Palo Alto Networks NG Firewalls Primary Use Case

Solutions Architect at a comms service provider with 501-1,000 employees
We use both the NG and VM series of Palo Alto firewalls. We sell and install them for clients to provide the best security that money can buy. View full review »
Jonny Su
IS&S Europe and Global Infrastructure Manager at a transportation company with 10,001+ employees
We use this solution as a firewall. We use it for VPN setup, threat protection, and for internet breakout also. We actually deploy several different versions. We have a TA200, a PA820, and a PA3200 series. View full review »
Mahmoud Salaheldin
Security Unit Manager at EEMC
Upstream and data center NGFW. View full review »
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
418,646 professionals have used our research since 2012.
Head, Information Technology at a construction company with 501-1,000 employees
It is our main firewall. It has performed well. It meets our expectations. View full review »
Mustafa Arrabi
IT Manager at a tech services company with 51-200 employees
Our solution is now based on clustering and load balancing. We can add more nodes to our environment to accommodate the new load within our company. We have about 2,000 to 2,300 users on Palo Alto NG firewall support. Palo Alto has a line of products for different customers. If you do the sizing it from the beginning, considering that you are a growing company, it is fine. You need to plan for the future, which means that you have to pay in advance through investment. With Palo Alto NG Firewalls, the cost will be higher. View full review »
Bachir Elsitt
Network Security Engineer at Data Consult
I used Palo Alto firewalls for plenty of projects and have many use cases. When working with App-ID, it is important to understand that each App-ID signature may have dependencies that are required to fully control an application. For example, with Facebook applications, the App‑ID Facebook‑base is required to access the Facebook website and to control other Facebook applications. For example, to configure the firewall to control Facebook email, you would have to allow the App-IDs Facebook-base and Facebook-mail. View full review »
Denis L
Sales Engineer at BAKOTECH LLC
The primary use for this product is for security as a firewall by a sales engineer for the guest environment. View full review »
I use the PA-220 to protect the LAN at my small-ish (about twenty people) office. We have several remote users who use the GlobalProtect VPN. As we move into a data center for hosting, I'll buy a second PA-220 to set up a site-to-site VPN. We also have a VM-50 for internal testing and lab use. View full review »
Rakesh Rawat
Network Engineer at Acliv Technologies Pvt Ltd
We use this solution to block malicious or suspicious activity by creating policies that define which action should be blocked or allowed. View full review »
Vice President & Head Technology Transition at a tech services company with 10,001+ employees
We have multiple IPS applications, and other multiple use cases. View full review »
Jean Maurice Prosper
Chief Executive Officer at a tech services company with 11-50 employees
I primarily use this solution for the core banking network. It's for core security. So it's to protect against intrusion, to protect against any kind of cyber attack that can happen to it. It protects our core infrastructure. View full review »
Aleksandar Jovanovic
System Engineer with 51-200 employees
We use this solution for WAN routing, NAT, VPN tunnels, granular security policies, URL filtering, antivirus, threat prevention, sandboxing, decryption, high availability, and reporting. View full review »
Senior Technical Consultant at Exclusive GRP
We're customer facing; each customer uses it for a different purpose. Some use NG Firewalls for IPS capability, some for application capabilities, these kinds of things. View full review »
Ibrahim Ghanem
Head of Information Network Security at FRA
We use the firewall for securing the data center. We have designed it to be a two-stage firewall. We have a perimeter firewall which is not Palo Alto, and then the Palo Alto firewall which is acting as a data center firewall. We are securing our internal network, so we have created different security zones. And we assign each zone a particular task. View full review »
Sales Engineer at a wholesaler/distributor with 51-200 employees
I use the solution for firewalls. View full review »
Mike Hancock
Vice President, Security Engineering at a financial services firm with 1,001-5,000 employees
We use this solution for Zero Trust Data Center Segmentation with layer 2 Palo Alto firewalls. Segmentation has allowed us to put servers into Zones based off VLAN tags applied at the Nutanix level and can change "personalities" with the change of a VLAN tag. Palo Alto calls the "Layer 2 rewrite". By default, all traffic runs through a pair of 5000 series PAs and nothing is trusted. All North and South, East and West traffic is untrusted. No traffic is passed unless it matched a rule in the firewalls. There is a lot of upfront work to get this solution to work but once implemented adds/moves/changes are easy. View full review »
Partner at a tech services company with 51-200 employees
Mohamed Farouk
CTO at a tech services company with 11-50 employees
I'm using many solutions. I'm working as a CTO for a big company here. I work with Palo Alto and Cisco. View full review »
IT Technician / Support
Finding a solution for easy management, where the company is protected in a matter where an unwanted software is blocked. View full review »
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: April 2020.
418,646 professionals have used our research since 2012.