If you were talking to someone whose organization is considering Palo Alto Networks Panorama, what would you say?
How would you rate it and why? Any other tips or advice?
My advice to others who are looking into implementing it, I would say that the solution is practically completely perfect. It gets a ten out of ten rating from me.
I would recommend the solution. I find Palo Alto is the easiest product to deploy. I would rate the solution eight out of ten.
I would recommend this solution.
I will recommend this solution to others because it is a good solution, but only if you are using multiple files and not only two or three files. You should have at least five files for this solution to be right for you. I rate this product an eight out of ten. Easier implementation with other solutions will increase my rating. In the future, I would like to see additional features being able to install firewalls using remote sites and the ability to do initial configuration using Panorama. I would like this initial configuration to be copied on USP and have the firewalls configured to connect to the Panorama. I would, therefore, like to see easier configuration and implementation in the next version.
This is the most mature next-generation firewall in the market and a solution that I strongly recommend. The biggest lesson that I have learned from this solution is not to trust internet users. Whether it is regular users or employees, they do not like to be detected. They keep trying to work around the policies using different applications and peer-to-peer functionality. I have learned this because Palo Alto has full visibility to all types of traffic, and we're able to catch these scenarios and put security policies int place. Palo Alto has done a lot towards closing gaps in security. Cloud security is not their only focus. It is concerned with the flows between VMs, storage, and containers. They are concerned with PCI requirements and compliance. They have also launched Cortex Analytics to help close gaps further. They are in a very good position to lead the future. At the end of the day, everything is relative, and I would rate this solution a ten out of ten compared to other products. However, there is room for improvement. Overall, I would rate this solution a nine out of ten.
Most of our clients deal with the on-premises deployment solution, as cloud solutions in Egypt can occasionally be insecure. I would advise anyone looking to implement the solution really focus on sizing before beginning the implementation. I would rate the solution nine out of ten.
We are using the private cloud deployment model. I would recommend the solution. It has a user-friendly interface. It's stable. You can easily troubleshoot any issue. You will also get clear information, and, in general, it's a very good product that allows you to manage more than one device from a central interface. Of course, before you do any change, I would recommend that you back up everything first. I would rate the solution seven out of ten.
If you are looking at getting a Palo Alto firewall, then you should probably at least look into Panorama. Because if you start out just putting in firewalls and you don't have this, you will be kicking yourself that you didn't have this from day one. If you have just one firewall out there, maybe you don't need it. However, if you have two or three, then you should probably get it to be in front of a lot of the features which you will want eventually. It is pretty solid product. Our security program is fairly immature compared to other enterprises, and this product has definitely helped us lock down things. We have a rigorous code review process. Therefore, we are always back a bunch of versions. If the latest version came out today with new features on it, we probably wouldn't get to that for quite a while. There are only certain things that you can do within the Panorama solution.
Ensure you get professional services with the tool. We are very satisfied with everything that they provides us. This product has significantly helped with implementing new leadership strategy, getting metrics, and being able to actually assign a risk floor.