Try our new research platform with insights from 80,000+ expert users
Security Analyst at ARINSO Deutschland
Real User
Top 20
A comprehensive and feature-rich product that is easy to use
Pros and Cons
  • "The product was great, and whenever there was a bug or issue, they released updates quickly. Additionally, their support was very good."
  • "The pricing of the solution could be considered an area of improvement, as it is a comprehensive and feature-rich product that may include features that are not needed by some companies."

What is our primary use case?

We require Palo Alto Networks Panorama to safeguard internet access for our users. Additionally, we need features such as URL filtering and sandboxing, among other useful functionalities.

How has it helped my organization?

The Palo Alto Networks Panorama was highly useful to us. However, it is important to consider that Palo Alto is a specific solution, and therefore one must be certain about their requirements before investing in it as it can sometimes be overburdening and expensive. Despite this, Palo Alto offers a plethora of features that can be useful if required. The product was great, and whenever there was a bug or issue, they released updates quickly. Additionally, their support was very good.

What is most valuable?

Feature-wise, Palo Alto Networks Panorama had a mix of everything. With the centralized view for the firewall, it was really convenient to have the same rule set for all. We could check everything from the logs, do some packet tracing, and more. In the beginning, we had BrightCloud as a database provider, but we eventually moved to Palo Alto Networks Panorama, which was also convenient. So, we can say that the ease of use was a big factor.

What needs improvement?

The pricing of the solution could be considered an area of improvement, as it is a comprehensive and feature-rich product that may include features that are not needed by some companies. Therefore, the solution should have a more competitive pricing structure.

Buyer's Guide
Palo Alto Networks Panorama
December 2024
Learn what your peers think about Palo Alto Networks Panorama. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,053 professionals have used our research since 2012.

For how long have I used the solution?

I have been using Palo Alto Networks Panorama for three to four years. There are a lot of upgrades, so I don't clearly remember the version.

What do I think about the stability of the solution?

Stability-wise, I rate the solution a nine out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution an eight out of ten. I may consider increasing the solution's usage.

How are customer service and support?

I rate the technical support an eight out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

In the beginning, the solution was hosted in a data center that was not owned by us but by Verizon. However, when we migrated to SD-WAN, it became cloud-based.

The infrastructure was managed by Verizon towards the end. Therefore, any issues or problems, as well as room modifications, were raised by us through a ticket, and they took care of everything related to the infrastructure. So, it wasn't something we had to deal with directly.

What was our ROI?

I have seen a return on the investment. But maybe we can see higher ROI with other solutions at the moment. So, we are a bit tight on budget now.

What other advice do I have?

I would tell those planning to buy the product that if you really need those features and you are able to afford the price, go for it because it will probably be hard to get by any other product with the same features. Overall, I rate the product a nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
IT Security Analyst at a energy/utilities company with 51-200 employees
Real User
Easy to manage with a straightforward initial setup and good stability
Pros and Cons
  • "The product can scale."
  • "The solution is extremely expensive. You can integrate it with other Palo Alto products, however, it ends up being too much."

What is our primary use case?

We use the solution for segregation. We also use it as a gateway in order to do URL filtering on the DNI as a security measure. We use the product's global protective VPN as well. 

How has it helped my organization?

The application ID, this kind of technology, has a very high-level check. It makes everything more secure for your enterprise network. Otherwise, fake applications can sneak in. 

If you're using application ID, they check the high side, the traffic, and they analyze everything. They see if it's a normal application. They're working closely with each vendor, to make it easy to identify applications. For the hackers or malicious traffic, they can see it and block it. 

What is most valuable?

I like the user ID and the application ID as it's easy to identify the popular applications and the EZT does the security checking in regards to the user and the application ID.

The initial setup is very easy.

The solution is easy to manage. It has a good interface as well.

The solution is stable.

The product can scale.

The solution offers good integration potential.

What needs improvement?

While Palo Alto is the leading firewall worldwide, it's so pricey. Other products like Checkpoint still do the job, and yet it's way cheaper than Palo Alto. The solution is extremely expensive. You can integrate it with other Palo Alto products, however, it ends up being too much.

Palo Alto prefers the VM version. However, for the VM level, often we have a migration from one host, VM host, to another host, and then the network jobs. And they're not fully redundant. With VM, the purpose is easy migration from one host to another one. That's the purpose of VM in play, however, if you want to have high availability or redundancy, you have to purchase two licenses - one on one host, another one on another host - and it costs a lot of money to do that. 

Technical support could be better.

For how long have I used the solution?

I've used the solution for about five to seven years at this point.

What do I think about the stability of the solution?

It is a stable solution. With the cloud, you don't even touch the physical box at all. However, for the traditional network guests, I like my stuff to be reliable. That's why I don't like the VM migrating from one host to another host. That's why I'm in the process of converting the VM back to the physical box using redundancy. That will be the network solution. I want my network available 24/7. 

What do I think about the scalability of the solution?

The solution is quite scalable.

We have about 150 people using the product currently.

How are customer service and technical support?

Support is awesome. However, it can depend. When you get a ticket and you take it to the proper person, they can give you a solution really quick, and the support is really good. That said, sometimes, if you are not lucky, you create a ticket and a salesperson or specialist runs it to a different person. Sometimes it takes a long time. Sometimes they make you do a lot of the work and ask you to send them reports or check certain things. If they run the ticket to the proper person, I can resolve the problem in 10 minutes. If they run my ticket to some other person, maybe it takes a whole day or two and I don't have time to play around.

I'd rate it as average, at maybe a five out of ten in terms of the service level you get in general.

Which solution did I use previously and why did I switch?

I previously used Juniper. I have experience with Cisco ASA as well. 

Currently, I use Microsoft Defender for my endpoint protection.

I switched when Palo Alto turned into the top firewall management solution. I did do research.

From the GRI management port, it's easier than Cisco ASA

How was the initial setup?

The solution is very easy to set up. I've been working for many years on this. I know the whole process is easy to start with some simple logarithmic management It's easy to manage. 

The deployment is fast. It usually takes about a day. On the first day, you get the management running on the UI. On the second day you need to get the traffic going through the certificate, and to do some proper security policies. That's all. Yes. To do it in one day is just a one-man job.

I manage the solution myself and maintain it every two months or so. Of course, if there are any issues in between these maintenance events, I also work on them.

What about the implementation team?

I did the implementation myself, however, five or seven years ago, I used a consultant and learned from him. I've likely done 20 or so firewalls myself at this point.

What's my experience with pricing, setup cost, and licensing?

The issue with Palo Alto is that the price is almost double other products such as Checkpoint, or Fortinet. There's no reason you price yourself to be double other brands.

I just did a call for renewing my license. I requested two redundancy units. The price, which was all-inclusive with WiFi, a VPN solution, a global VPN, et cetera - all of them bundled together, for two units, over three years, was $81,000.

You can buy the hardware only and each box is not even $10,000. It's only $8,000 for the unit itself. However, then you are charged a three-year license at $81,000.

What other advice do I have?

I'm just a customer.

I'm using the latest version of the solution.

I would rate the solution at an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Palo Alto Networks Panorama
December 2024
Learn what your peers think about Palo Alto Networks Panorama. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,053 professionals have used our research since 2012.
Manager at a financial services firm with 10,001+ employees
Real User
Provides good visibility, offers good functionality, and has great support
Pros and Cons
  • "Overall, the functionality was very good."
  • "It is an expensive product."

What is our primary use case?

Even though there was a dedicated team to monitor the logs with the SIEM platform, I would use the solution when there is a potential outbreak to provide a particular tool to view the effects of the outbreak on my environment.

What is most valuable?

It was a good functional tool. When we had multiple Palo Alto devices to be managed, it provided a lot of visibility onto those solutions. It was a good and useful tool.

The solution helped us consolidate and use logs.

The UI was fine. The visualization would be almost similar to Palo Alto Firewalls.

Overall, the functionality was very good.

It was a stable product.

It's easy to set up. 

What needs improvement?

I don't have any real comments in terms of areas of improvement. 

The scalability is limited. 

It is an expensive product. 

For how long have I used the solution?

The last time I used the solution was six months ago. I recently switched jobs. I previously used the solution for about three or four years. 

What do I think about the stability of the solution?

The solution was stable and reliable. There were no bugs or glitches, and it didn't crash or freeze. I'd rate the stability of the solution nine out of ten. 

What do I think about the scalability of the solution?

It's not hugely scalable. It has limited scalability. That said, it's good. It offers what is requested. It depends on your initial planning and pricing, so it's not great in scalability. However, I would give it an overall scalability rating of seven out of ten.

At my old company, we had six to eight people using the solution. 

How are customer service and support?

I did raise some tickets with technical support, and I found them to be helpful and responsive. 

How would you rate customer service and support?

Positive

How was the initial setup?

It was pretty easy to set up. I did not find the implementation complex. I'd rate the ease of deployment nine out of ten. 

What's my experience with pricing, setup cost, and licensing?

The pricing of the product is high. They aren't very cost-effective. That said, they do provide high value to organizations. 

Which other solutions did I evaluate?

I've seen three other devices like FortiGate and FortiManager as well as FortiAnalyzer. However, I can't make apples-to-apples comparisons between the solutions. I can say that the interface of Panorama is better in general, and Panorama does offer very good visibility.

What other advice do I have?

I was a customer and end-user. 

I'd rate the solution eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
NenadMijatovic - PeerSpot reviewer
Director of Sales at S4E Serbia
Reseller
Top 5Leaderboard
Simplifies firewall management and integrates seamlessly with Palo Alto firewalls
Pros and Cons
  • "The most valuable aspect of Palo Alto Networks Panorama for me is the centralized management of multiple firewalls."
  • "In the future, it would be beneficial if Panorama could include a firewall assurance feature similar to Skybox."

What is our primary use case?

My clients use Palo Alto Networks Panorama for centralized management of multiple firewalls across various locations. It allows them to easily oversee and configure all their firewalls through a single interface, streamlining security management across their network infrastructure.

What is most valuable?

The most valuable aspect of Palo Alto Networks Panorama for me is the centralized management of multiple firewalls. It saves time, provides consolidated visibility into my network, and allows me to configure all firewalls from one web interface, eliminating the need to access each firewall separately.

What needs improvement?

In the future, it would be beneficial if Panorama could include a firewall assurance feature similar to Skybox. While each firewall has its policy optimizer, a consolidated policy optimizer in Panorama could further enhance firewall management and optimization.

For how long have I used the solution?

I have been working with Palo Alto Networks Panorama for over ten years.

What do I think about the stability of the solution?

Panorama is stable.

What do I think about the scalability of the solution?

Palo Alto Networks Panorama is scalable and can support up to 1,000 devices, making it suitable for various network sizes. In terms of clients, it is mainly used by larger customers with more than ten firewalls. Some smaller customers with six or eight firewalls may not opt for Panorama, but those with ten or more find it beneficial for centralized management.

How are customer service and support?

I find Palo Alto Networks' technical support to be good, especially with premium support. The initial support level is handled by us, and if we encounter issues beyond our scope, Palo Alto's support team is efficient in resolving them. I would rate the support as a nine out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

Installing Palo Alto Networks Panorama is easy, and connecting firewalls is a straightforward process. Deployment typically requires just one person, usually the firewall administrator. Maintenance is also easy, especially for those familiar with managing individual firewalls, and Panorama serves additional functions like log collection and setting up SD-WAN functionality, making it highly useful for networks with multiple firewalls.

What was our ROI?

In terms of return on investment, Palo Alto Networks Panorama is worthwhile, especially for larger networks with more than ten firewalls. The time saved and the consolidated view it provides investment pay off quickly, often within a couple of months.

What's my experience with pricing, setup cost, and licensing?

In terms of pricing, Palo Alto Networks Panorama is moderate. It is very affordable when compared to more expensive firewalls. The license is yearly, and the price typically includes the initial license and support, with subsequent years requiring only twenty percent of the initial license cost for support. It is negotiable, and the overall cost depends on your network setup and the type of firewalls you are using.

What other advice do I have?

Overall, I would rate Palo Alto Networks Panorama as an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
Sumanth Myneni - PeerSpot reviewer
Architect at PepsiCo
Real User
Top 10
Beneficial central management, useful traffic monitoring, and reliable
Pros and Cons
  • "Palo Alto Networks Panorama provides many features, such as alerts, traffic monitoring, and logs."
  • "Sometimes in Palo Alto Networks Panorama, we receive issues where it is overloaded and unresponsive. We have issues with accessing the devices due to a slow response from Panorama."

What is our primary use case?

We are using Palo Alto Networks Panorama for a single pane of glass view of our network. 

What is most valuable?

Palo Alto Networks Panorama provides many features, such as alerts, traffic monitoring, and logs.

What needs improvement?

Sometimes in Palo Alto Networks Panorama, we receive issues where it is overloaded and unresponsive. We have issues with accessing the devices due to a slow response from Panorama.

Palo Alto Networks Panorama should be more robust and resilient. 

For how long have I used the solution?

I have been using Palo Alto Networks Panorama for approximately two years.

What do I think about the stability of the solution?

The stability of Palo Alto Networks Panorama is good.

What do I think about the scalability of the solution?

Palo Alto Networks Panorama is scalable.

We have approximately 250,000 users using this solution.

How are customer service and support?

We have a technical support manager from Palo Alto Networks Panorama but their response time could be faster.

Which solution did I use previously and why did I switch?

We previously used Cisco ASA and we switched to Palo Alto Networks Panorama because it is a superior solution.

How was the initial setup?

The initial installation of Palo Alto Networks Panorama is straightforward and the process takes a couple of hours.

What about the implementation team?

We used an integrator to do the implementation of Palo Alto Networks Panorama.

We have four to five engineers that support the solution.

What's my experience with pricing, setup cost, and licensing?

There is a license required to use this solution and it is paid annually.

What other advice do I have?

I would recommend this solution to others.

I rate Palo Alto Networks Panorama an eight out of ten 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1608327 - PeerSpot reviewer
Cyber Ambassador at a comms service provider with 11-50 employees
Reseller
Easy to use, updated regularly, and helpful for managing multiple environments, firewalls, and locations
Pros and Cons
  • "The entire ease of use is most valuable. If you're managing firewalls locally with PAN-OS, the look and feel of Panorama is the same. So, you don't have to relearn another product. If you're used to managing firewalls from Palo Alto, you can easily use Panorama to manage them. It looks and feels the same."
  • "Reporting might be an area to improve. It can provide reporting or some sort of graphical representation of your environment."

What is our primary use case?

We use it internally to manage the solutions that we provide to our customers. So, we use it to manage our own firewalls and Prisma Access. We also use it to manage managed firewalls. We can also resell it, but we don't tend to do too many panoramas.

We are using version 10.0.7, which is the latest one under version 10. We're not running 10.1 yet. We don't need to run that.

What is most valuable?

The entire ease of use is most valuable. If you're managing firewalls locally with PAN-OS, the look and feel of Panorama is the same. So, you don't have to relearn another product. If you're used to managing firewalls from Palo Alto, you can easily use Panorama to manage them. It looks and feels the same.

Our primary issue at the moment is to manage Prisma Access because we just switched over to using Prisma Access for our customers. My newest one is in North America. It is a great tool for that. The fact that you can push out your Prisma Access just dynamically and it changes into Prisma Access Cloud is fantastic.

What needs improvement?

It tends to move along fairly quickly in terms of features because it is a part of PAN-OS. We are waiting on one feature that's on the beta at the moment, but that's because we use Okta as our authentication.

Reporting might be an area to improve. It can provide reporting or some sort of graphical representation of your environment.

For how long have I used the solution?

I have been using it for probably two years.

What do I think about the stability of the solution?

There are no reliability issues.

What do I think about the scalability of the solution?

You can manage multiple environments, multiple firewalls, and multiple locations with it. So, it scales really well.

We have just a handful of admins. We have less than five of them.

How are customer service and technical support?

I have not used their technical support.

Which solution did I use previously and why did I switch?

We've always been Palo Alto. The founders of our company were ex-Palo Alto people, so it is always going to be Palo Alto.

How was the initial setup?

I've been using it for two years, but I didn't actually deploy those instances at Panorama. When we recently moved to Azure, I actually deployed it in Azure, and I had no issues. So, I was a complete rookie in terms of deploying it because I'd never done it before. I did that with minimal assistance from Palo Alto or anybody. So, I would say it is easy to deploy in the cloud.

In terms of updates, PAN-OS releases come every month, six weeks, or so. You have to be running a higher or equal level of Panorama to the firewalls that you're managing. If you're keeping your firewall environments up to date, you also have to keep your Panorama up to date, and with that comes new features. You have to plan for firewall updates more than Panorama, which is just managing other environments. You can pretty much update Panorama whenever you want. There is no customer or firewall outage when you update Panorama. It is just the reboot time. You just download it, install it, and reboot it, and you're done. It takes less than 20 minutes.

What's my experience with pricing, setup cost, and licensing?

We're a reseller, and we're an MSSP. So, we get some extreme discounts. 

What other advice do I have?

It is easy if you're used to managing firewalls. Using Panorama to manage the firewalls is not rocket science. It is just another GUI or web UI.

Palo Alto is really good at innovation, adding new functions and features, and rolling those out on a regular basis. So, they're going in the right direction. As long as that keeps happening, they are good. They should just keep adding and improving. 

I would rate Palo Alto Networks Panorama a nine out of 10.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Sagar More - PeerSpot reviewer
Network Security Engineer at Ares Management Corporation
Real User
When combined with WildFire, it's highly secure
Pros and Cons
  • "Compared to all of the other firewall vendors, Palo Alto is very secure."
  • "The initial setup can be complex."

What is our primary use case?

We use this solution because it provides us with a consistent security profile no matter the location. Regardless of users, we use the same configuration. 

We also use Panorama for management. Currently, all of our users are working from home — this solution has helped us manage everything. 

Over the next four years, we are planning on moving all of our data centers onto the cloud.  

What needs improvement?

Before I joined this organization, they experienced some issues when trying to set up zone protection parameters. Last week I applied a zone protection profile; for each and every branch, I had to apply a zone protection profile or modify existing metrics — I needed to physically go to each branch. When we originally deployed Panorama, we were managing the firewalls individually. After implementing all those firewalls and changing all of the templates, it's really hard to modify them. 

You can't just modify them with a single click, you need to physically go to each individual branch and make the changes yourself — we can't directly seal all of the fireworks. This needs to be improved. 

With version 9.1, when configuring it, if something goes wrong, then it reverts back to your original settings automatically. This is a nice feature but it's not available on the standard firewalls. If we didn't have Panorama and I was setting up some remote Palo Alto firewalls, after implementing my configurations, if I were to lose the configurations then I would lose firewall access. This isn't the case with other firewalls like Cisco and Juniper SRX where you can just put in a reminder in the last 10 minutes. 

For how long have I used the solution?

I have been using Palo Alto Networks Panorama for the past five years.

What do I think about the stability of the solution?

Besides the odd bug, Panorama is stable. From a management point of view, it's good. Even though we now have 25 firewalls, with a single click, we can add and submit a request. With a single click, we can apply changes to all 25 firewalls. Upgrading our remote locations, the firewalls, logs, and the reporting is all very easy. We can easily add more power and stability, it's nice.

What do I think about the scalability of the solution?

GlobalProtect is a great extension that you can add on. If something goes wrong with our cloud solution, then it will automatically fall back to our local physical firewalls across the globe. We have four different locations that GlobalProtect automatically connects to. At the moment, our company is expanding so we are adding more clients. 

How are customer service and technical support?

The technical support is pretty good. The best part about Palo Alto is that you can find answers with a simple Google search. Compared to other vendors, all of their technical data is online — for all of their solutions. Still, sometimes we prefer to use support. Sometimes it takes time as their technical team has to regenerate our issues in their lab, etc. 

How was the initial setup?

The initial setup can be complex. As I mentioned before, making modifications is very difficult. Before implementing, you need to plan carefully.

Our engineer made some mistakes when he was setting it up; we still experience some complications due to that as everything is already in place and we can't change it. 

What's my experience with pricing, setup cost, and licensing?

Licenses are available on a one to three-year basis. If you go for a one-year license, you won't get much of a discount. We have a three-year license for all of our firewalls. Currently, we have 25 firewall licenses.

Currently, we have around 20 TB of data. We are in the process of upgrading our licenses because we are adding more and more files.

The price of the licenses could be lower. Still, because we have Panorama with 25 firewalls, Palo Alto gives us a good discount. 

What other advice do I have?

I would definitely recommend Panorama to others. Compared to all of the other firewall vendors, Palo Alto is very secure. Personally, I'd say it's the best firewall vendor on the market. When combined with WildFire, it's highly secure; just make sure you configure it properly as there are a lot of viruses out there. 

Overall, on a scale from one to ten, I would give Panorama a rating of nine. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Swapnil Jumale - PeerSpot reviewer
Project Lead at Peristent Systems
Real User
Top 10
Simple rule management, highly scalable, and easy to use
Pros and Cons
  • "The most valuable feature of Palo Alto Networks Panorama is the simplicity of rule management. Both this device group and template management are very easy to use."
  • "Palo Alto Networks Panorama currently lacks the capability of integrating with other software, such as AlgoSec to simplify rule management and schedule management. However, this feature has been requested by the company and it is uncertain if Palo Alto will implement it in the future. Additionally, the UI needs improvement, it is too slow."

What is our primary use case?

We use Palo Alto Networks Panorama firewall, rule and policies management.

What is most valuable?

The most valuable feature of Palo Alto Networks Panorama is the simplicity of rule management. Both this device group and template management are very easy to use. 

What needs improvement?

Palo Alto Networks Panorama currently lacks the capability of integrating with other software, such as AlgoSec to simplify rule management and schedule management. However, this feature has been requested by the company and it is uncertain if Palo Alto will implement it in the future. Additionally, the UI needs improvement, it is too slow.

For how long have I used the solution?

I have been using Palo Alto Networks Panorama for approximately five years.

What do I think about the stability of the solution?

The solution has frequent upgrades that reduce the stability.

I rate the stability of Palo Alto Networks Panorama a six out of ten.

What do I think about the scalability of the solution?

Palo Alto Networks Panorama is scalable.

I have been using the same management software from other vendors, such as Check Point and Fortinet, but they are not as scalable as Palo Alto Networks Panorama.

We have approximately 25 people using the solution.

We do not plan to increase our usage because we are migrating to Zscaler and Cisco. Zscaler has some scalability advantages over Palo Alto Networks Panorama and this is why we are switching.

I rate the scalability of Palo Alto Networks Panorama a nine out of ten.

How are customer service and support?

There are a few areas where Palo Alto Networks Panorama support could be improved. Specifically, when we encounter issues, it takes a significant amount of for support to resolve them, particularly when it comes to coding-related problems. We are unsure if they have invested in research and development in this area.

How was the initial setup?

The initial setup of Palo Alto Networks Panorama took a long time to complete because there was not a lot of documentation.

What about the implementation team?

We used the support from Palo Alto Networks Panorama for the implementation. They were very professional and helpful. We used five people for the deployment of the solution.

What's my experience with pricing, setup cost, and licensing?

The price of Palo Alto Networks Panorama should be reduced. We pay for the solution annually.

We have acquired Palo Alto Networks Panorama for a three-year period, and we are selecting firewall options based on our specific needs, which may result in purchasing a DNS Security solution separately.

What other advice do I have?

We use five people for the maintenance of the solution.

The solution is easy to use and superior to other competitors. Additionally, there are occasional graphical or visual glitches that also take a while for them to address through updates. The length of time it takes to resolve these issues depends on their severity.

I rate Palo Alto Networks Panorama a nine out of ten.

The solution is good compared to the competition, but the support is not up to standard.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
Buyer's Guide
Download our free Palo Alto Networks Panorama Report and get advice and tips from experienced pros sharing their opinions.
Updated: December 2024
Buyer's Guide
Download our free Palo Alto Networks Panorama Report and get advice and tips from experienced pros sharing their opinions.