We resell products by Palo Alto and Cisco, and this next-generation firewall by Palo Alto is one of the products that we are familiar with.
System Engineer at IRIS
Good web and application filtering, but the traps needs to be improved
Pros and Cons
- "The most valuable features are web filtering and application filtering."
- "I would like to see better integration with IoT technologies."
What is our primary use case?
What is most valuable?
The most valuable features are web filtering and application filtering.
The IPS functionality is very good.
The performance is good.
What needs improvement?
The price is expensive and should be reduced to make it more competitive.
Information about Palo Alto products is more restricted than some other vendors, such as Cisco, which means that getting training is important.
The traps should be improved.
I would like to see better integration with IoT technologies. Having a unified firewall for OT and IT would be very good.
For how long have I used the solution?
We have been working with Palo Alto for about one year.
Buyer's Guide
Palo Alto Networks NG Firewalls
March 2025

Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
847,959 professionals have used our research since 2012.
What do I think about the stability of the solution?
This is a stable firewall and you don't have a lot of surprises. The performance, throughput, and decryption are all good. It is important to remember that at the end of the day, it depends on the configuration.
For special functionality, you are going to have some exceptions. However, for the well-known functionality, it is stable.
What do I think about the scalability of the solution?
It is scalable in that the performance is good and you don't need a large cluster to operate it.
How are customer service and support?
The technical support is good. The team is responsive and they gave us the right information at the right time to solve the difficulties and complexities that we were experiencing.
Which solution did I use previously and why did I switch?
We also sell products by Cisco and there are some differences between them. Palo Alto is more expensive and the performance is better. With Cisco, the documentation is better and it is easier to install. There is a lot more information available for Cisco products.
What's my experience with pricing, setup cost, and licensing?
This is an expensive product, which is why some of our customers don't adopt it.
What other advice do I have?
My advice for anyone who is implementing the Palo Alto Next-Generation firewall is to take the training that is available. This will allow them to better work with the technology.
This is an ambitious company with a good security roadmap. The product is being continuously developed and they are professionals who are focused in this area of technology. It is the firewall that I personally recommend.
I would rate this solution a seven out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: partner

Chief of IT security department at a financial services firm with 1,001-5,000 employees
The DPI ability to understand web applications and build access rules on web application categories are great features
Pros and Cons
- "We have found the DPI ability to understand web applications and build access rules on web application categories first to be a great feature."
- "They could improve their support and pricing and maybe integration. It's a little more expensive that Check Point but the quality is better. Integration with firewall endpoints could be better. Palo Alto does have very good malware or antivirus protection. I think they could improve on that front."
What is our primary use case?
We use these firewalls on-premise. We use them as a central gateway for internet security. We also use them for organizing access to the internet from organizations, and security access rules.
What is most valuable?
We have found the DPI ability to understand web applications and build access rules on web application categories first to be a great feature. The firewalls have good integration and good log journals' integration with Qradar. This is how the system produces user logs, how they build, how they structure the logs is stable to integrate with SIEM. For example, Check Point is not so good in this category.
What needs improvement?
They could improve their support and pricing and maybe integration. It's a little more expensive than Check Point but the quality is better. Integration with firewall endpoints could be better. Palo Alto does have very good malware or antivirus protection. I think they could improve on that front.
For how long have I used the solution?
We have been using the Palo Alto Networks Next-Generation Firewalls for about 12 months. We are using the latest version.
What do I think about the stability of the solution?
We have found Palo Alto Networks Next-Generation Firewalls to be a very stable solution and very convenient solution.
What do I think about the scalability of the solution?
We don't have any problems with the performance. It works very good. We have not had any problems. If we compare with Check Point, Check Point is not really good in stability, not for monitoring. That is why we didn't choose Check Point to move to Palo Alto.
How are customer service and technical support?
We are satisfied with Palo Alto's support. We don't need to contact them frequently but when we do it is a good experience.
Which solution did I use previously and why did I switch?
If we compare with Check Point, Check Point is not really good in stability, not for monitoring. That is why we didn't choose Check Point to move to Palo Alto. Compared with Check Point, it's excellent. It's very good. It's even better than Cisco also. So for this kind of usage scenario, it's very good. We don't use it as a regular firewall or perimeter firewall. We use it only as an internet gateway. But for an internet gateway, it's very good.
How was the initial setup?
It was a very straightforward install and we were able to perform it from the Palo Alto books available. It only took one or two days for the installation. No problem with SIEM integrations or with the security policies. It's just worked as expected.
What about the implementation team?
We performed the installation in house from the Palo Alto books available.
What other advice do I have?
I would give Palo Alto Networks Next-Generation Firewalls a rating of nine on a scale of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Palo Alto Networks NG Firewalls
March 2025

Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
847,959 professionals have used our research since 2012.
Network Engineer at Vibs
Stable, good technical support, and there are helpful use case description on the website
Pros and Cons
- "The scalability is very good."
- "This is a difficult product to manage, so the administrator needs to have a good knowledge of it, otherwise, they will not be able to handle it properly."
What is our primary use case?
We are a solution provider and this is one of the firewalls that we implement for our clients.
What needs improvement?
This is a difficult product to manage, so the administrator needs to have a good knowledge of it, otherwise, they will not be able to handle it properly.
What do I think about the scalability of the solution?
The scalability is very good.
We have a small number of clients with this solution in place.
How are customer service and technical support?
The support is good.
Which solution did I use previously and why did I switch?
I have experience with multiple firewall vendors and I have seen that products from other vendors have bugs. My feeling is that Palo Alto does not have this problem.
Some of the vendors that I have worked with are Fortinet and Sophos. The setup and management of these products are easy compared to Palo Alto.
How was the initial setup?
Implementing this product can be a little bit difficult. The configuration is difficult compared to other products, so it would be nice if there were videos are other instructions available. It can be very time consuming for the network administrator.
What's my experience with pricing, setup cost, and licensing?
The pricing is very high.
What other advice do I have?
My advice for anybody who is implementing this firewall is to follow the guide or instructions that are available. There are multiple resources and examples of use cases available on the Palo Alto website, and you can directly follow them.
I would rate this solution a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: partner
President at MT-Data
Awesome stability, great firewall capabilities, and a rather straightforward initial setup
Pros and Cons
- "The solution allows us to set parameters on where our users can go. We can block certain sites or ads if we want to."
- "We're working with the entry-level appliances, so I don't know what the higher-end ones are like, however, on the entry-level models I would say commit speeds need to be improved."
What is our primary use case?
We primarily use the solution for the firewalls. We're also using the next-gen features to shape what's going on. For example, to figure out what is allowed out and what isn't allowed out on a layer-7 application-aware firewall. We can block based on the application, as opposed to port access.
How has it helped my organization?
The solution helped us stop being policemen to our users. We don't have to run around telling people they can't do certain things. We can just not allow it and walk away from it. We're not out there seeing who is doing what, we just don't allow the what.
What is most valuable?
The solution allows us to set parameters on where our users can go. We can block certain sites or ads if we want to.
The firewall capabilities are very good.
What needs improvement?
We're working with the entry-level appliances, so I don't know what the higher-end ones are like, however, on the entry-level models I would say commit speeds need to be improved.
The appliances I'm working on are relatively old now. We're talking five-year old hardware. That slow commit speed might be addressed with just the newer hardware. However, even though it is slow, the speed at which they do their job is very acceptable. The throughput even from a five-year-old appliance shocks me sometimes.
Currently, if I make changes on the firewall and I want to commit changes, that can take two or three minutes to commit those changes. It doesn't happen instantly.
The solution doesn't offer spam filtering. I don't know whether it's part of their plan to add something of that aspect in or not. I can always get spam filtering someplace else. It's not a deal-breaker for me. A lot of appliances do that, and there are just appliances that handle nothing but spam.
For how long have I used the solution?
I've been using the solution for five years.
What do I think about the stability of the solution?
The stability is awesome. I haven't had any issues with the solution stability-wise. I've got the same firewalls that have been out there for five years and they work great.
What do I think about the scalability of the solution?
I don't work with enterprise-class products. I'm not in that environment. However, so as far as I know, Palo Alto has products that will go that large. Panorama may be able to scale quite well. You can manage all your appliances out of it. They are a very popular license.
Their GlobalProtect license is very much like Cisco's AnyConnect. It does the endpoint security checks. It makes sure they've got the latest patches on and the antivirus running and they've got the latest antivirus definitions and whatnot installed before they allow the VPN connection to happen. It's quite nice.
How are customer service and technical support?
Their support is very good. I've never had any issues with their support. I would say that we've been satisfied with their level of service.
Occasionally there may be a bit of a language issue based on where their support is located.
How was the initial setup?
The initial setup is pretty typical. It's like any firewall. As long as you've worked with next-gen firewalls, it's just a matter of getting your head around the interface. It's the same sort of thing from one firewall to the other. It's just a matter of learning how Palo Alto does stuff. Palo Alto as a system, for me, makes a whole lot of sense in the way that they treat things. It makes sense and is easy to figure out. That's unlike, for example, the Cisco firewalls that seem to do everything backwards and in a complicated way to me.
I haven't worked with enough Cisco due to the fact I don't really like the way they work. That isn't to say that Cisco firewalls are bad or anything. It's just that they don't operate the way I think. That might have changed since they acquired FireEye which they bought a couple of years back.
What's my experience with pricing, setup cost, and licensing?
I know the solution is not inexpensive. It depends on what you ultimately sign up for or whether you just want the warranty on the hardware.
What other advice do I have?
I'm not really a customer. I'm like a consultant. I'm an introduction expert. If I think a client needs a certain technology I point them in the direction of whoever sells it. I do go in and configure it, so I do have experience actually using the product.
When I'm looking for something, I just find someone that sells Palo Alto and I redirect the client towards them. I'm not interested in being in a hardware vendor. There's no money in it. There's so much competition out there with people selling hardware. It doesn't matter where the client gets it from.
We tend to use the 200-series models of the solution.
I'd rate the solution eight out of ten. They do a very good job. The product works well.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Technical Consultant at Exclusive GRP
Valuable accessibility, antivirus, and stability features with a simple implementation
Pros and Cons
- "The basic configuration will only take 15 minutes to set up"
- "Customers don't want to buy extra things for extra capabilities"
What is our primary use case?
We're customer facing; each customer uses it for a different purpose. Some use NG Firewalls for IPS capability, some for application capabilities, these kinds of things.
What is most valuable?
The accessibility, antivirus, and stability features are the most valuable. It's so stable, the customer can use the decryption features without impacting performance.
What needs improvement?
Most customers ask about the choice of features. It's limited. It's not arranged well for users. Also, customers don't want to buy extra things for extra capabilities. I would like to implement individual profiles for each user. Capability, in general, is limited.
For how long have I used the solution?
I've been using the solutions for 2 years.
What do I think about the stability of the solution?
It's a very stable solution.
How are customer service and technical support?
I am the customer's technical support. If a customer has issues, they would call me.
How was the initial setup?
The initial setup was basic. It was very simple. The basic configuration will only take 15 minutes. Anyone can set it up. If a person has worked with a firewall before, they can do it themselves. You only need one person for deployment.
What's my experience with pricing, setup cost, and licensing?
Licensing is on a three year basis. Customers prefer one to three years. Licencing is pretty expensive. Check Point is cheaper than Palo Alto. There's also an international license. If a customer wants to control different things, they will need an extra license.
What other advice do I have?
I've helped customers using Fortinet and Check Point. They are compromised. Their firewall is not stable. But for some features, for example, encryption, they want to use this feature, but the firewall feature isn't great. With Palo Alto, there isn't any problem, you can open any feature - IPS feature, data encryption feature - there isn't an issue.
Implementation is simple, the product is stable, but I advise if people get the firewall I strongly recommend the use of the API features. They may not be accustomed to using a next-generation firewall. If they want to use NG Firewalls, they need to use and implement the API features. They need to create uses based on the application.
My understanding is Version 9 will introduce some logic features.
I would rate this solution 9 out of 10.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Technical Manager at Ipenet Solutions
Secure solution that makes it easy to understand your network visibility, control the network, and prevent attacks
Pros and Cons
- "The solution is user-friendly. It's secure and easy to understand your network visibility, control the network, and prevent attacks."
- "The pricing could be improved. They need to work on the setup over the firewall, VLAN, and PPPoE."
What is our primary use case?
I am a reseller of Palo Alto Networks.
What is most valuable?
The solution is user-friendly. It's secure and easy to understand your network visibility, control the network, and prevent attacks.
What needs improvement?
The pricing could be improved. They need to work on the setup over the firewall, VLAN, and PPPoE.
What do I think about the stability of the solution?
It's stable.
What do I think about the scalability of the solution?
It's scalable.
How are customer service and support?
I seldom call technical support because it's easy to understand and configure the solution.
What's my experience with pricing, setup cost, and licensing?
It could be less expensive.
What other advice do I have?
I would rate this solution 9 out of 10.
If you want to have a secure network, use Palo Alto.
Disclosure: My company has a business relationship with this vendor other than being a customer:
Senior information technology consultant at a tech services company with 11-50 employees
An extremely strong security tool, with machine learning capabilities for advanced threat detection
Pros and Cons
- "We have found the SSL decryption within this solution to be great; you can enable this feature and have the ability to see more of what is happening across your network."
- "We would like to see improvement in the web interface for this solution, so that it can handle updates without manual intervention to put the data in order."
What is our primary use case?
Our main use of this solution is to create micro segmentations only in the public cloud, and use the data we receive to see threats passing through the Vnets.
How has it helped my organization?
We have found that this solution has improved not only the level of security that is in place, but also reduced the amount of operational time needed for us to handle cloud-based security.
What is most valuable?
We have found the SSL decryption within this solution to be great; you can enable this feature and have the ability to see more of what is happening across your network.
We also really like the Wi-Fi service feature of this solution. It has a great base of information, and uses machine learning to improve recognition of issues and threats.
What needs improvement?
We would like to see improvement in the web interface for this solution, so that it can handle updates without manual intervention to put the data in order.
For how long have I used the solution?
We have been working with this solution for two years.
What do I think about the stability of the solution?
We have found this to be a stable solution during our time working with it.
What do I think about the scalability of the solution?
As it is cloud-based, the solution is easily scalable.
How are customer service and support?
We have found the technical support for this solution to be very good; we just open a support chat window and we have assistance when we need it.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used Fortinet, and changed to this solution because of the superior performance.
How was the initial setup?
The initial setup of this solution was very easy, and the deployment took just under two weeks to complete.
What about the implementation team?
We used a consultancy team from Add Valley Services for our implementation of this solution, and their service was great.
What's my experience with pricing, setup cost, and licensing?
We would advise that this solution has a higher price point than other comparable products, however, the license fee covers all the features that the solution can provide and there are not extra costs involved.
What other advice do I have?
We would recommend that organizations implementing this solution use a good consulting service and plan extensively up front, before implementation, in order to ensure a smooth deployment with no issues.
We would rate this solution as 10 out of 10.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security Engineer at a tech services company with 1,001-5,000 employees
Enables us to monitor VPN compliance and integrate with multiple vendors
Pros and Cons
- "With App-ID, we can identify exact traffic. Even if someone tries to fool the firewall with a different port number, or with the correct port number, Palo Alto is able to identify what kind of traffic it is."
- "The solution has normal authentication, but does not have two-factor or multi-factor authentication. There is room for development there."
What is our primary use case?
These firewalls are only used for perimeter purposes, in gateway mode.
How has it helped my organization?
In addition to our environment being secure, we can monitor compliance of VPN users. Security and monitoring are the two big benefits.
It's also very critical for us that it provides a unified platform that natively integrates all security capabilities. We have multiple vendors and multiple solutions. Palo Alto has to work with them. For example, when it comes to authentication, we can integrate LDAP and RADIUS, among others. And in one of our customer's environments, we have integrated a new, passwordless authentication.
What is most valuable?
Apart from the security, Palo Alto NG Firewalls have nice features like App-ID and User-ID. These are the two most useful features.
With App-ID, we can identify exact traffic. Even if someone tries to fool the firewall with a different port number, or with the correct port number, Palo Alto is able to identify what kind of traffic it is.
With User-ID, we can configure single sign-on, which makes things easy for users. There is no need for additional authentication for a user. And for documentation and reporting purposes, we can fetch user-based details, based on User-ID, and can generate new reports.
Another good feature is the DNS Security. With the help of DNS security, we can block the initial level of an attack, and we can block malicious things from a DNS perspective.
The GlobalProtect VPN is also very useful.
What needs improvement?
The solution has normal authentication, but does not have two-factor or multi-factor authentication. There is room for development there.
For how long have I used the solution?
We have been using Palo Alto Networks NG Firewalls for two years. I've worked on the 800 Series and the 3000 Series.
What do I think about the stability of the solution?
It's quite stable. They are launching a new firmware version, but compared to other products, Palo Alto is quite stable.
How are customer service and support?
I have worked with Palo Alto's support many times and it is quite good. Whenever we create a support ticket, they are on time and they update us in a timely manner. In terms of technical expertise, they have good people who are experts in it. They are very supportive of customers.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial deployment is straightforward; very simple. The primary access for these firewalls is quite simple. We can directly access them, after a few basic steps, and start the configuration. Even the hardware registration process and licensing are quite simple.
The time it takes to deploy a firewall depends upon hardware and upon the customer's environment. But a basic to intermediate deployment takes two to three months.
What was our ROI?
Our customers definitely see ROI with Palo Alto NG Firewalls, although I don't have metrics.
What's my experience with pricing, setup cost, and licensing?
I am not involved in the commercial side, but I believe that Palo Alto is quite expensive compared to others.
Which other solutions did I evaluate?
One of the pros of Palo Alto is the GlobalProtect, which is a VPN solution. GlobalProtect has broader compliance checks. I have worked on Check Point and FortiGate, but they don't have this kind of feature in their firewalls. Also, Check Point does not have DNS Security, which Palo Alto has.
What other advice do I have?
If you're going with Palo Alto, you have to use all its features, including the DNS Security, App-ID, and SSL decryption. Otherwise, there is no point in buying Palo Alto.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner

Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2025
Product Categories
FirewallsPopular Comparisons
Fortinet FortiGate
Netgate pfSense
Cisco Secure Firewall
Check Point NGFW
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Fortinet FortiGate-VM
SonicWall NSa
Untangle NG Firewall
KerioControl
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Palo Alto the best firewall for an on-premise/cloud hybrid IT network?
- What are the main differences between Palo Alto and Cisco firewalls ?
- Expert Opinion on Palo-Alto Required.
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Features comparison between Palo Alto and Fortinet firewalls
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which is better - Palo Alto Networks NG Firewalls or Sophos XG?
- What are the main differences between Palo Alto firewalls and Cisco Secure Firepower?
- What is a better choice, Azure Firewall or Palo Alto Networks NG Firewalls?
- Which Palo Alto Networks NG Firewalls model is recommended for 1200 users?