Palo Alto NG Firewalls Review

Secures and deeply analyzes connections


What is our primary use case?

We use this solution to block malicious or suspicious activity by creating policies that define which action should be blocked or allowed.

How has it helped my organization?

The firewall is a security device. We use this solution to create policies like ISPs for a specific purpose. We only allow the policies for a particular application, so this is a way for the firewall to secure an unwanted connection.

What is most valuable?

The most valuable feature is the ability to deeply analyze the connection or connection type.

What needs improvement?

Overall it is good. It is reliable and easy to understand. However, the monitoring feature could be improved.

They have many solutions already. I don't think I have seen any missing features. Every device has different functions, but as a firewall, this solution has a lot.

For how long have I used the solution?

I have been using this for three years.

What do I think about the stability of the solution?

Stability is good.

What do I think about the scalability of the solution?

There are no scalability issues to date.

We have about 2,500 users behind the firewall using this solution. I think we don't have any requirement to increase usage. Currently, we have around 2,500 users, but if this increases, we may need a new requirement.

We hired one or two people to maintain the solution.

How are customer service and technical support?

Technical support is good. Once you call up with your issue, it takes around one or two hours for them to contact and give you a solution accordingly.

If you previously used a different solution, which one did you use and why did you switch?

We were using Cisco ASA. We switched because of legal reasons and difficulty to understand. That's why they had decided to change to Firewall.

How was the initial setup?

It is very easy to use. It's straightforward, easy to understand, and easy to configure.

What about the implementation team?

Deployment time depends on your requirements. If you talk about the system requirements, it hardly takes up to 15 or 20 minutes for the configuration.

That said, it totally depends on your requirements: What kind of policy you require that supports what kind of block, etc.

The deployment time would change based on these requirements, but the system configuration: accessing the internet and creating policies hardly takes 20 minutes.

Deployment is configured by administrators, so if we have any kind of issue in policies or any confusion, we get tech support.

What's my experience with pricing, setup cost, and licensing?

Pricing is yearly, but it depends. You could pay on a yearly basis or every three years.

If you want to add a device or two, there would be an additional cost. Also, if you want to do an assessment or another similar add-on you have to pay accordingly for the additional service.

Which other solutions did I evaluate?

We also evaluated Check Point and Fortinet solutions.

What other advice do I have?

This solution is easy to understand, reliable, and user-friendly.

I would rate this solution as eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Add a Comment
Guest
Sign Up with Email