Comprehensive logging is essential for monitoring and analysis purposes. For remote users, the firewall can be configured as a VPN concentrator, with VPN policies defined within the firewall settings.
Automation-OT Manager at a non-profit with 1,001-5,000 employees
Real User
Top 20
2024-02-15T15:38:00Z
Feb 15, 2024
The most effective features for threat prevention in the PA-Series are its integration with Cortex and the use of machine learning AI for advanced threat detection.
IT Manager at a computer software company with 51-200 employees
Real User
Top 10
2024-01-30T16:08:46Z
Jan 30, 2024
The cloud-based aspect helps significantly. It integrates seamlessly with other Palo products like Prisma Cloud, offers robust VPN protection, and it's all in one convenient package.
Learn what your peers think about Palo Alto Networks PA-Series. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Senior Network Engineer at a manufacturing company with 10,001+ employees
Real User
Top 5
2023-09-19T17:29:30Z
Sep 19, 2023
It has its own logging system. You can go to monitoring and check the logs to see if a connection is getting blocked. You can use multiple types of logs to check if a file or a port is getting blocked or if there are any TCP resets from the source or destination. It's easy to troubleshoot with the monitoring and logging it provides.
Palo Alto Networks PA-Series is essential for firewall implementation, perimeter defense, securing infrastructure boundaries, web filtering, VPN, and threat prevention. Organizations deploy it for secure cloud connections, internet security, and managing network devices.
Companies trust Palo Alto Networks PA-Series to protect corporate networks from external threats, control traffic between networks, and meet regulatory compliance. Integrating well with applications, it offers...
The reporting feature and application ID functionality within Palo Alto Networks PA-Series are incredibly valuable to us.
Comprehensive logging is essential for monitoring and analysis purposes. For remote users, the firewall can be configured as a VPN concentrator, with VPN policies defined within the firewall settings.
The most effective features for threat prevention in the PA-Series are its integration with Cortex and the use of machine learning AI for advanced threat detection.
The cloud-based aspect helps significantly. It integrates seamlessly with other Palo products like Prisma Cloud, offers robust VPN protection, and it's all in one convenient package.
The solution has a three-layer architecture, and it helps customers to deploy the solution quickly.
The tool's most valuable feature is WildFire.
The solution is used for security and IoT security.
The solution provides good customer support.
It is scalable. But that depends on what model you are using.
Palo Alto Networks firewalls offer single-mode panel processing with live scanning.
It has its own logging system. You can go to monitoring and check the logs to see if a connection is getting blocked. You can use multiple types of logs to check if a file or a port is getting blocked or if there are any TCP resets from the source or destination. It's easy to troubleshoot with the monitoring and logging it provides.
I like the tool's security and web filtering features.
It is stable when you set up something and put it into production. Once it works, you don't have other tasks or actions to perform.