Senior Manager Technical Security at Hitachi Systems, Ltd.
Reseller
Top 20
2024-11-20T06:46:41Z
Nov 20, 2024
We manage public or private cloud traffic, inspecting for security through various profiles. This includes managing traffic for southeast, east-west, inbound, and A access, applying security profiles to the traffic. I also work with the Check Point Next Generation Firewall and Palo Alto Firewalls.
The primary use case involves using next-generation firewalls, hardware, VM-Series, Prisma Access for SASE solutions, Prisma Cloud for cloud security posture management, and Cloud Workload Protection. It's used primarily for securing customers' virtualized data center environments as well as public cloud environments.
Product Manager of IT Ops and Management at ManageEngine A division of Zoho Corporation.
Real User
Top 10
2024-10-15T12:03:00Z
Oct 15, 2024
I use it for two main reasons. In case there is a customer query, Palo Alto firewall is one of the vendors that we support for syslogs, rule management, change management, and traffic monitoring. Our product is used to query the firewall and provide a dashboard that raises alarms if any suspicious activity is detected. It involves the management of the firewall. We have a partnership with Palo Alto, and I have worked with VM-Series. When a customer encounters an issue with our product in accordance with Palo Alto, I analyze the problem and provide solutions. Additionally, I have constructed a lab with network devices for partner training. This lab uses Palo Alto firewalls for communication.
We use Palo Alto Networks VM-Series to offer services to our customers as a managed security service provider. We provide solutions and services to our customers across the globe. For example, if I want to host a firewall in the cloud or somewhere where the physical appliance is not a possibility, we provide that image of the firewall on virtual machines.
System Engineer - Security Presales at Raya Integration
Real User
Top 10
2024-04-19T15:33:00Z
Apr 19, 2024
Our company sometimes uses a data center edge firewall from Cisco, Fortinet, Forcepoint, or any other vendor, and the solution is used to cover apps and data.
Learn what your peers think about Palo Alto Networks VM-Series. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
I've mainly worked with the VM-Series, and a few features have been really effective for threat prevention in our networks, like McAfee training, Accountant ID, and apps ID. These features integrate well with our existing environments and tools, such as Panorama.
Infrastructure Architect at a tech services company with 51-200 employees
Real User
2023-09-26T08:27:08Z
Sep 26, 2023
We use Palo Alto Networks VM-Series for our company's customers, especially those who use Azure Firewall to secure their environment but still want a third-party firewall from companies like Fortinet FortiGate and Palo Alto in their environment. Whenever our company's customers want to opt for a third-party firewall, we suggest firewall products from companies like Fortinet FortiGate and Palo Alto. There have been cases where our company's customer who already uses firewall products from Fortinet FortiGate and Palo Alto deployed on an on-premises model want to shift the same product to the cloud, going on the good experience they have had with the products. If our company's customers are not interested in purchasing a third-party firewall, my company suggests the cloud-native firewall provided by Azure, specifically for their landing zone environment.
We use Palo Alto Networks VM-Series primarily for security purposes. It helps us with URL filtering, domain blocking, threat analysis, and detecting vulnerabilities.
The main concern is VPN. If you're using Azure Firewall, you still need a VPN gateway to terminate your VPN connection. Azure Firewall doesn't remove the need for another VPN gateway, especially for point-to-site VPN. So you have to use another VPN appliance. With Palo Alto and FortiGate, for example, you can have an all-in-one solution. The VPN gateway and all the other features are available.
Ours is an enterprise environment and some of the services are hosted in our private data centers and some of the servers are hosted on Azure. We have the IPSec tunnels from the firewalls to our own data centers and from the firewall to the cloud as well. It depends on the type of application being hosted. We are using Panorama for centralized management of all our firewalls around the world, as well as for centralized management of security policies and network settings. We have not completely migrated to the cloud. We are in transit.
We use the solution for network protection. Previously, I worked for a physical organization, but last year we moved to a Proof of Concept. Following the POC, we had to deploy the solution in three different geographical locations. We deployed all of the Palo Alto solutions in the hub environment and connected them to another node.
Azure Firewall is a cloud-native solution. It's only for netting and simple source-destination blocking. The client wanted everything, so they wanted us to implement a third-party solution. Palo Alto was the leading solution. It's easy to install. Palo Alto is dynamic regarding protocol rules, and it is classless. The client also wanted a third-party solution between their on-premise environment and Azure, so they went for Palo Alto. Palo Alto VM-Series is deployed on the Azure Cloud.
Manager-Information Technology at a computer software company with 51-200 employees
Real User
Top 20
2022-05-02T05:27:00Z
May 2, 2022
We are using it on Azure Cloud for our internal systems, where we have set up our internal workloads. We are using it as a perimeter firewall. We are using it because our internal workflows are on the cloud. Almost everything in our production and development uses these instances. We are using it extensively for conducting reports of the development environment. It is working fine.
Consultant at a tech services company with 501-1,000 employees
Reseller
2021-05-19T12:03:00Z
May 19, 2021
We use the solution for hands-on testing purposes and also for activating firewall re-entries, which is easy to accomplish. We only need to turn up the VM to the firewall. This serves users who are working at home due to the COVID-19 pandemic. We also utilize the solution in respect to several servers which are behind the firewall.
IT Infrastructure Architect at a financial services firm with 10,001+ employees
Real User
2021-01-23T04:01:00Z
Jan 23, 2021
It is deployed on the Azure cloud to inspect the outbound traffic, but in the near future we will be working to inspect inbound and Azure Express Route traffic as well.
Assistant Professor at Facultatea de Economie și Administrarea Afacerilor din Iași
Real User
2021-01-05T17:34:14Z
Jan 5, 2021
I am the guy they call up first for the central infrastructure and configuration of the malware, firewall, and main applications, and I use Palo Alto Networks VM-Series for that.
Network Security Engineer at a tech vendor with 51-200 employees
Real User
2020-12-11T17:29:37Z
Dec 11, 2020
We are a solution provider and the Palo Alto VM-Series is one of the products that we implement for our customers. Our customers use this virtualized next-generation firewall as part of their security solution.
Senior Network Engineer at a tech services company with 51-200 employees
Real User
2020-10-13T07:21:29Z
Oct 13, 2020
We are a service provider and I work on both shared firewall and dedicated firewall solutions for our customers. The primary focus is firewall threat protection. The rest of the features are used, albeit not too much. At this moment, it is not an overly complicated or advanced solution.
Senior Network Engineer at a tech services company with 51-200 employees
Real User
2020-10-07T07:04:33Z
Oct 7, 2020
We mostly use it for threat protection. Currently, I'm working on virtual solutions, and it is deployed on the cloud. We have three people who work with this solution. I have previously worked on the shared firewall as well as dedicated firewall solutions, where we deployed it on-premises as well as on the cloud.
Executive Cyber Security Consultant at a tech services company with 11-50 employees
Consultant
2020-09-21T06:33:11Z
Sep 21, 2020
Palo Alto VM-Series is something we recommend as a firewall solution in certain situations for clients with particular requirements who have the budget leeway.
Senior Manager Network Engineering at a manufacturing company with 10,001+ employees
Real User
2020-09-10T07:35:40Z
Sep 10, 2020
I am a firewall expert, although my job is not on the management side. I take care of the routing and switching aspects. We have approximately 1,000 firewalls in the company.
The primary use case of this solution is as a firewall for our servers. We are running a total of 12 servers. Four of them are hardware servers and the rest are VMware servers. We have about 80 clients running Windows 10.
Technology Specialist at Accretive Technologies Pvt Ltd
Real User
2020-07-15T07:11:39Z
Jul 15, 2020
We primarily use the solution for IT. I am from the Palo Alto Partner end, so I am not using it deliberately. I usually deploy to clients in various industries, including the payment gateway industry.
Cloud Practice Engineer at a outsourcing company with 51-200 employees
Real User
2018-12-11T08:30:00Z
Dec 11, 2018
We use Palo Alto for the VPN, firewalls, and the hybrid site-to-site. We have purchased Palo Alto VM for one of our customers. It has been a year since we have been using this product. We use Palo Alto's on-premise version for a different purpose. We are using the cloud version for our contractors to VPN to the AWS environment. For Palo Alto on-premise, we use it more for security firewalls. On the cloud side, we use it for customer contractors to get into the AWS environment for VPN. we use native routing and native security tools that they developed already in AWS.
Palo Alto Networks VM-Series is a highly effective advanced threat protection (ATP) solution and firewall that can be hosted on cloud computing technologies designed by many different companies. It decreases the amount of time that it will take administrators to respond to threats. Users that deploy VM-series have 70% less downtime than those who use similar firewalls. Neither protection nor efficiency are concerns when this next-generation firewall is in play.
VM-Series is...
We manage public or private cloud traffic, inspecting for security through various profiles. This includes managing traffic for southeast, east-west, inbound, and A access, applying security profiles to the traffic. I also work with the Check Point Next Generation Firewall and Palo Alto Firewalls.
The primary use case involves using next-generation firewalls, hardware, VM-Series, Prisma Access for SASE solutions, Prisma Cloud for cloud security posture management, and Cloud Workload Protection. It's used primarily for securing customers' virtualized data center environments as well as public cloud environments.
I use it for two main reasons. In case there is a customer query, Palo Alto firewall is one of the vendors that we support for syslogs, rule management, change management, and traffic monitoring. Our product is used to query the firewall and provide a dashboard that raises alarms if any suspicious activity is detected. It involves the management of the firewall. We have a partnership with Palo Alto, and I have worked with VM-Series. When a customer encounters an issue with our product in accordance with Palo Alto, I analyze the problem and provide solutions. Additionally, I have constructed a lab with network devices for partner training. This lab uses Palo Alto firewalls for communication.
We use Palo Alto Networks VM-Series to offer services to our customers as a managed security service provider. We provide solutions and services to our customers across the globe. For example, if I want to host a firewall in the cloud or somewhere where the physical appliance is not a possibility, we provide that image of the firewall on virtual machines.
All the PwC offices in Pakistan use Palo Alto in their environment. It is a global solution.
Our company sometimes uses a data center edge firewall from Cisco, Fortinet, Forcepoint, or any other vendor, and the solution is used to cover apps and data.
I've mainly worked with the VM-Series, and a few features have been really effective for threat prevention in our networks, like McAfee training, Accountant ID, and apps ID. These features integrate well with our existing environments and tools, such as Panorama.
I use the solution in my company to block threats, detect vulnerabilities, and protect the organization's internal network.
We primarily use the solution for cloud firewalling, SASE, ZTNA, and CASB compared to the hardware-based NGFW or cloud firewalls.
We use the solution for inter-VPC traffic segmentation and inspection. I also use it for external interfaces.
The solution is used to protect some servers and access their traffic in a virtualization environment.
We use the product on our Azure network firewalls.
I have completed ten projects. The solution is used for network security, application control, and enforcement of policies on end-user devices.
Our corporate clients use the product to secure cloud environments.
I use Palo Alto Networks VM-Series for testing purposes of VMs.
We use Palo Alto Networks VM-Series for our company's customers, especially those who use Azure Firewall to secure their environment but still want a third-party firewall from companies like Fortinet FortiGate and Palo Alto in their environment. Whenever our company's customers want to opt for a third-party firewall, we suggest firewall products from companies like Fortinet FortiGate and Palo Alto. There have been cases where our company's customer who already uses firewall products from Fortinet FortiGate and Palo Alto deployed on an on-premises model want to shift the same product to the cloud, going on the good experience they have had with the products. If our company's customers are not interested in purchasing a third-party firewall, my company suggests the cloud-native firewall provided by Azure, specifically for their landing zone environment.
We use Palo Alto Networks VM-Series primarily for security purposes. It helps us with URL filtering, domain blocking, threat analysis, and detecting vulnerabilities.
We use the product to mitigate vulnerabilities for the applications running on particular VMs.
The main concern is VPN. If you're using Azure Firewall, you still need a VPN gateway to terminate your VPN connection. Azure Firewall doesn't remove the need for another VPN gateway, especially for point-to-site VPN. So you have to use another VPN appliance. With Palo Alto and FortiGate, for example, you can have an all-in-one solution. The VPN gateway and all the other features are available.
Ours is an enterprise environment and some of the services are hosted in our private data centers and some of the servers are hosted on Azure. We have the IPSec tunnels from the firewalls to our own data centers and from the firewall to the cloud as well. It depends on the type of application being hosted. We are using Panorama for centralized management of all our firewalls around the world, as well as for centralized management of security policies and network settings. We have not completely migrated to the cloud. We are in transit.
We use the solution for network protection. Previously, I worked for a physical organization, but last year we moved to a Proof of Concept. Following the POC, we had to deploy the solution in three different geographical locations. We deployed all of the Palo Alto solutions in the hub environment and connected them to another node.
Azure Firewall is a cloud-native solution. It's only for netting and simple source-destination blocking. The client wanted everything, so they wanted us to implement a third-party solution. Palo Alto was the leading solution. It's easy to install. Palo Alto is dynamic regarding protocol rules, and it is classless. The client also wanted a third-party solution between their on-premise environment and Azure, so they went for Palo Alto. Palo Alto VM-Series is deployed on the Azure Cloud.
We use this product to secure our entire network. At this point, it is used only for VPN purposes, allowing access to our servers behind the firewall.
We are using it on Azure Cloud for our internal systems, where we have set up our internal workloads. We are using it as a perimeter firewall. We are using it because our internal workflows are on the cloud. Almost everything in our production and development uses these instances. We are using it extensively for conducting reports of the development environment. It is working fine.
This is our core firewall for the data center network. We have two on-premises appliances set up in a high availability configuration.
We use the solution for hands-on testing purposes and also for activating firewall re-entries, which is easy to accomplish. We only need to turn up the VM to the firewall. This serves users who are working at home due to the COVID-19 pandemic. We also utilize the solution in respect to several servers which are behind the firewall.
It is deployed on the Azure cloud to inspect the outbound traffic, but in the near future we will be working to inspect inbound and Azure Express Route traffic as well.
I am the guy they call up first for the central infrastructure and configuration of the malware, firewall, and main applications, and I use Palo Alto Networks VM-Series for that.
We are a solution provider and the Palo Alto VM-Series is one of the products that we implement for our customers. Our customers use this virtualized next-generation firewall as part of their security solution.
We are a service provider and I work on both shared firewall and dedicated firewall solutions for our customers. The primary focus is firewall threat protection. The rest of the features are used, albeit not too much. At this moment, it is not an overly complicated or advanced solution.
We mostly use it for threat protection. Currently, I'm working on virtual solutions, and it is deployed on the cloud. We have three people who work with this solution. I have previously worked on the shared firewall as well as dedicated firewall solutions, where we deployed it on-premises as well as on the cloud.
We use it for all next-gen firewall features such as ACLS, application monitoring, security, virtual networking, etc.
The VM-Series firewall is part of our overall security solution.
Palo Alto VM-Series is something we recommend as a firewall solution in certain situations for clients with particular requirements who have the budget leeway.
I am a firewall expert, although my job is not on the management side. I take care of the routing and switching aspects. We have approximately 1,000 firewalls in the company.
The primary use case of this solution is as a firewall for our servers. We are running a total of 12 servers. Four of them are hardware servers and the rest are VMware servers. We have about 80 clients running Windows 10.
We primarily use the solution for IT. I am from the Palo Alto Partner end, so I am not using it deliberately. I usually deploy to clients in various industries, including the payment gateway industry.
Palo Alto VM Series is a firewall that makes up part of our security solution, handing IPS, IDS, and other security measures.
The Palo Alto VM-Series is a firewall that is part of our security solution.
We use this as our primary security barrier between trusted and untrusted zones.
We use it to protect applications and data on AWS.
Primary use case is network protection, next-generation IDS, and IPS protection.
We use it to secure all traffic leaving and entering AWS.
We use it for firewall purposes.
We use Palo Alto for the VPN, firewalls, and the hybrid site-to-site. We have purchased Palo Alto VM for one of our customers. It has been a year since we have been using this product. We use Palo Alto's on-premise version for a different purpose. We are using the cloud version for our contractors to VPN to the AWS environment. For Palo Alto on-premise, we use it more for security firewalls. On the cloud side, we use it for customer contractors to get into the AWS environment for VPN. we use native routing and native security tools that they developed already in AWS.
* To do a lot of intrusion detection. * Threat prevention. * As an application firewall, to be able to securely deliver apps to the public.
We use Palo Alto as a perimeter security device.