PeerSpot user
Network Security Engineer at Data Consult
Real User
Gives us visibility and protection for the entire network
Pros and Cons
  • "I like to install Palo Alto mainly on the data center side to have visibility into all VLANs. That gives full visibility into the core."
  • "I'm thinking about a new feature. They have decryption. It's a good idea to use decryption on Palo Alto. It would be good if they had offloading of the traffic, and if they could decrypt the traffic and offload it. Like, for example, ASM on our site. We have an SSL decryption to offload the traffic. We could use that on Palo Alto."

What is our primary use case?

I used Palo Alto firewalls for plenty of projects and have many use cases.

When working with App-ID, it is important to understand that each App-ID signature may have dependencies that are required to fully control an application. For example, with Facebook applications, the App‑ID Facebook‑base is required to access the Facebook website and to control other Facebook applications. For example, to configure the firewall to control Facebook email, you would have to allow the App-IDs Facebook-base and Facebook-mail.

How has it helped my organization?

I like to install Palo Alto mainly on the data center side to have visibility and protection into the network because we can configure the SVI (layer 3) on Palo Alto instead of the core switch.

It gives us full visibility and protection for the core of the network.

What is most valuable?

Visibility and Protection

It gives us good visibility into the network, and this is very important because it's the core of the network. All the packets go through the firewall.

MFA is a new feature in Palo Alto and it's good to use it.

What needs improvement?

I'm thinking about a new feature. They have decryption. It's a good idea to use decryption on Palo Alto. It would be good if they can offload the traffic.
Like, for example, SSL Offloading on F5. They have an SSL decryption to offload the traffic. 

Buyer's Guide
Palo Alto Networks NG Firewalls
April 2024
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
770,292 professionals have used our research since 2012.

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

Palo Alto is very stable. I worked on Cisco products like FTD and Firepower, and they are not as stable as Palo Alto. Also, some Fortigates are not stable. Palo Alto, as far as I know, is the most stable firewall compared to these others.

What do I think about the scalability of the solution?

The solution is scalable because they are now using the next generation security network. They are integrating with endpoint protection. Palo Alto now has traps, so they integrate their traps and the next generation with the cloud. So it is scalable.

How are customer service and support?

Technical support in Cisco is better than Palo Alto. In Cisco, you can directly talk to the top engineers.

Which solution did I use previously and why did I switch?

We were using Cisco ASA. When Cisco moved to the next generation firewall or tried to move to the next generation firewall when they acquired Sourcefire, and they announced Firepower on ASA, it was not a good option.
They had tool management so you could configure ASA from the CLI and you could configure it on the Firepower. You need to redirect the traffic from ASA to Firepower. It was not a good idea. The packets were processed but there was latency in the packets. 
Nowdays, FTD has many problems and bugs.

When selecting a vendor, the important criteria is how much the appliance is powerful and if it gives me the feature that I want, not an appliance that does everything and it will affect the throughput. Also, the value of the product, the price. 

There has to be a match between the price and the features.

Which other solutions did I evaluate?

Palo Alto, Cisco.

What other advice do I have?

Buy Palo Alto and try its features. In Palo Alto, you have select prevention, scan over AV, anti-spyware, vulnerability protection. and file blocking. you have good feature like WildFire to protect against unknown malware.

I rate Palo Alto at eight out of 10 because it gives me visibility and protection. This visibility and protection are very important nowadays to protect you from hackers.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Network Security Engineer at a tech services company with 51-200 employees
Real User
The best firewall with easy configuration, excellent support, and good security and protection features
Pros and Cons
  • "IoT security is most valuable in the current version. Content IDs, DDoS protection, zone protection, and DLP are the most prominent features in Palo Alto Networks NG Firewall. It is easier to configure than other solutions."
  • "People sometimes find it more expensive as compared to other solutions. There are also fewer training opportunities for Palo Alto than Cisco and other vendors."

What is our primary use case?

We shifted an existing network from Cisco to Palo Alto. It was like a branch to head office network.

We have done public and private cloud deployments as well as on-prem deployments. We are using versions 8, 9, and 10.

What is most valuable?

IoT security is most valuable in the current version. Content IDs, DDoS protection, zone protection, and DLP are the most prominent features in Palo Alto Networks NG Firewall. It is easier to configure than other solutions.

What needs improvement?

People sometimes find it more expensive as compared to other solutions. There are also fewer training opportunities for Palo Alto than Cisco and other vendors.

For how long have I used the solution?

I have been using this solution for the last four or five years.

What do I think about the stability of the solution?

It is working fine.

What do I think about the scalability of the solution?

Its scalability has been fine for our use cases. It is good for large-scale environments, and there are no problems.

How are customer service and technical support?

Their technical support is excellent. 

How was the initial setup?

It is very straightforward. They also have a very good script, so it runs very smoothly.

What's my experience with pricing, setup cost, and licensing?

It is expensive as compared to other brands.

What other advice do I have?

If we are comparing firewalls, this is the best firewall. I would rate Palo Alto Networks NG Firewall a nine out of ten.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Palo Alto Networks NG Firewalls
April 2024
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
770,292 professionals have used our research since 2012.
PeerSpot user
Network Engineer at Acliv Technologies Pvt Ltd
Real User
Secures and deeply analyzes connections
Pros and Cons
  • "The most valuable feature is the ability to deeply analyze the connection or connection type."
  • "Overall it is good. It is reliable and easy to understand. However, the monitoring feature could be improved."

What is our primary use case?

We use this solution to block malicious or suspicious activity by creating policies that define which action should be blocked or allowed.

How has it helped my organization?

The firewall is a security device. We use this solution to create policies like ISPs for a specific purpose. We only allow the policies for a particular application, so this is a way for the firewall to secure an unwanted connection.

What is most valuable?

The most valuable feature is the ability to deeply analyze the connection or connection type.

What needs improvement?

Overall it is good. It is reliable and easy to understand. However, the monitoring feature could be improved.

They have many solutions already. I don't think I have seen any missing features. Every device has different functions, but as a firewall, this solution has a lot.

For how long have I used the solution?

I have been using this for three years.

What do I think about the stability of the solution?

Stability is good.

What do I think about the scalability of the solution?

There are no scalability issues to date.

We have about 2,500 users behind the firewall using this solution. I think we don't have any requirement to increase usage. Currently, we have around 2,500 users, but if this increases, we may need a new requirement.

We hired one or two people to maintain the solution.

How are customer service and technical support?

Technical support is good. Once you call up with your issue, it takes around one or two hours for them to contact and give you a solution accordingly.

Which solution did I use previously and why did I switch?

We were using Cisco ASA. We switched because of legal reasons and difficulty to understand. That's why they had decided to change to Firewall.

How was the initial setup?

It is very easy to use. It's straightforward, easy to understand, and easy to configure.

What about the implementation team?

Deployment time depends on your requirements. If you talk about the system requirements, it hardly takes up to 15 or 20 minutes for the configuration.

That said, it totally depends on your requirements: What kind of policy you require that supports what kind of block, etc.

The deployment time would change based on these requirements, but the system configuration: accessing the internet and creating policies hardly takes 20 minutes.

Deployment is configured by administrators, so if we have any kind of issue in policies or any confusion, we get tech support.

What's my experience with pricing, setup cost, and licensing?

Pricing is yearly, but it depends. You could pay on a yearly basis or every three years.

If you want to add a device or two, there would be an additional cost. Also, if you want to do an assessment or another similar add-on you have to pay accordingly for the additional service.

Which other solutions did I evaluate?

We also evaluated Check Point and Fortinet solutions.

What other advice do I have?

This solution is easy to understand, reliable, and user-friendly.

I would rate this solution as eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Cyber Security Specialist at a tech services company with 10,001+ employees
Real User
An easy setup with good malware protection and excellent technical support
Pros and Cons
  • "The application control portion of the solution is its most valuable aspect."
  • "The price of the solution is very high."

What is our primary use case?

We primarily use the solution as security - as a next-generation firewall.

What is most valuable?

The application control portion of the solution is its most valuable aspect.

The malware protection on offer is excellent.

The initial setup is very easy.

We found the scalability to be quite good.

The stability is excellent.

Technical support is great.

The interface is very user-friendly.

What needs improvement?

Either the application or the vendor needs to provide a more updated list of internet applications.

The price of the solution is very high.

For how long have I used the solution?

We've been dealing with the solution for about three or so years at this point. It's been a while now.

What do I think about the stability of the solution?

The solution has been extremely stable. There are no bugs or glitches. It doesn't crash or freeze. It's very reliable.

What do I think about the scalability of the solution?

We tend to work with enterprise-level organizations.

The scalability is quite good. If a company needs to scale, it can do so with ease.

How are customer service and technical support?

We found the technical support to be quite good. They are helpful, knowledgeable, and responsive. We have no complaints. We are very satisfied with the service they provide to us.

Which solution did I use previously and why did I switch?

We also work with Fortinet.

I'd likely recommend Palo Alto over Fortinet as I find Palo Alto to be more user-friendly. The performance is also very good.

How was the initial setup?

We found the initial setup to be very simple and straightforward. It was not overly complex or difficult. A company shouldn't have any trouble implementing the solution.

The deployment is also very quick. It only takes about ten to 15 minutes or so.

What's my experience with pricing, setup cost, and licensing?

The cost, overall, is pretty expensive.

What other advice do I have?

We are a Palo Alto partner. We are a systems integrator.

I'd recommend the solution. If a company has the budget, I would suggest the product to them. If a customer has a more limited budget, however, I would highly recommend Fortinet as an option.

I'd rate the solution at an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: partner
PeerSpot user
Cyber Security Solutions Architect at a tech services company with 10,001+ employees
Real User
Offers innovative, advanced threat protection
Pros and Cons
  • "Innovative, advanced threat protection is the most valuable feature."
  • "The user interface is probably not as slick as it could be."

What is our primary use case?

Our primary use case was for perimeter protection.

What is most valuable?

Innovative, advanced threat protection is the most valuable feature. 

What needs improvement?

I don't see any specific room for improvement.

The user interface is probably not as slick as it could be.

For how long have I used the solution?

I have been using Palo Alto for three years. 

We're on-premises primarily at the moment, but also a cloud product. 

What do I think about the stability of the solution?

The stability is generally pretty good. I haven't heard any complaints from our customers around Palo Alto's stability. It's one of the reasons why they're the leaders in this space.

We've got our own team for maintenance. My company is a large multinational with 20,000 employees.

How are customer service and technical support?

I have contacted their support once. It's very good support. They help me to fix our problem quickly.

How was the initial setup?

The initial setup was complex. It's not very intuitive. You need to know what you're doing for the initial setup, you need to be a Palo Alto expert.

If you compare it to their competitor Fortinet, Fortinet's FortiGate product is a lot easier to install, if you're not an expert.

The time it takes to deploy depends on how complex the deployment needs to be for the client. If it's a basic deployment, is going to take around two days. 

What other advice do I have?

My advice would be to make sure the firewall is configured properly.

I would rate it an eight out of ten. Not a ten because you have to be really excellent before you get a ten out of me.

In the next release, I would like to have the ability to auto-generate rule and policy, based on known traffic, based on the baseline. That is a feature that I think Palo Alto should be able to have in some form or fashion to auto-generate and propose a policy and rules set, after putting the file into a learning mode for some period.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Senior Technical Consultant at Exclusive GRP
Real User
Valuable accessibility, antivirus, and stability features with a simple implementation
Pros and Cons
  • "The basic configuration will only take 15 minutes to set up"
  • "Customers don't want to buy extra things for extra capabilities"

What is our primary use case?

We're customer facing; each customer uses it for a different purpose. Some use NG Firewalls for IPS capability, some for application capabilities, these kinds of things.

What is most valuable?

The accessibility, antivirus, and stability features are the most valuable. It's so stable, the customer can use the decryption features without impacting performance.

What needs improvement?

Most customers ask about the choice of features. It's limited. It's not arranged well for users. Also, customers don't want to buy extra things for extra capabilities. I would like to implement individual profiles for each user. Capability, in general, is limited.

For how long have I used the solution?

I've been using the solutions for 2 years.

What do I think about the stability of the solution?

It's a very stable solution.

How are customer service and technical support?

I am the customer's technical support. If a customer has issues, they would call me.

How was the initial setup?

The initial setup was basic. It was very simple. The basic configuration will only take 15 minutes. Anyone can set it up. If a person has worked with a firewall before, they can do it themselves. You only need one person for deployment.

What's my experience with pricing, setup cost, and licensing?

Licensing is on a three year basis. Customers prefer one to three years. Licencing is pretty expensive. Check Point is cheaper than Palo Alto. There's also an international license. If a customer wants to control different things, they will need an extra license. 

What other advice do I have?

I've helped customers using Fortinet and Check Point. They are compromised. Their firewall is not stable. But for some features, for example, encryption, they want to use this feature, but the firewall feature isn't great. With Palo Alto, there isn't any problem, you can open any feature - IPS feature, data encryption feature - there isn't an issue.

Implementation is simple, the product is stable, but I advise if people get the firewall I strongly recommend the use of the API features. They may not be accustomed to using a next-generation firewall. If they want to use NG Firewalls, they need to use and implement the API features. They need to create uses based on the application.

My understanding is Version 9 will introduce some logic features.

I would rate this solution 9 out of 10.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Director, Middle East, East India & SAARC at DMX Technologies
Real User
Top 5
It is fine normally but has issues during peak business hours and needs better load handling, VPN connectors, and support
Pros and Cons
  • "It worked fine normally."
  • "The VPN connectors should be better. We had some challenges in terms of the VPN with Palo Alto Networks NG Firewall, and that's one of the main reasons why we moved to Sophos. Its load handling can also be improved. There were challenges when traffic was high. During peak business hours, it did not function very well. There was a lot of slowness, and the users used to complain, especially when they were connecting from outside. We even reported this to the support team. Their support should also be improved. Technical support was a bit of a concern while using this solution. We didn't get very good support from the Palo Alto team."

What is our primary use case?

We were mainly using it because we had two ISP links, so it was a kind of gateway device. Whenever a link went down, the firewall used to automatically switch over to the secondary link so that the internet connectivity is kind of highly available.

What is most valuable?

It worked fine normally.

What needs improvement?

The VPN connectors should be better. We had some challenges in terms of the VPN with Palo Alto Networks NG Firewall, and that's one of the main reasons why we moved to Sophos.

Its load handling can also be improved. There were challenges when traffic was high. During peak business hours, it did not function very well. There was a lot of slowness, and the users used to complain, especially when they were connecting from outside. We even reported this to the support team.

Their support should also be improved. Technical support was a bit of a concern while using this solution. We didn't get very good support from the Palo Alto team.

For how long have I used the solution?

I have been using this solution for almost two to three years.

What do I think about the stability of the solution?

It was fine normally, but during peak business hours, it used to have challenges. We faced this issue at least two to three times a month.

What do I think about the scalability of the solution?

It is not very scalable. We had around 100 users. We had around ten people in our IT team.

How are customer service and technical support?

Support was a bit of a concern while using this solution. The support that we received was not too great, which caused a lot of issues. They were not very customer friendly.

Which solution did I use previously and why did I switch?

This was the first firewall that we used. 

How was the initial setup?

I didn't do the installation.

What other advice do I have?

I would not recommend this solution. I am sure they will come up with better models to overcome some of the challenges that we faced, but I would definitely not recommend this particular model.

I would rate Palo Alto Networks NG Firewalls a six out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Technology Engineer at a computer software company with 51-200 employees
Real User
Stable, very reliable, and easy to use
Pros and Cons
  • "I have found it to be reliable and very easy to use. I haven't really encountered many problems with it because its documentation is clear and readily available on their website."
  • "Based on the features that I have seen so far, I do not see any room for improvement, but they can improve their CLI documentation. I haven't really seen much when it comes to CLI documentation."

What is our primary use case?

I am currently testing Palo Alto and preparing for an exam.

How has it helped my organization?

The Global Protect Feature has allowed our organization to support our remote workforce. 

What is most valuable?

I have found it to be reliable and very easy to use. I haven't really encountered many problems with it because its documentation is clear and readily available on their website.

What needs improvement?

They need to provide documentation for CLI, as most of the commands, we get from Community Forums.

For how long have I used the solution?

I have been doing research on Palo Alto for the past nine months.

What do I think about the stability of the solution?

It is stable.

What do I think about the scalability of the solution?

Highly scalable as the HA deployment allows you to pair up to eight devices at once. 

How are customer service and technical support?

I haven't had a chance to contact them.

Which solution did I use previously and why did I switch?

Palo Alto is my first solution.

How was the initial setup?

Initial setup is easy and subsequent changes have been easy to implement as well. 

What about the implementation team?

In-house expertise. 

Which other solutions did I evaluate?

What other advice do I have?

I would say go for it because it seems to be stable and very reliable. I've spoken to some specialists who vouch for Palo Alto. They say they've been using it in their environment, and it hasn't let them down so far.

I would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2024
Product Categories
Firewalls
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros sharing their opinions.