We deploy Prisma SD-WAN for our NetBackBot and sell Fortinet SD-WAN and Fortinet SRC solutions. We also provide both on-premises and account solutions. Our customers focus on security rather than DLP.
The solution is primarily used for firewall management. It is required for clients who want to manage a large number of firewalls in multiple locations. Otherwise, it is not too useful. It makes sense to use the product when the clients want to manage several branches.
My clients use Palo Alto Networks Panorama for centralized management of multiple firewalls across various locations. It allows them to easily oversee and configure all their firewalls through a single interface, streamlining security management across their network infrastructure.
Director of cloud infrastructure at Injazat Data Systems
MSP
Top 10
2024-01-17T08:32:49Z
Jan 17, 2024
Palo Alto Networks Panorama is essential for those adopting a centralized landing zone firewall approach as it provides a unified management point for enforcing security policies. It becomes particularly crucial in multicast strategies and cloud environments, streamlining configuration and monitoring across multiple firewalls.
Security Technical Lead at a tech services company with 11-50 employees
Real User
Top 5
2023-09-14T14:52:43Z
Sep 14, 2023
It works as a centralized management solution for Palo Alto Networks firewalls. It allows administrators to manage all firewalls from a single interface, reducing the time and effort required for configuration. Panorama also provides pre-configurations and allows for easy deployment of configuration rules to multiple firewalls. Administrators can also leverage Panorama to change smart IPS rules to Panorama IPS rules, allowing for customization and flexibility in managing security signatures. It also simplifies the process of performing upgrades and complex tasks, making it a valuable tool for efficient firewall management.
Learn what your peers think about Palo Alto Networks Panorama. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
We require Palo Alto Networks Panorama to safeguard internet access for our users. Additionally, we need features such as URL filtering and sandboxing, among other useful functionalities.
Solution Architect at Innovirtuz Technologies Pvt. Ltd
Real User
Top 10
2022-12-14T14:25:00Z
Dec 14, 2022
We provide Palo Alto Networks Panorama to customers in the education and government niches, for example, for state and defense accounts. The product is for logging and log management.
Manager at a financial services firm with 10,001+ employees
Real User
Top 20
2022-12-13T08:47:33Z
Dec 13, 2022
Even though there was a dedicated team to monitor the logs with the SIEM platform, I would use the solution when there is a potential outbreak to provide a particular tool to view the effects of the outbreak on my environment.
The basic use case is when you have a lot of Palo Alto Networks firewalls. Panorama is a security management tool for all of your Palo Alto Network devices. Every time you create some configurations or when you need to manage a lot of branches with Palo Alto Network devices, and when you need to group these branches to use the policies, the configurations on a group of devices, it's useful. It's easier to use Panorama to manage stuff.
Cybersecurity Engineer at Networks Unlimited Africa
Real User
2022-07-18T11:25:17Z
Jul 18, 2022
We use Palo Alto firewalls, for our perimeter security. It is our perimeter security product, which we use as our perimeter security firewall. As a firewall should, protect us and our organization at the perimeter.
Senior Network Security Engineer at HCL Technologies
Real User
2022-06-16T13:51:21Z
Jun 16, 2022
This solution allows us to centrally manage all devices. It's deployed on-premises. There are 10,000 employees in my organization. We have two or three data centers across the globe.
Director at a tech services company with 1-10 employees
Reseller
2022-03-28T21:38:00Z
Mar 28, 2022
Palo Alto Networks Panorama can be used for managing all your files at once. Its primary use case is that it's a centralized management system for firewalls. For example: we have a company with four different sites, and each one of those sites has two Palo Alto networks in there, so rather than do one integration, then replicate it four times, what we do is we plug it all into Palo Alto Networks Panorama and make the change once, and it pushes out to all the firewalls, regardless of where those are located.
We have used this solution to design LLD, HLD and PLB queues as well as development queues. Once approved, we implement and configure drone and drone protections. We have also used this solution for App-IDs.
Sr. Director, Security and Architecture at a pharma/biotech company with 11-50 employees
Real User
2021-10-20T18:31:08Z
Oct 20, 2021
It is essentially a lightweight SIEM, so it'll detect and flag any sort of vulnerabilities or attacks on your network. I've been using the most recent version of it. In terms of deployment, it is on the cloud. It is a private cloud. It is Palo Alto's Cloud, and I think they host on AWS.
Cyber Ambassador at a comms service provider with 11-50 employees
Reseller
2021-09-02T21:22:10Z
Sep 2, 2021
We use it internally to manage the solutions that we provide to our customers. So, we use it to manage our own firewalls and Prisma Access. We also use it to manage managed firewalls. We can also resell it, but we don't tend to do too many panoramas. We are using version 10.0.7, which is the latest one under version 10. We're not running 10.1 yet. We don't need to run that.
VP of IT at a tech services company with 51-200 employees
Real User
2021-08-13T09:36:41Z
Aug 13, 2021
Palo Alto Networks Panorama is a centralized monitoring solution that can monitor remote locations, firewalls, configuration management, and patch updates on a single dashboard. We are system integrators. We deploy solutions for our client base.
IT Security Analyst at a energy/utilities company with 51-200 employees
Real User
2021-06-30T18:46:24Z
Jun 30, 2021
We use the solution for segregation. We also use it as a gateway in order to do URL filtering on the DNI as a security measure. We use the product's global protective VPN as well.
We have firewalls in different locations and we want to manage them centrally to see all the information available. The best way to do this is by using this solution, we are able to monitor, manage, and have visibility of the networks.
Technology consultant at a tech services company with 501-1,000 employees
Real User
2021-05-26T09:12:18Z
May 26, 2021
We are using this solution to manage our two perimeter devices. We have two firewall setups; one perimeter and one internal firewall and we have two different Panorama for managing both set of firewall.
Lead Consultant at a tech services company with 1-10 employees
Real User
2020-12-08T16:53:44Z
Dec 8, 2020
We are a solution provider and one of the Palo Alto products that we implement for our clients is Panorama. This product is a management solution for cloud firewalls. It is a central management and logging system.
Within our organization, there are roughly 800 users using Palo Alto Networks Panorama. We may continue using this solution in the future, we're not quite sure yet.
Coordinator of the Architecture Security Team at TOTVS
Real User
Top 5
2020-10-23T11:50:04Z
Oct 23, 2020
Our firewall uses IPS and other features. We have some firewall rules using the IPS feature. For the VPN users using the MFA authentication protocol, we are using the SAML protocol.
Chief Cloud Architect at a tech services company with 1,001-5,000 employees
Real User
2020-09-29T05:58:28Z
Sep 29, 2020
We are using it to manage the configuration of the firewall to validate that the environment is properly hardened (i.e., vulnerabilities are minimized).
Director, Compliance and Risk Management at a pharma/biotech company with 10,001+ employees
Real User
2020-09-16T08:18:00Z
Sep 16, 2020
My obligations consist of overseeing cyber threat intelligence, threat defense operation, digital forensic incident response, and data loss prevention. So in the context of endpoint solutions, my position pertains mainly to the DLP (data loss prevention) function. Cisco AMP (Advanced Malware Protection) plays a significant role in our perimeter strategy for protecting the infrastructure. I work primarily with making sure that we have indicators of compromise in Cisco AMP. I am not on the network engineering or network operations side of things. I am mainly a consumer of services from those particular groups. We use Snort rules (open source network intrusion detection system [NIDS]). We use Yara rules (Yet Another Recursive/Ridiculous Acronym, rules for malware identification). We have Palo Alto IPSs (Intrusion Prevention Systems). Our use cases are primarily perimeter-based for runtime malware defense.
Regional Manager, Management Information Systems at a wellness & fitness company with 501-1,000 employees
Real User
2020-09-16T08:18:00Z
Sep 16, 2020
We use the solution to manage the several Palo Alto firewalls we have. We are customers of Palo Alto and I'm an information systems and security manager.
We primarily use the solution to centrally manage multiple firewalls that we have in our infrastructure and to be able to consistently push policies to them. It's really just a management platform.
This is a solution that we implement for our customers. It allows our customers to manage several firewalls from a central location. Some examples are securing the internet edge, data centers, micro-segmentation within the data centers, and securing their campuses. The majority of the deployments are on-premises, however, we have more and more customers that are moving to the cloud. This solution is helping them to secure their cloud, as well.
Senior Security Engineer at a government with 1,001-5,000 employees
Real User
2019-08-07T06:15:00Z
Aug 7, 2019
We are using the solution primarily for monitoring the firewalls that we have. We have multiple firewalls, including a DC firewall, a perimeter firewall, etc. We are using Panorama to control all of our firewalls.
Panorama network security management provides static rules and dynamic security updates in an ever-changing threat landscape. Reduce administrator workload and improve your overall security posture with a single rule base for firewall, threat prevention, URL filtering, application awareness, user identification, file blocking and data filtering.
We deploy Prisma SD-WAN for our NetBackBot and sell Fortinet SD-WAN and Fortinet SRC solutions. We also provide both on-premises and account solutions. Our customers focus on security rather than DLP.
We are dealing with Palo Alto Networks as a firewall.
The solution is primarily used for firewall management. It is required for clients who want to manage a large number of firewalls in multiple locations. Otherwise, it is not too useful. It makes sense to use the product when the clients want to manage several branches.
My clients use Palo Alto Networks Panorama for centralized management of multiple firewalls across various locations. It allows them to easily oversee and configure all their firewalls through a single interface, streamlining security management across their network infrastructure.
Palo Alto Networks Panorama is essential for those adopting a centralized landing zone firewall approach as it provides a unified management point for enforcing security policies. It becomes particularly crucial in multicast strategies and cloud environments, streamlining configuration and monitoring across multiple firewalls.
It works as a centralized management solution for Palo Alto Networks firewalls. It allows administrators to manage all firewalls from a single interface, reducing the time and effort required for configuration. Panorama also provides pre-configurations and allows for easy deployment of configuration rules to multiple firewalls. Administrators can also leverage Panorama to change smart IPS rules to Panorama IPS rules, allowing for customization and flexibility in managing security signatures. It also simplifies the process of performing upgrades and complex tasks, making it a valuable tool for efficient firewall management.
We require Palo Alto Networks Panorama to safeguard internet access for our users. Additionally, we need features such as URL filtering and sandboxing, among other useful functionalities.
Our primary use cases are for web security, antivirus, and remote browsing. I'm a senior security specialist and we are integrators.
We are using Palo Alto Networks Panorama for a firewall between the DMZ and the enterprise.
We use Palo Alto Networks Panorama firewall, rule and policies management.
We provide Palo Alto Networks Panorama to customers in the education and government niches, for example, for state and defense accounts. The product is for logging and log management.
Even though there was a dedicated team to monitor the logs with the SIEM platform, I would use the solution when there is a potential outbreak to provide a particular tool to view the effects of the outbreak on my environment.
Our customers are using the product.
I use the firewall to protect my entire enterprise network.
My customers use this solution in their companies.
We use Panorama in order to centrally manage our firewall.
The basic use case is when you have a lot of Palo Alto Networks firewalls. Panorama is a security management tool for all of your Palo Alto Network devices. Every time you create some configurations or when you need to manage a lot of branches with Palo Alto Network devices, and when you need to group these branches to use the policies, the configurations on a group of devices, it's useful. It's easier to use Panorama to manage stuff.
We are a cybersecurity business, so we are a Palo Alto reseller and integrator. We also use Palo Alto to run our firewalls in our own environment.
We use Palo Alto firewalls, for our perimeter security. It is our perimeter security product, which we use as our perimeter security firewall. As a firewall should, protect us and our organization at the perimeter.
This solution allows us to centrally manage all devices. It's deployed on-premises. There are 10,000 employees in my organization. We have two or three data centers across the globe.
We are using Palo Alto Networks Panorama for a single pane of glass view of our network.
Palo Alto Networks Panorama can be used for managing all your files at once. Its primary use case is that it's a centralized management system for firewalls. For example: we have a company with four different sites, and each one of those sites has two Palo Alto networks in there, so rather than do one integration, then replicate it four times, what we do is we plug it all into Palo Alto Networks Panorama and make the change once, and it pushes out to all the firewalls, regardless of where those are located.
We have used this solution to design LLD, HLD and PLB queues as well as development queues. Once approved, we implement and configure drone and drone protections. We have also used this solution for App-IDs.
My primary use of Panorama is as a management unit, including firewall and log management.
It is essentially a lightweight SIEM, so it'll detect and flag any sort of vulnerabilities or attacks on your network. I've been using the most recent version of it. In terms of deployment, it is on the cloud. It is a private cloud. It is Palo Alto's Cloud, and I think they host on AWS.
Palo Alto Networks Panorama is used to manage the Palo Alto firewalls.
We use it internally to manage the solutions that we provide to our customers. So, we use it to manage our own firewalls and Prisma Access. We also use it to manage managed firewalls. We can also resell it, but we don't tend to do too many panoramas. We are using version 10.0.7, which is the latest one under version 10. We're not running 10.1 yet. We don't need to run that.
Palo Alto Networks Panorama is a centralized monitoring solution that can monitor remote locations, firewalls, configuration management, and patch updates on a single dashboard. We are system integrators. We deploy solutions for our client base.
We use the solution for border-leaf access.
We use the solution for segregation. We also use it as a gateway in order to do URL filtering on the DNI as a security measure. We use the product's global protective VPN as well.
We have firewalls in different locations and we want to manage them centrally to see all the information available. The best way to do this is by using this solution, we are able to monitor, manage, and have visibility of the networks.
We are using this solution to manage our two perimeter devices. We have two firewall setups; one perimeter and one internal firewall and we have two different Panorama for managing both set of firewall.
It is a central firewall management solution.
We primarily use the solution in order to protect our perimeter. It's used for security purposes.
Our primary use case is to have a centralized console for gateways.
We used Panorama to control all the other modules from Palo Alto and to create the rules.
We are a solution provider and one of the Palo Alto products that we implement for our clients is Panorama. This product is a management solution for cloud firewalls. It is a central management and logging system.
Within our organization, there are roughly 800 users using Palo Alto Networks Panorama. We may continue using this solution in the future, we're not quite sure yet.
Our firewall uses IPS and other features. We have some firewall rules using the IPS feature. For the VPN users using the MFA authentication protocol, we are using the SAML protocol.
This product is part of our overall security solution.
We primarily use the solution for automation purposes and for security.
We are using it to manage the configuration of the firewall to validate that the environment is properly hardened (i.e., vulnerabilities are minimized).
We primarily use the solution for security.
My obligations consist of overseeing cyber threat intelligence, threat defense operation, digital forensic incident response, and data loss prevention. So in the context of endpoint solutions, my position pertains mainly to the DLP (data loss prevention) function. Cisco AMP (Advanced Malware Protection) plays a significant role in our perimeter strategy for protecting the infrastructure. I work primarily with making sure that we have indicators of compromise in Cisco AMP. I am not on the network engineering or network operations side of things. I am mainly a consumer of services from those particular groups. We use Snort rules (open source network intrusion detection system [NIDS]). We use Yara rules (Yet Another Recursive/Ridiculous Acronym, rules for malware identification). We have Palo Alto IPSs (Intrusion Prevention Systems). Our use cases are primarily perimeter-based for runtime malware defense.
We use the solution to manage the several Palo Alto firewalls we have. We are customers of Palo Alto and I'm an information systems and security manager.
We primarily use the solution to centrally manage multiple firewalls that we have in our infrastructure and to be able to consistently push policies to them. It's really just a management platform.
We mainly use this solution to centralize our management.
Our primary use case of this solution is to have as a management tool for firewalls.
We use it for centralized management of all their firewalls. We're using it on-prem.
Our primary use case of this solution is jack monitoring and file management.
This is a solution that we implement for our customers. It allows our customers to manage several firewalls from a central location. Some examples are securing the internet edge, data centers, micro-segmentation within the data centers, and securing their campuses. The majority of the deployments are on-premises, however, we have more and more customers that are moving to the cloud. This solution is helping them to secure their cloud, as well.
The solution is primarily used as a firewall reporting feature.
We are using the solution primarily for monitoring the firewalls that we have. We have multiple firewalls, including a DC firewall, a perimeter firewall, etc. We are using Panorama to control all of our firewalls.
The primary use case is the centralized management of our firewalls.
It is our end all, be all, for all of our firewalls throughout the regions that we support.