We have had use cases for defending our resources against external access or authenticating particular traffic or appropriate traffic for access.
IT Specialist at a government with 501-1,000 employees
Robust security infrastructure, user-friendly, and intuitive
Pros and Cons
- "In my opinion, Palo Alto has consistently been one of the best firewalls for enterprise security."
- "I would like to see some Machine Learning because I have observed new types of attacks that are able to bypass existing security rules."
What is our primary use case?
How has it helped my organization?
The key factor here is reliability. In my previous company, we had a different vendor's firewall before switching to Palo Alto network devices.
Unfortunately, during that time, our security team was on vacation and had to be called back urgently due to a severe incident. This experience led us to switch to a more dependable, reliable, and robust system, which turned out to be the Palo Alto network device.
Fortunately, the transition from our old system to the new one was relatively seamless, and we now have a reliable and robust security infrastructure.
What is most valuable?
In my opinion, Palo Alto has consistently been one of the best firewalls for enterprise security.
We have encountered numerous instances where we have observed threats and attacks targeting our systems, and Palo Alto has proven to be highly reliable in blocking any malicious activity.
What needs improvement?
I would like to see some Machine Learning because I have observed new types of attacks that are able to bypass existing security rules. It is possible that implementing some form of continuous learning or education could be beneficial in addressing this issue.
Some way to learn what is normal it isn't, you know, something like that, I think that would be probably the most beneficial thing to me.
Buyer's Guide
Palo Alto Networks NG Firewalls
February 2025

Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
841,004 professionals have used our research since 2012.
What do I think about the stability of the solution?
To say it's a set-and-forget system wouldn't be entirely accurate, but it is an incredibly stable and reliable system. Once it's set up and configured properly, you really just need to keep an eye on it for any necessary updates or new rules. In my experience, it's one of the most reliable systems available.
What do I think about the scalability of the solution?
The original installation we were considering was for a small organization, and we had to take into account the fact that we were going to expand the endpoints to our entire user base, not just a select few like marketing.
We were assured that the system would have no issues handling the additional workload as we added more devices or upgraded the device.
The firewall solution that I have referred to the most during this conversation is one that I have implemented for small to medium-sized organizations.
How was the initial setup?
I found the initial setup very straightforward.
I recall that the setup process for the device was straightforward and could be completed quickly. However, while the device did come out of the box, it wasn't as secure as it could have been, and I had to go in and tighten up the security settings. Despite that, compared to other firewalls with complex and cryptic interfaces, Palo Alto's firewall interface was relatively easy to use and comprehend.
There were certainly benefits in terms of time-saving and ease of learning for the user. The straightforward setup process and user-friendly interface of the Palo Alto network devices made it easier and quicker to implement, thus saving time. Additionally, the easy-to-use interface also helped in reducing the learning curve for users, enabling them to become proficient in using the device more rapidly.
Using Palo Alto has reduced the amount of downtime considerably.
Determining the impact of blocking threats is not straightforward because it depends on the severity of the threat. For example, if a threat only affected one server, the downtime would be minimal. However, if it caused an outage in the entire environment, the impact would be much greater. It is challenging to quantify the amount of downtime prevented by blocking threats.
Usually, when setting up a new firewall, it's common to get around 80% of the work done within a few days. However, with the Palo Alto network device, I recall that we were able to achieve 95% to 99% completion within just a couple of days. The device's user-friendly interface and straightforward configuration process made it easier to accomplish more in less time.
What about the implementation team?
Technical support was helpful during the deployment process.
During the deployment process, I thought they were great. I had no complaints they were very knowledgeable, and we were able to resolve everything very quickly.
What was our ROI?
The organization has seen a return on investment with Palo Alto firewalls as we haven't experienced any significant breaches.
Which other solutions did I evaluate?
When when we first looked at Palo Alto, it came in as the top recommendation from a source that we trusted. We didn't actually look at other vendors at that time.
At the time, we had the full support of our CEO and team, who recognized the urgency of the situation as our entire system was down. This rare backing from everyone helped us to quickly implement a solution.
What other advice do I have?
We frequently recommend Palo Alto to others as we believe it is a highly effective solution for network security. It is one of those things where if someone does not have a Palo Alto, we advise them to consider it as a worthwhile investment.
For those seeking the cheapest or quickest solution, I would advise that while it may seem like a good idea in the short term, you will likely encounter issues that will require you to replace the solution soon after. Investing in a reliable and reputable solution like Palo Alto Networks may require a larger investment upfront, but will ultimately save you time and money in the long run.
The biggest value that I gain from being here is networking and finding out what other products are out there without having to go to, like, a search engine and wait or rely on the results of the search engine. I can literally wander around. And if something catches my eye, I can be like, well, that's really cool. Let me go get some more information about that.
It's really easy to just look at all the different vendors, looks at the various talks, looks at everything that's here, and get information tailored to what I wanna learn about.
I definitely can make recommendations on various products they get based on my experience, but I don't have a say in it directly.
I would rate Palo Alto Networks NG Firewalls a nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Network administrator at a educational organization with 201-500 employees
A comfortable and easy to use solution with a helpful URL filtering feature
Pros and Cons
- "There are many valuable features within the solution. This includes security, a user-friendly firewall, antivirus, and global protection."
- "The VPN has room for improvement."
What is our primary use case?
We use the solution to protect our network environment. We use three versions: 230, 440, and 820.
How has it helped my organization?
Palo Alto Networks NG Firewalls embed machine learning into the core of the firewall to provide real-time attack prevention, which is wonderful.
We check the machine learning logs to secure our networks against threats that are able to evolve more rapidly.
I find the solution to be comfortable and easy to use. While I cannot completely authenticate my devices, I am able to distinguish between private devices and use them for authentication in some way, which is very helpful. The URL filtering feature is also helpful and I am very satisfied with the firewall delivery.
Palo Alto Networks NG Firewalls provide a unified platform that natively integrates all our security capabilities through Cortex XDR.
I give the solution's single-pass architecture for performance and security an eight out of ten.
What is most valuable?
There are many valuable features within the solution. This includes security, a user-friendly firewall, antivirus, and global protection.
Palo Alto Networks NG Firewalls' documentation, features, and user-friendliness are excellent.
What needs improvement?
The VPN has room for improvement.
For how long have I used the solution?
I have been using the solution for two and a half years.
What do I think about the stability of the solution?
For the most part, the stability is good but we sometimes face problems with the VPN connections.
What do I think about the scalability of the solution?
The solution is scalable. We have 150 people that use the solution.
How are customer service and support?
We often don't have to open a ticket as the documentation provided is usually comprehensive, and we can usually resolve most issues on our own. The one time I submitted a ticket, the technical support was not able to resolve the issue.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I previously used Forcepoint Next-Generation Firewall which is cheaper than Palo Alto Networks NG Firewalls but I prefer Palo Alto because it is user-friendly and supports more devices and features.
How was the initial setup?
I was not involved in the initial setup but I did migrate the 820 to the 440 and it was straightforward. The migration took a few hours.
What's my experience with pricing, setup cost, and licensing?
Palo Alto Networks NG Firewalls are expensive.
There is an additional cost for support.
What other advice do I have?
I give the solution nine out of ten.
The maintenance consists of regular updates only.
Currently, we do not use Palo Alto Networks NG Firewalls across our entire network but we have plans to extend them in the future.
I recommend Palo Alto Networks NG Firewalls to others.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Palo Alto Networks NG Firewalls
February 2025

Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: February 2025.
841,004 professionals have used our research since 2012.
System Engineer at a tech vendor with 1-10 employees
A flexible, easy to configure solution, with excellent threat intelligence and outstanding support
Pros and Cons
- "All the features are valuable, but my main one is the straightforward and well-designed GUI. I'm over 50 and have been in this business since the internet started. I'm not a GUI guy; I prefer using the command line. The product's GUI is excellent, and so is the threat intelligence. It's also straightforward to configure and flexible. The solution even has good networking, such as VLAN and subinterfaces, which is great because, in my experience, if the firewall is good, then the router usually isn't and vice-versa, but Palo Alto has both."
- "The solution's VPN, called GlobalProtect, could be improved as I've had a few issues with that."
What is our primary use case?
I design networks for our customers; I always use a high-speed packet filter upfront because I work for a Juniper partner company. This is usually a Juniper SRX series firewall and it does most of the easy work. Behind that, I add a more intelligent firewall, Palo Alto NGFW. We are partnered with Palo Alto, but that's not the main reason we use their solution. I worked with Check Point products for four years, and the Palo Alto alternative seriously impressed me. Here in Hungary, Palo Alto is considered the de facto intelligent firewall, for good reason.
I work for an integrator and support company, and I support our customer's security platforms; we have many customers with Palo Alto Networks NG Firewalls.
How has it helped my organization?
The firewalls improved our organization. Creating firewall rules is much simpler. The solution is so straightforward that customers can configure it themselves, and they rarely call us for that, which is great for us as a support company. It makes our job much easier as Palo Alto NGFWs don't require a security specialist to configure; it can be done by systems engineers or IT support staff.
What is most valuable?
All the features are valuable, but my main one is the straightforward and well-designed GUI. I'm over 50 and have been in this business since the internet started. I'm not a GUI guy; I prefer using the command line. The product's GUI is excellent, and so is the threat intelligence. It's also straightforward to configure and flexible. The solution even has good networking, such as VLAN and subinterfaces, which is great because, in my experience, if the firewall is good, then the router usually isn't and vice-versa, but Palo Alto has both.
We use the on-premises solution, and it's very impressive; both flexible and intelligent. The machine learning functionality is excellent, and I love the product as a support guy because it makes my job much easier. I have very little troubleshooting, and our customers haven't had a single security incident since implementing Palo Alto. I'm deeply impressed with this solution.
The machine learning against evolving threats works well. The best thing I can say is that none of our customers have had any security issues; I can't find any problems with the solution.
The support is outstanding; we are always alerted about potential issues such as bugs in advance, so we have time to adapt and prepare. Palo Alto has grown more effective; most importantly, there haven't been any security issues. I would give the product a 10 out of 10 for flexibility and at least a seven for security. I can't say precisely what security threats our customers face, but nothing has gotten through.
The solution provides a unified platform, which is essential because there is a significant shortage of experienced IT specialists in Hungary and elsewhere. Their effectiveness is amplified by the quality and straightforward nature of the solution, and the result is more robust security.
I don't have a direct view of our customer's security threats as it is privileged information, but I can say that there have been no security breaches. I would say the solution does eliminate security holes.
Our Palo Alto firewalls have the zero-delay signature feature implemented, and it works fine. There haven't been any issues with us or any of our customers. This feature makes the whole security system more efficient.
The network performance is top-notch; I would give it a 10 out of 10. Intelligent firewalls tend to be slower, but this solution is fast. Previously, I used a simple packet filter or zone-based packet filter in conjunction with an intelligent firewall, but Palo Alto is fast and secure enough for standalone use. I've been familiar with the solution's architecture from the beginning, and it's a very nice platform.
I recommend this solution to any engineer; technically speaking, it's the best product on the market. I know it isn't the cheapest, and decisions are often made on a financial level, but Palo Alto in Hungary always gives us a good deal.
What needs improvement?
The solution's VPN, called GlobalProtect, could be improved as I've had a few issues with that.
It can be challenging to migrate configurations between Palo Alto firewalls or restart with a backup configuration using the CLI. That could be improved. I think I'm one of the only people still using the CLI over the GUI, so that's just a personal issue.
For how long have I used the solution?
I have been working with the solution for four years.
What do I think about the stability of the solution?
The solution is incredibly stable.
What do I think about the scalability of the solution?
We work with hardware platforms, and they are usually slightly over designed to be on the safe side. The virtual firewall is highly customizable, but I have experience with the hardware platforms, and there is an upper limit on those, but I haven't had any scaling issues thus far.
In Hungary, where I live, the population is 10 million, similar to London. When I say we have 1000 end-users, it may seem like a small number, but that's relatively high for Hungary. Other vendors also supply the solution here, so 1000 is just our customers.
I mostly do deployments and maintenance alone. There are three systems engineers at our company.
How are customer service and support?
The customer service and support are good. I have full support when I have a problem, and they can even do remote assistance. We had a big power failure, and the firewall didn't restart; they provided a hardware expert over the phone to solve the problem. They are very impressive. I would say Juniper offers the best support, but Palo Alto is almost as good, if not just as good for me.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have been in this business from the beginning, so I used most firewall solutions. I focused on Cisco for 15 years, but that changed due to license-based selling in a very price-sensitive market. Cisco is not as viable an option as it used to be as customers consider it too expensive. I also used a Check Point solution, which was regarded as the go-to intelligent firewall five years ago, but now Palo Alto has taken that top spot.
We are partners with several providers, including Juniper, Palo Alto, and a few others, but I always go with Palo Alto because it's a straightforward solution with easy installation.
How was the initial setup?
The setup is easy; it's straightforward for anyone with basic networking and security knowledge. It's comparable to setting up a firewall at home, which is very impressive. It's still easy with very complex network setups, only the VPN concentrator, GlobalProtect, is more challenging, as it requires two-factor authentication, but it's still straightforward.
Initial setup time depends on the specific implementation, but we can do a new deployment in one or two days. It is more complicated when migrating from other platforms because the customer expects the same logic and features in the new platform. Palo Alto has an excellent marketing strategy, so their customers know their product uses a unique logic. This helps keep the implementation straightforward and shorter compared to other solutions.
My implementation strategy begins with a plan for the customer's network based on their needs. Then I set up all the networking parameters and configure the solution in my lab device, so I can export it and import it on-site. Every setup begins in our lab, as it's more impressive to go to the customer and import the configuration right away.
What's my experience with pricing, setup cost, and licensing?
I don't know about the price of the platform or the license fees, as the finance department deals with that. I only bill for the materials involved in the design.
I don't know about the price. When there's a new project, I go to the meeting, but after a point, all the engineers leave when it comes to money because it's not our business. I know Palo Alto offers good discounts for the partners, and the solutions are good. They offer free trials and win many customers because it allows them to test products and see how well they perform.
The only thing I can say is it's a top technology.
What other advice do I have?
I would rate this solution a nine out of ten.
Cloud-based solutions are very unpopular in Eastern Europe, only private clouds are used, but on-premises is the favored deployment method. We use cloud solutions at home and for small companies or companies with particular use cases. I implemented the solution for a customer, and my first task was to disable all cloud-related features. It's exceedingly difficult to find a financial or government institution using a cloud-based platform; this market segment tends to have a more conservative mentality.
I don't use the solution personally, but I'm the first-level troubleshooter. If I can't solve a problem, I open a ticket to Palo Alto's customer support.
I have clients who used separate firewalls and VPN concentrators, but after switching to this solution, they now use the Palo Alto firewall and its VPN, GlobalProtect. I don't think it's the best VPN concentrator, it's an excellent firewall, but the weak point is the VPN.
I advise reading the documentation before configuring, which goes for any platform.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Senior Network Engineer at a tech services company with 201-500 employees
Combines many tools in one appliance, giving us a single point of view for our firewall and all related security issues
Pros and Cons
- "The most valuable features include the different security zones and the ability to identify applications not only by port numbers but by the applications themselves... And with the single-pass architecture, it provides a good trade-off between security and network performance. It provides good security and good network throughput."
- "The machine learning in Palo Alto NG Firewalls for securing networks against threats that are able to evolve and morph rapidly is good, in general. But there have been some cases where we get false positives and Palo Alto has denied traffic when there have been new updates and signature releases. Valid traffic gets blocked. We have had some bad experiences with this. If there were an ability, before it denies traffic, to get some kind of notification that some traffic is going to be blocked, that would be good."
What is our primary use case?
We use it to segregate traffic between different tenant instances and to manage secure access to environments, DMZ zones, and to communicate what the firewall is doing.
How has it helped my organization?
With Palo Alto NG Firewalls, we can pass all compliance requirements. We trust it and we are building the security of our environment based on it. We feel that we are secure in our network.
It also provides a unified platform that natively integrates all security capabilities. It's very important because it gives us one solution that covers all aspects of security. The unified platform helps to eliminate security holes by enabling detection. It helps us to manage edge access to our network from outside sources on the internet and we can do so per application. It also provides URL filtering. The unified platform has helped to eliminate multiple network security tools and the effort needed to get them to work together with each other. In one appliance it combines URL filtering, intrusion prevention and detection, general firewall rules, and reporting. It combines all of those tools in one appliance. As a result, our network operations are better because we have a single point of view for our firewall and all related security issues. It's definitely a benefit that we don't need different appliances, different interfaces, and different configurations. Everything is managed from one place.
What is most valuable?
The most valuable features include the different security zones and the ability to identify applications not only by port numbers but by the applications themselves.
The DNS Security with predictive analytics and machine learning for instantly blocking DNS-related attacks works fine. We are happy with it.
And with the single-pass architecture, it provides a good trade-off between security and network performance. It provides good security and good network throughput.
What needs improvement?
The machine learning in Palo Alto NG Firewalls for securing networks against threats that are able to evolve and morph rapidly is good, in general. But there have been some cases where we get false positives and Palo Alto has denied traffic when there have been new updates and signature releases. Valid traffic gets blocked. We have had some bad experiences with this. If there were an ability, before it denies traffic, to get some kind of notification that some traffic is going to be blocked, that would be good.
In addition, there is room for improvement with the troubleshooting tools and packet simulator. It would help to be able to see how packets traverse the firewall and, if it's denied, at what level it is denied. We would like to see this information if we simulate traffic so we can predict behavior of the traffic flow, and not just see that information on real traffic.
For how long have I used the solution?
I have been using Palo Alto Networks NG Firewalls for about three years.
What do I think about the stability of the solution?
The solution is pretty stable.
What do I think about the scalability of the solution?
The scalability is good.
In terms of the extensiveness of use, it depends on business needs. Every communication from the company is going through this solution, so it's highly used and we are highly dependent on the solution.
In terms of increasing our use of the solution, it all comes down to business needs. If the business needs it, and we get to the limit of the current appliance, we will consider updating it or adding more appliances. At this point, we're good.
Which solution did I use previously and why did I switch?
We previously used Cisco. The switch was a business decision and may have had to do with cost savings, but I'm not sure what the driver was.
How was the initial setup?
The initial setup was a little bit complex, but not terrible. The complexity was not related to the product. It was more to do with needing to prepare and plan things properly so that in the future the solution will be scalable. If there were some predefined templates for different use cases, that would help. Maybe it has that feature, but I'm not familiar with it.
The time needed for deployment depends on the requirements. We also continuously optimized it, so we didn't just deploy it and forget it.
Our implementation strategy was to start with allowing less access and then allowing more and more as needed. We made the first configuration more restrictive to collect data on denied traffic, and then we analyzed the traffic and allowed it as needed.
We have less than 10 users and their roles are security engineers and network engineers. We have three to four people for deployment and maintenance and for coordinating with the business, including things such as downtime and a cut-over. The network and security engineers work to confirm that the configuration of the solution is meeting our requirements.
What about the implementation team?
We did it ourselves.
What's my experience with pricing, setup cost, and licensing?
I'm not sure about pricing. I don't know if Palo Alto NG Firewalls are cheaper or not, but I would definitely recommend Palo Alto as an option.
If you need additional features, you need additional licenses, but I'm not aware of the cost details.
Which other solutions did I evaluate?
We evaluated Cisco, Sophos, Dell EMC SonicWall, and FortiGate. Cost and reputation were some of the key factors we looked at, as well as the flexibility of configuration. Another factor was how many users could comfortably work on the solution when publicly deployed.
What other advice do I have?
The fact that Palo Alto NG Firewalls embed machine learning in the core of the firewall to provide inline, real-time attack prevention is important, but I still don't completely trust it. I haven't really seen this feature. Maybe it's somewhere in the background, but I haven't gotten any notifications that something was found or prevented. At this point, we still use traditional approaches with human interaction.
Overall, what I have learned from using Palo Alto is that you need to be very detailed in your requirements.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Security and IT Infrastruture Senior Manager at a retailer with 1,001-5,000 employees
Helps to eliminate security holes and enables us to manage our firewall security in-house
Pros and Cons
- "The technical support is great."
- "There is a tradeoff between security and network performance, as security is always top-notch, but performance can sometimes lag and has room for improvement."
What is our primary use case?
We use the solution as a firewall for our network. We can manage our traffic between internal traffic and external traffic handling. The solution protects the traffic and we manage the standard firewall issues.
How has it helped my organization?
The solution's embedded machine learning in the core of the firewall that provides in-line real-time attack prevention is important and provides good insight for us. The machine learning actions and learning activities provide some useful information.
The solution's machine learning for securing our networks against rapidly evolving threats is good. We utilize an IoT tool that comprehends IoT devices, such as webcams, and can therefore interpret their behavior and send information on their activity. The tool also applies appropriate firewall rules to these devices, taking into account the clearance level of each device based on its traffic.
Before implementing Palo Alto, we had to rely on a management company to handle our firewall security. However, now that we have Palo Alto, we can manage our firewall security in-house.
Palo Alto Networks NG Firewalls unified platform helped to eliminate security holes.
The zero-delay signature feature helps keep our security updated against new attacks.
What is most valuable?
Palo Alto Networks NG Firewalls provides a unified platform that natively integrates all security capabilities which is important to our organization.
Palo Alto Networks NG Firewalls' zero-delay signature feature is important, and it receives daily updates.
What needs improvement?
At times, server capacity can result in issues. While Palo Alto is a top firewall company, it's crucial to properly size the firewall to meet our needs. In the case of larger attacks, the capacity of our current firewall may not be adequate, requiring us to obtain more advanced and expensive versions to ensure network protection.
There is a tradeoff between security and network performance, as security is always top-notch, but performance can sometimes lag and has room for improvement.
The cost of the solution has room for improvement.
For how long have I used the solution?
I have been using the solution for one year.
What do I think about the stability of the solution?
I give the stability an eight out of ten.
What do I think about the scalability of the solution?
The solution is not very scalable. We need to define our requirements and purchase the correct product for our needs.
We are an enterprise company with over 3,000 people. All the network traffic goes through the solution but we have five people that work directly on the solution.
How are customer service and support?
The technical support is great.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used Check Point NGFW and switched to Palo Alto Networks NG Firewalls because of the stability.
How was the initial setup?
I give the initial setup a five out of ten. The deployment took one month.
What about the implementation team?
Implementation was completed in-house by a consultant.
What's my experience with pricing, setup cost, and licensing?
Compared to other firewall solutions, this is an expensive solution.
What other advice do I have?
I give the solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Compliance Analyst at a international affairs institute with 11-50 employees
The ability to provide secure access to people without having to carry an additional device around really benefits us
Pros and Cons
- "Prisma Access is the most valuable feature of Palo Alto Networks NG Firewalls."
- "In my opinion, the training provided is satisfactory, but there is certainly room for improvement. It would be great to have more comprehensive training at a lower cost, or even for free."
What is our primary use case?
We use Palo Alto Networks NG Firewalls to protect small businesses that work within the defense industrial base.
How has it helped my organization?
By using Prisma Access, we can easily connect to our network from different locations around the world without having to deploy multiple firewalls. This not only makes it more convenient but also saves us a lot of expenses.
What is most valuable?
Prisma Access is the most valuable feature of Palo Alto Networks NG Firewalls.
The ability to provide secure access to people without having to carry an additional device around really benefits us in the defense industrial base.
What needs improvement?
The training provided is satisfactory, but there is certainly room for improvement. It would be great to have more comprehensive training at a lower cost, or even for free.
I would say that Palo Alto Networks NG Firewalls provide a unified platform for many, but not all.
Having everything in one pane of glass is important to me because I have a lot of responsibilities. It would be really nice to have everything in one place, so I don't have to switch around between different applications and can stay focused on one platform.
It's important to have machine learning embedded, but it's equally important to not solely rely on it. We still need human interaction to ensure proper security measures. Nonetheless, machine learning is a vital component of our security strategy.
For how long have I used the solution?
I have been using Palo Alto Networks NG Firewalls for five years.
What do I think about the stability of the solution?
Palo Alto Networks NG Firewalls have been instrumental in reducing our downtime as we moved away from less robust devices. By implementing Palo Alto firewalls, we have significantly improved our network stability.
If I had to estimate, it has saved us 10 to 15 hours per year.
Palo Alto Networks NG Firewalls is a very stable solution.
What do I think about the scalability of the solution?
I haven't encountered the need to scale the solution yet. Our current setup meets our requirements and has been working well for us. Given that we are a small company, we have not felt the need to look into scaling it at this point.
How are customer service and support?
The technical support provided by Palo Alto Networks is excellent. Although I have only needed to contact them a few times, they have always been quick to respond, and their team is very knowledgeable.
I would rate the technical support a nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Before, we used SonicWall, but we decided to switch to Palo Alto Networks NG Firewalls because they offer a much better solution and are leading the market.
How was the initial setup?
I was part of the deployment team, but since I was new to Palo Alto devices, the deployment process was more complex for me. That's where the training came into play.
I had to familiarize myself with their user interface and terminologies since I was used to using a different system. It took some time for me to learn and compare it with what I've used before.
What about the implementation team?
We purchased from a reseller.
It was a straightforward process. We made the purchase online and they shipped it to us. After that, it was a matter of getting it up and running.
What was our ROI?
It's difficult to determine. When looking at the ten to fifteen hours a year, it's unclear whether or not I would consider that as part of the return on investment. It's a bit challenging to assess from an IT perspective.
What's my experience with pricing, setup cost, and licensing?
Reducing costs is important, especially since Prisma can be expensive. It would be great if it were more affordable.
Although the hardware can be expensive, the quality of Palo Alto Networks NG Firewalls is excellent. While a lower cost would be desirable, we recognize the value of investing in a reliable and effective solution.
Which other solutions did I evaluate?
When we were moving away from SonicWall, we evaluated FortiGate and Meraki's solutions.
In my opinion, I was impressed with FortiGate's system on a chip. It was really fast compared to Palo Alto's, but I think Palo Alto has a better feature set and interface. As for SonicWall, we had several reasons for leaving. Regarding Meraki, I find their management interface not suitable for my needs, and they seem to be more of a consumer-grade or prosumer-grade product.
What other advice do I have?
I am not in a position to comment on the solution's ability to secure data centers consistently across all workplaces, from the smallest office to the largest data centers since I have only used their smaller solutions.
My advice to those who are seeking a firewall solution is not to prioritize the cheapest or the fastest options, as it could be risky. Instead, it is important to invest in the best quality firewall that is within your budget. This is something that I have experienced with Palo Alto Networks, which provides a high-quality solution that is worth the investment.
I would rate Palo Alto Networks NG Firewalls a nine out of ten.
The experience has been amazing, with a few sessions resulting in new services that I can offer my company directly. The best part is that I can do it without having to invest in an expensive tool that costs hundreds of thousands of dollars.
It does impact the purchases we will make throughout the year.
If I can perform 95% of the work at a lower cost, we are unlikely to consider Mandiant and spend a significant amount of money.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT engineer at a financial services firm with 201-500 employees
The solution provides a unified platform, enhances security, and is stable
Pros and Cons
- "The application awareness feature that recognizes application IDs and vulnerability protection are Palo Alto Networks NG Firewalls' most valuable features."
- "The price is high and has room for improvement."
What is our primary use case?
We use Palo Alto Networks NG Firewalls as a gateway for our data center and server files because they are a reliable and robust device, and the best in the security field. We also use their threat intelligence and threat protection services, which are like brass fittings.
How has it helped my organization?
Palo Alto enables telemetry and enriches their systems to protect our network against threats, which is why machine learning helps us secure our network.
Palo Alto Networks NG Firewalls have enhanced our security by around 20 percent.
The solution provides a unified platform that natively integrates all of our security capabilities.
Palo Alto Networks NG Firewalls help eliminate security holes by stopping all the known and unknown vulnerabilities that we are seeing in our network.
The single-path architecture has improved performance and latency.
What is most valuable?
The application awareness feature that recognizes application IDs and vulnerability protection are Palo Alto Networks NG Firewalls' most valuable features.
What needs improvement?
The price is high and has room for improvement.
We have Elite Plus partner support, which means we always have to speak to a partner to open a case. However, not all of the partners are knowledgeable or helpful.
For how long have I used the solution?
I have been using Palo Alto Networks NG Firewalls for two years.
What do I think about the stability of the solution?
Palo Alto Networks NG Firewalls are stable.
What do I think about the scalability of the solution?
When it comes to virtual machine editions or the cloud, I think they are more scalable than hardware.
We have three administrators, 1,000 end users, and up to 400 servers that use Palo Alto Networks NG Firewalls.
Which solution did I use previously and why did I switch?
We previously used Fortinet FortiGate firewalls but switched to Palo Alto Networks NG Firewalls for their superior performance. We also chose Palo Alto Networks because Gartner's reviews of their firewalls have consistently been better than those of Fortinet.
How was the initial setup?
The initial setup is straightforward. However, enabling the security features and starting traffic inspection can be complex. The physical installation is easy.
The deployment for one device takes one day.
What was our ROI?
We have seen a return on investment in the two years that we have been using the solution.
What's my experience with pricing, setup cost, and licensing?
Palo Alto Networks NG Firewalls' price is expensive.
What other advice do I have?
I give Palo Alto Networks NG Firewalls a nine out of ten.
I recommend Palo Alto Networks NG Firewalls.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Network Analyst at a non-profit with 1,001-5,000 employees
Debugging and troubleshooting through package capture are very easy from CLI
Pros and Cons
- "It's very important that Palo Alto NG Firewalls embed machine learning into the core of the firewall to provide inline, real-time attack prevention. That increases our security posture... The firewall is able to capture it and flag it and it is easy to mitigate as soon as we see something like that happening, to secure the environment more, in real time."
- "In the last three years at least, they have been lagging behind their competitors. The main issue is the support that we can get... You have to wait for them to get back to you and sometimes it's random. And the biggest problem I have is that you have to wait hours on the line when you're calling them to get a hold of the next available engineer."
What is our primary use case?
We used the solution as an edge or internet firewall where we were running IPS/IDS and doing filtering on it, apart from the other security features. We are still using it for our users' VPN activity and to manage site-to-site VPN tunnels with other clouds, like AWS and Azure, so that there is connectivity back and forth between those cloud providers and our on-prem data center.
What is most valuable?
The features I like are the debugging and troubleshooting through package capture. It's easy to capture from the CLI and it's also easy to get logs from the CLI.
It's very important that Palo Alto NG Firewalls embed machine learning into the core of the firewall to provide inline, real-time attack prevention. That increases our security posture. It gives us real-time anti-cyber activity and enables us to look at it. The firewall is able to capture it and flag it and it is easy to mitigate as soon as we see something like that happening, to secure the environment more, in real time.
These firewalls have the zero-delay signatures feature, which is really important because you don't want to be lagging behind with any kind of security updates. It doesn't affect our security a lot, but without it, we could be compromised a little bit. If updates are delayed by a couple of hours, there's an opportunity for the bad actors to execute something in that time frame. It gives us a little bit more security, but it's not like it's a high-severity situation.
Overall, they're doing great with the features. They're improving them day by day and year by year, which is really good. They're making new products that are compact inside, which is also really good. Instead of a full rack, they have tiny devices that have the same or even better performance compared to the bigger ones. They are doing well in improving the units, features, and security.
For how long have I used the solution?
I've been using Palo Alto Networks NG Firewalls for eight years.
What do I think about the stability of the solution?
They're very reliable and stable. Compared to some of the competitors, they're more reliable.
What do I think about the scalability of the solution?
The scalability is also good. They provide good options for scaling. The only thing that I would think about is that, in the newer firewalls, they have increased the performance but decreased the number of concurrent VPN connections or users. The new, compact devices have better performance, but they have reduced the number of users that can connect. Maybe that's a marketing strategy to sell higher-end models.
In my organization, everybody is using the Palo Alto firewalls because they're connected to the VPN, but the management and operations aspects are limited to the folks in IT.
How are customer service and support?
These firewalls used to bring a lot of value to us, but in my practical experience, in the last three years at least, they have been lagging behind their competitors. The main issue is the support that we can get.
For example, in the past, if something happened, we could just give them a call and open a ticket, and we would have technical support right away to help us. Whether it was a severity-one, critical incident, where we had no connectivity, or just a minor or medium-severity issue, we used to get support right away. But in the last three years, it has been really hard to get hold of an engineer. I have reached out a couple of times to give them a heads-up, "This is a ticket I opened three days ago. I'm trying to get a hold of anybody."
It's okay that they force us to open a ticket on the portal, but after opening a ticket, it's really hard to get support when you need it. You have to wait for them to get back to you and sometimes it's random. And the biggest problem I have is that you have to wait hours on the line when you're calling them to get a hold of the next available engineer.
They should make it easier to get in touch with their TAC. This is what they have called transforming the customer experience, but I believe it's getting worse. That's the only thing they have to improve. When you do get someone, the support from their end stands out, it's a nine out of 10. But getting a hold of an engineer is a two out of 10.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial setup is very straightforward. You need to connect through the portal manager and to the IP that you want to access remotely. And pushing the configuration from other devices is very easy. They provide tools so that you can get the configuration from competitors' devices and convert that into the Palo Alto version. It's very easy to configure initially and to manage as well.
On the maintenance side, it's really good. We don't have to put a lot of effort into that.
What other advice do I have?
The security and performance of the PA-400 series of Palo Alto NGFWs, versus its price, is really good. It's very inexpensive and has good performance compared to the previous higher-end 3000 models.
Palo Alto provides Panorama where you can manage a bunch of firewalls from a single pane of glass or just one device. It allows you to manage all of the firewalls in one, integrated location. You don't have to make a chain of 50 different firewalls. It will push what you need to be changed to all the other firewalls. We used to use it, but we got rid of it because we replaced all our Palo Altos with competitors' firewalls and we don't use Palo Alto anymore, other than for VPN. We have six firewalls in our organization right now, although we used to have 35 to 40. Because we no longer have a lot of firewalls, we got rid of Panorama. We don't want to pay for it to just manage six firewalls where we are not making any changes frequently. If we had 35 or 40 still, I would definitely recommend having Panorama.
Panorama is for managing the rules. It saves time on configuration, but it doesn't affect your security posture. Whether you're managing each firewall or using Panorama, it's exactly the same thing. But it helps you to execute changes in a very short period of time. It's a way of pushing the config to all your devices.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Updated: February 2025
Product Categories
FirewallsPopular Comparisons
Fortinet FortiGate
Netgate pfSense
Cisco Secure Firewall
Check Point NGFW
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
SonicWall NSa
Fortinet FortiGate-VM
Untangle NG Firewall
KerioControl
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Palo Alto the best firewall for an on-premise/cloud hybrid IT network?
- What are the main differences between Palo Alto and Cisco firewalls ?
- Expert Opinion on Palo-Alto Required.
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Features comparison between Palo Alto and Fortinet firewalls
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which is better - Palo Alto Networks NG Firewalls or Sophos XG?
- What are the main differences between Palo Alto firewalls and Cisco Secure Firepower?
- What is a better choice, Azure Firewall or Palo Alto Networks NG Firewalls?
- Which Palo Alto Networks NG Firewalls model is recommended for 1200 users?