We use the solution to access clients.
The configuration is quite simple to understand, but the functionalities are limited
Pros and Cons
- "The configuration is quite simple to understand."
- "The functionalities are limited."
What is our primary use case?
What is most valuable?
I like the configuration of the product. The configuration is quite simple to understand. The product is easy to manage.
What needs improvement?
The solution has a lot of features. However, there are no deep configurations available. The functionalities are limited. Other products offer more customization.
For how long have I used the solution?
I have been using the solution for the last five years.
Buyer's Guide
Palo Alto Networks NG Firewalls
December 2025
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,889 professionals have used our research since 2012.
What do I think about the stability of the solution?
The product is stable.
What do I think about the scalability of the solution?
The product is currently being used by three of our customers. We provide them with dedicated VMs.
How are customer service and support?
The local support is good. The response is slow when I try to reach out to technical support on the customer portal. It might be because the tickets I raised were P3 or P4 tickets. However, I do not get proper responses for P2 tickets either. I get a good response when I call support directly.
Which solution did I use previously and why did I switch?
We also use FortiGate, Check Point, Forcepoint, and SonicWall. We use the tools based on our clients’ requirements.
How was the initial setup?
The initial installation was easy. It was not difficult for me because I am familiar with many products.
What was our ROI?
The solution is worth the money. However, there are other tools that provide features similar to Palo Alto but are less expensive.
What's my experience with pricing, setup cost, and licensing?
The solution’s cost is a little high compared to other products.
What other advice do I have?
I will recommend the tool to others. It is a fine product. If someone is looking for DLP and other features, the product might not suit them. The product has good URL filtering features. Overall, I rate the solution a seven or eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at a computer software company with 5,001-10,000 employees
The solution uses machine learning embedded in the core of the firewall to provide in-line, real-time attack prevention
Pros and Cons
- "I like the remote access and URL filtering features that are available on global products."
- "The analysis of the ITS ID by Palo Alto Networks NG Firewalls could be improved."
What is our primary use case?
We use Palo Alto Networks NG Firewalls to protect our end-to-end environment.
How has it helped my organization?
Palo Alto Networks NG Firewalls use machine learning embedded in the core of the firewall to provide in-line, real-time attack prevention.
Palo Alto Networks NG Firewalls use predictive analytics and machine learning to instantly block DNS-related attacks. The data for attacks or prevention is based on a segmented mask. Palo Alto Networks also keeps signatures updated on a holiday and on the Palo Alto Network and cloud. This helps to prevent signature leaks and secures dynamic web applications.
The solution is able to detect and resolve the initial tunneling attack.
Palo Alto Networks NG Firewalls are constantly being updated with new feature packages, and the improvements are the best we have seen compared to any other product in the industry. This is due to the company's deep knowledge of technology and the field.
The solution provides a unified platform that natively integrates all security capabilities. The ability to integrate all of the capabilities is good because it is ready to use right out of the box. Additionally, it is an ECPU. The security is quite robust.
The unified platform helps to eliminate security holes in our organization by providing multiple layers of security. This is important because it can help to prevent any attack.
The unified platform helps eliminate the need for multiple network security tools and the effort required to get them working together. If we are filtering traffic using any other firewall, we will be using different processing methods. However, when we use a firewall or a third-party tool, it then has access to the restriction using the firewall. We can then use this feature to centralize and combine with this.
The zero-delay signature feature handles Wi-Fi. It analyzes each file type that is downloaded during a session and then sends the file analysis signature to the file cloud. This has made our network more secure.
Palo Alto Networks NG Firewalls' single pass architecture provides greater security and performance because all security functions are consolidated into a single device.
What is most valuable?
I like the remote access and URL filtering features that are available on global products. There are also other features, such as application-based access, that allow us to provide user IDs based on the type of access needed.
What needs improvement?
The analysis of the ITS ID by Palo Alto Networks NG Firewalls could be improved.
For how long have I used the solution?
I have been using Palo Alto Networks NG Firewalls for six years.
What do I think about the stability of the solution?
Palo Alto Networks NG Firewalls are stable.
What do I think about the scalability of the solution?
Palo Alto Networks NG Firewalls are scalable. We have around 10,000 users.
How are customer service and support?
The technical support is generally good, but it can be difficult to get the right person on the phone.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is moderate. We can deploy within an hour or two. The deployment requires two people. Four to five people can handle the maintenance.
What about the implementation team?
We implement the solution for our clients.
What was our ROI?
Our clients have seen a return on investment with the solution.
What's my experience with pricing, setup cost, and licensing?
Palo Alto Networks NG Firewalls are expensive compared to other firewalls such as FortiGate Next-Generation Firewall.
What other advice do I have?
I give Palo Alto Networks NG Firewalls a nine out of ten.
Organizations that require network security should not choose a firewall based on cost. I recommend Palo Alto Networks NG Firewalls to harden security posture.
I definitely recommend Palo Alto Networks NG Firewalls for medium and large organizations.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Palo Alto Networks NG Firewalls
December 2025
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,889 professionals have used our research since 2012.
Cybersecurity architect at a consultancy with 10,001+ employees
Provides a unified platform that natively integrates all security capabilities
Pros and Cons
- "There are many valuable features, such as wireless cloud features."
- "The bugs can be improved."
What is our primary use case?
We use Palo Alto Networks NG Firewalls for our network security. We deployed the solution on both the cloud and on-prem.
How has it helped my organization?
Palo Alto Networks NG Firewalls machine learning secures our network against threats that evolve rapidly.
The DNS security feature is already commonly used for authentication by clients, with many threats being pushed from the inside to the outside. DNS security helps improve our network.
The DNS security feature is integral in protecting against DNS tunneling.
The solution provides a unified platform that natively integrates all security capabilities. Palo Alto Networks NG Firewalls' unified platform helps us eliminate security threats. We use all the Palo Alto Networks NG Firewalls' features including the UTM, WiFi, and VPN feature to protect our network.
Both the network performance and security of the single-pass architecture are good.
What is most valuable?
There are many valuable features, such as wireless cloud features. The IP and signals are updated regularly, and all UTM features provide good basic gateway-level security.
Palo Alto Networks NG Firewalls machine learning in the core of the firewall to provide real-time attack prevention is a basic requirement for our private security network.
What needs improvement?
The bugs can be improved.
For how long have I used the solution?
I have been using the solution for eight years.
What do I think about the stability of the solution?
The solution is stable. We encounter small bugs sometimes but they are not a problem.
What do I think about the scalability of the solution?
The solution is scalable.
How are customer service and support?
The technical support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
For experienced people, the initial setup is straightforward. Cloud deployment can be challenging for someone new. The deployment takes around one hour.
What about the implementation team?
We implement the solution for our clients.
What other advice do I have?
I give the solution a nine out of ten.
Our clients are enterprise-level.
The PA400 series has good performance and security.
I recommend Palo Alto Networks NG Firewalls to others.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Implementer
CIO at a government with 201-500 employees
Provides a consistent experience for the management team as well as the end user
Pros and Cons
- "The fact that I can perform several security functions in one device at wire speed is a valuable feature. I don't have to slow down my business transactions, and I don't have to inconvenience my users with 16 different solutions. I can have it all in one box, and it protects my organization at wire speed."
- "Surfacing actionable intelligence right away could be better. You have to dig far to get some of the information. If the solution could surface the two or three things out of the 10,000 a day that we really need to deal with, it would be helpful."
What is our primary use case?
We use this solution as our external firewall and VPN.
What is most valuable?
The fact that I can perform several security functions in one device at wire speed is a valuable feature. I don't have to slow down my business transactions, and I don't have to inconvenience my users with 16 different solutions. I can have it all in one box, and it protects my organization at wire speed.
Palo Alto Networks NG Firewalls catch a lot of things that other firewalls may not catch and support more current security practices. We get updates several times a day from WildFire, and the firewalls do a great job of keeping us protected.
Within their domain, Palo Alto Networks NG Firewalls provide a unified platform that natively integrates all security capabilities. This is critical because I don't want to deal with multiple devices. I want to do it all with as few devices as possible and have it all work successfully.
It's very important that these firewalls embed machine learning into their core because the only way to keep up with the changing threat environment is to keep learning about it.
Palo Alto Networks NG Firewalls are the gold standard right now for securing data centers consistently across all workplaces, and I'm using them across all of my locations. They provide a consistent experience for the management team as well as the end user.
What needs improvement?
Surfacing actionable intelligence right away could be better. You have to dig far to get some of the information. If the solution could surface the two or three things out of the 10,000 a day that we really need to deal with, it would be helpful.
For how long have I used the solution?
I've been working with Palo Alto Networks NG Firewalls for about 20 years.
What do I think about the stability of the solution?
It is a rock-solid solution in terms of stability. You very rarely have to worry about it. If there's a problem, it's usually because a rule got configured incorrectly.
What do I think about the scalability of the solution?
Across the product line, the NG firewalls scale very well. Within the individual units, however, there are some limitations. It's not always clear to resellers as to what those limitations are. Therefore, as your organization grows you may start to bump into those limitations unexpectedly.
How are customer service and support?
Palo Alto's technical support is pretty good and is among the best. We have called them several times, and they've been on it. Sometimes, it can take a bit longer for them to understand an issue, but overall, I would rate technical support at eight.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have used several firewalls including Cisco, Fortinet, and Check Point. We chose Palo Alto because it's the only one that brings it all together in one platform and lets me manage it. It also removes the complexity of what I have to manage and deal with.
How was the initial setup?
The initial setup is fairly straightforward. You put the firewall in with whatever might be there right now in learning mode, and then you can figure out where the holes are.
What was our ROI?
Palo Alto Networks NG Firewalls have prevented a number of things from happening. We would not have been able to prevent those things from happening had we had other firewalls.
What's my experience with pricing, setup cost, and licensing?
Palo Alto Networks NG Firewalls are the Cadillac standard, and you do pay Cadillac pricing. However, the protection is worth the steep price.
What other advice do I have?
If you're looking for the fastest firewall, Palo Alto needs to be on your list. They seem to be the only ones that perform at wire speed right now. If you want the cheapest firewall, you will be able to find cheaper options, but you won't find better options than Palo Alto Networks NG Firewalls.
Overall, I would rate Palo Alto Networks NG Firewalls a nine on a scale from one to ten.
The biggest value of RSAC is being able to see everything I don't know anything about. It helps me keep up with where the industry is going.
Also, attending RSAC impacts our organization’s cybersecurity purchases made throughout the year. I chat with my existing vendors when I attend and have conversations with those my team recommends. We then make purchasing decisions based on what I see at RSAC.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Supervisor at a educational organization with 51-200 employees
Powerful solution that provides good visibility, a user-friendly interface, and has good reporting
Pros and Cons
- "It is an extremely powerful solution as it provides visibility into all the network traffic, and offers a range of actions such as blocking websites or graphics, as well as load balancing. It's a great tool."
- "I believe it would be beneficial if the solution could integrate with Google Chrome, especially for students who use Chromebooks. However, as far as I know, the solution currently does not support Google Chrome."
What is our primary use case?
We use Palo Alto Networks NG Firewalls for cybersecurity and network security for our infrastructure for our districts, worldwide.
What is most valuable?
The SIM's ability to analyze traffic and take appropriate action is the most valuable feature of this solution.
It is an extremely powerful solution as it provides visibility into all the network traffic, and offers a range of actions such as blocking websites or graphics, as well as load balancing. It's a great tool.
The solution's user-friendly interface and clear network visibility are highly valuable to us. It makes management easier, especially for those without extensive technical knowledge.
The benefit we derive from this solution is not only its ease of use but also how it enables collaboration among our team for special activities in our network.
Additionally, the reports that we can generate from the software are very valuable.
Using Palo Alto Networks NG Firewalls has helped us reduce downtime.
Compared to our previous solution, I believe it was Fortinet. It saves a lot of time, you know, especially running your reports and analyzing the traffic. I believe we save thirty to forty percent.
It provides a unified platform that natively integrates all security capabilities.
It has seamless integration with all our devices, including Mac and Windows, and also with our secret server. Moreover, it is even integrated with the Microsoft streaming application that we use.
The embedded machine learning functions seamlessly and can be easily accessed through the dashboard's dedicated tools. Its ease of use is impressive.
What needs improvement?
I believe it would be beneficial if the solution could integrate with Google Chrome, especially for students who use Chromebooks. However, as far as I know, the solution currently does not support Google Chrome.
For how long have I used the solution?
I have been using Palo Alto Networks NG Firewalls for five years.
What do I think about the stability of the solution?
The solution is incredibly stable.
We have installed patches and updates, and they have all gone smoothly without any issues.
What do I think about the scalability of the solution?
We haven't fully used the capabilities of the firewall, but we purchased a larger scale to prepare for potential future growth.
The firewall is deployed across all six schools and the district office, protecting the entire infrastructure, including switches, access points, and other devices.
This is approximately 3,500 to 4,000 devices.
How are customer service and support?
The technical support team is readily available and very helpful. They provide great assistance whenever we encounter any issues.
There are delays at times, but overall, they are great. I would rate them a nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, we used Fortinet.
How was the initial setup?
I was involved in the deployment.
What about the implementation team?
We received assistance from the technical support team who helped us implement the project.
What was our ROI?
We have seen a return on our investment.
As previously mentioned, the firewall is easy to use and has helped us save a significant amount of time, approximately thirty to forty percent.
What's my experience with pricing, setup cost, and licensing?
The cost is quite high.
Which other solutions did I evaluate?
We evaluated Fortinet as well as Cisco.
The firewall we use is recommended by our county office of education, which also uses the same application.
This makes it easier for us to collaborate with the county and share reports between different departments.
What other advice do I have?
I'm thoroughly impressed during my inaugural visit here. The array of products and the advanced technology showcased are truly exceptional. It's a great experience.
I plan to revisit it in the future.
Certainly, my attendance would have a significant impact on my cybersecurity-related buying choices as I would gain better insights into various vendors and their products available in the market. It would provide me with increased visibility and enable me to make informed purchasing decisions.
By attending the event and gaining insights into the different vendors and products available in the market, we can make informed decisions about which route to take in the future.
I would rate Palo Alto Networks NG Firewalls a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Architect at a government with 10,001+ employees
Natively integrates all security capabilities and decrypts by category
Pros and Cons
- "Decryption is one of Palo Alto Networks NG Firewalls' best features because we can decrypt by category. For instance, we can decrypt everything except for bank traffic so that we don't interfere with the passwords and two-factor authentication of those checking their bank accounts at work. We can still monitor for malware and other threats that come through a secure channel. It's seamless for users. The URL filtering and IPS are both great as well."
- "Palo Alto Networks NG Firewalls need better training modules. You have to do a lot of reading prior to watching the training videos, and it's good for people who are really into it. However, often you want to use a video for a TID. You want to see how to do something rather than spend 30 minutes reading and then another 30 minutes watching the class. As a result, I take third-party training classes rather than Palo Alto's training because they are a lot better."
What is our primary use case?
We started using this solution as a basic firewall, and then, we ended up with URL filtering, IPS, and decryption.
How has it helped my organization?
It increased visibility, and we can see things that we couldn't see before and are able to decrypt as well. We can actually see what's going on in our network.
What is most valuable?
Decryption is one of Palo Alto Networks NG Firewalls' best features because we can decrypt by category. For instance, we can decrypt everything except for bank traffic so that we don't interfere with the passwords and two-factor authentication of those checking their bank accounts at work. We can still monitor for malware and other threats that come through a secure channel. It's seamless for users. The URL filtering and IPS are both great as well.
Palo Alto Networks NG Firewalls provide a unified platform that natively integrates all security capabilities. WildFire stops a lot of viruses and malware that come in from the outside. In addition, when you decrypt the traffic you'll be able to see a lot that you couldn't before. You can then integrate that into a SIEM and have visibility into all the different things that are going on. Integration with WildFire provides sandboxing and tells you if it's malicious content or not. Then, you can do URL filtering for the endpoints. All of this data goes into the SIEM. Thus, it's a really good, well-integrated software.
This native integration is very important to us because of the cost. When we get an enterprise license and get all these features on one device, we don't have to buy five devices or virtuals or set up a virtual or cloud farm to do the five things that the solution will do automatically, natively out of the box. We have been able to save money because we are able to get rid of our decryption software and are getting close to letting go of our filtering software.
It's important to us that Palo Alto Networks NG Firewalls embed machine learning in the core of the firewall to provide inline, real-time attack prevention. This is important because those who exploit us daily use new tactics that are not seen at all times. They employ tactics that use applications that we currently use, such as PowerShell. If a PowerShell script comes in and it's decrypted, launched in WildFire in a sandbox, and blocked, it cuts our threat vector down tremendously.
When we go across all the workspaces, it's simple. The web-facing servers are protected with IPS, and the endpoints are protected with URL filtering in the sandbox and decryption. We log all of the MAC addresses, so we block hackers from getting into different websites when staff use a Wi-Fi connection off-site. In terms of securing data centers consistently across all workspaces, our whole ecosystem depends on having Palo Alto so that we can have one centralized SIEM where all the data is. Our SOC can investigate all the alerts that we get from all of these different areas.
What needs improvement?
Palo Alto Networks NG Firewalls need better training modules. You have to do a lot of reading prior to watching the training videos, and it's good for people who are really into it. However, often you want to use a video for a TID. You want to see how to do something rather than spend 30 minutes reading and then another 30 minutes watching the class. As a result, I take third-party training classes rather than Palo Alto's training because they are a lot better.
The training should be more accessible because if everybody has to pay for training, it makes it harder for us to get in techs who are qualified to do the work. If there are clear levels and schemes for certification, it would be great.
For how long have I used the solution?
I've been using this solution for probably five years now.
What do I think about the stability of the solution?
The firewalls are always on, and we haven't had any stability problems. We haven't even had any hardware failures, and the perishables are great.
What do I think about the scalability of the solution?
The firewall's scalability is nice because you can take a VM and put more memory in it. If you virtualize, then you can scale it out. With an enterprise license, you can load several to get all different points of your internet access. For example, one could do URL filtering just for the desktop, and another one could be an IPS in front of something else.
It's very flexible, and you can use these virtuals to contain all these different situations from an architectural standpoint without having to buy other software.
How are customer service and support?
Palo Alto's technical support is great, and I'd give them a ten out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is straightforward in the sense that when you put it in it starts doing what it's supposed to do. Then, you have to turn on all the features that you want.
What about the implementation team?
We mainly worked with Palo Alto Networks. They taught us a lot and have been very helpful in getting us onboarded with all of the different features.
What was our ROI?
We see a return on our investment every day. We have threat hunters who go through the data and tell other state agencies where the problems are or what we were able to stop.
What's my experience with pricing, setup cost, and licensing?
We haven't had a problem with pricing or licensing because we consolidated other software to make Palo Alto more affordable.
What other advice do I have?
If you're just looking for the cheapest and fastest firewall, remember that you'll get what you pay for. Check if the company is able to support its product 24/7. You have to be able to get technical support on the phone at any time of the day or night. In addition, the company has to be able to do training on its firewall, and there has to be a job market for it so that there's an employee pool from which you can pick someone who knows the software. If it's an obscure software company, and they only have two or three people in the country who are certified on it, then it would hurt you a lot because you won't be able to call these two or three people in the middle of the night and expect them to always be there. Palo Alto has a very deep bench, so they can go globally and get you tech support at any time. That's very helpful.
The price is dependent upon how many features you use. If you have a Palo Alto ecosystem where you use Prisma, IPS, URL filtering, and decryption, it's going to be affordable because you will be able to eliminate other software. However, if you're looking to use Palo Alto as just a firewall, it may not help you that much because everybody out there competes to provide a firewall experience.
On a scale from one to ten, I would rate Palo Alto Networks NG Firewalls a ten.
The value I get by attending an RSA Conference is being able to see new up-and-coming software. Some products are new to the market, and others are trying to get their product to market. A lot of times, these products have key features that others don't.
Attending RSAC helps to influence cybersecurity purchases throughout the year because we are able to see a product that we didn't know was available. We learn that there is software that does certain functions that we didn't even know we needed. There are some products at RSAC that may be too expensive, but there are others that we would consider because they are cost-effective and have feature sets that we didn't know about.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Sr. Infrastructure Solution Architect and Engineer at a aerospace/defense firm with 10,001+ employees
Helped us meet our security requirements but the technical support needs improvement
Pros and Cons
- "The fact that the Next-Gen firewalls are integrated with identity is the best. It gives us the ability to track what an individual is doing and helps us provide access to only what they need in order to do their job."
- "Palo Alto Networks NG Firewalls don't provide a unified platform that natively integrates all security capabilities. It's missing some features for geofencing and understanding locations."
What is our primary use case?
We mainly use the solution for traditional firewall boundaries.
How has it helped my organization?
The solution helped us meet our security requirements.
What is most valuable?
The fact that the Next-Gen firewalls are integrated with identity is the best. It gives us the ability to track what an individual is doing and helps us provide access to only what they need in order to do their job.
Because we want to free up our operators from the routine tasks of investigations, it's important to us that Palo Alto Networks NG Firewalls embed machine learning in the core of the firewall to provide inline, real-time attack prevention.
What needs improvement?
Technical support could be improved. Palo Alto's technical support used to be great. Whenever I had a problem, I could pick up the phone and call and get answers. That's not the case any longer.
Palo Alto Networks NG Firewalls don't provide a unified platform that natively integrates all security capabilities. It's missing some features for geofencing and understanding locations.
These firewalls are primarily used for edge defense. In terms of securing data centers consistently across all workplaces, that is, from the smallest office to the largest data centers, Palo Alto Networks NG Firewalls don't have a strong zero trust model.
NG Firewalls have not helped us reduce downtime in our organization. Because of technical support issues, we've taken some hits.
For how long have I used the solution?
I've been using Palo Alto Networks NG Firewalls for 20 years.
What do I think about the stability of the solution?
It's always been a stable product.
What do I think about the scalability of the solution?
This solution is a firewall that's a hardware appliance, and that's not the direction the industry is heading. Everybody is going toward a software-defined perimeter. Palo Alto doesn't have a strong say on it. They took what they had for their hardware and just put it in the cloud without understanding what being cloud-centric is all about.
How are customer service and support?
I would rate the technical support a three out of ten.
How would you rate customer service and support?
Negative
What was our ROI?
Our ROI is that the firewalls have been used quite a few times for investigations. We've gathered the evidence we needed to act upon an issue.
What's my experience with pricing, setup cost, and licensing?
These firewalls are not cheap, but they have a reasonable licensing model.
What other advice do I have?
If you are considering attending an RSA Conference, note that you won't gain enough information by attending one conference. However, when you attend year after year, go through the expo, and talk to vendors, you will begin to see trends. You'll see that what's hype one year is no longer a reality another year. Thus, the experience with RSA is a multiple-year experience.
Attending RSAC has made an impact on our organization’s cybersecurity purchases. We've brought products back into our infrastructure based on what we discovered from talking to vendors at the RSAC.
Overall, I would rate Palo Alto Networks NG Firewalls a seven out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Network Analyst at a non-profit with 1,001-5,000 employees
Debugging and troubleshooting through package capture are very easy from CLI
Pros and Cons
- "It's very important that Palo Alto NG Firewalls embed machine learning into the core of the firewall to provide inline, real-time attack prevention. That increases our security posture... The firewall is able to capture it and flag it and it is easy to mitigate as soon as we see something like that happening, to secure the environment more, in real time."
- "In the last three years at least, they have been lagging behind their competitors. The main issue is the support that we can get... You have to wait for them to get back to you and sometimes it's random. And the biggest problem I have is that you have to wait hours on the line when you're calling them to get a hold of the next available engineer."
What is our primary use case?
We used the solution as an edge or internet firewall where we were running IPS/IDS and doing filtering on it, apart from the other security features. We are still using it for our users' VPN activity and to manage site-to-site VPN tunnels with other clouds, like AWS and Azure, so that there is connectivity back and forth between those cloud providers and our on-prem data center.
What is most valuable?
The features I like are the debugging and troubleshooting through package capture. It's easy to capture from the CLI and it's also easy to get logs from the CLI.
It's very important that Palo Alto NG Firewalls embed machine learning into the core of the firewall to provide inline, real-time attack prevention. That increases our security posture. It gives us real-time anti-cyber activity and enables us to look at it. The firewall is able to capture it and flag it and it is easy to mitigate as soon as we see something like that happening, to secure the environment more, in real time.
These firewalls have the zero-delay signatures feature, which is really important because you don't want to be lagging behind with any kind of security updates. It doesn't affect our security a lot, but without it, we could be compromised a little bit. If updates are delayed by a couple of hours, there's an opportunity for the bad actors to execute something in that time frame. It gives us a little bit more security, but it's not like it's a high-severity situation.
Overall, they're doing great with the features. They're improving them day by day and year by year, which is really good. They're making new products that are compact inside, which is also really good. Instead of a full rack, they have tiny devices that have the same or even better performance compared to the bigger ones. They are doing well in improving the units, features, and security.
For how long have I used the solution?
I've been using Palo Alto Networks NG Firewalls for eight years.
What do I think about the stability of the solution?
They're very reliable and stable. Compared to some of the competitors, they're more reliable.
What do I think about the scalability of the solution?
The scalability is also good. They provide good options for scaling. The only thing that I would think about is that, in the newer firewalls, they have increased the performance but decreased the number of concurrent VPN connections or users. The new, compact devices have better performance, but they have reduced the number of users that can connect. Maybe that's a marketing strategy to sell higher-end models.
In my organization, everybody is using the Palo Alto firewalls because they're connected to the VPN, but the management and operations aspects are limited to the folks in IT.
How are customer service and support?
These firewalls used to bring a lot of value to us, but in my practical experience, in the last three years at least, they have been lagging behind their competitors. The main issue is the support that we can get.
For example, in the past, if something happened, we could just give them a call and open a ticket, and we would have technical support right away to help us. Whether it was a severity-one, critical incident, where we had no connectivity, or just a minor or medium-severity issue, we used to get support right away. But in the last three years, it has been really hard to get hold of an engineer. I have reached out a couple of times to give them a heads-up, "This is a ticket I opened three days ago. I'm trying to get a hold of anybody."
It's okay that they force us to open a ticket on the portal, but after opening a ticket, it's really hard to get support when you need it. You have to wait for them to get back to you and sometimes it's random. And the biggest problem I have is that you have to wait hours on the line when you're calling them to get a hold of the next available engineer.
They should make it easier to get in touch with their TAC. This is what they have called transforming the customer experience, but I believe it's getting worse. That's the only thing they have to improve. When you do get someone, the support from their end stands out, it's a nine out of 10. But getting a hold of an engineer is a two out of 10.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial setup is very straightforward. You need to connect through the portal manager and to the IP that you want to access remotely. And pushing the configuration from other devices is very easy. They provide tools so that you can get the configuration from competitors' devices and convert that into the Palo Alto version. It's very easy to configure initially and to manage as well.
On the maintenance side, it's really good. We don't have to put a lot of effort into that.
What other advice do I have?
The security and performance of the PA-400 series of Palo Alto NGFWs, versus its price, is really good. It's very inexpensive and has good performance compared to the previous higher-end 3000 models.
Palo Alto provides Panorama where you can manage a bunch of firewalls from a single pane of glass or just one device. It allows you to manage all of the firewalls in one, integrated location. You don't have to make a chain of 50 different firewalls. It will push what you need to be changed to all the other firewalls. We used to use it, but we got rid of it because we replaced all our Palo Altos with competitors' firewalls and we don't use Palo Alto anymore, other than for VPN. We have six firewalls in our organization right now, although we used to have 35 to 40. Because we no longer have a lot of firewalls, we got rid of Panorama. We don't want to pay for it to just manage six firewalls where we are not making any changes frequently. If we had 35 or 40 still, I would definitely recommend having Panorama.
Panorama is for managing the rules. It saves time on configuration, but it doesn't affect your security posture. Whether you're managing each firewall or using Panorama, it's exactly the same thing. But it helps you to execute changes in a very short period of time. It's a way of pushing the config to all your devices.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2025
Product Categories
FirewallsPopular Comparisons
Fortinet FortiGate
Netgate pfSense
Cisco Secure Firewall
WatchGuard Firebox
Cisco Meraki MX
Check Point Quantum Force (NGFW)
Azure Firewall
SonicWall TZ
Fortinet FortiGate-VM
Check Point Harmony SASE (formerly Perimeter 81)
Juniper SRX Series Firewall
SonicWall NSa
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Palo Alto the best firewall for an on-premise/cloud hybrid IT network?
- What are the main differences between Palo Alto and Cisco firewalls ?
- Expert Opinion on Palo-Alto Required.
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Features comparison between Palo Alto and Fortinet firewalls
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which is better - Palo Alto Networks NG Firewalls or Sophos XG?
- What are the main differences between Palo Alto firewalls and Cisco Secure Firepower?
- What is a better choice, Azure Firewall or Palo Alto Networks NG Firewalls?
- Which Palo Alto Networks NG Firewalls model is recommended for 1200 users?











