How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
We use both the NG and VM series of Palo Alto firewalls. We sell and install them for clients to provide the best security that money can buy.
We use this solution for Zero Trust Data Center Segmentation with layer 2 Palo Alto firewalls. Segmentation has allowed us to put servers into Zones based off VLAN tags applied at the Nutanix level and can change "personalities" with the change of a VLAN tag. Palo Alto calls the "Layer 2 rewrite". By default, all traffic runs through a pair of 5000 series PAs and nothing is trusted. All North and South, East and West traffic is untrusted. No traffic is passed unless it matched a rule in the firewalls. There is a lot of upfront work to get this solution to work but once implemented adds/moves/changes are easy.
We use this solution for WAN routing, NAT, VPN tunnels, granular security policies, URL filtering, antivirus, threat prevention, sandboxing, decryption, high availability, and reporting.
We have multiple IPS applications, and other multiple use cases.
The primary use for this product is for security as a firewall by a sales engineer for the guest environment.
We use the firewall for securing the data center. We have designed it to be a two-stage firewall. We have a perimeter firewall which is not Palo Alto, and then the Palo Alto firewall which is acting as a data center firewall. We are securing our internal network, so we have created different security zones. And we assign each zone a particular task.
I use the PA-220 to protect the LAN at my small-ish (about twenty people) office. We have several remote users who use the GlobalProtect VPN. As we move into a data center for hosting, I'll buy a second PA-220 to set up a site-to-site VPN. We also have a VM-50 for internal testing and lab use.
I primarily use this solution for the core banking network. It's for core security. So it's to protect against intrusion, to protect against any kind of cyber attack that can happen to it. It protects our core infrastructure.
I'm using many solutions. I'm working as a CTO for a big company here. I work with Palo Alto and Cisco.
Upstream and data center NGFW.
We're customer facing; each customer uses it for a different purpose. Some use NG Firewalls for IPS capability, some for application capabilities, these kinds of things.
We use this solution as a firewall. We use it for VPN setup, threat protection, and for internet breakout also. We actually deploy several different versions. We have a TA200, a PA820, and a PA3200 series.
I use the solution for firewalls.
Our solution is now based on clustering and load balancing. We can add more nodes to our environment to accommodate the new load within our company. We have about 2,000 to 2,300 users on Palo Alto NG firewall support. Palo Alto has a line of products for different customers. If you do the sizing it from the beginning, considering that you are a growing company, it is fine. You need to plan for the future, which means that you have to pay in advance through investment. With Palo Alto NG Firewalls, the cost will be higher.
We use this solution to block malicious or suspicious activity by creating policies that define which action should be blocked or allowed.
Finding a solution for easy management, where the company is protected in a matter where an unwanted software is blocked.
It is our main firewall. It has performed well. It meets our expectations.
I used Palo Alto firewalls for plenty of projects and have many use cases. When working with App-ID, it is important to understand that each App-ID signature may have dependencies that are required to fully control an application. For example, with Facebook applications, the App‑ID Facebook‑base is required to access the Facebook website and to control other Facebook applications. For example, to configure the firewall to control Facebook email, you would have to allow the App-IDs Facebook-base and Facebook-mail.