We performed a comparison between Palo Alto Networks K2-Series and Palo Alto Networks NG Firewalls based on real PeerSpot user reviews.
Find out in this report how the two Firewalls solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Offers good security and filtering."
"The most valuable features are the possibility of having one fabric for switching on security."
"In terms of security, we have not experienced any security flaws or loopholes, and it has proven to be quite stable."
"Secure, user-friendly, stable, and scalable network security solution. Installation is straightforward."
"The initial setup is straightforward."
"The signature database and zero-day detection are Fortinet FortiGate's most valuable features."
"The email protection and VPN features are the most valuable."
"Fortinet FortiGate protects against internet-based threats, both internal and external. It is scalable, stable, easy to use, and easy to install."
"It caters to typical use cases across various technologies. MDR and XDR, for example, focus on user and endpoint protection. It's pretty straightforward."
"The most valuable feature of Palo Alto Networks K2-Series is the configuration, it is very clear."
"Palo Alto firewalls are scalable enough. We have about 110 employees in our company, and we are about to expand to 130."
"K2-Series' best features include its scalability, which is the best on the market."
"One of the most valuable features is Palo Alto's firewall management. We find it easier to manage the firewall centrally."
"The most valuable feature is availability."
"Overall, this is a very simple and very effective firewall, and I am satisfied with it."
"Simple integrations with the domain controllers and other inventories"
"Identifying applications is very easy with this solution."
"It helps the organization function better by virtue of cleaner and more predictive Internet access and usage being conducted by the employees and constituents of the company. It helps ensure that they have a stronger security posture. It is preventive medicine If you have DNS Security in place. You will be happy you had it. If you don't have it, you may never need it. However, if you did need it, and didn't have it, you will wish that you did. It is one of those things, like insurance."
"The initial setup was very easy."
"One of the things I really like about it is that we have the same features and functions available on the entry-level device (PA-220), as do large corporations with much more costly appliances."
"Its flexibility is the most valuable."
"We have not had to replace hardware routers nor purchase additional hardware. So, that has provided a little bit of an ROI."
"I typically get involved with it when it comes to audit and compliance and having to gather evidence of those firewalls, routers, and rule sets. The evidence that I typically need is there."
"The best feature is the packet inspection; compared to solutions like Cisco and FortiGate, Palo Alto's packet inspection is much less CPU intensive, allowing it to detect threats embedded within packages more quickly and efficiently."
"Fortinet FortiGate should improve the VPN tokens."
"The renewal price and the availability could be improved."
"The UTM filtering needs improvement."
"Due to its higher cost, Fortinet FortiGate can lead to increased operational expenses."
"This product could be improved with Active directory integration and better handling in IPsec and GRE Tunnels."
"Fortinet FortiGate could improve by having more capabilities for troubleshooting VPN connections. For example, I do get some feedback about the current status, but I could use some history and logging of important events. The information is logged in our Syslog server, but I could use that information from the device. If they could provide a GUI to have some more insight on what's going with my VPN would be useful."
"The reporting in Fortinet FortiGate could improve. Customers are having to purchase additional reporting components. When I have used the Sophos solution it is a complete solution, in Fortinet FortiGate you have to use additional tools to have the features needed."
"The non-error conserve mode has room for improvement."
"We had some issues with upgrading in the past. They could make the process easier."
"Its networking features could be better."
"The URL Filtering module needs to have more categories added to it."
"Palo Alto releases a lot of bug fixes for their firewalls, which means it's necessary to do frequent upgrades. They should work on decreasing their bugs so that upgrades aren't needed so often."
"When it comes to renewing the solution, they tend to try to jack up the pricing."
"I'd like to see more data protection on the system."
"If we have issues, they take anywhere from two days to a week to respond. I even wrote to their CEO because there was no response. When it comes to support, this is the worst company."
"I would like to see the threat intelligence capability integrated with other vendors such as Cisco and Forcepoint."
"Palo Alto could do better with integrating the Palo Alto Next-Gen Firewall with SD-WAN. The biggest issue with Palo Alto is that they are expensive. They are very expensive for what they offer. They should improve their pricing."
"Palo Alto should improve their support. It's sometimes difficult to get the right technician or engineer to fix the problem as soon as possible."
"A major concern is making the licensing more accessible to enable small municipalities to afford and manage their own systems independently."
"The scalability of the firewalls could be improved."
"The only area I can see for improvement is that Palo Alto should do more marketing."
"There is a bit of limitation with its next-generation capabilities. They could be better. In terms of logs, I feel like I am a bit limited as an administrator. While I see a lot of logs, and that is good, it could be better."
"There are some advanced features that we aren't able to use, which include active IP authentication and app ID. We are facing challenges with implementing those two features."
"The biggest thing that needs to be improved with them is their training. I took a training class for the 8.0 build, then I took it again for the 9.0 and 10 builds. They add new features every time that they do a new major release, but the training doesn't keep up. It is the same basic training that probably was with the 3.0 build, and they just change the screenshots. I would love to see them do some more work since they have all these bells and whistles, but we don't know how to use those features on a large scale."
More Palo Alto Networks NG Firewalls Pricing and Cost Advice →
Palo Alto Networks K2-Series is ranked 27th in Firewalls with 29 reviews while Palo Alto Networks NG Firewalls is ranked 6th in Firewalls with 161 reviews. Palo Alto Networks K2-Series is rated 8.4, while Palo Alto Networks NG Firewalls is rated 8.6. The top reviewer of Palo Alto Networks K2-Series writes "Easy to implement and manage, and the documentation is good". On the other hand, the top reviewer of Palo Alto Networks NG Firewalls writes "We get reports back from WildFire on a minute-by-minute basis". Palo Alto Networks K2-Series is most compared with , whereas Palo Alto Networks NG Firewalls is most compared with Check Point NGFW, Azure Firewall, Meraki MX, Sophos XG and Netgate pfSense. See our Palo Alto Networks K2-Series vs. Palo Alto Networks NG Firewalls report.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
In the best tradition of these questions, Feature-wise both are quite similar, but each has things it's better at, it kind of depends what you value most.
PA is good at app control, web filtering and such like, they have always been top of the pile there. The GUI is very good, and their product is very user-focused.
Fortinet is good for scalability and predictable high throughput (ASICs in the hardware), and useful things like authentication flexibility, CLI config (if you have any networking/Cisco people, they always seem to prefer CLI over GUI) and have better OT features, maybe relevant to your manufacturing use?
Fortinet seem to have a broader integration offering with their security fabric than PA do, plus they can do Fortinet-based wifi, switching, etc. Depends if you are prepared to go all-in with a single vendor.
Hi,
Both FT and PA have compelling features for large Enterprises. I would like to add a few good points about Fortinetwhich might be helpful ( from my 13 years of engagement with them as Distributor and Partner)
Fortinet:
Have higher throughput; which comes with competitive rates
Wide range of models to select to meet your requirement, without spending heavliy
Outstanding customer support and very active customer care team
Easly available skilled resources from the channel for deployment and post-implementation support
Regards
Abhilash
Hello. The question is what you are going to have as a result of application