It is a management tool, and we use it to manage many devices at many locations.
Senior Network Engineer at a tech services company with 201-500 employees
Works well and helpful for centralized management of devices at different locations
Pros and Cons
- "Templates and the possibility to apply a configuration to many devices at the same time are the most valuable features. We are able to create templates, and we don't need to go to each firewall to make changes. We can make changes in Panorama, and it automatically applies those changes to all those firewalls on which we want to apply the changes. It provides centralized management."
- "It communicates with remote devices, and sometimes, there is a little bit of delay during its communication with remote devices. There should be real-time communication or updates from the manager to devices."
What is our primary use case?
What is most valuable?
Templates and the possibility to apply a configuration to many devices at the same time are the most valuable features. We are able to create templates, and we don't need to go to each firewall to make changes. We can make changes in Panorama, and it automatically applies those changes to all those firewalls on which we want to apply the changes. It provides centralized management.
What needs improvement?
It communicates with remote devices, and sometimes, there is a little bit of delay during its communication with remote devices. There should be real-time communication or updates from the manager to devices.
In Panorama and Palo Alto firewalls, I would like to have a traffic simulator. They have packet capture for troubleshooting, but it would help if they can provide a traffic simulator so that we can simulate the traffic and see the route the traffic is taking and get feedback about whether it is blocked or it is able to pass.
For how long have I used the solution?
I have been using this solution for maybe a year and a half.
Buyer's Guide
Palo Alto Networks Panorama
August 2025

Learn what your peers think about Palo Alto Networks Panorama. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
867,676 professionals have used our research since 2012.
What do I think about the stability of the solution?
I don't have big deployments. It works and is stable for what I have, and I don't have concerns.
What do I think about the scalability of the solution?
I don't have experience in big deployments. In terms of its users, our network engineers have access to it. We have less than 10 people.
How are customer service and support?
I don't have any experience with their tech support.
Which solution did I use previously and why did I switch?
Its main competitor is Cisco with the next-generation firewalls and FTD. They are managed by FMC, which is a little bit similar to Panorama and firewalls. There are some similarities, but there are also some different approaches. In general, they both are using the same standards. One major difference is that Palo Alto uses security zones, but Cisco doesn't have this feature, which makes Palo Alto better.
How was the initial setup?
It is not so straightforward, but it is also not complex. It is acceptable.
What other advice do I have?
I would advise others to completely evaluate the requirements and build properly with hierarchical templates. This will make it more scalable and manageable in the future.
I would rate Palo Alto Networks Panorama an eight out of 10.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Senior Manager at Technometrics Limited
Manage devices centrally, reliable, and good technical support
Pros and Cons
- "The most valuable aspect of this solution is the ability to manage our devices centrally. Additionally, we can monitor the workforce connections, receive reports, and use the backup feature."
What is our primary use case?
We have firewalls in different locations and we want to manage them centrally to see all the information available. The best way to do this is by using this solution, we are able to monitor, manage, and have visibility of the networks.
What is most valuable?
The most valuable aspect of this solution is the ability to manage our devices centrally. Additionally, we can monitor the workforce connections, receive reports, and use the backup feature.
What needs improvement?
There are times when we are backing up a device centrally, we do not get a full backup. We are able to do a full backup of all the devices but when we attempt to backup a single device, it only does the backup of a few presets and not the full configuration.
In the future, they could improve by providing better management of the devices, such as bandwidth.
For how long have I used the solution?
I have been using the solution within the last 12 months.
What do I think about the stability of the solution?
The stability is good.
What do I think about the scalability of the solution?
The solution is scalable. You are able to go through this solution and download from the internet upgrades to push them to the certain devices that need it.
How are customer service and technical support?
The technical support is good. I receive a resolution from the technical support whenever I have dealt with them.
How was the initial setup?
We sometimes have difficulty with the deployment configuration.
What's my experience with pricing, setup cost, and licensing?
The solution requires a license and the price is higher than competitors. It would be better for them to decrease the price or maximize the discount.
What other advice do I have?
I would recommend this solution to others if you have multiple sites and you want to manage them centrally.
I rate Palo Alto Networks Panorama a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Palo Alto Networks Panorama
August 2025

Learn what your peers think about Palo Alto Networks Panorama. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
867,676 professionals have used our research since 2012.
Senior Network & Security Administrator at a consultancy with 1,001-5,000 employees
Easy to set up, good support, and allows us to create shared profiles for all gateways
Pros and Cons
- "It has shared profiles for all gateways. If I do not have Panorama, I need to create a separate profile for each and every gateway by logging into that particular gateway, but with Panorama, I can create a shared profile and just push it down to each and every gateway connected to it."
- "In our version, there is no feature to transfer or upload a database of third-party vulnerabilities or signatures so that Panorama can convert them into its own database. This kind of feature might already have come in version 10."
What is our primary use case?
Our primary use case is to have a centralized console for gateways.
What is most valuable?
It has shared profiles for all gateways. If I do not have Panorama, I need to create a separate profile for each and every gateway by logging into that particular gateway, but with Panorama, I can create a shared profile and just push it down to each and every gateway connected to it.
What needs improvement?
In our version, there is no feature to transfer or upload a database of third-party vulnerabilities or signatures so that Panorama can convert them into its own database. This kind of feature might already have come in version 10.
For how long have I used the solution?
I have been using this solution for around four years.
What do I think about the scalability of the solution?
As of now, I am not seeing any limitation in terms of technicality, deployment, and functionality. In terms of licensing, depending on the number of gateways or serial numbers, I need to purchase the license, which is not really a limitation.
How are customer service and technical support?
They are good. Whenever there are some issues or bugs and we are not able to trace them out, we reach out to them. They provide the required support.
How was the initial setup?
It was straightforward. The gateway integration with Panorama was also a pretty straightforward configuration for us.
We deployed it site-wise. For each HAPS, it took us around two hours to take an existing production gateway behind Panorama.
What other advice do I have?
I would recommend this solution to others. It is a good solution. If any environment has multiple gateways, such as 50 or 100 gateways, it is good to have Panorama. If you have only one or two gateways of Palo Alto, you can easily manage them individually without having Panorama.
I would rate Palo Alto Networks Panorama a nine out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Engineering infrastructure manager at a financial services firm with 10,001+ employees
It has useful threat prevention and security features and good stability with right configuration
Pros and Cons
- "The threat prevention and layer seven security features were the most used and important for us. All operations are quite good in this solution."
- "We found a vulnerability where when we have a low flow, like 2.7K, it is not getting fired by the threat prevention. That's something important to improve on. They should have a proxy or some solution to solve the issue. We also found some issues around decrypting the flow. When we have more flow than expected to decrypt, the performance goes down."
What is our primary use case?
We used Panorama to control all the other modules from Palo Alto and to create the rules.
What is most valuable?
The threat prevention and layer seven security features were the most used and important for us. All operations are quite good in this solution.
What needs improvement?
We found a vulnerability where when we have a low flow, like 2.7K, it is not getting fired by the threat prevention. That's something important to improve on. They should have a proxy or some solution to solve the issue.
We also found some issues around decrypting the flow. When we have more flow than expected to decrypt, the performance goes down.
For how long have I used the solution?
I have used this solution for one year.
What do I think about the stability of the solution?
Its stability is fine. It supports the only point used here to decrypt the flows. When we have the right configuration, it has good stability.
What do I think about the scalability of the solution?
We didn't scale up the solution because it requires a load balancer, which is not there. We have around 40,000 users.
How are customer service and technical support?
They should have a local technical team. I would rate them a seven out of ten.
How was the initial setup?
It wasn't easy, but it also wasn't very difficult. I would say it was medium. The deployment took around three months.
What other advice do I have?
In order to have the right security level, you need to understand how decryption works or is used in Palo Alto. We had to clarify some points with them related to how decryption works.
I would rate Palo Alto Networks Panorama an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Advisor - Network and IT security consultant at Agrosuper
Easy to administrate and easy to control
Pros and Cons
- "Panorama is very easy, easy to administrate, and easy to control."
- "It's difficult to implement."
What is most valuable?
Panorama is very easy, easy to administrate, and easy to control.
What needs improvement?
It's difficult to implement.
For how long have I used the solution?
I have been using Palo Alto Networks Panorama for approximately five years.
What do I think about the stability of the solution?
Palo Alto is very stable and is a great global solution.
What do I think about the scalability of the solution?
There are more than 5,000 users in my company.
How are customer service and technical support?
I would rate their support a ten out of ten.
What other advice do I have?
I would recommend this solution.
I would rate it a ten out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Coordinator of the Architecture Security Team at TOTVS
Awesome stability and comes with useful features like IPS, App-ID, and content inspection
Pros and Cons
- "The application ID or App-ID feature is a good feature for us. We are also using IPS and content inspection features. The firewall can inspect the packages that are passing through my network."
- "It should have more connection with Threat Intelligence Cloud. They can also include features related to SecOps and automation API."
What is our primary use case?
Our firewall uses IPS and other features. We have some firewall rules using the IPS feature. For the VPN users using the MFA authentication protocol, we are using the SAML protocol.
What is most valuable?
The application ID or App-ID feature is a good feature for us. We are also using IPS and content inspection features. The firewall can inspect the packages that are passing through my network.
What needs improvement?
It should have more connection with Threat Intelligence Cloud. They can also include features related to SecOps and automation API.
For how long have I used the solution?
I have been using Palo Alto Networks Panorama for two years.
What do I think about the stability of the solution?
It is awesome in terms of stability.
What do I think about the scalability of the solution?
In terms of scalability, it is complicated because you have to scale up. Its scalability could be better. It would be great if you could scale out by integrating another node, and you are good to go.
Currently, you have to buy new hardware with more power in terms of CPU and memory. You cannot simply increase the nodes in a cluster. In the last five months, we had to acquire new hardware because we are facing some higher usage in the Palo Alto hardware. We have about 15,000 users.
How are customer service and technical support?
They provide good support. I would rate them an eight out of ten.
They can increase the SOA time. When dealing with your case, sometimes, they take time. In the queue, you need to pass through one analyst and then go to the next level, which takes some time.
How was the initial setup?
It was quite straightforward. In terms of technology, it was okay. As our environment is quite complicated, we had to deal with several phases of the implementation because we don't have only one appliance installed. We have implemented four Palo Altos. That's why it took some time, but it was just because of the complexity of our environment, not because of the solution itself. The whole project took one year.
We did some POCs to understand this solution. We had a lot of discussions in terms of the best way to implement this solution in our environment. It took the effort that this kind of solution normally takes.
What's my experience with pricing, setup cost, and licensing?
It is not a cheap solution.
What other advice do I have?
I would advise studying and understanding the best factors for implementing Palo Alto Networks Panorama and creating a roadmap to use all the features because it is not a cheap solution. Understand the possible ways to implement Palo Alto Networks Panorama and create a roadmap that implements all the features.
Palo Alto is constantly improving its solutions. They have been doing a great job and putting a great effort into their products. I would rate Palo Alto Networks Panorama a nine out of ten. We are satisfied with the solution.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Easy to use and the threat analysis functionality works well
Pros and Cons
- "The most valuable feature is the Threat Intelligence."
- "I would like to have better analytics."
What is our primary use case?
This product is part of our overall security solution.
What is most valuable?
The most valuable feature is the Threat Intelligence.
It is easy to use.
What needs improvement?
I would like to have better analytics.
The network traffic analysis (NTA) is something that you can add on to get more insight from the traffic passing through the firewall, and it should be included.
For how long have I used the solution?
We have been working with Panorama for at least five to six years.
What do I think about the stability of the solution?
Palo Alto Panorama is a stable product.
What do I think about the scalability of the solution?
We did not have any challenges with respect to scalability.
How are customer service and technical support?
Our team has managed properly so we have not often needed to contact technical support. I would say that they are okay, as we have not had any problems with them.
Which solution did I use previously and why did I switch?
We are currently using several different firewalls. There is Check Point, Fortinet, Juniper, and Palo Alto. Check Point was the first one that we used.
How was the initial setup?
The initial setup is straightforward and it took a couple of weeks to deploy.
What about the implementation team?
Our in-house team handled the deployment and is responsible for maintenance.
What's my experience with pricing, setup cost, and licensing?
Palo Alto is expensive and there are many cheaper firewalls, but they do not work as well.
What other advice do I have?
My advice to anybody who is looking at this solution is that it is easy and straightforward to use, although more difficult than some to deploy. It is expensive but if you can afford it, then it's worth it.
I would rate this solution an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Lead Program Manager at a computer software company with 10,001+ employees
Flexible, scalable and very user friendly
Pros and Cons
- "You don't need an overly experienced workforce to handle Palo Alto. It's very easy to use."
- "They need to do less bug-related releases and create versions that are stable for at least six months at a time. I don't find this issue in other solutions like Cisco, Check Point, FortiGate, or others. Those just provide a patch if there is a bug and we don't have to worry about downtime."
What is our primary use case?
We primarily use the solution for automation purposes and for security.
What is most valuable?
The underlying technology is very good, considering that we are moving to a work-from-home environment.
Panorama is a straightforward tool. Palo Alto is comparative to other firewalls. Some firewall tools are more user friendly, and, from a technical perspective, it is very user friendly as well. It's not like Check Point. We use a setup for offshore development centers. For all those ODCs, we usually use a Palo Alto device. We have few perimeter firewalls which are Palo Alto but for the perimeter predominantly we use Check Point.
You don't need an overly experienced workforce to handle Palo Alto. It's very easy to use.
The solution if extremely flexible and scalable.
What needs improvement?
There are too many OS upgrades. We've had six new versions in the past six months. Even if they are updating it to fix bugs, it's hard to keep pace with the change when you have 800 or more Palo Alto devices that you now need to update and upgrade.
We try to follow version minus one or two for security reasons. To keep pace with the changes, it takes us nearly six months as we have to check with the business, arrange downtime, and count and cover all devices.
These upgrades aren't just little fixes either. Whenever there is a new release, it requires an OS upgrade. It would be nice if there was some automation on the upgrades of the devices.
They need to do less bug-related releases and create versions that are stable for at least six months at a time. I don't find this issue in other solutions like Cisco, Check Point, FortiGate, or others. Those just provide a patch if there is a bug and we don't have to worry about downtime.
For how long have I used the solution?
We've been using the solution for close to seven years at this point. It's definitely been about six years.
What do I think about the stability of the solution?
The solution is very, very stable. There aren't too many issues on it once you get it up and running. We consider it reliable.
What do I think about the scalability of the solution?
The solution is very scalable. If a company needs to expand its services, it can do so rather easily.
We have different businesses running inside the organization. We have close to 800 devices, so it means about 800 different projects are using those devices. Each project has a firewall, so most of these, 80%, are on Palo Alto.
Which solution did I use previously and why did I switch?
We use Check Point as well, however, we don't really like it as much. It's not as user friendly.
Prior to this solution, we were using the ASA products and then Check Point. Check Point is a little complicated. I can use Check Point on my perimeter firewall, but not on my overseas businesses. That's what makes Palo Alto is more user friendly. I can use the GUI to do everything due to the fact that I don't need a skilled person to work on the Palo Alto. On Check Point, I have to go to CLA and do all the changes.
It's easy to upgrade or to do anything with the Palo Alto. Technically it's quite sound. It's dynamic, scalable, and there's a lot of things that can be done easily. Plus, I don't need an extremely experienced person to work on Palo Alto. Anybody with two or three years of experience can easily work on a Palo Alto device.
How was the initial setup?
The initial setup is not complex. It's pretty straightforward.
The deployment is easy and uncomplicated. It takes about an hour or so, if not less than an hour. It's pretty quick.
However, we have 800 or more devices. It takes about six months to deploy everything, especially if I have to do everything manually.
We have eight to ten people who manage deployment and maintenance.
What about the implementation team?
We haven't used an integrator or reseller. We handled the implementation ourselves in-house.
What's my experience with pricing, setup cost, and licensing?
In terms of licensing for Panorama and Palo Alto products, we have only the DMC cost and we are billed every year.
It's not overly expensive. It is comparatively okay if you look at other devices. Compared to the top three devices, pricing is okay due to the fact that you have multiple vendors who are selling firewalls and competing with each other for the same clients.
What other advice do I have?
We're just a customer. We don't have a business relationship with the company.
We have multiple variants of the solution's model. Currently, we are using 8.1.15-H. We also have some virtual firewalls that are recently in Tokyo. We are using close to around 800+ Palo Alto firewalls.
We're currently developing our virtual firewalls and have them in different locations.
It is not just Palo Alto. We have other devices as well, so we have close to around 1300 plus firewall devices.
I would recommend the solution to others.
I'd rate the solution eight out of ten. If you need a perimeter type of device, Check Point may be a better option. However, for my businesses, I would choose Palo Alto due to its scalability and user-friendliness. It also has great security features. That said, if it didn't release so many new updates, I would rate it higher, simply due to the fact that so many upgrades requires a lot of work on our part.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Palo Alto Networks Panorama Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Product Categories
Firewall Security ManagementPopular Comparisons
Tufin Orchestration Suite
Fortinet FortiGate Cloud
FireMon Security Manager
Skybox Security Suite
AWS Firewall Manager
Azure Firewall Manager
ManageEngine Firewall Analyzer
Fortinet FortiPortal
FortiGate Cloud-Native Firewall (FortiGate CNF)
Cisco Security Cloud Control
Cisco Secure Firewall Management Center
Buyer's Guide
Download our free Palo Alto Networks Panorama Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the differences between Palo Alto Networks Panorama and AlgoSec?
- Which lesser known firewall product has the best chance at unseating the market leaders?
- Comparing network security vendors and devices
- When should companies use SSL Inspection?
- When evaluating Firewall Security Management, what aspect do you think is the most important to look for?
- What are the most important features you would be looking for in a firewall?
- How do I estimate the required firewall throughput for my organization?
- What are the pros and cons of Tufin, AlgoSec and RedSeal?
- Tasks to Perform on Preventive Maintenance.
- Why is network segmentation important?