We use Palo Alto Networks NG Firewalls for our network security. We deployed the solution on both the cloud and on-prem.
Manager - Project at a consultancy with 10,001+ employees
Provides a unified platform that natively integrates all security capabilities
Pros and Cons
- "There are many valuable features, such as wireless cloud features."
- "The bugs can be improved."
What is our primary use case?
How has it helped my organization?
Palo Alto Networks NG Firewalls machine learning secures our network against threats that evolve rapidly.
The DNS security feature is already commonly used for authentication by clients, with many threats being pushed from the inside to the outside. DNS security helps improve our network.
The DNS security feature is integral in protecting against DNS tunneling.
The solution provides a unified platform that natively integrates all security capabilities. Palo Alto Networks NG Firewalls' unified platform helps us eliminate security threats. We use all the Palo Alto Networks NG Firewalls' features including the UTM, WiFi, and VPN feature to protect our network.
Both the network performance and security of the single-pass architecture are good.
What is most valuable?
There are many valuable features, such as wireless cloud features. The IP and signals are updated regularly, and all UTM features provide good basic gateway-level security.
Palo Alto Networks NG Firewalls machine learning in the core of the firewall to provide real-time attack prevention is a basic requirement for our private security network.
What needs improvement?
The bugs can be improved.
Buyer's Guide
Palo Alto Networks NG Firewalls
November 2024
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
817,354 professionals have used our research since 2012.
For how long have I used the solution?
I have been using the solution for eight years.
What do I think about the stability of the solution?
The solution is stable. We encounter small bugs sometimes but they are not a problem.
What do I think about the scalability of the solution?
The solution is scalable.
How are customer service and support?
The technical support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
For experienced people, the initial setup is straightforward. Cloud deployment can be challenging for someone new. The deployment takes around one hour.
What about the implementation team?
We implement the solution for our clients.
What other advice do I have?
I give the solution a nine out of ten.
Our clients are enterprise-level.
The PA400 series has good performance and security.
I recommend Palo Alto Networks NG Firewalls to others.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Implementer
Manager Data Servicers at Union Bank of Colombo
Provides protection by blocking security loopholes
Pros and Cons
- "It has a solid network security with some robust tools. We can block unexpected attacks, especially zero-day attacks. Since they use the Pan-OS engine, they can collect attacks from all over the world and analyze them. They can then protect against zero-day attacks and unexpected attacks."
- "I would like them to improve their GUI interface, making it more user-friendly."
What is our primary use case?
It is on-prem. We wanted to implement a multiple architecture for our network security. That is why we looked at the Palo Alto product. It is famous for its multi-layer security architecture and firewall.
There are five users: two senior expert administrators and one junior administrator from our data center team and two security engineers from our security team.
How has it helped my organization?
It has a solid network security with some robust tools. We can block unexpected attacks, especially zero-day attacks. Since they use the Pan-OS engine, they can collect attacks from all over the world and analyze them. They can then protect against zero-day attacks and unexpected attacks.
There are regular signature updates. You are filtering your objects from external sources. It has also helped to prevent external attacks more quickly. We have the solution enabled to prevent SQL injection attacks.
Palo Alto blocks loopholes where we cannot fix all our vulnerabilities, providing protection.
What is most valuable?
With secure application enablement, we can protect against application ID.
Another feature is its malware detection and prevention. DNS Security filters URLs, blocks malicious domains, and provides signature-based protection. They also have Panorama security. We prefer Palo Alto Networks for our parameter security because of these features.
It is not like a traditional firewall. It has sophisticated technology that uses machine learning against cyber attacks, preventing them.
The DNS Security feature is capable of proactively detecting and blocking malicious domains, which are a headache because you can never filter enough. Malicious domains increase in number everyday. That is why using machine learning is a perfect solution for preventing these types of malicious domain attacks.
We don't have to use other advanced technologies due to the solution's UTM capabilities, such as antivirus, anti-spam, and anti-spyware.
With its single-pass technology, the firewalls are capable of analyzing SSL traffic using less CPU and memory.
What needs improvement?
I would like them to improve their GUI interface, making it more user-friendly.
I would like the dashboard to have real-time analytics.
For how long have I used the solution?
We have been using it for almost three years.
What do I think about the stability of the solution?
Compared to other solutions, it is very stable.
How are customer service and support?
The technical support is perfect. I would rate them as nine out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Before 2008, we used only core firewall architecture for our network. Then, we needed to enhance our security as we moved toward the cloud. We needed to protect our network from external threats so we decided to go with multi-layer architecture.
We use several products: Palo Alto, Checkpoint, and three products. Among those products, Palo Alto's performance and product security features are very good.
We only used Juniper firewalls for our core Firewall. We switched because we wanted to move to a multi-layer architecture.
How was the initial setup?
The initial setup was straightforward. The initial configuration took one to two hours. You need to configure the policies and features. Since we had to do performance tuning, it took us two to three weeks.
What about the implementation team?
It is very easy to deploy. It needs two network engineers.
What was our ROI?
It is a good investment with the five-year extended support. You don't have to pay any additional costs for five years. You also save on costs because you don't need to purchase other products or technology to manage attacks. That can all be done from Palo Alto. We have seen a 20% to 30% return on investment.
What's my experience with pricing, setup cost, and licensing?
Compared to other products, the pricing is flexible and reasonable.
Which other solutions did I evaluate?
We did a PoC with several products, then we selected Palo Alto for its enhanced security features and multi-layer aspects. We also selected it for its speed and performance. Performance doesn't slow down when analyzing SSL traffic.
What other advice do I have?
We are currently using a single firewall architecture. Next year, we will probably move to a dual firewall architecture.
I would recommend Palo Alto Networks NGFW, especially for parameter-level security.
I would rate the product as 10 out of 10.
Which deployment model are you using for this solution?
On-premises
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Palo Alto Networks NG Firewalls
November 2024
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
817,354 professionals have used our research since 2012.
Sr. Manager (IT Security & Operations) at a tech services company with 11-50 employees
Helps us monitor traffic based on source destination and geolocation, and reduced access to unwanted websites by 80%
Pros and Cons
- "The packet level inspection is the most valuable feature. The traffic restriction features allow us to restrict the sub-features of any platform."
- "Palo Alto is like Microsoft. It has varied features, but it's too technical. A lot of the features could be simplified. The procedure, process, features, and usability could be more simple."
What is our primary use case?
We use the solution for IPS. Palo Alto's firewall is really good compared to firewalls like FortiGate, Cisco, or any other competitor.
We're able to monitor traffic based on the source destination and geolocation. The firewall allows us to restrict user access. For example, we have restricted user access to the chat feature on Facebook.
There are about 170 total users on the client side. On the administrative side, we have two or three people.
We're using version PA-200. The solution is deployed on-premises.
How has it helped my organization?
We reduced access to unwanted websites by 80%. It allows us to optimize user efficiency. For example, I have restricted the calling feature on LinkedIn, so people can still use LinkedIn, but they aren't able to dial out or receive calls.
We restricted social media sites so that only basic features can be used. The monitoring functionality allows us to see which users are using which websites, the frequency, and the level of usage. It improves the network monitoring in our organization and gives us the required control level to restrict user access.
Palo Alto Next-Gen Firewall has Panorama, which is a unified platform that natively integrates all security capabilities, but I haven't worked with it yet.
The unified platform gives us more visibility and restricts unwanted guests and unwanted traffic. It gives us more insight into network traffic so that we can analyze it.
It helps eliminate multiple network security tools and the effort needed to get them to work together. Previously, I used other network monitoring tools for bandwidth monitoring. Now, the security features and wireless detection are in a single platform, so it definitely reduces the need for multiple platforms.
It has affected our network operations and network-related costs, but it's not the main benefit. The main benefit is the visibility and not having to maintain or manage multiple platforms. It's a bit costly because it has a lot of features, and each feature has a cost. It's important to do a cost-benefit analysis and know the requirements of your organization. We don't have to manage five to seven platforms and we're getting all the information in a single platform, so we can compromise a little bit on the cost side.
What is most valuable?
The packet level inspection is the most valuable feature. The traffic restriction features allow us to restrict the sub-features of any platform.
I really like the security aspects. That's why it's highly rated on Gartner. The antivirus definitions, updates, and malware detection are pretty good.
It embeds machine learning in the core of the firewall to provide inline real-time attack prevention, which is a very nice feature. It's part of the add-on services subscription. The autonomous behavior toward malware and potential risk is pretty good.
Machine learning is really good to have. We received some false positives with machine learning, which was the main problem we had with it.
It's very important to me that the solution integrates natively with security solutions. Inside attacks are very rare. Most attacks are generated from the outside or from a public site, so having Palo Alto is really important on a public site.
What needs improvement?
Palo Alto is like Microsoft. It has varied features, but it's too technical. A lot of the features could be simplified. The procedure, process, features, and usability could be more simple.
It's too complex and sometimes the process to implement a single thing is hectic.
For how long have I used the solution?
I have been using this solution for about eight months.
What do I think about the stability of the solution?
The solution is stable.
What do I think about the scalability of the solution?
It's scalable. If you use the virtual solution, you may need to change the subscription.
How are customer service and support?
I haven't directly worked with Palo Alto's technical support, but their community logs have been really helpful and we can find the answer to almost anything. The documentation is good.
Which solution did I use previously and why did I switch?
We previously used Fortinet and Cisco.
We switched to Palo Alto because it's an all-in-one solution. We were attracted by its level of detection, level of monitoring, and level of packageable inspection.
How was the initial setup?
The setup is straightforward. Deployment took a week.
I haven't used it inline directly. First, I did a port mirror. Once I was fully satisfied with the level of detection, I put all of my traffic through it.
We use two or three administrative staff for maintenance.
What's my experience with pricing, setup cost, and licensing?
The price is high.
Which other solutions did I evaluate?
We evaluated other features, but we chose Palo Alto early on in the process because of the features and usability.
What other advice do I have?
I would rate this solution an eight out of ten.
In terms of a trade-off between security and network performance, I would rate it more toward network security. We have a lot of other alternatives for monitoring but not for the security side or antivirus detection.
I would highly recommend Palo Alto. If you want a cheap solution, I would recommend Sophos. But if someone is looking for real-time protection, I would suggest that they go with the virtual instance of Palo Alto, which is PA-200 VM, because it simply fulfills our requirements.
For personal use or SMEs, the price of PA-400 is high, but the security and performance are worth it.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Specialized Engineering Services at Netcontroll
Provides good protection, integrates with Active Directory, and allows us to manage VPNs inside the firewall
Pros and Cons
- "The trackability is most valuable. When a port is open for a protocol, such as port 443 for HTTPS, it can look inside the traffic and identify or verify the applications that are using the port, which was previously not possible with traditional firewalls."
- "We use ACC which is a tool for verifying the activity or traffic within your network. Currently, in ACC, the time of the samples that they offer is about five minutes. When you try to go down to a shorter duration, you can't. You only have five minutes. They can provide samples for shorter durations, such as one minute."
What is our primary use case?
Generally, it is used for the main function of the firewall. It protects the applications and the servers of clients from attacks. We use it as a perimeter firewall for the traffic from the internet, and it is also being used because one of the customers needed a solution for PCI compliance. We have put the firewall between servers inside the network to do segmentation. So, with the firewalls, specific communication is open between the clients and the servers, between the servers, and between the servers, applications, and the database.
We have PA-5000 and PA-850 series firewalls. In terms of the version, we are using version 9.1, which is not the most recent version. It is the previous one. We manage all firewalls from Panorama.
How has it helped my organization?
The most important benefit is that we can manage VPNs inside this firewall. We have integrated it with Active Directory. We provide a certificate to a user, and the user of the certificate can connect with the GlobalProtect VPN, which is a Palo Alto solution. With this solution, we can easily manage about 1,000 VPNs daily. It supports integration with Active Directory, and it is very easy for us to manage the VPNs. Before using Palo Alto Next-Generation firewalls, there was another solution, and we had a lot of issues with that.
Palo Alto NGFW provides a unified platform that natively integrates all security capabilities. Our main customer is going for PCI certification, and a part of the certification requires the use of these kinds of firewalls to protect all the information that they have.
Palo Alto NGFW’s unified platform helped to eliminate security holes and protect from various threats.
We have firewalls that automatically update the signatures every 15 minutes. It is very important for us because if something happens, we know that the threat will be eliminated because the firewall is updated to the latest signatures.
What is most valuable?
The trackability is most valuable. When a port is open for a protocol, such as port 443 for HTTPS, it can look inside the traffic and identify or verify the applications that are using the port, which was previously not possible with traditional firewalls.
It is very important that Palo Alto NGFW embeds machine learning in the core of the firewall to provide inline, real-time attack prevention. If something is different, the firewall identifies that based on the behavior of the traffic and alerts us. It can also block that so that nothing more happens.
We use Panorama to manage all firewalls. There is a dashboard, and there is a tab that shows you the real-time traffic that is passing through the firewall. We are able to get all the insights about the traffic.
What needs improvement?
We use ACC which is a tool for verifying the activity or traffic within your network. Currently, in ACC, the time of the samples that they offer is about five minutes. When you try to go down to a shorter duration, you can't. You only have five minutes. They can provide samples for shorter durations, such as one minute.
For how long have I used the solution?
I have been using this solution for eight years.
What do I think about the scalability of the solution?
In terms of usage, all the traffic is passing from these firewalls. In general, there are about 3,000 users and 1,000 servers. All the traffic travels through these firewalls. At this moment, there are no plans to increase its usage.
When we were migrating from one model to another, Palo Alto gave us a chance to replace the hardware because the previous model was old, and there was no support. We were able to acquire a new box at the same price that we would have had to pay to repair and maintain it.
How are customer service and support?
There is another person that is in charge of that. Their support is only in English, which has been challenging, but now, we have engineers who can talk in English.
How was the initial setup?
It wasn't easy because we were migrating from Check Point to Palo Alto. It was difficult at the beginning, but after that it was easy. Overall, the implementation took us three months because we could only do it in certain time windows. It was implemented in phases.
There were some applications that didn't work fine in the beginning. We had to see what was happening and identified the issue.
What about the implementation team?
In the beginning, we used Palo Alto, but after that, we did everything in-house. The support from Palo Alto was fine. Their support person helped us. We are in Mexico, and he helped in translating the support information from English to Spanish in the beginning. We had a few big issues, but in the end, we solved all of them. Now, I can operate these firewalls.
What's my experience with pricing, setup cost, and licensing?
Its price is comparable to other companies. The license is on a one-year or three-year basis. It depends on the customers what they want to go for. There are some features that require an additional license, and there is also the cost of the support.
What other advice do I have?
I would recommend this solution. It is a good solution. I would rate it a nine out of ten.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Partner
Senior Network Engineer L4 at a tech services company with 10,001+ employees
Efficient threat management and automation drive reliability
Pros and Cons
- "The most valuable features of Palo Alto Networks NG Firewalls are Threat Vault and AutoFocus."
- "For colleagues seeking a cost-effective firewall, I recommend Palo Alto Networks NG Firewalls."
- "Palo Alto Firewalls could improve by introducing more features, particularly in load balancing."
- "Palo Alto Firewalls could improve by introducing more features, particularly in load balancing."
What is our primary use case?
The primary use case for Palo Alto is to address traffic-related issues and manage configurations pushed from Panorama to Palo Alto Firewalls. Additionally, it handles GPU-related challenges, global protect, and IP internal problems.
Both FortiGate and Cisco firewalls process network traffic sequentially, meaning each packet passes through security engines, e.g., security profiles and URL filtering, one by one, which can be time-consuming. In contrast, Palo Alto Networks NG Firewalls utilize single-pass parallel processing. When a packet arrives on an interface, the firewall creates multiple copies and sends them to all relevant security engines simultaneously. This parallel approach significantly reduces processing time and increases overall efficiency.
How has it helped my organization?
Palo Alto Networks Next-Generation Firewalls offer a comprehensive platform that seamlessly integrates all essential security functions, eliminating the need for multiple platforms. With integrated routing, switching, threat prevention, SASE, and Prisma capabilities, Palo Alto provides a centralized solution. A notable feature is the active-passive router configuration, enabling one firewall to be active while another remains on standby. Additionally, these firewalls incorporate SD-WAN, IPsec, and VPNs for enhanced network security and connectivity.
Palo Alto Networks NG Firewalls effectively utilize embedded machine learning to provide real-time attack prevention. Upon receiving a packet, the firewall performs an initial ingress phase analysis before passing it to the fast path for routing, switching, and connection establishment. Simultaneously, the security policy is checked. If a threat is detected, the initial packet is allowed through for analysis, while subsequent traffic is automatically blocked without the need for manual security policy configuration.
Our organization benefited from the comprehensive feature set of Palo Alto Networks NG Firewalls, eliminating the need for separate purchases of web-based firewalls, load balancers, routers, switches, Prisma devices, and SD-WAN devices. This saves our organizational costs.
Palo Alto provides strong security in our data centers and across all our workplaces.
Palo Alto Networks NG Firewalls reduce downtime and enhance network reliability and security through active-passive setups, where a secondary firewall automatically takes over if the primary one fails, ensuring continuous operation. These firewalls provide a seamless and efficient environment by automatically capturing logs and managing known threats. Advanced features like App-ID and Content-ID inspection enable deep packet inspection, identifying and mitigating threats even within encrypted files or those disguised as legitimate data, such as a virus bound to an MPG file. This comprehensive approach ensures robust security and minimizes the impact of malicious activities, regardless of the attacker's techniques.
What is most valuable?
The most valuable features of Palo Alto Networks NG Firewalls are Threat Vault and AutoFocus. Threat Vault allows us access to a comprehensive threat database, enabling us to get detailed information on threats and how to mitigate them. AutoFocus provides sandboxing capabilities, automatically addressing global threats.
What needs improvement?
Palo Alto Firewalls could improve by introducing more features, particularly in load balancing. Enhancing this capability would be beneficial.
For how long have I used the solution?
I have been working with Palo Alto NG Firewalls for six and a half years.
What do I think about the stability of the solution?
I would rate the stability of Palo Alto Networks NG Firewalls at eight and a half out of ten.
What do I think about the scalability of the solution?
Palo Alto Networks NG Firewalls are scalable and reliable. I have not faced any limitations with its scalability, and it is suitable for environments ranging from small offices to large data centers.
How are customer service and support?
Palo Alto provides good support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I previously worked with Cisco and FortiGate devices. I switched to Palo Alto Firewalls because of the comprehensive features offered by Palo Alto, including better hardware, software, and support.
How was the initial setup?
The initial setup was straightforward, taking about 20 to 30 minutes for one Palo Alto Network NG Firewall.
What about the implementation team?
The level two team was responsible for the configuration and setup process for Palo Alto Network NG Firewalls.
What's my experience with pricing, setup cost, and licensing?
I am not sure about the specific licensing costs of Palo Alto Networks NG Firewalls, but FortiGate and Palo Alto are generally cheaper than some high-end Cisco devices.
What other advice do I have?
I would rate Palo Alto Networks NG Firewalls eight out of ten.
For colleagues seeking a cost-effective firewall, I recommend Palo Alto Networks NG Firewalls. Despite not being the absolute cheapest, their robust hardware and software, combined with excellent support and comprehensive features, make them a more efficient and reliable long-term investment.
Palo Alto Networks NG Firewalls require maintenance.
I recommend considering Palo Alto for small or medium-sized environments due to its cost-efficiency, reliability, ease of use, and extensive features.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Last updated: Nov 24, 2024
Flag as inappropriateIt provides a unified platform, is stable, and reduces downtime
Pros and Cons
- "Palo Alto Networks NG Firewalls' single-path architecture offers a valuable feature, ensuring stable performance for our customers."
- "I would like Palo Alto Networks to provide a free virtual firewall."
What is our primary use case?
As a reseller, our primary customers utilizing Palo Alto Networks NG Firewalls are in the financial services, government, and manufacturing sectors. They select Palo Alto Networks NG Firewalls due to their superior performance and security capabilities compared to alternative firewall solutions.
How has it helped my organization?
Palo Alto Networks NG Firewalls provides a unified platform that natively integrates all security capabilities for our customers.
Palo Alto Firewalls integrate machine learning into their core functionality to offer real-time, inline attack prevention that our customers rely on.
Palo Alto Networks NG Firewalls offer a variety of models designed to protect data centers in all work environments. These models share standard features.
Palo Alto Networks NG Firewalls can significantly reduce downtime, and replacing a firewall typically takes only one to two minutes.
What is most valuable?
Palo Alto Networks NG Firewalls' single-path architecture offers a valuable feature, ensuring stable performance for our customers.
What needs improvement?
Palo Alto Networks NG Firewalls pricing has room for improvement.
I would like Palo Alto Networks to provide a free virtual firewall.
For how long have I used the solution?
I have been using Palo Alto Networks NG Firewalls for three years.
What do I think about the stability of the solution?
I have not encountered any stability issues using Palo Alto Networks NG Firewalls.
What do I think about the scalability of the solution?
The scalability of Palo Alto Networks NG Firewalls is limited because of the lack of a virtual firewall.
How are customer service and support?
The local support is better than the corporate support.
How would you rate customer service and support?
Neutral
What's my experience with pricing, setup cost, and licensing?
Palo Alto Networks NG Firewalls are expensive compared to other solutions.
I would rate the price eight out of ten, with ten being the most costly.
What other advice do I have?
I would rate Palo Alto Networks NG Firewalls eight out of ten.
Although Palo Alto Networks NG Firewalls are more expensive than other firewalls, they provide better protection and are a better value for your money.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: reseller
Last updated: Sep 2, 2024
Flag as inappropriateTechnical Superintendent at a educational organization with 501-1,000 employees
Has AI and ML capabilities, which work well for real-time attack prevention
Pros and Cons
- "The unified platform provided is very important to us as it allows us to manage all traffic and ensure security without using separate tools. It has AI and ML capabilities, which work well for real-time attack prevention."
- "One area for improvement with Palo Alto Networks NG Firewall would be customer support. Currently, in regions like India, customer support is handled by third-party partners. Unfortunately, the support provided by these partners has not been satisfactory. It would be beneficial if the tool handled customer support directly, similar to how Cisco maintains high-quality customer care. This would ensure that customers receive the level of support they expect."
What is most valuable?
The unified platform provided is very important to us as it allows us to manage all traffic and ensure security without using separate tools. It has AI and ML capabilities, which work well for real-time attack prevention.
Since implementing Palo Alto, we've seen an 80-90 percent reduction in issues. It handles ISP links, ensuring minimal downtime. Recently, we upgraded our secondary ISP to 3 Gbps, and when the primary link goes down, it automatically switches to the secondary. As a result, end users do not experience bandwidth shortages or interruptions in internet access.
What needs improvement?
One area for improvement with Palo Alto Networks NG Firewall would be customer support. Currently, in regions like India, customer support is handled by third-party partners. Unfortunately, the support provided by these partners has not been satisfactory. It would be beneficial if the tool handled customer support directly, similar to how Cisco maintains high-quality customer care. This would ensure that customers receive the level of support they expect.
Getting reliable service is important when you're a customer, especially with critical devices like firewalls. Firewalls are key parts of a network; if they fail, the whole network can become unstable. So, the support you get needs to be just as reliable as the device itself.
For how long have I used the solution?
I have been working with the product for a year.
What do I think about the stability of the solution?
I haven't experienced any downtime.
Which solution did I use previously and why did I switch?
We used Cisco ASA before. At that time, Cisco didn’t have a unified next-generation (NG) firewall, and I’m unsure if they offer one now. The main reason we decided to switch was that we needed a unified NG firewall. Besides the unified features that NG firewalls provide, there were other differences between Cisco and Palo Alto Networks NG Firewalls, particularly in terms of features and price. However, the features are mostly similar across different firewalls; it depends on how they’re implemented, how effective they are for end users, and how well they handle security. This varies from company to company and firewall to firewall because each has its architecture, data plan, processing, control, and so on. So, it depends on the original equipment manufacturer.
How was the initial setup?
The tool's deployment is complex and takes seven to eight days to complete.
What's my experience with pricing, setup cost, and licensing?
The tool's pricing is similar to that of Cisco. It's a security appliance; the cost depends on your network topology and specific requirements. The suitability of NG firewalls should be chosen based on your network and what you need. If a colleague from a different company asked for the cheapest and fastest firewall, I suggest they consider options like Sophos. Sophos took over Cyberoam, which was previously a leader in NG firewalls
What other advice do I have?
I work with the product, and we purchased our box after a demo. We also have IoT security, but I don't personally handle that. I rate the overall product a nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: Aug 25, 2024
Flag as inappropriateNetwork Architect at a computer software company with 1,001-5,000 employees
Embedded machine learning within our firewall core has enhanced our business performance by enabling us to process higher volumes of data more efficiently
Pros and Cons
- "The most valuable features are Wildfire, URL filtering, and IPS."
- "Palo Alto's support could be improved."
What is our primary use case?
We use Palo Alto Networks NG Firewalls in our offices and data centers.
How has it helped my organization?
Embedded machine learning within our firewall core has enhanced our business performance by enabling us to process higher volumes of data more efficiently. Single-pass parallel processing and machine learning provide real-time insights, allowing us to maintain a strong security posture.
There is no trade-off for the single-pass architecture. The firewall meets the standards and expectations.
What is most valuable?
The most valuable features are Wildfire, URL filtering, and IPS.
What needs improvement?
Palo Alto's support could be improved. Compared to Cisco's community portal, its support resources appear lacking.
For how long have I used the solution?
I have been using Palo Alto Networks NG Firewalls for over three years.
What do I think about the stability of the solution?
Palo Alto Networks NG Firewalls are stable.
What do I think about the scalability of the solution?
Palo Alto Networks NG Firewalls are scalable.
Which solution did I use previously and why did I switch?
We previously used Cisco but found it not on par with Palo Alto, especially with throughput. Performance is essential, and Cisco was lacking in this area.
What was our ROI?
From a technical standpoint, our engineers have significantly reduced labor hours by utilizing Palo Alto, resulting in a substantial return on investment.
What other advice do I have?
I would rate Palo Alto Networks NG Firewalls nine out of ten.
We have a large number of users within our organization.
We have a maintenance team for Palo Alto.
For organizations with budget constraints, Fortinet is a viable alternative; however, if budgetary limitations are not a concern, the Palo Alto PA-440 Firewall is recommended.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Last updated: Jul 28, 2024
Flag as inappropriateBuyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Product Categories
FirewallsPopular Comparisons
Fortinet FortiGate
Netgate pfSense
Cisco Secure Firewall
Azure Firewall
Check Point NGFW
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Untangle NG Firewall
Fortinet FortiGate-VM
SonicWall NSa
KerioControl
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Palo Alto the best firewall for an on-premise/cloud hybrid IT network?
- What are the main differences between Palo Alto and Cisco firewalls ?
- Expert Opinion on Palo-Alto Required.
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Features comparison between Palo Alto and Fortinet firewalls
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which is better - Palo Alto Networks NG Firewalls or Sophos XG?
- What are the main differences between Palo Alto firewalls and Cisco Secure Firepower?
- What is a better choice, Azure Firewall or Palo Alto Networks NG Firewalls?
- Which Palo Alto Networks NG Firewalls model is recommended for 1200 users?