We performed a comparison between OPNsense and Palo Alto Networks NG Firewalls based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: OPNsense is highly regarded for its ability to adapt and grow, its ability to allow guest access, its user-friendly interface, its versatility, its reliability, its intrusion detection and prevention system, and the availability of a free version. Palo Alto Networks NG Firewalls excel in their incorporation of machine learning, their ability to prevent attacks in real-time, their unified platform, and their robust security capabilities.
OPNsense has room for improvement in interface simplicity, bandwidth management, high availability, logging, integration, hardware updates, reporting, SSL inspection, and learning curve. Palo Alto Networks NG Firewalls can enhance customization, SD-WAN configuration, logging accuracy, management interface, documentation, VPN availability, training materials, external dynamic list feature, and internet filtering.
Service and Support: Some users find the customer service for OPNsense excellent, while others believe it could be enhanced. Opinions on Palo Alto Networks NG Firewalls' customer service are divided. Some customers appreciate the support team's expertise and promptness, while others have faced challenges in contacting support.
Ease of Deployment: The setup process for both OPNsense and Palo Alto Networks NG Firewalls is described as straightforward. Users with or without IT experience can easily navigate through either setup. The deployment time for both options can vary depending on specific circumstances. Palo Alto Networks NG Firewalls provide training materials that contribute to the simplified and user-friendly setup experience.
Pricing: OPNsense primarily incurs expenses for hardware, while the software is available for free. Additional costs may involve public IPs and underlying VMs. Palo Alto Networks NG Firewalls are generally perceived as having higher pricing due to licensing and subscriptions. Nevertheless, this higher cost is deemed reasonable given the level of security and features offered by the product.
ROI: OPNsense delivers cost savings within a short period, eradicating the need for ongoing expenses. Palo Alto Networks NG Firewalls enhance visibility, reporting, and security, streamlining administration and ensuring a sense of security.
Comparison Results: Based on user feedback, Palo Alto Networks NG Firewalls is the preferred choice when compared to OPNsense. Users find the initial setup of Palo Alto Networks NG Firewalls to be straightforward and easy. Palo Alto Networks NG Firewalls is highly regarded for its embedded machine learning capabilities, strong security features, and comprehensive logging.
"The solution is very, very easy to use."
"It performs very well."
"The user interface is relatively easy. The devices are easy to deploy and figure out when you have experience with other security appliances."
"The initial setup of Fortinet FortiGate was straightforward."
"This version is stable. I don't have any issues with this solution, in our environment, it works well."
"Their interface is very easy to use, it is without bugs."
"The simplicity of the configuration and the stability of the product are most valuable. The VPN concentrator is very useful."
"This solution has solid UTM features combined with a nice GUI."
"I feel that its valuable features are that it is simple and free."
"The solution is good for a basic firewall for a small business or for home use."
"It has firewall and VPN capabilities, which are very valuable features."
"OPNsense is easy to use and open source."
"It is a very good solution. I like the dashboard. I can see what is going on and manage it as I like it."
"OPNsense could improve by making the configuration more web-based rather than shell or command-line-based."
"The IDS and IPS features are valuable. From the usability perspective, there is a lot of good documentation. As IT professionals, we found it very easy to configure the firewall. It was easy to configure and use."
"I find the solution to be user-friendly. It has a lot of reports and easy settings."
"Application control, IPS, and sandboxing towards the cloud are the most valuable features. It is a very user-friendly product with a very easy-to-use interface."
"GlobalProtect and App-ID features are very good."
"We have found the DPI ability to understand web applications and build access rules on web application categories first to be a great feature."
"It's one of the best products I've worked with. It's typically a market leader on Gartner. It's a very respected brand."
"The most valuable features are application inspection and sandboxing. Application inspection decides where traffic is transmitted. If I have a perimeter report for a particular service, then other services or malicious services cannot use an open port. In this way, application inspection is doing a fantastic job. We also have a very good sandbox with almost no rate limit. It will inspect any file that comes in and goes out in a dedicated patch to identify malware. Therefore, these two things help me to protect our organization from any bad actors."
"Comments have some delay, but overall, it's a good product."
"It is an extremely powerful solution as it provides visibility into all the network traffic, and offers a range of actions such as blocking websites or graphics, as well as load balancing. It's a great tool."
"They are regularly releasing new versions that include more integration with third-party services."
"The process of configuring firewall rules appears excessively complex."
"Palo Alto has a feature called WildFire Analysis that is unavailable in FortiGate. WildFire is better than a sandbox because it can address zero-day threats and vulnerabilities. It can immediately identify zero-day threats from the cloud."
"The feature which gives us a lot of pain is ASIC architecture."
"Their software support needs improvement. I would prefer to have better support for bug fixes. Sometimes, we open a ticket, and it is very difficult to get a solution. Specifically, we are not at all happy with their support for load balancing."
"The way everything is set up could be easier. Currently, people need a lot of experience and knowledge to administer it and to link it to devices."
"The room for improvement is about the global delivery time period. Usually I need to wait for almost one month to deliver it overseas. So if you can shorten the deliver time it'd be great."
"Currently, FortiGate is providing SSL VPN. But they're missing some features that are available in Palo Alto's SSL VPN."
"The pricing could always be better."
"The interface of the solution is an area with shortcomings."
"The solution would not be suitable for anything large-scale."
"Its interface should be a little bit better."
"The interface isn't so friendly user. But we have some technicians here who are quite confident with this tool. OPNSense could maybe add sets of rules so it's simpler to manage different groups with particular needs."
"The ability to set the VPN IP address would be a welcome addition."
"The IPS solution could be more reliable."
"An area for improvement in OPNsense is the hardware, which needs to be updated more frequently. DNS blocking is another good feature I want to be added to the solution. pfSense has a peer-blocking feature that I also want to see in OPNsense."
"The logging could improve in OPNsense."
"Palo Alto Networks NG Firewalls do not provide a unified platform that natively integrates all security capabilities."
"I am in GCC in the Middle East. The support that we are getting from Palo Alto is disastrous. The problem is that the support ticket is opened through the distributor channel. Before opening a ticket, we already do a lot of troubleshooting, and when we open a ticket, it goes to a distributor channel. They end up wasting our time again doing what we have already done. They execute the same things and waste time. The distributor channel's engineer tries to troubleshoot, and after spending hours, they forward the ticket to Palo Alto. It is a very time-consuming process. The distributor channels also do not operate 24/7, and they are very lazy in responding to the calls."
"As part of our internet filtering, we integrate heavily with Active Directory, and we use security groups to separate staff into two groups: those who should have full access to the internet and those who should have limited access. It may be just the way the topology is for our domain controllers and that infrastructure, but at peak usage, there seems to be a delay in reading back against the security group to find out what group the user is in."
"The initial configuration is complicated to set up."
"The solution could be simplified."
"When we looked at it originally, we needed to host the Panorama environment ourselves. I would prefer it if we could take this as a service. It might be that it is available, but for some reason we didn't choose it. The downsides of hosting are that we need to feed and water the machines. We are trying to move to a more SaaS environment where we have less things in our data centers, whether they be in our cloud data centers or physical data centers, which can reduce our physical data center footprint."
"The data loss prevention (DLP) capabilities need to be beefed up."
"The solution would benefit from having a dashboard."
More Palo Alto Networks NG Firewalls Pricing and Cost Advice →
OPNsense is ranked 3rd in Firewalls with 36 reviews while Palo Alto Networks NG Firewalls is ranked 6th in Firewalls with 162 reviews. OPNsense is rated 8.4, while Palo Alto Networks NG Firewalls is rated 8.6. The top reviewer of OPNsense writes "Robust network security and management offering a user-friendly interface, open-source flexibility, and cost-effectiveness, with challenges regarding initial setup and the absence of official support". On the other hand, the top reviewer of Palo Alto Networks NG Firewalls writes "We get reports back from WildFire on a minute-by-minute basis". OPNsense is most compared with Netgate pfSense, Sophos XG, Untangle NG Firewall, Sophos UTM and Sophos XGS, whereas Palo Alto Networks NG Firewalls is most compared with Check Point NGFW, Azure Firewall, Meraki MX, Sophos XG and Sophos UTM. See our OPNsense vs. Palo Alto Networks NG Firewalls report.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.