaluated Check Point and Fortinet solutions.
What other advice do I have?
This solution is easy to understand, reliable, and user-friendly.
I would rate this solution as eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Cyber Security Solutions Architect at a tech services company with 10,001+ employees
Offers innovative, advanced threat protection
Pros and Cons
- "Innovative, advanced threat protection is the most valuable feature."
- "The user interface is probably not as slick as it could be."
What is our primary use case?
Our primary use case was for perimeter protection.
What is most valuable?
Innovative, advanced threat protection is the most valuable feature.
What needs improvement?
I don't see any specific room for improvement.
The user interface is probably not as slick as it could be.
For how long have I used the solution?
I have been using Palo Alto for three years.
We're on-premises primarily at the moment, but also a cloud product.
What do I think about the stability of the solution?
The stability is generally pretty good. I haven't heard any complaints from our customers around Palo Alto's stability. It's one of the reasons why they're the leaders in this space.
We've got our own team for maintenance. My company is a large multinational with 20,000 employees.
How are customer service and technical support?
I have contacted their support once. It's very good support. They help me to fix our problem quickly.
How was the initial setup?
The initial setup was complex. It's not very intuitive. You need to know what you're doing for the initial setup, you need to be a Palo Alto expert.
If you compare it to their competitor Fortinet, Fortinet's FortiGate product is a lot easier to install, if you're not an expert.
The time it takes to deploy depends on how complex the deployment needs to be for the client. If it's a basic deployment, is going to take around two days.
What other advice do I have?
My advice would be to make sure the firewall is configured properly.
I would rate it an eight out of ten. Not a ten because you have to be really excellent before you get a ten out of me.
In the next release, I would like to have the ability to auto-generate rule and policy, based on known traffic, based on the baseline. That is a feature that I think Palo Alto should be able to have in some form or fashion to auto-generate and propose a policy and rules set, after putting the file into a learning mode for some period.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Product Categories
FirewallsPopular Comparisons
Fortinet FortiGate
Netgate pfSense
Cisco Secure Firewall
Azure Firewall
Check Point NGFW
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Untangle NG Firewall
Fortinet FortiGate-VM
SonicWall NSa
KerioControl
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Palo Alto the best firewall for an on-premise/cloud hybrid IT network?
- What are the main differences between Palo Alto and Cisco firewalls ?
- Expert Opinion on Palo-Alto Required.
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Features comparison between Palo Alto and Fortinet firewalls
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which is better - Palo Alto Networks NG Firewalls or Sophos XG?
- What are the main differences between Palo Alto firewalls and Cisco Secure Firepower?
- What is a better choice, Azure Firewall or Palo Alto Networks NG Firewalls?
- Which Palo Alto Networks NG Firewalls model is recommended for 1200 users?