$("#pro-aspect-container .snippet-list").append('
AG<\/span><\/div><\/div>
Adarsh Gopakumar<\/span><\/a><\/div>
Manager at a tech services company with 51-200 employees<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Nov 30, 2022<\/div><\/div>
The solution does a great job of identifying malicious items and vulnerabilities with URL filtering.<\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
\"Ferenc<\/div>
Ferenc Balku<\/span><\/a><\/div>
System Engineer at a tech vendor with 1-10 employees<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Jul 3, 2022<\/div><\/div>
All the features are valuable, but my main one is the straightforward and well-designed GUI. I'm over 50 and have been in this business since the internet started. I'm not a GUI guy; I prefer using the command line. The product's GUI is excellent, and so is the threat intelligence. It's also straightforward to configure and flexible. The solution even has good networking, such as VLAN and subinterfaces, which is great because, in my experience, if the firewall is good, then the router usually isn't and vice-versa, but Palo Alto has both.<\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
\"MartinFerguson<\/div>
MartinFerguson<\/span><\/a><\/div>
Managing Director/Co-Founder at Azured<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Oct 30, 2022<\/div><\/div>
I can enable the features I want and configure the policies based on the user and not all users and network traffic, making firewall management much easier.<\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
\"NimeshaBalasuriya<\/div>
NimeshaBalasuriya<\/span><\/a><\/div>
Security Engineer at Sri Lanka Telecom Ltd<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Dec 29, 2022<\/div><\/div>
Most of the features in Palo Alto are very valuable.<\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
\"Marcin<\/div>
Marcin Chudzik<\/span><\/a><\/div>
Senior Security Engineer Implementation&Support at T Systems Poland<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Jul 4, 2022<\/div><\/div>
The most significant benefit is threat protection. Anti-malware uses signatures, so dynamic analyzers like WildFire are the best way to protect the company. It is a firewall based on application control, user ID, and security policy. We can use it based on user and application ID without a stateless firewall or TCPIP ports.\n\n<\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
\"Matt<\/div>
Matt Gahafer<\/span><\/a><\/div>
Network Engineer at Samtec, Inc.<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Mar 30, 2022<\/div><\/div>
We have not had to replace hardware routers nor purchase additional hardware. So, that has provided a little bit of an ROI.<\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
\"Sachin<\/div>
Sachin Vinay<\/span><\/a><\/div>
Network Administrator at Amrita<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Sep 21, 2022<\/div><\/div>
It has a unique approach to packet processing. It has single-pass architecture. We can easily perform policy lookups, application decoding, and integration or merging. This can be all done with a single pass. It effectively reduces the amount of processing required to perform multiple actions. This is the main advantage of using Palo Alto.<\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
SG<\/span><\/div><\/div>
reviewer1422384<\/span><\/a><\/div>
Network Administrator at Dart Enterprises<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Jul 30, 2021<\/div><\/div>
The machine learning in the core of the firewalls, for inline, real-time attack prevention, is very important to us. With the malware and ransomware threats that are out there, to keep abreast of and ahead of those types of attacks, it's important for our devices to be able to use AI to distinguish when there is malicious traffic or abnormal traffic within our environment, and then notify us.<\/span><\/div><\/div><\/div>