We use this solution to block malicious or suspicious activity by creating policies that define which action should be blocked or allowed.
Network Engineer at Acliv Technologies Pvt Ltd
Secures and deeply analyzes connections
Pros and Cons
- "The most valuable feature is the ability to deeply analyze the connection or connection type."
- "Overall it is good. It is reliable and easy to understand. However, the monitoring feature could be improved."
What is our primary use case?
How has it helped my organization?
The firewall is a security device. We use this solution to create policies like ISPs for a specific purpose. We only allow the policies for a particular application, so this is a way for the firewall to secure an unwanted connection.
What is most valuable?
The most valuable feature is the ability to deeply analyze the connection or connection type.
What needs improvement?
Overall it is good. It is reliable and easy to understand. However, the monitoring feature could be improved.
They have many solutions already. I don't think I have seen any missing features. Every device has different functions, but as a firewall, this solution has a lot.
Buyer's Guide
Palo Alto Networks NG Firewalls
December 2024
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
For how long have I used the solution?
I have been using this for three years.
What do I think about the stability of the solution?
Stability is good.
What do I think about the scalability of the solution?
There are no scalability issues to date.
We have about 2,500 users behind the firewall using this solution. I think we don't have any requirement to increase usage. Currently, we have around 2,500 users, but if this increases, we may need a new requirement.
We hired one or two people to maintain the solution.
How are customer service and support?
Technical support is good. Once you call up with your issue, it takes around one or two hours for them to contact and give you a solution accordingly.
Which solution did I use previously and why did I switch?
We were using Cisco ASA. We switched because of legal reasons and difficulty to understand. That's why they had decided to change to Firewall.
How was the initial setup?
It is very easy to use. It's straightforward, easy to understand, and easy to configure.
What about the implementation team?
Deployment time depends on your requirements. If you talk about the system requirements, it hardly takes up to 15 or 20 minutes for the configuration.
That said, it totally depends on your requirements: What kind of policy you require that supports what kind of block, etc.
The deployment time would change based on these requirements, but the system configuration: accessing the internet and creating policies hardly takes 20 minutes.
Deployment is configured by administrators, so if we have any kind of issue in policies or any confusion, we get tech support.
What's my experience with pricing, setup cost, and licensing?
Pricing is yearly, but it depends. You could pay on a yearly basis or every three years.
If you want to add a device or two, there would be an additional cost. Also, if you want to do an assessment or another similar add-on you have to pay accordingly for the additional service.
Which other solutions did I evaluate?
We also evaluated Check Point and Fortinet solutions.
What other advice do I have?
This solution is easy to understand, reliable, and user-friendly.
I would rate this solution as eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Presales Specialist at a tech services company with 1-10 employees
Embedded machine learning reduces manual work of having to search for attacks in a SIEM
Pros and Cons
- "DNS Security is a good feature because, in the real world with web threats, you can block all web threats and bad sites. DNS Security helps to prevent those threats. It's also very helpful with Zero-day attacks because DNS Security blocks all DNS requests before any antivirus would know that such requests contain a virus or a threat to your PC or your network."
- "The only area I can see for improvement is that Palo Alto should do more marketing."
What is our primary use case?
We have had a couple of big projects with government companies here in Ukraine. One of those projects involved three data centers with a lot of security and network requirements, and we implemented Palo Alto as part of this project.
The use case was to build the new data centers with a firewall that would not only work on the perimeter but also for internal traffic. We deployed eight PA-5200 Series firewalls and integrated them with VMware NSX, and they're working together.
How has it helped my organization?
One of the points that helped us win the tender is that Palo Alto NG Firewalls embed machine learning in the core of the firewall to provide inline, real-time attack prevention. The customer's security team was asking for this feature from the firewalls because machine learning makes things much easier than manually sitting there with some kind of SIEM and searching for all kinds of attacks and critical issues. The machine learning is really helpful because it's doing the work automatically.
What is most valuable?
We had a small project with the PA-800 Series appliance where we implemented DNS Security. DNS Security is a good feature because, in the real world with web threats, you can block all web threats and bad sites. DNS Security helps to prevent those threats. It's also very helpful with Zero-day attacks because DNS Security blocks all DNS requests before any antivirus would know that such requests contain a virus or a threat to your PC or your network.
In general, Palo Alto NG Firewalls are
- easy to manage
- good, reliable appliances
- easy to configure.
They also have a good balance between security and traffic. They have good hardware and, for management, they have their own data plane. If traffic is really overloading the data plane, you still have the ability to get into the management tools to see what's going on. You can reset or block some traffic. Not all firewalls have that feature.
They have really good clients, such as a VPN client. You can also enforce security standards on workers in the field. It's a really good product. And now, for endpoint security, they have Cortex XDR. You use the same client, but with additional licenses that enable more features.
What needs improvement?
The only area I can see for improvement is that Palo Alto should do more marketing.
For how long have I used the solution?
We work with customers, but we are not using the solution ourselves.
What do I think about the scalability of the solution?
The scalability is really good because they have a chassis version of appliances. They plan to build new chassis. But for the really big projects here in Ukraine, we can easily cover what we need with the PA-8000 Series with Palo Alto chassis appliances.
In our project with the three data centers, each data center was able to process 40 gigs.
How are customer service and support?
First-level support is provided by our distributor Bakotech. They are technical guys and they really know the product. Unlike some support providers who just send you manuals to ready, they're really helpful. You can call them at any time and they get back to you shortly and help.
How was the initial setup?
The initial setup is really easy. If you're working with Palo Alto Panorama, which is their management server, it's very easy to deploy a lot of appliances in a couple of days, because you're just sending out the configuration and templates on a blind device. In a couple of hours that device is working like the rest.
Which other solutions did I evaluate?
Another valuable aspect of Palo Alto NG Firewalls is that the appliances and software are really reliable in terms of stability and performance. Some firewall vendors don't write real information on their datasheets and, after implementing them, you see that the reality is not the way it was described. For example, when it comes to threat prevention and how much traffic appliances can handle, there was a project where we beat another vendor's firewall because Palo Alto has the real information on its datasheets.
I have some experience with Cisco, on a small project but there was a somewhat older software version, and there was a lot of lag. When changing something in the configuration, once you pushed "commit" you could go have a coffee or do other stuff for 20 minutes or more, because it took a really long time to push that configuration to the device.
What other advice do I have?
If a colleague at another company said to me, "We're just looking for the cheapest and fastest firewall," I would tell them that the cheapest is not the best. If you need really reliable hardware and software, and don't want headaches after the implementation, just buy Palo Alto.
The PA-400 is really strong and not only for SOHO or SMB companies. They have a really big throughput with Threat Prevention and DNS Security enabled. It's a really good appliance in a small size. But it's not only for small companies. The PA-460 can easily handle the traffic of a midsize company, one with 100 or 200 employees, and maybe even a little more. The PA-460 can handle about 5 gigs of traffic. With Threat Prevention, they can handle 2.5 gigabytes of traffic. For a regular office, that's good. It might be a little small for big companies.
Regarding DS tunneling, it is mostly peer-type attacks. With tunneling, it depends on what type of tunneling is used. You need to look at the specific case, at things like whether it was an internal DNS tunnel or one from the outside to the inside between branches. Most of the time, you can see that kind of traffic with a firewall if you have enabled full logging and you drop the logs into a good SIEM, like ArcSight or others. You will see the anomaly traffic via tunnels. You can also switch on decryption so you can decrypt a tunnel and see what is going on inside.
We have had no issues from our customers who are working with Palo Alto NG Firewalls. They fully cover all our customers' needs.
Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
Buyer's Guide
Palo Alto Networks NG Firewalls
December 2024
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
Cyber Security Solutions Architect at a tech services company with 10,001+ employees
Offers innovative, advanced threat protection
Pros and Cons
- "Innovative, advanced threat protection is the most valuable feature."
- "The user interface is probably not as slick as it could be."
What is our primary use case?
Our primary use case was for perimeter protection.
What is most valuable?
Innovative, advanced threat protection is the most valuable feature.
What needs improvement?
I don't see any specific room for improvement.
The user interface is probably not as slick as it could be.
For how long have I used the solution?
I have been using Palo Alto for three years.
We're on-premises primarily at the moment, but also a cloud product.
What do I think about the stability of the solution?
The stability is generally pretty good. I haven't heard any complaints from our customers around Palo Alto's stability. It's one of the reasons why they're the leaders in this space.
We've got our own team for maintenance. My company is a large multinational with 20,000 employees.
How are customer service and technical support?
I have contacted their support once. It's very good support. They help me to fix our problem quickly.
How was the initial setup?
The initial setup was complex. It's not very intuitive. You need to know what you're doing for the initial setup, you need to be a Palo Alto expert.
If you compare it to their competitor Fortinet, Fortinet's FortiGate product is a lot easier to install, if you're not an expert.
The time it takes to deploy depends on how complex the deployment needs to be for the client. If it's a basic deployment, is going to take around two days.
What other advice do I have?
My advice would be to make sure the firewall is configured properly.
I would rate it an eight out of ten. Not a ten because you have to be really excellent before you get a ten out of me.
In the next release, I would like to have the ability to auto-generate rule and policy, based on known traffic, based on the baseline. That is a feature that I think Palo Alto should be able to have in some form or fashion to auto-generate and propose a policy and rules set, after putting the file into a learning mode for some period.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Senior Technical Consultant at Exclusive GRP
Valuable accessibility, antivirus, and stability features with a simple implementation
Pros and Cons
- "The basic configuration will only take 15 minutes to set up"
- "Customers don't want to buy extra things for extra capabilities"
What is our primary use case?
We're customer facing; each customer uses it for a different purpose. Some use NG Firewalls for IPS capability, some for application capabilities, these kinds of things.
What is most valuable?
The accessibility, antivirus, and stability features are the most valuable. It's so stable, the customer can use the decryption features without impacting performance.
What needs improvement?
Most customers ask about the choice of features. It's limited. It's not arranged well for users. Also, customers don't want to buy extra things for extra capabilities. I would like to implement individual profiles for each user. Capability, in general, is limited.
For how long have I used the solution?
I've been using the solutions for 2 years.
What do I think about the stability of the solution?
It's a very stable solution.
How are customer service and technical support?
I am the customer's technical support. If a customer has issues, they would call me.
How was the initial setup?
The initial setup was basic. It was very simple. The basic configuration will only take 15 minutes. Anyone can set it up. If a person has worked with a firewall before, they can do it themselves. You only need one person for deployment.
What's my experience with pricing, setup cost, and licensing?
Licensing is on a three year basis. Customers prefer one to three years. Licencing is pretty expensive. Check Point is cheaper than Palo Alto. There's also an international license. If a customer wants to control different things, they will need an extra license.
What other advice do I have?
I've helped customers using Fortinet and Check Point. They are compromised. Their firewall is not stable. But for some features, for example, encryption, they want to use this feature, but the firewall feature isn't great. With Palo Alto, there isn't any problem, you can open any feature - IPS feature, data encryption feature - there isn't an issue.
Implementation is simple, the product is stable, but I advise if people get the firewall I strongly recommend the use of the API features. They may not be accustomed to using a next-generation firewall. If they want to use NG Firewalls, they need to use and implement the API features. They need to create uses based on the application.
My understanding is Version 9 will introduce some logic features.
I would rate this solution 9 out of 10.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Technical Manager at Ipenet Solutions
Secure solution that makes it easy to understand your network visibility, control the network, and prevent attacks
Pros and Cons
- "The solution is user-friendly. It's secure and easy to understand your network visibility, control the network, and prevent attacks."
- "The pricing could be improved. They need to work on the setup over the firewall, VLAN, and PPPoE."
What is our primary use case?
I am a reseller of Palo Alto Networks.
What is most valuable?
The solution is user-friendly. It's secure and easy to understand your network visibility, control the network, and prevent attacks.
What needs improvement?
The pricing could be improved. They need to work on the setup over the firewall, VLAN, and PPPoE.
What do I think about the stability of the solution?
It's stable.
What do I think about the scalability of the solution?
It's scalable.
How are customer service and support?
I seldom call technical support because it's easy to understand and configure the solution.
What's my experience with pricing, setup cost, and licensing?
It could be less expensive.
What other advice do I have?
I would rate this solution 9 out of 10.
If you want to have a secure network, use Palo Alto.
Disclosure: My company has a business relationship with this vendor other than being a customer:
Security Engineer at a tech services company with 1,001-5,000 employees
Enables us to monitor VPN compliance and integrate with multiple vendors
Pros and Cons
- "With App-ID, we can identify exact traffic. Even if someone tries to fool the firewall with a different port number, or with the correct port number, Palo Alto is able to identify what kind of traffic it is."
- "The solution has normal authentication, but does not have two-factor or multi-factor authentication. There is room for development there."
What is our primary use case?
These firewalls are only used for perimeter purposes, in gateway mode.
How has it helped my organization?
In addition to our environment being secure, we can monitor compliance of VPN users. Security and monitoring are the two big benefits.
It's also very critical for us that it provides a unified platform that natively integrates all security capabilities. We have multiple vendors and multiple solutions. Palo Alto has to work with them. For example, when it comes to authentication, we can integrate LDAP and RADIUS, among others. And in one of our customer's environments, we have integrated a new, passwordless authentication.
What is most valuable?
Apart from the security, Palo Alto NG Firewalls have nice features like App-ID and User-ID. These are the two most useful features.
With App-ID, we can identify exact traffic. Even if someone tries to fool the firewall with a different port number, or with the correct port number, Palo Alto is able to identify what kind of traffic it is.
With User-ID, we can configure single sign-on, which makes things easy for users. There is no need for additional authentication for a user. And for documentation and reporting purposes, we can fetch user-based details, based on User-ID, and can generate new reports.
Another good feature is the DNS Security. With the help of DNS security, we can block the initial level of an attack, and we can block malicious things from a DNS perspective.
The GlobalProtect VPN is also very useful.
What needs improvement?
The solution has normal authentication, but does not have two-factor or multi-factor authentication. There is room for development there.
For how long have I used the solution?
We have been using Palo Alto Networks NG Firewalls for two years. I've worked on the 800 Series and the 3000 Series.
What do I think about the stability of the solution?
It's quite stable. They are launching a new firmware version, but compared to other products, Palo Alto is quite stable.
How are customer service and support?
I have worked with Palo Alto's support many times and it is quite good. Whenever we create a support ticket, they are on time and they update us in a timely manner. In terms of technical expertise, they have good people who are experts in it. They are very supportive of customers.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial deployment is straightforward; very simple. The primary access for these firewalls is quite simple. We can directly access them, after a few basic steps, and start the configuration. Even the hardware registration process and licensing are quite simple.
The time it takes to deploy a firewall depends upon hardware and upon the customer's environment. But a basic to intermediate deployment takes two to three months.
What was our ROI?
Our customers definitely see ROI with Palo Alto NG Firewalls, although I don't have metrics.
What's my experience with pricing, setup cost, and licensing?
I am not involved in the commercial side, but I believe that Palo Alto is quite expensive compared to others.
Which other solutions did I evaluate?
One of the pros of Palo Alto is the GlobalProtect, which is a VPN solution. GlobalProtect has broader compliance checks. I have worked on Check Point and FortiGate, but they don't have this kind of feature in their firewalls. Also, Check Point does not have DNS Security, which Palo Alto has.
What other advice do I have?
If you're going with Palo Alto, you have to use all its features, including the DNS Security, App-ID, and SSL decryption. Otherwise, there is no point in buying Palo Alto.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Director, Middle East, East India & SAARC at DMX Technologies
It is fine normally but has issues during peak business hours and needs better load handling, VPN connectors, and support
Pros and Cons
- "It worked fine normally."
- "The VPN connectors should be better. We had some challenges in terms of the VPN with Palo Alto Networks NG Firewall, and that's one of the main reasons why we moved to Sophos. Its load handling can also be improved. There were challenges when traffic was high. During peak business hours, it did not function very well. There was a lot of slowness, and the users used to complain, especially when they were connecting from outside. We even reported this to the support team. Their support should also be improved. Technical support was a bit of a concern while using this solution. We didn't get very good support from the Palo Alto team."
What is our primary use case?
We were mainly using it because we had two ISP links, so it was a kind of gateway device. Whenever a link went down, the firewall used to automatically switch over to the secondary link so that the internet connectivity is kind of highly available.
What is most valuable?
It worked fine normally.
What needs improvement?
The VPN connectors should be better. We had some challenges in terms of the VPN with Palo Alto Networks NG Firewall, and that's one of the main reasons why we moved to Sophos.
Its load handling can also be improved. There were challenges when traffic was high. During peak business hours, it did not function very well. There was a lot of slowness, and the users used to complain, especially when they were connecting from outside. We even reported this to the support team.
Their support should also be improved. Technical support was a bit of a concern while using this solution. We didn't get very good support from the Palo Alto team.
For how long have I used the solution?
I have been using this solution for almost two to three years.
What do I think about the stability of the solution?
It was fine normally, but during peak business hours, it used to have challenges. We faced this issue at least two to three times a month.
What do I think about the scalability of the solution?
It is not very scalable. We had around 100 users. We had around ten people in our IT team.
How are customer service and technical support?
Support was a bit of a concern while using this solution. The support that we received was not too great, which caused a lot of issues. They were not very customer friendly.
Which solution did I use previously and why did I switch?
This was the first firewall that we used.
How was the initial setup?
I didn't do the installation.
What other advice do I have?
I would not recommend this solution. I am sure they will come up with better models to overcome some of the challenges that we faced, but I would definitely not recommend this particular model.
I would rate Palo Alto Networks NG Firewalls a six out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Technology Engineer at a computer software company with 51-200 employees
Stable, very reliable, and easy to use
Pros and Cons
- "I have found it to be reliable and very easy to use. I haven't really encountered many problems with it because its documentation is clear and readily available on their website."
- "Based on the features that I have seen so far, I do not see any room for improvement, but they can improve their CLI documentation. I haven't really seen much when it comes to CLI documentation."
What is our primary use case?
I am currently testing Palo Alto and preparing for an exam.
How has it helped my organization?
The Global Protect Feature has allowed our organization to support our remote workforce.
What is most valuable?
I have found it to be reliable and very easy to use. I haven't really encountered many problems with it because its documentation is clear and readily available on their website.
What needs improvement?
They need to provide documentation for CLI, as most of the commands, we get from Community Forums.
For how long have I used the solution?
I have been doing research on Palo Alto for the past nine months.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
Highly scalable as the HA deployment allows you to pair up to eight devices at once.
How are customer service and technical support?
I haven't had a chance to contact them.
Which solution did I use previously and why did I switch?
Palo Alto is my first solution.
How was the initial setup?
Initial setup is easy and subsequent changes have been easy to implement as well.
What about the implementation team?
In-house expertise.
Which other solutions did I evaluate?
What other advice do I have?
I would say go for it because it seems to be stable and very reliable. I've spoken to some specialists who vouch for Palo Alto. They say they've been using it in their environment, and it hasn't let them down so far.
I would rate this solution a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Product Categories
FirewallsPopular Comparisons
Fortinet FortiGate
Netgate pfSense
Cisco Secure Firewall
Azure Firewall
Check Point NGFW
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Untangle NG Firewall
Fortinet FortiGate-VM
SonicWall NSa
KerioControl
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Palo Alto the best firewall for an on-premise/cloud hybrid IT network?
- What are the main differences between Palo Alto and Cisco firewalls ?
- Expert Opinion on Palo-Alto Required.
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Features comparison between Palo Alto and Fortinet firewalls
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which is better - Palo Alto Networks NG Firewalls or Sophos XG?
- What are the main differences between Palo Alto firewalls and Cisco Secure Firepower?
- What is a better choice, Azure Firewall or Palo Alto Networks NG Firewalls?
- Which Palo Alto Networks NG Firewalls model is recommended for 1200 users?