We have a dedicated team for Prisma SD-WAN, which handles the technical parts and pre-sales. Palo Alto is the market leader in security integration. It provides WildFire and an internal security portion. Prisma SD-WAN has, by default, an inbuilt artificial intelligence feature. The solution has Wildfire, GP, and a single pane of glass features available. I will recommend Prisma SD-WAN to users in the mid-level market who have been using public applications. I will also recommend the solution to an enterprise customer, such as a bank or finance solution with over 10,000 users. I would recommend the solution to other users. Overall, I rate the solution a six out of ten.
I recommend doing a POC before buying Prisma SD-WAN. This helps you understand how the solution works, clarify doubts with Palo Alto specialists, and make a preliminary design for implementation. This way, you can identify all costs involved and avoid surprises post-purchase. Regarding AI, I know Prisma SD-WAN is connected to Palo Alto's data lake and monitors threats using AI, but I don't see how it works. However, it does help optimize our network. Overall, I rate Prisma SD-WAN as nine out of ten as it is good but not perfect.
The solution's security framework has enhanced our data protection. The solution offers really good security. We faced some challenges while integrating Prisma SD-WAN into our existing infrastructure. The key is to presage the SD-WAN ION boxes prior so you can do a simple cutover. Do as much groundwork as possible, and then you can cutover to the new boxes. Prisma SD-WAN is aiding our AI-driven initiatives because we can push our policy updates across the board. Earlier, if you needed to provision a new IT service, you'd need several resources to implement via the command line interface to individual boxes. Now, it happens with the push of a button, and it works its magic. We're standardizing the networks first, building automation, and then looking at AI. Overall, I rate the solution a seven out of ten.
We used to open tickets because it was a completely new environment for every engineer and because it was hosted for the last two years. Whenever we had such challenges in the network at the architect level, we used to open a ticket. So we request the engineer to join and discuss our plans for what we want to achieve. They will help us with most things. Sometimes we might see some failure of changes as well, but most of the time, we succeed when we involve this Prisma SD-WAN tactic. Prisma SD-WAN has layer seven capability to check how the traffic is going, but unfortunately, I do not have in-depth knowledge of that process. We have a workflow at the layer seven level. They have all kinds of analytics at layers three, four, five, and seven. Prisma SD-WAN can automate many things, but we also need to have that kind of testing environment. We never use it in our environment because of our daily activities. Network automation is the biggest thing in current evaluation in the network world. We have thousands of switches and network devices where we need to configure multiple configurations. So if you have automation in place, it will reduce the timeline, and we won't miss anything. If we do it manually, some people might properly follow the process, and others might not. So if the automation comes in place, only one person can push all the configurations to the respective devices so that we follow the standards. We never tried using automation for network troubleshooting, but we tried much automation while provisioning some networks, like new installations. Troubleshooting will come with the packet capture directly. We do some packet captures, but as of now, we didn't automate those. We are looking for automation for provisioning things when new sites come into the picture. We want to automate without doing manual configurations. The alarms make sure that we are checking everything on time and give us some flexibility to ensure that the device will not go down. So, the alarms might not reduce in the future, but they will give us a trigger point so that we check immediately what is missing. Those are mandatory alarms for CPU alerts. Every time there is a high utilization on the box, it will show some trigger. We'll understand why the CPU utilization was happening. They will show some information on the network regarding why the CPU is being utilized. We can ensure not to repeat that kind of scenario in the future. Sometimes, if the bandwidth utilization from the users is high, we cannot control those alerts. But when such kind of traffic utilization is high, we can increase the bandwidth so that we can reduce those alerts. If you take those steps effectively, then it will definitely reduce your alerts. Prisma SD-WAN incorporates policy control for event correlation and analysis, which affects our admins' control over events generated on our network. We have many path policies and QOS policies. It will show which is the better path that needs to be selected while the traffic was going. It also shows the next backup path, if one of the paths fails. We have to configure manually with the path policies, what kind of application requires minimum amounts of bandwidth. Those path policies need to be applied to the iron box. Whenever a user sends traffic via the iron box, it will select those path policies to make an effective decision. Prisma SD-WAN's policy control for event correlation and analysis helps admins pinpoint issues. Whenever we log in and check, users complain about issues related to packet loss, and we have to load share the network manually. These automated path policies affect configurations. Sometimes, if the internet link keeps on disconnecting, we can see something on the analytics screen that packet drops are high. Unlike traditional networks, you don't have any kind of analytics. The customer might not take third-party analytics because of the cost. So we don't know the visibility of checking those WAN links, and we simply rely on the ISPs to understand how the WAN link is working. They tell that there is no issue with the WAN links and everything is fine. There might be some milli-seconds of packet loss which cannot be shown on the ping reserves. So this analytics gives a lot of information to the administrator to understand the issue. We can ask those people to understand this issue, and they can resolve those things by seeing those analytics. Prisma SD-WAN is the web solution that helps the administrator to understand the issue and resolve it. Prisma SD-WAN enables branch services such as networking and security to be delivered from the cloud. They also have virtual solutions that they can provide, but we never use those virtual solutions. Prisma SD-WAN is a very good product. It gives lots of benefits to the enterprise network by deactivating the costliest MPRS networks. Even non-technical people can understand the packet flow and easily see what is happening by seeing the analytics of the link. Overall, I rate Prisma SD-WAN an eight out of ten.
The solution also gives us deep application visibility, with Layer 7 intelligence. Traffic engineering is not working on our side. That generally works on the ISP network. There is a security feature in Prisma and a security path setting. We need to create a policy and a zone and mention the policy rules in the zone. It will bind to the security binding and we can apply a global security policy.
Pcs at a computer software company with 1,001-5,000 employees
Real User
Top 20
2022-12-25T16:37:00Z
Dec 25, 2022
I rate Prisma SD-WAN eight out of 10. There is still room for improvement in complete SASE integration and the unified chassis. Once Prisma adds these features, it will be a complete all-in-one solution.
Sr Network Engineer at a financial services firm with 1,001-5,000 employees
Real User
Top 20
2022-12-25T08:37:00Z
Dec 25, 2022
I rate Prisma SD-WAN a nine out of ten. I've been happy with it aside from one pain point. It's been effortless to deploy. I recommend doing a demo. Measure Prisma against other products to see what fits your company's needs best. If you're looking for a cheap solution, Prisma may not be for you. The most important thing is to ask them to do a demo for you to see how it stacks against competing products.
It is a growing product and Palo Alto gives you training for it. I have attended many programs from Palo Alto. I would definitely recommend Prisma SD-WAN. It is a growing product, first of all and the Prisma SD-WAN team is doing a very good job of upgrading the platform. The product is very flexible and understandable. Everybody can work on it. The GUI is very friendly. You also have CLI access if you want. Our customers who use it don't require a top network administrator to work on their networks. Even an IT admin can work with the Prisma SD-WAN and modify things. Overall, it makes things easy and it is cost-effective. There's no complexity in the network. Everything is in the portal and is available. You can administer devices and traffic in this single portal.
IT Communications engineer at a construction company with 10,001+ employees
Real User
2022-09-20T16:46:00Z
Sep 20, 2022
I would rate this solution a nine out of ten. My advice is that everybody should do a proof of concept. First, read the basic white papers on Palo Alto. If the product seems to suit your needs, contact them and see what the POC will be and what the pricing will be like. The pricing is different for different companies. Larger enterprises get larger discounts. This also depends on how many sites will be incorporated. There are many factors. It's not a simple decision, but at least you know the product is good. It's on the premium end, but that's what Palo Alto is all about. If you want a top-notch solution, then Prisma is for you. Our security team evaluated the solution and couldn't find any lacking features. I think it's suitable for large and complex enterprises.
We are a Palo Alto partner. We are a system integrator and not a customer. We're selling to customers right now. We are using the solution with a SASE subscription, Prisma Access. I've used both on-premises and cloud deployments. I'd recommend the solution to the users and companies. It comes with all the security and the good direct point to the cloud application as well. I would rate the solution at a ten out of ten. It's a really great product.
Technical Lead at a tech services company with 10,001+ employees
Real User
2021-12-27T20:54:00Z
Dec 27, 2021
I would rate it as 7 out of 10. We have many other options coming out from Palo Alto. The interactions between those and other network gears has a lack of documentation.
Simplify management, enable app-defined SD-WAN policies and deliver a secure, cloud-delivered branch today with the Industry’s first next-generation SD-WAN.
Integrating Prisma SD-WAN with third-party solutions is definitely required and it is recommended to utilize its AI capabilities.
We have a dedicated team for Prisma SD-WAN, which handles the technical parts and pre-sales. Palo Alto is the market leader in security integration. It provides WildFire and an internal security portion. Prisma SD-WAN has, by default, an inbuilt artificial intelligence feature. The solution has Wildfire, GP, and a single pane of glass features available. I will recommend Prisma SD-WAN to users in the mid-level market who have been using public applications. I will also recommend the solution to an enterprise customer, such as a bank or finance solution with over 10,000 users. I would recommend the solution to other users. Overall, I rate the solution a six out of ten.
I recommend doing a POC before buying Prisma SD-WAN. This helps you understand how the solution works, clarify doubts with Palo Alto specialists, and make a preliminary design for implementation. This way, you can identify all costs involved and avoid surprises post-purchase. Regarding AI, I know Prisma SD-WAN is connected to Palo Alto's data lake and monitors threats using AI, but I don't see how it works. However, it does help optimize our network. Overall, I rate Prisma SD-WAN as nine out of ten as it is good but not perfect.
The solution's security framework has enhanced our data protection. The solution offers really good security. We faced some challenges while integrating Prisma SD-WAN into our existing infrastructure. The key is to presage the SD-WAN ION boxes prior so you can do a simple cutover. Do as much groundwork as possible, and then you can cutover to the new boxes. Prisma SD-WAN is aiding our AI-driven initiatives because we can push our policy updates across the board. Earlier, if you needed to provision a new IT service, you'd need several resources to implement via the command line interface to individual boxes. Now, it happens with the push of a button, and it works its magic. We're standardizing the networks first, building automation, and then looking at AI. Overall, I rate the solution a seven out of ten.
I recommend the solution to those who plan to use it. As per market standards, the product is doing good. I rate the overall tool a nine out of ten.
I rate the product a seven out of ten.
I rate Prisma SD-WAN 10 out of 10.
We used to open tickets because it was a completely new environment for every engineer and because it was hosted for the last two years. Whenever we had such challenges in the network at the architect level, we used to open a ticket. So we request the engineer to join and discuss our plans for what we want to achieve. They will help us with most things. Sometimes we might see some failure of changes as well, but most of the time, we succeed when we involve this Prisma SD-WAN tactic. Prisma SD-WAN has layer seven capability to check how the traffic is going, but unfortunately, I do not have in-depth knowledge of that process. We have a workflow at the layer seven level. They have all kinds of analytics at layers three, four, five, and seven. Prisma SD-WAN can automate many things, but we also need to have that kind of testing environment. We never use it in our environment because of our daily activities. Network automation is the biggest thing in current evaluation in the network world. We have thousands of switches and network devices where we need to configure multiple configurations. So if you have automation in place, it will reduce the timeline, and we won't miss anything. If we do it manually, some people might properly follow the process, and others might not. So if the automation comes in place, only one person can push all the configurations to the respective devices so that we follow the standards. We never tried using automation for network troubleshooting, but we tried much automation while provisioning some networks, like new installations. Troubleshooting will come with the packet capture directly. We do some packet captures, but as of now, we didn't automate those. We are looking for automation for provisioning things when new sites come into the picture. We want to automate without doing manual configurations. The alarms make sure that we are checking everything on time and give us some flexibility to ensure that the device will not go down. So, the alarms might not reduce in the future, but they will give us a trigger point so that we check immediately what is missing. Those are mandatory alarms for CPU alerts. Every time there is a high utilization on the box, it will show some trigger. We'll understand why the CPU utilization was happening. They will show some information on the network regarding why the CPU is being utilized. We can ensure not to repeat that kind of scenario in the future. Sometimes, if the bandwidth utilization from the users is high, we cannot control those alerts. But when such kind of traffic utilization is high, we can increase the bandwidth so that we can reduce those alerts. If you take those steps effectively, then it will definitely reduce your alerts. Prisma SD-WAN incorporates policy control for event correlation and analysis, which affects our admins' control over events generated on our network. We have many path policies and QOS policies. It will show which is the better path that needs to be selected while the traffic was going. It also shows the next backup path, if one of the paths fails. We have to configure manually with the path policies, what kind of application requires minimum amounts of bandwidth. Those path policies need to be applied to the iron box. Whenever a user sends traffic via the iron box, it will select those path policies to make an effective decision. Prisma SD-WAN's policy control for event correlation and analysis helps admins pinpoint issues. Whenever we log in and check, users complain about issues related to packet loss, and we have to load share the network manually. These automated path policies affect configurations. Sometimes, if the internet link keeps on disconnecting, we can see something on the analytics screen that packet drops are high. Unlike traditional networks, you don't have any kind of analytics. The customer might not take third-party analytics because of the cost. So we don't know the visibility of checking those WAN links, and we simply rely on the ISPs to understand how the WAN link is working. They tell that there is no issue with the WAN links and everything is fine. There might be some milli-seconds of packet loss which cannot be shown on the ping reserves. So this analytics gives a lot of information to the administrator to understand the issue. We can ask those people to understand this issue, and they can resolve those things by seeing those analytics. Prisma SD-WAN is the web solution that helps the administrator to understand the issue and resolve it. Prisma SD-WAN enables branch services such as networking and security to be delivered from the cloud. They also have virtual solutions that they can provide, but we never use those virtual solutions. Prisma SD-WAN is a very good product. It gives lots of benefits to the enterprise network by deactivating the costliest MPRS networks. Even non-technical people can understand the packet flow and easily see what is happening by seeing the analytics of the link. Overall, I rate Prisma SD-WAN an eight out of ten.
The solution also gives us deep application visibility, with Layer 7 intelligence. Traffic engineering is not working on our side. That generally works on the ISP network. There is a security feature in Prisma and a security path setting. We need to create a policy and a zone and mention the policy rules in the zone. It will bind to the security binding and we can apply a global security policy.
I rate Prisma SD-WAN eight out of 10. There is still room for improvement in complete SASE integration and the unified chassis. Once Prisma adds these features, it will be a complete all-in-one solution.
I rate Prisma SD-WAN a nine out of ten. I've been happy with it aside from one pain point. It's been effortless to deploy. I recommend doing a demo. Measure Prisma against other products to see what fits your company's needs best. If you're looking for a cheap solution, Prisma may not be for you. The most important thing is to ask them to do a demo for you to see how it stacks against competing products.
It is a growing product and Palo Alto gives you training for it. I have attended many programs from Palo Alto. I would definitely recommend Prisma SD-WAN. It is a growing product, first of all and the Prisma SD-WAN team is doing a very good job of upgrading the platform. The product is very flexible and understandable. Everybody can work on it. The GUI is very friendly. You also have CLI access if you want. Our customers who use it don't require a top network administrator to work on their networks. Even an IT admin can work with the Prisma SD-WAN and modify things. Overall, it makes things easy and it is cost-effective. There's no complexity in the network. Everything is in the portal and is available. You can administer devices and traffic in this single portal.
I would rate this solution a nine out of ten. My advice is that everybody should do a proof of concept. First, read the basic white papers on Palo Alto. If the product seems to suit your needs, contact them and see what the POC will be and what the pricing will be like. The pricing is different for different companies. Larger enterprises get larger discounts. This also depends on how many sites will be incorporated. There are many factors. It's not a simple decision, but at least you know the product is good. It's on the premium end, but that's what Palo Alto is all about. If you want a top-notch solution, then Prisma is for you. Our security team evaluated the solution and couldn't find any lacking features. I think it's suitable for large and complex enterprises.
We are a Palo Alto partner. We are a system integrator and not a customer. We're selling to customers right now. We are using the solution with a SASE subscription, Prisma Access. I've used both on-premises and cloud deployments. I'd recommend the solution to the users and companies. It comes with all the security and the good direct point to the cloud application as well. I would rate the solution at a ten out of ten. It's a really great product.
I would rate it as 7 out of 10. We have many other options coming out from Palo Alto. The interactions between those and other network gears has a lack of documentation.