Palo Alto VM-Series is something we recommend as a firewall solution in certain situations for clients with particular requirements who have the budget leeway.
Executive Cyber Security Consultant at a tech services company with 11-50 employees
An excellent solution for the right situations and businesses
Pros and Cons
- "The Palo Alto VM-Series is nice because I can move the firewalls easily."
- "It has excellent scalability."
- "The product needs improvement in their Secure Access Service Edge."
- "They made only a halfhearted attempt to put in DLP (Data Loss Prevention)."
- "Palo Alto is that it is really bad when it comes to technical support."
What is our primary use case?
What is most valuable?
The Palo Alto VM-Series is nice because I can move the firewalls easily. For instance, we once went from one cloud provider to another. The nice thing about that situation was that I could just move the VMs almost with a click of a button. It was really convenient and easy and an option that every firewall will not give you.
What needs improvement?
We would really like to see Palo Alto put an effort into making a real Secure Access Service Edge (SASE). Especially right now where we are seeing companies where everybody is working from home, that becomes an important feature. Before COVID, employees were all sitting in the office at the location and the requirements for firewalls were a different thing.
$180 billion a year is made on defense contracts. Defense contracts did not stop because of COVID. They just kept going. It is a situation where it seems that no one cared that there was COVID they just had to fulfill the contracts. When people claimed they had to work from home because it was safer for them, they ended up having to prove that they could work from home safely. That became a very interesting situation. Especially when you lack a key element, like the Secure Access Services.
Palo Alto implemented SASE with Prisma. In my opinion, they made a halfhearted attempt to put in DLP (Data Loss Prevention), those things need to be fixed.
For how long have I used the solution?
I have been using Palo Alto VM-Series for probably around two to three years.
Buyer's Guide
Palo Alto Networks VM-Series
December 2024
Learn what your peers think about Palo Alto Networks VM-Series. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
What do I think about the stability of the solution?
I think the stability of Palo Alto is good — leaning towards very good.
What do I think about the scalability of the solution?
Palo Alto does a good job on the scalability. In my opinion, it has excellent scalability.
How are customer service and support?
My experience with Palo Alto is that it is really bad when it comes to technical support. When we have a situation where we have to call them, we should be able to call them up, say, "I have a problem," and they should ask a series of questions to determine the severity and the nature of the problem. If you start with the question "Is the network down?" you are at least approaching prioritizing the call. If it is not down, they should be asking questions to determine how important the issue is. They need to know if it is high, medium, or low priority. Then we can get a callback from the appropriate technician.
Do you want to know who does the vetting of priority really, well? Cisco. Cisco wins hands down when it comes to support. I do not understand that, for whatever reason, Palo Alto feels that they do not have a need to answer questions, or they just do not want to.
It is not only that the support does not seem dedicated to resolving issues efficiently. I am a consultant, so I have a lot of clients. When I call up and talk to Palo Alto and ask something like, "What is the client's password?" That is a general question. Or it might be something even less sensitive like "Can you send me instructions on how to configure [XYZ — whatever that XYZ is]?" Their response will be something like, "Well, we need your customer number." They could just look it up because they know who I am. Then if I do not know my client's number, I have got to go back to the client and ask them. It is just terribly inefficient. Then depending on the customer number, I might get redirected to talk to Danny over there because I can not talk to Lisa or Ed over here.
The tedium in the steps to get a simple answer just make it too complicated. When the question is as easy as: "Is the sky sunny in San Diego today?" they should not be worried about your customer representative, your customer number, or a whole bunch of information that they really do not use anyway. They know me, who I am, and the companies I deal with. I have been representing them for seven or eight years. I have a firewall right here, a PA-500. I got it about 11 years ago. They could easily be a lot more efficient.
Which solution did I use previously and why did I switch?
I have clients whose architecture is configured in a lot of different ways and combinations. I use a lot of different products and make recommendations based on specific situations. For example:
- I have one client that actually uses multiple VM-series and then at each one of their physical sites that have the K2-series — or the physical counterpart of the VM-series.
- I have other clients that use Fortinet AlarmNet. As a matter of fact, almost all my healthcare providers use Fortinet products.
- I have another customer that used to be on F5s and they had had some issues so switched to Fortinet.
- I have a couple of holdouts out there that are still using the old Cisco firewalls who refuse to change.
- I have a new client that is using a Nokia firewall which is a somewhat unique choice.
I have a customer that used to be on F5s and they had had some issues. The result of the issue was that they came to me and we did an evaluation of what they really needed. They came in and they said, "We need you to do an evaluation and when you are done with the evaluation, you need to tell us that we need Palo Alto firewalls." I said that was great and I sat down and got to work building the side-by-side comparison of the four firewalls that they wanted to look at. When I was done, just like they wanted the Palo Alto firewall was right there as the first one on the list. They selected the Fortinet firewall instead.
Nokia is specifically designed to address the LTE (Long Term Evolution, wireless data transmission) threats with faster networks and such. So it is probably not considered to be a mainstream firewall. The client who uses Nokia is a service provider using it on a cellular network. They are a utility and they are using Nokia on a cellular network to protect all their cellular systems and their automated cellular operations. The old Nokia firewalls — the one on frames — was called NetGuard. This client originally had the Palo Alto K-series and they switched over to the Nokia solution. That is my brand new Nokia account. They were not happy with the K-series and I am not sure why.
The thing about Cisco is nobody is ever going to fire you for buying a Cisco product. It is like the old IBM adage. They just say that it is a Cisco product and that automatically makes it good. What they do not seem to acknowledge is that just because their solution is a Cisco product does not necessarily make it the right solution for them. It is really difficult to tell a customer that they are wrong. I do not want to say that it is difficult to tell them in a polite way — because I am always polite with my customers and I am always pretty straightforward with them. But I have to tell them in a way that is convincing. Sometimes it can be hard to change their mind or it might just be impossible.
When I refer to Cisco, I mean real Cisco firewalls, not Meraki. Meraki is the biggest problem I think that I deal with. I do not have the network folks manage the Meraki firewalls differently than they manage their physical firewalls. I do not want there to be a difference, or there should be as little difference as possible in how the firewalls are handled. They do have some inherent differences. I try not to let them do stuff on the virtual firewalls that they can not do in the physical firewalls. The reason for that is because in defense-related installations it matters. Anytime you are dealing with defense, the closer I can get to maintaining one configuration, the better off I am. Unless something unique pops up in Panorama, I will not differentiate the setups.
I say that there are differences because there is a little bit of configuration that inherently has to be different when you are talking about physical and virtual firewalls, but not much. I can sanitize the virtual machine and show the cloud provider that since I was going into a .gov environment or a .gov cloud, that it met all the requirements as stated in the Defense Federal Acquisition Regulation Supplement. That is huge for our situation. Of course with a cloud provider, you are not going to have a physical firewall. Had we had a physical firewall, that becomes a bit of a chore because you have got to download the configuration file, then you have got to sanitize the configuration. Things like that become a bit of a burden. Having a VM-Series for that purpose makes it much easier.
I did not mention Sophos in the list. Sophos does a semi-decent job with that too, by the way. The only problem with Sophos is that they are not enterprise-ready, no matter what they say. I have deployed Sophos in enterprises before, and the old Sophos models did very well. The new ones do very poorly. The SG-Series — Sierra Golf — they are rock solid. As long as we keep going with them, our customers love it. It works. I have one client with 15,000 seats. They are running 11 or 12 of them and they have nothing but great things to say about the product. The second you go to the X-Series, they are not up to the task.
How was the initial setup?
Setting up Palo Alto is relatively quick. But I also have an absolute rockstar on our team for when it comes to Palo Alto installations. When he is setting it up, he knows what he is doing. The only thing he had to really learn was the difference between the VM-Series and the PA-Series.
I lay out the architecture and I tell people doing the installations exactly what has to be there. I sit down and create the rule sets. Early on, the person actually doing the fingers-on-the-keyboard complained a little saying that the setup was a little bit more complicated than it should have been. I agree, generally speaking. I generally feel that Palo Alto is more complicated than it needs to be and they could make an effort to make the installations easier.
But, installing Palo Alto is not as bad as installing Cisco. Cisco is either a language that you speak or a language that you do not. I mean, I can sit down and plot the firewall and get the firewall together about 45 minutes with a good set of rules and everything. But that is me and it is because I have experience doing it. Somebody who is not very well-versed in Cisco will take two or three days to do the same thing. It is just absolutely horrid. It is like speaking English. It is a horrid language.
What's my experience with pricing, setup cost, and licensing?
I do not have to do budgets and I am thankful for that. I am just the guy in the chain who tells you what license you are going to need if you choose to go with Palo Alto VM-Series. How they negotiate the license and such is not my department. That is because I do not resell.
I know what the costs might be and I know it is expensive in comparison to other solutions. I get my licenses from Palo Alto for free because they like me. I have proven to be good to them and good for them. When they have customers that are going to kick them out, I can go in and save the account.
I will tell you, they do practice something close to price gouging with their pricing model, just like Cisco does. When I can go out and I can get an F5 for less than half of what I pay for Palo Alto, that is a pretty big price jump. An F5 is really a well-regarded firewall. When I can get a firewall that does twice what a Palo Alto does for less than half, that tells me something.
Sophos decided that they were going to play with the big boys. So what they did is they went in and jacked up all their prices and all their customers are going to start running away now. The model is such that it is actually cheaper to buy a new firewall with a three-year license than it is to renew the Sophos license of the same size firewall for an older product. It sorta does not make sense.
Which other solutions did I evaluate?
I make recommendations for clients so I have to be familiar with the firewalls that I work with. In essence, I evaluate them all the time.
I work from home and I have two Cisco firewalls. I have a Fortinet. I have the Palo Alto 500 and I have a Palo Alto 5201. I have a Sophos. My F5 is out on loan. I usually have about eight or nine firewalls on hand. I never go to a client without firing up a firewall that I am going to recommend, testing it, and getting my fingers dirty again to make sure I have it fresh in my mind. I know my firewalls.
The VM-Series are nice because you can push them into the cloud. The other nice thing is whether you are running a VM-Series or the PA-Series, we can manage it with one console. Not without hiccups, but it works really well. Not only that, we can push other systems out there. For instance, for VMware, we are pushing Prisma out to them. VMware and the Palo Alto VM-Series do really well with Prisma. The issue I have with it is — and this is where Palo Alto and I are going to disagree — they are not as good at SASE (Secure Access Service Edge). I do not care what Palo Alto says. They do a poor job of it and other products do it better.
Palo Alto claims it is SASE capable, but even Gartner says that it is not. Gartner usually has the opinion that favors those who pay the most, and Palo Alto pays them well. So when Gartner even questions their Secure Access Service Edge, it is an issue. That is one of those places where you want the leader in the field.
From my hands-on experience, Fortinet's secure access service edge just takes SASE hands down.
What other advice do I have?
My first lesson when it comes to advice is a rule that I follow. When a new version comes out, we wait a month. If in that month we are not seeing any major complaints or issues with the Palo Alto firewall customer base, then we consider it safe. The client base is usually a pretty good barometer for announcing to the world that Palo Alto upgrades are not ready. When that happens, making the upgrade goes off our list until we hear better news. If we do not see any of those bad experiences, then we do the upgrade. That is the way we treat major revisions. It usually takes about a month, or a month-and-a-half before we commit. Minor revisions, we apply within two weeks.
I am of the opinion right now that there are some features missing on Palo Alto that may or may not be important to particular organizations. What they have is what you have to look at. Sit down and be sure it is the right solution for what you need to do. I mean, if the organization is a PCI (Payment Card Industry) type service — in other words, they need to follow PCI regulations — Palo Alto works great. It is solid, and you do not have remote users. If you are a Department of Defense type organization, then there are some really strong arguments to look elsewhere. That is one of the few times where Cisco is kind of strong choice and I could make an argument for using them as a solution. That is really bad for me to say because I do not like Cisco firewalls.
On a scale from one to ten (where one is the worst and ten is the best), I would rate the Palo Alto Networks VM-series as an eight-out-of-ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Infrastructure Team Lead at a financial services firm with 1,001-5,000 employees
App-ID and User-ID have repeatedly shown value in securing business critical systems, but we have run into issues with the antivirus interfering with App-ID
Pros and Cons
- "In AWS, Palo Alto provides us a better view than flow logs for network traffic."
- "App-ID and User-ID have repeatedly shown value in securing business critical systems."
- "I would like to see a more thorough QA process. We have had some difficulties from bugs in releases."
- "We have ran into issues with Palo Alto’s limitations for resolving large IP lists from DNS lookups, as well as the antivirus interfering with App-ID."
What is our primary use case?
We use this as our primary security barrier between trusted and untrusted zones.
How has it helped my organization?
App-ID and User-ID have repeatedly shown value in securing business critical systems.
What is most valuable?
In AWS, Palo Alto provides us a better view than flow logs for network traffic.
What needs improvement?
We have ran into issues with Palo Alto’s limitations for resolving large IP lists from DNS lookups, as well as the antivirus interfering with App-ID.
I would like to see a more thorough QA process. We have had some difficulties from bugs in releases.
I see more improvements needed from AWS than from Palo Alto on the VM-Series, namely a design centered on NGFW.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
We are typically at only about eight to ten percent load.
What do I think about the scalability of the solution?
The limit of the product is based on resources that we can obtain from AWS. We have approximately 3500 users and 200 servers leveraging the Palo Alto product.
What's my experience with pricing, setup cost, and licensing?
We used BYOL, because of the cost to own.
We procure the solution through AWS Marketplace because previous experience with their physical appliances.
The pricing and licensing of this product on AWS for a three-year commitment is a great deal, if you can plan that far ahead.
What other advice do I have?
It is a good product, but there is room for improvement.
We use this with Microsoft AD, N2WS, IIS, MySQL, MS SQL, and a number of proprietary applications.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Palo Alto Networks VM-Series
December 2024
Learn what your peers think about Palo Alto Networks VM-Series. Get advice and tips from experienced pros sharing their opinions. Updated: December 2024.
824,067 professionals have used our research since 2012.
Director of Cloud Security at a tech services company with 10,001+ employees
It provides complete security posture from end-to-end
Pros and Cons
- "It provides complete security posture from end-to-end. This has given us better visibility into what our security aspects are."
- "The product could provide protection above Layer 3, which gets into the application layer and provides better visibility into those aspects of application security."
What is our primary use case?
Primary use case is network protection, next-generation IDS, and IPS protection.
How has it helped my organization?
- It provides better protection.
- There is seamless integration.
- It provides complete security posture from end-to-end. This has given us better visibility into what our security aspects are.
What is most valuable?
The next-generation features of its IDS and IPS.
What needs improvement?
The product could provide protection above Layer 3, which gets into the application layer and provides better visibility into those aspects of application security. This would be very helpful. This way, there would be one tool that we could continue using.
The data aspects of data security and data loss prevention could provide visibility which would be very useful.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
It is stable. We haven't had any issues and don't think about the stability.
What do I think about the scalability of the solution?
One of the great features that we liked and selected it was its scalability. We can autoscale and put it in Auto Scaling groups, which is very useful.
How is customer service and technical support?
We have hardly any issues. We have had some patches of data needing some help, but that was it, and the technical support has been spot on.
How was the initial setup?
Integration on on our AWS environment was one of the points that we liked about it.
What about the implementation team?
We used technical support in the initial stages when we were setting it up and configuring some of the features. We used their Professional Services, who were very useful.
What was our ROI?
We have already seen ROI.
We continue using it, because the concept was at six months, we should receive value back out of it. If the value is seen, only then would we continue using it. It is two years later, and we still continue using it.
What's my experience with pricing, setup cost, and licensing?
Because the solution was getting deployed on AWS, it was the best place to go and it was available there.
One of the factors for selecting Palo Alto was they had flexible pricing. They had a pay-as-you-go model. Comparable to other products, such as Check Point, the price point was definitely a plus. It was expensive but it was comparable.
Which other solutions did I evaluate?
We looked at Palo Alto, Check Point, Fortinet, and some other vendors.
We chose Palo Alto because its features, especially its advanced features from the IDS and IPS. We were existing customers with Palo Alto from the on-premise side along with the integration aspects of its hardware.
What other advice do I have?
Identify a use case first of all. If the use case is a match, then use the product.
We use it in the cloud for both AWS and non-AWS versions. The AWS version is far better. It works seamlessly and integrates very well with some other services.
We have integrated it with Splunk for the security aspects and with identity and access management for configuration purposes.
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller.
Hewlett Packard Enterprise Solution Architect at a tech services company with 11-50 employees
It prevents data loss and business disruption
Pros and Cons
- "Embedding it into my application development lifecycle prevents data loss and business disruption, allowing the adoption to operate at the speed of my AWS Cloud."
- "It has a good performance which helps you with the stability of your virtual environment."
- "It can definitely improve on the performance."
- "It has to be more scalable for the deployment of VMs on the cloud."
What is our primary use case?
We use it to protect applications and data on AWS.
How has it helped my organization?
Embedding it into my application development lifecycle prevents data loss and business disruption, allowing the adoption to operate at the speed of my AWS Cloud.
What is most valuable?
It prevents data loss and business disruption.
What needs improvement?
It can definitely improve on the performance.
I would like more scalability included on the next release.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
It has a good performance which helps you with the stability of your virtual environment.
What do I think about the scalability of the solution?
It has to be more scalable for the deployment of VMs on the cloud.
What about the implementation team?
You have to be an expert administrator of a virtual environment to know how to integrate it with your AWS environment.
What's my experience with pricing, setup cost, and licensing?
Purchasing through the AWS Marketplace is a secure way to purchase this solution. Our organization chose to procure this solution via the AWS Marketplace because we have clients who were interested in the solution. Also, for out proof of concept, we decided to purchase it.
The pricing and licensing of this product on AWS should be from $1.28/hr or $4,500.00/yr. Then, it would be a good price for the performance that it delivers.
What other advice do I have?
It solves several challenges protecting your AWS workloads with good security features, delivering superior visibility, control, and threat prevention at the application level when compared to other cloud-oriented security solutions.
I have not tried integrating Palo Alto with other products.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
A tool with a great support team that is useful for testing purposes of VMs
Pros and Cons
- "The main advantage of Palo Alto Networks VM-Series stems from the fact that you can access it with the help of cloud services."
- "With Palo Alto Networks VM-Series, it is hard for me to manage its network configuration part."
What is our primary use case?
I use Palo Alto Networks VM-Series for testing purposes of VMs.
What is most valuable?
The main advantage of Palo Alto Networks VM-Series stems from the fact that you can access it with the help of cloud services.
What needs improvement?
With Palo Alto Networks VM-Series, it is hard for me to manage its network configuration part. Regarding Palo Alto Networks VM-Series, I am figuring out whether to use interzone or intrazone networks for the VMs in our company's environment, which is very confusing. The aforementioned aspects of the solution can be considered for improvement.
In the future, whenever I try to onboard Palo Alto Networks VM-Series, it should allow for easy configuration, especially in terms of network connectivity. I want an easier setup and configuration in the product's future releases.
For how long have I used the solution?
I have been using Palo Alto Networks VM-Series for around a year. My company has a partnership with Palo Alto Networks.
How are customer service and support?
The technical support of Palo Alto Networks does reply to the cases or issues I file with the support team. The support is equally good for all the products that fall under Palo Alto Networks. I rate the technical support a nine out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
I rate the implementation process a six or seven on a scale of one to ten, where one is difficult and ten is easy.
During the implementation process of the product, I faced some issues related to the networking part and connectivity of VMs. I faced issues with how an end user could connect the VMs to a firewall or connect a firewall to VMs, but the same process was easy for me on a physical device firewall.
What other advice do I have?
I am more comfortable with the physical device firewall. I am actually trying to figure out things since I am not very familiar with the VM side of Palo Alto.
I would recommend Palo Alto Networks VM-Series since it is a cheaper product compared to the other tools available in the market. Apart from Palo Alto Networks VM-Series, I usually recommend Palo Alto Networks Cortex XSOAR and Palo Alto Networks Prisma Cloud.
I rate the overall product an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
System Administrator at DeepMap
It offers a single pane of glass for all the different types of installations
Pros and Cons
- "It offers a single pane of glass for all the different types of installations."
- "It gives us the ease that we are secure. We have set up the proper things that help make our data safe."
- "I would like a way to do everything programmatically, or be able to copy the configs from different prices at different levels."
What is our primary use case?
- To do a lot of intrusion detection.
- Threat prevention.
- As an application firewall, to be able to securely deliver apps to the public.
How has it helped my organization?
It gives us the ease that we are secure. We have set up the proper things that help make our data safe. This is the biggest benefit.
What is most valuable?
It offers a single pane of glass for all the different types of installations.
The easy of use is pretty good.
What needs improvement?
I would like a way to do everything programmatically, or be able to copy the configs from different prices at different levels.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
The stability is excellent. We have about 50 to 60 employees on it per day. Then, we have about 100 edge connected devices coming through it as well.
What do I think about the scalability of the solution?
It is definitely scalable. We have about 100 users with about 200 to 300 instances on the cloud that we protect.
How are customer service and technical support?
The technical support is really good. It is usually one phone call to get everything done if we are having an issue.
Which solution did I use previously and why did I switch?
We chose to purchase Palo Alto through the AWS Marketplace because we needed an easy to use firewall and a way to protect our public applications and services.
How was the initial setup?
The integration and configuration on our AWS environment was pretty simple. We did not have to ask any questions about anything on it, so it was good.
What was our ROI?
We haven't had any security issues since deploying it.
What's my experience with pricing, setup cost, and licensing?
Purchasing on the AWS Marketplace was simple, effective, and easy.
The price is not bad. They have a yearly renewal fee, and the pricing is exactly where we expect it to be.
Which other solutions did I evaluate?
We also evaluated Fortinet, but Palo Alto is sort of the new up and coming product. There were a lot of good recommendations from other security experts.
In addition, Palo Alto is easier to configure when you are building policies on applications.
What other advice do I have?
Talk to their technical services to make sure you are getting the right size solution for what you want to do.
The product is easy use. I don't have to think twice when I am using it. I know it is doing its job. Customer support has been great.
We are using both the AWS and on-premise versions. Both versions are about the same. The interface is nice and easy to configure. I like that it seems like it is one platform to manage.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Pre-Sales Architect at network techlab
Protects from ransomware and malware but needs improvement in visibility
Pros and Cons
- "The most effective features for threat prevention are application-based prevention and WildFire. These features cover various threats, such as ransomware, malware, etc. They provide real-time visibility. By applying appropriate policies, threats can be blocked."
- "The solution needs to improve its visibility. It's not straightforward to use. Understanding the policies, authorizations, and initializing features requires careful review. The product needs to offer proper training."
What is most valuable?
The most effective features for threat prevention are application-based prevention and WildFire. These features cover various threats, such as ransomware, malware, etc. They provide real-time visibility. By applying appropriate policies, threats can be blocked.
What needs improvement?
The solution needs to improve its visibility. It's not straightforward to use. Understanding the policies, authorizations, and initializing features requires careful review. The product needs to offer proper training.
For how long have I used the solution?
I have been working with the product for three to four months.
What do I think about the stability of the solution?
I rate Palo Alto Networks VM-Series' stability as ten out of ten.
How are customer service and support?
The main issue with the tool's support is the delayed response time, ranging from one to two hours. This delay can impact customers who are waiting for support. Additionally, partners may become busy.
How would you rate customer service and support?
Positive
What other advice do I have?
The tool's improvement in cloud security posture depends on the features used and the licenses purchased. Different suites are available, such as Professional, Core, and Enterprise, each offering various features for endpoint.
Competitors such as Fortinet and Check Point also offer similar features, but I don't know much about their offerings. However, Palo Alto Network VM-Series stands out with its application deployment capability, iOS zone protection, and features like application ID, user ID, and device ID identification. These features enable policy application and on-premises protection, which may not be available in competing solutions.
I rate the overall product a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Last updated: Apr 1, 2024
Flag as inappropriateSupport Engineer & IT Professional at SISAP
A reliable tool with excellent support
Pros and Cons
- "It is reliable and the support is very good."
- "In the newer version, there are 3850s, all of them are scalable. They fit better into the medium or small businesses."
- "From time to time, they have released some content updates that have some issues, maybe twice a year."
- "There are various reports that come with the box or with the VMware, but you can only run them daily."
What is our primary use case?
For this VM in particular, it is microsegmentation which is used for implementing the firewall inside the data center.
How has it helped my organization?
When talking about the VM or the virtual firewall, it is mostly about the sessioncapacities that it can handle. In the early version of the firewall, the session or traffic that it could inspect was low.
In quite a few releases, they have improved a lot. They started with the physical firewall, therefore it is almost virtually the same firewall with the same features, only that it is a virtual one. The main improvements that they have made are surrounding the processing capacity for the virtual machines.
What is most valuable?
The granularity which is used to confirm applications based in users.
When you have VMware NSX, it is easy to deploy this virtual firewall because it is fully integrated with the VM solution. If I want to segment any type of network inside the data center, it is about two or three clicks, and it works.
What needs improvement?
The reporting. There are various reports that come with the box or with VMware, but you can only run them daily. If you want to generate a report from this week or the past month, you have to create a custom report. It is not that difficult, but I expect these reports to be pre-made. I would like to be able to choose the dates that I can run the reports. As of now, you can only run it for the day before, so this is one improvement they need to make.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
From time to time, maybe twice a year, they have released content updates which have some issues. When they release content updates, the applications with these updates give us a false positives. I manage older software developers and members, and almost everyone has one or two missteps a year regarding these updates.
What do I think about the scalability of the solution?
The Series 2000 version of Palo Alto were somewhat big for small or medium customers. They did not have a middle box.
In the newer version (3850s), all of them are scalable. They fit better into medium or small businesses, so it is easy for us. E.g, if we have a VMware 500 appliance, we can upgrade it to a 100. They have improved in this way.
How are customer service and technical support?
The technical support is extremely good. They are a 10 out of 10, not only because of their fast response time, but their knowledgeable personnel as well. They have knowledge regarding very specific issues.
When we finish creating tickets in the support portal, there are a lot of knowledge-based documents. They answer almost immediately, calling you back about 10 minutes later. When creating a support ticket, I always get a quick answer.
Which solution did I use previously and why did I switch?
I was using Cisco, but I was using the old Cisco. The firewall was the only working protocol. The Palo Alto Network Firewall is a Next-Generation Firewall, so it is a lot different.
This is the first and only Next-Generation Firewall that I have used. I have put in several Sophos Firewalls, but they are not the same as Palo Alto.
How was the initial setup?
You will need to know what are you doing with the firewall.
It's different than Sophos or Fortinet where you only need to click two or three times, and it puts you in engaged mode in the simplest way.
With Palo Alto, you need to know where you are going to be implementing and what architectures you want. It is not complicated, but it is not as easy as Sophos or Fortinet, because when you start with these two firewalls, the quick setup wizard chooses for you and it automatically creates for you network rules.
With Palo Alto, you need to do all those steps manually, but it is somewhat better because it gives you the flexibility to choose how you want your network set up and how you are going to segment the networks.
What's my experience with pricing, setup cost, and licensing?
I know Palo Alto is not cheap because my finance team has been telling me that it is not a cheap solution. It is about the maturity of your security team or infrastructure team and whom you want to work with no matter how big your organization is: small, medium, or large.
The newest version of Cisco, the Next-Generation Firewall, is less expensive than Palo Alto. The price is more comparable to Check Point.
For licensing, it depends how you want to use the firewall. The firewall can be used only for IPS purposes. If you only want that firewall IPS, you will only need a license called threat prevention which includes vulnerabilities, antivirus signatures, and one additional measure; it includes three measures and security updates.
If you do not want to buy the threat prevention license in the box, you can buy it with only the support license which is for the support of the hardware. It works like a simple firewall. It integrates what it calls user IDs and application IDs. If you do not buy any other license, only the firewall, Palo Alto will also help you improve your security.
Which other solutions did I evaluate?
We evaluated VanGuard for their Next-Generation Firewall.
We chose between Check Point and Palo Alto for their support teams. Check Point is very bad for support. We switched from Check Point to Palo Alto.
What other advice do I have?
If you do not have a Next-Generation Firewall, Palo Alto is a good choice. It is reliable and the support is very good. The VMware version is in all the boxes and they use the same OS, so it is not different if you manage a physical box or a virtual box. The only difference is the virtual box depends on where it will be placed, and its main usage is for microsegmentation and data center firewalls.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
Buyer's Guide
Download our free Palo Alto Networks VM-Series Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2024
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
Azure Firewall
Check Point NGFW
Juniper SRX Series Firewall
Untangle NG Firewall
Fortinet FortiGate-VM
SonicWall NSa
KerioControl
Sangfor NGAF
Forcepoint Next Generation Firewall
Buyer's Guide
Download our free Palo Alto Networks VM-Series Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which product do you recommend: Palo Alto Network VM-Series vs Fortinet FortiGate?
- Is Palo Alto the best firewall for an on-premise/cloud hybrid IT network?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Features comparison between Palo Alto and Fortinet firewalls
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?
- How does Azure Firewall compare with Palo Alto Networks VM Series?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?