We just raised a $30M Series A: Read our story
2020-03-03T08:47:00Z

What needs improvement with Palo Alto Networks K2-Series?

0

Please share with the community what you think needs improvement with Palo Alto Networks K2-Series.

What are its weaknesses? What would you like to see changed in a future version?

ITCS user
Guest
1414 Answers

author avatar
Top 5LeaderboardReal User

The user interface could be improved. Right now, it's an aspect that is lacking. They should make it more user-friendly. There are too many options visible right now, which makes it confusing. They need to streamline and simplify it. I'd like to see more data protection on the system. It needs a DLP, a Data Loss Prevention, system.

2021-07-13T20:33:38Z
author avatar
Top 20Real User

They could improve by providing more features in the solution.

2021-06-15T17:26:49Z
author avatar
Top 20Real User

They should lower their prices for small businesses. They should offer subscriptions or box-sets because a lot of companies want to buy it, but they just can't afford it. It's not that expensive necessarily; the market is just doing poorly at the moment. Everything I could possibly want has already been implanted into the new version, including the Internet of Things, machine learning, and SD-WAN; every feature I wanted has already been integrated.

2020-10-19T09:33:00Z
author avatar
Top 20Real User

The company needs to align better with the customer. At the price point they offer, they need to be as good or better than the competition. They're losing market because they aren't there yet in that regard. When it comes to renewing the solution, they tend to try to jack up the pricing.

2020-08-23T08:17:17Z
author avatar
Top 20Reseller

The reporting functionality in GlobalProtect needs to be improved. Other products, such as Check Point, have better reporting features that give more reports. The price of the K2-Series should be lowered. The dashboard could be improved by adding more GUI components.

2020-06-07T09:09:00Z
author avatar
Top 10Real User

The partner support, which is a local company, is not that good and can be improved. I would like to see the threat intelligence capability integrated with other vendors such as Cisco and Forcepoint. This would effectively be a multi-threat intelligence solution. Along the same lines, it would be useful to share threat signatures with different vendors.

2020-05-27T16:23:40Z
author avatar
Top 10Real User

The URL Filtering module needs to have more categories added to it. The concept of clustering would be of benefit to Palo Alto and it would make it more productive. For example, with Forcepoint, you can cluster two different products.

2020-05-27T16:23:40Z
author avatar
Top 5Reseller

The ease of management and configuration should be improved. The price of the K2 series could be lower.

2020-04-20T07:27:25Z
author avatar
Top 20Real User

The technical support, and how they provide it to the client, needs to be improved. They take too long to provide answers. I would like to have a statistical report that shows the number of times that each rule is used.

2020-03-30T07:58:09Z
author avatar
Top 20Real User

The solution could be improved with more dedicated reporting about the user's context. For example, if I need to have a summarized report that includes uses as well as consolidating the user's activities, threads and applications on the endpoint machine, Palo Alto does not have the visibility for the endpoint in their firewalls. If I want to have a report from the firewall that summarizes user application from the user side, rather than the server side, Palo Alto software does not have that information. Other vendors, such as Cisco, have that in their profile. You can generate a report from Cisco firewall and it will tell you that you're using the internet, and using Firefox or Google Chrome. Palo Alto doesn't have that extended visibility to the end point. It would be the same for additional features - I need to have the visibility of the endpoint application, endpoint context. It's an innate feature in Cisco firewalls. I don't like the style of Forte, for example. It has email spam over the firewall. I don't like this feature, and I don't like to have features that are not really good for out of the box. What Forte does have that is good is an explicit proxy capability and Palo Alto could include that.

2020-03-23T06:14:17Z
author avatar
Top 20Real User

In terms of what needs improvement, Palo Alto is lacking abilities that other firewalls can do. They disable the current sessions when you think the hardest part is done. They have a workaround for authentication, but then our clients just use the local database of the device itself. Some of the small to medium businesses are using these features and it would be easier for us to upsell the product up to other networks. Palo Alto Networks is quite a bit higher when it comes to prices. They should implement the features that the other firewalls have. In the next release, I would like for them to include a checkbox where the user could disable concurrent users of the portal.

2020-03-19T13:00:00Z
author avatar
Top 20Real User

There are a lot of bugs in this solution.

2020-03-16T06:56:21Z
author avatar
Top 20Real User

It's like anything else. What's good today might not be in a day, a week, a month, etc. The solution needs to constantly be adapting and updating. The solution needs a series of OS changes.

2020-03-09T08:07:58Z
author avatar
Top 10Real User

There is not really anything that needs to be improved in the product. It might be nice if it were possible for newer users to get a higher level of support.

2020-03-03T08:47:00Z
Learn what your peers think about Palo Alto Networks K2-Series. Get advice and tips from experienced pros sharing their opinions. Updated: October 2021.
540,984 professionals have used our research since 2012.