We just raised a $30M Series A: Read our story

Palo Alto Networks DNS Security OverviewUNIXBusinessApplication

Palo Alto Networks DNS Security is #4 ranked solution in top Domain Name System (DNS) Security tools. IT Central Station users give Palo Alto Networks DNS Security an average rating of 10 out of 10. Palo Alto Networks DNS Security is most commonly compared to Cisco Umbrella:Palo Alto Networks DNS Security vs Cisco Umbrella. The top industry researching this solution are professionals from a comms service provider, accounting for 22% of all views.
What is Palo Alto Networks DNS Security?

Automatically secure your DNS traffic by using Palo Alto Networks DNS Security service, a cloud-based analytics platform providing your firewall with access to DNS signatures generated using advanced predictive analysis and machine learning, with malicious domain data from a growing threat intelligence sharing community.

Palo Alto Networks DNS Security Buyer's Guide

Download the Palo Alto Networks DNS Security Buyer's Guide including reviews and more. Updated: November 2021

Pricing Advice

What users are saying about Palo Alto Networks DNS Security pricing:
  • "There is an annual license for the solution and I am satisfied with the pricing."

Palo Alto Networks DNS Security Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
JF
Senior Technical Project Manager at a university with 10,001+ employees
Real User
Top 5
Mature with good scalability and an easy initial setup

Pros and Cons

  • "The stability is excellent and the product is very mature."
  • "Every vendor that sells DNS or firewalls needs to be able to protect against DNS look-up attacks and DNS naming hacks. This is true of Palo Alto as well as others."

What is our primary use case?

We primarily use the solution for security reasons.

What is most valuable?

Palo Alto has a range of products. They have very secure 600 DNS as well as 100 DNS. They have anti-hacking features which are quite useful. They have virus protection within the firewall.

They have other products that are geared towards protecting the DNS. All of their product line is highly secure with built-in security. You can protect DNS within the firewall as most of the features are built-in. It's not like a product within the firewall. It's already built-in.

The initial setup is very, very straightforward.

The scalability is good.

The stability is excellent and the product is very mature.

What needs improvement?

Every vendor that sells DNS or firewalls needs to be able to protect against DNS look-up attacks and DNS naming hacks. This is true of Palo Alto as well as others.

The IDS and IPS should be built-in. With EDS and IDS, some are proud to have built-in IDS and IPS intrusion protection and intrusion detection as some vendors sell IDS and IPS separately. They shouldn't be separate. Instead of selling two products, it really should just be one.

For how long have I used the solution?

I've been using the solution for about six years at this point. It's been a while.

What do I think about the stability of the solution?

The solution is a very mature product. That's what I like about Palo Alto. They said they don't have breaches on their firewall. There are no bugs or glitches. It doesn't crash or freeze. It's great.

What do I think about the scalability of the solution?

Cisco and Palo Alto, right off the bat, are very scalable. That's why I'm studying cloud computing, as, right now, all of the cloud computing platforms have automation and start with automation. We're going away from humans having to configure routers, switches, stories, and firewalls. Everything is done through automation in the stack as well as through virtualization. Maybe in five years, we'll then have so many Cisco routers engineers, NetApp engineers, who would be mostly working through virtualization and the cloud. 

How are customer service and technical support?

Palo Alto has a very mature library of documentation. That's what I like about Palo Alto. They don't have so many breaches so, and you're dealing with a good mature product. 

You can go and visit the support webpage and check the size of their tech support libraries. If it's huge, then you know you have a product that has, let's say, a lot of incidents, so you maybe want to stay away from it.

Which solution did I use previously and why did I switch?

I'm in the process of certifying for cloud computing, Amazon cloud computing. I'm focusing not so much on hardware, but on the solutions that Amazon has. We deal primarily with Route 53, which is the Amazon product, which has built-in security features within the configuration of Route 53.

I have experience with Cisco, which is pretty easy to set up.

Sonicwall and Sophos I don't use at all.

Checkpoint is not an easy firewall to set up, although is a very good firewall. Checkpoint has also been around for a very long time and it still has instruction sets and comments. It's software-driven, most of the time.

How was the initial setup?

The initial setup is not complex. That's the beauty about Palo Alto. If you set up a firewall, it is very easy and very straightforward. Unlike other vendors, the two firewalls that are easiest to set up are Cisco and Palo Alto. The other vendors are a little bit more work.

What's my experience with pricing, setup cost, and licensing?

I'm more focused on supporting the product, I don't buy it. I go to the webpage and I see prices, however, I don't pay too much attention to the cost. I'm more interested in the product features and doing the work and the support than actually buying the product. 

It's my understanding that they are closely competitive with Cisco, and likely their pricing is on par.

What other advice do I have?

We are customers and end-users.

I'm not sure which version of the solution we're using.

I'm currently during training with new virtual firewalls.

DNS is a very ancient protocol. The protocol 53 and the UCP and so on, and ARP. We need to review that architecture due to the way we do networking is open to hacking. People can poison the cache, and therefore we need to look at a way of doing away with ARP, doing away with the UCP and having, let's say, the address convert automatically into the IP address and do away with IP version 6. IP version 6 was a total mess. Although the protocol works, it consumes too much overhead and it's too much of a fat protocol. It uses 64 bit, 128 bit, hex addressing at the Mac layer and also at the network layer when using hex. 

We need to stick with expanding IP version 4, data in notation. That works at a human level better than working at the network layer. When you use, let's say, IP version 6 it is very difficult to troubleshoot. It's a lot easier to troubleshoot IP version 4, that it's decimal and hex at the network layer. It's a lot easier to identify patterns, easier for the eye to be able to recognize that something is negative or to understand how protocols are working or how routing is working.

Right now, most companies operate with all the DNS. What's surrounding the DNS are the firewalls, intrusion protection and detection, load balancing, fault tolerance et cetera. Other than that, we don't have a secure DNS. That's why we need to reinvent networking. We need to switch to a new method of networking, where we have a truly secure DNS. Without the DNS the internet does not work. That's like having a store open to pirates. DNS is the best thing that has been invented, as far as the internet goes, as that's what allows the browsers to work, that's what allows network solutions to work. Without it we're dead.

I'd rate the solution at an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
Flag as inappropriate
KS
Network Engineer at a educational organization with 11-50 employees
Real User
Top 20
We can actively see how many thousands of malicious requests have gotten knocked down in the last day or week that we didn't know before

Pros and Cons

  • "We now have insight into our DNS requests and we can actively see how many thousands of malicious requests have gotten knocked down in the last day or week that we didn't have before. There's more insight for both security and more insight."
  • "I'm not really sure what needs improvement. The only hiccup I've really seen is a couple of the DNS requests get flagged as the Sophos traffic instead of DNS traffic, but that's more of their app detection in the DNS Security. I haven't really seen any issues with the DNS security."

What is our primary use case?

Our primary use case is for preventing malware and malicious requests.

How has it helped my organization?

We now have insight into our DNS requests and we can actively see how many thousands of malicious requests have gotten knocked down in the last day or week that we didn't know before. There's more security and more insight.

The fact that the solution detects five times more malicious, newly registered domains and more than nine days faster than the in industry average, affects our security posture by blocking the bleeding edge malicious attacks. In theory, it just keeps us a few branches up from everybody else so we won't get hit.

We are moving towards a Zero Trust Architecture but not necessarily directly. We are in the process of trying to deploy a PAM that is in the direction of Zero Trust. It's very convenient that we can just put it in line, turn it on, and watch it go.

What is most valuable?

The autofocus piece that gives us insights into how many requests we have and how many malicious requests get denied is the most valuable feature. We didn't really have eyes on the DNS queries. We had some filtering done, but we didn't know which pieces it knocked down and how much work it was doing.

The comprehensiveness of DNS Security against emerging DNS layer threats is very good. They seem to have updates nearly daily.

My understanding is that it would protect against DNS tunneling, rebinding, and dangling DNS attacks. Any of the malicious-type attacks, like getting blocked, are important for us because we're trying to keep our network secure.

Features specifically relevant to DNS Security, like proactively digging for potential cybercriminal activities, C2, phishing, and grayware hosting are very important to us because they're malicious attempts at the network and Palo Alto knocks it down.

What needs improvement?

I'm not really sure what needs improvement. The only hiccup I've really seen is a couple of the DNS requests get flagged as the Sophos traffic instead of DNS traffic, but that's more of their app detection in the DNS Security. I haven't really seen any issues with the DNS security.

For how long have I used the solution?

I have been using Palo Alto for around two years. 

What do I think about the stability of the solution?

It's been very robust. You check the box and watch it work.

What do I think about the scalability of the solution?

It covered our whole network without us having to really tweak anything. The one adjustment we had to make is that we had to make the DNS lookup timeouts slightly longer, but as soon as we contacted support, they knew to do that and gave us the instructions on how to do it. 

We support 47 different school districts and they all come to us and pull through. It fluctuates and they manage their end of the network. 

At this point, we have two Egresses and it's on both Egresses fully.

Eight of us on the team work with Palo Alto. We mostly do the LAN side of the network.

How are customer service and support?

My only qualm with them is that sometimes they work off-hours compared to our time zone.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We didn't really have a solution before and we didn't have any eyes on our DNS requests, as far as what was malicious and what was expected traffic.

How was the initial setup?

The initial setup was straightforward. You just set up a security profile and attach it to your rules and it filters DNS requests.

We did it all together when the firewalls were deployed in the beginning. I'm not sure how long the DNS Security piece took.

What about the implementation team?

Palo Alto sales engineers helped us deploy it. Our experience with them was very good. They're very knowledgeable and very helpful.

What was our ROI?

We have eyes and security in a place we didn't before, so that's at least worth something.

What's my experience with pricing, setup cost, and licensing?

I wasn't too involved in the pricing piece of this, but we're an educational-type institution and we were able to make it work. I think the pricing is good.

Which other solutions did I evaluate?

We were replacing our outward-facing firewall but we mostly shop between Cisco and Palo Alto.

We were looking at Palo Alto as a whole for the firewall, not just the DNS Security filtering. As a whole, we like the management, features, and subscriptions that Palo Alto has compared to Cisco.

We've been really happy with it. And it seems like even with the web security piece doing some inspection, Palo Alto does more. With Palo Alto having the near-constant updates, they're usually cutting down newer malicious DNS requests before the others could.

What other advice do I have?

Turn it on and run it and see how many DNS requests you were missing before.

The biggest lesson I have learned is that we have a lot more malicious requests than we thought we did.

I would rate Palo Alto Networks DNS security a nine out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: IT Central Station contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Flag as inappropriate
Learn what your peers think about Palo Alto Networks DNS Security. Get advice and tips from experienced pros sharing their opinions. Updated: November 2021.
552,305 professionals have used our research since 2012.
Darshil Sanghvi
Consultant at a tech services company with 501-1,000 employees
Reseller
Top 5Leaderboard
User friendly, zero-configuration, and priced fair

Pros and Cons

  • "When comparing other cloud-based DNS security solutions to this one I have found the main beneficial feature in this solution to be we do not need to change our architecture."
  • "There should be an on-premise version of this solution."

What is our primary use case?

This is a subscription-based solution that you need to procure for our firewall that provides DNS security. We use this solution for all of our on-premise and remote users. It is used in any servers which are connected over the internet or the users who are trying to reach the internet.

What is most valuable?

When comparing other cloud-based DNS security solutions to this one I have found the main beneficial feature in this solution we do not need to change our architecture. There was no need to change the configuration or to do any modification to the user's end. The user's DNS will be the same, the traffic will flow through the same firewall, and it will give us the DNS level security. For other OEMs or other solutions, we need to map their DNS to the public DNS and there is a need to modify the DNS at the user level. Additionally, the solution works in real-time and it is easier to deploy users. For example, to deploy 1,000 - 2,000 users having to do the modifications in each user's IT environment would take a lot of time.

Additionally, I have found the solution to be very user-friendly.

What needs improvement?

There should be an on-premise version of this solution. There are companies that have asked for a solution that is on-premise. The reason for this is some companies might want to have control of where their traffic is going. For example, banking companies do not want their DNS queries or any such traffic to be sent over the cloud, because the cloud can be inside India or anywhere. This is why they might want the solution to be on-premise to allow them to have full control of the security.

For how long have I used the solution?

I have been using the solution within the last 12 months.

What do I think about the stability of the solution?

The solution is very reliable and stable. It intercepts DNS traffic and it can block unwanted traffic and forward it elsewhere.

What do I think about the scalability of the solution?

The solution is highly scalable since it is in the cloud. We have approximately 50 users using the solution. Between my customers, they have a user base of 10 to 10,000 users using the solution.

How are customer service and technical support?

The technical support is responsive.

How was the initial setup?

Since it is a subscription, all you need to do is activate the license to use it.

What's my experience with pricing, setup cost, and licensing?

There is an annual license for the solution and I am satisfied with the pricing.

Which other solutions did I evaluate?

We did evaluate other options.

What other advice do I have?

My advice to those wanting to implement Palo Alto Next-generation Firewalls, VM-Series, K2, or any other firewall from Palo Alto, I would recommend them to enable DNS Security.

I rate Palo Alto Networks DNS Security a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Flag as inappropriate
AH
Group Network Specialist at a financial services firm with 5,001-10,000 employees
Real User
Top 5Leaderboard
Good DNS filtering, scalable, and highly-integrated

Pros and Cons

  • "The most valuable feature is DNS filtering."
  • "We would like to have cloud-based management."

What is our primary use case?

We have a Palo Alto firewall in our data center and we use this product for DNS filtering. With respect to the DNS, everything is being processed.

How has it helped my organization?

This product is used in our organization to prevent all of the potential threats that we expect from the internet. It includes everything that can reach the end-user from the internet.

It handles everything that is DNS-related that originates from an untrusted zone.

This is beneficial for us because we are in the process of migrating everything from on-premises to the cloud. We have already migrated our email and OneDrive. Will hopefully be on Office 365 soon.

As far as I'm concerned, the DNS duties should be on the cloud as well.

What is most valuable?

The most valuable feature is DNS filtering.

This is a highly-integrated system tool.

What needs improvement?

We would like to have cloud-based management.

I would like to see integration with Cisco Meraki so that they can work together on DNS issues. 

For how long have I used the solution?

We have been using Palo Alto Networks DNS Security for between six and seven years.

What do I think about the stability of the solution?

This product has been doing well and we have no complaints about stability.

What do I think about the scalability of the solution?

This is a scalable solution. We have about 1,200 users.

What about the implementation team?

We have two people who are in charge of security and work with this product.

What other advice do I have?

For us, this is the best product that we have used. Nonetheless, I will recommend it only once they have integration with Cisco Meraki so that the two technologies can work together.

I would rate this solution a nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.