We just raised a $30M Series A: Read our story
2019-03-11T07:21:00Z

What needs improvement with Palo Alto Networks Panorama?

6

Please share with the community what you think needs improvement with Palo Alto Networks Panorama.

What are its weaknesses? What would you like to see changed in a future version?

ITCS user
Guest
2626 Answers

author avatar
Top 5LeaderboardReal User

There is a need to improve the upgrade process. When we are upgrading the solution we are facing some issues with Elasticsearch services. Every time we upgrade it takes a long time to become stable. In an upcoming release, I recommend having policy segmentation because that will help Panorama. There is no policy segmentation as you would find in Check Point.

2021-05-26T09:12:18Z
author avatar
Top 10Real User

They can improve its cloud integration.

2021-04-22T18:19:02Z
author avatar
Top 10Real User

Its scalability can be improved. It is too expensive to scale it in the way Palo Alto wants us to scale. Scalability is one of the main reasons why our customer is looking for alternatives. It is too expensive to scale. Its redundancy also requires improvement, but it seems that in the latest version, redundancy is improved, and you can have more than two devices in an HA pair. So, they are heading in that direction. It would be good if they combine their dynamic list functionality in a much better way with Panorama and include it as out-of-the-box functionality. Palo Alto supports the dynamic list functionality for some basic threats, but there is a lot of scope for improvement.

2021-04-19T16:17:19Z
author avatar
Top 5Real User

I haven't come across any issues with the product. Overall, it's been very positive. I don't recall missing any features. It's a fairly complete solution. The product could offer more integration with other solutions.

2021-03-29T20:35:51Z
author avatar
Top 5Real User

In our version, there is no feature to transfer or upload a database of third-party vulnerabilities or signatures so that Panorama can convert them into its own database. This kind of feature might already have come in version 10.

2020-12-22T13:42:17Z
author avatar
Top 5Real User

The product does need a bit of configuration. It's not quite ready to go out of the box. The solution could do a bit more with its security updates. Palo Alto in general could be a bit more secure. Support is pretty good, however, they could always be a bit faster and more responsive.

2020-12-11T19:18:06Z
author avatar
Top 5Real User

We found a vulnerability where when we have a low flow, like 2.7K, it is not getting fired by the threat prevention. That's something important to improve on. They should have a proxy or some solution to solve the issue. We also found some issues around decrypting the flow. When we have more flow than expected to decrypt, the performance goes down.

2020-12-11T05:12:11Z
author avatar
Top 5LeaderboardReal User

Aside from pricing, I don't have any issues with Panorama.

2020-12-08T16:53:44Z
author avatar
Top 5LeaderboardReal User

The notification and alerting system could be improved.

2020-11-09T16:54:26Z
author avatar
Top 10Real User

It's difficult to implement.

2020-10-29T21:40:00Z
author avatar
Top 5Real User

It should have more connection with Threat Intelligence Cloud. They can also include features related to SecOps and automation API.

2020-10-23T11:50:04Z
author avatar
Top 5Real User

I would like to have better analytics. The network traffic analysis (NTA) is something that you can add on to get more insight from the traffic passing through the firewall, and it should be included.

2020-10-06T06:57:41Z
author avatar
Top 5LeaderboardReal User

There are too many OS upgrades. We've had six new versions in the past six months. Even if they are updating it to fix bugs, it's hard to keep pace with the change when you have 800 or more Palo Alto devices that you now need to update and upgrade. We try to follow version minus one or two for security reasons. To keep pace with the changes, it takes us nearly six months as we have to check with the business, arrange downtime, and count and cover all devices. These upgrades aren't just little fixes either. Whenever there is a new release, it requires an OS upgrade. It would be nice if there was some automation on the upgrades of the devices. They need to do less bug-related releases and create versions that are stable for at least six months at a time. I don't find this issue in other solutions like Cisco, Check Point, FortiGate, or others. Those just provide a patch if there is a bug and we don't have to worry about downtime.

2020-09-29T05:58:30Z
author avatar
Top 5Real User

I would like to see Networks Panorama more integrated into the firewall solutions rather than being a separate component. This would be helpful so that we can do rule-based change management for the firewall through it as well.

2020-09-29T05:58:28Z
author avatar
Top 5Real User

The pricing should be reconsidered. It's too high right now. At times we have noticed that we get into issues where Panorama is going too slow or has other little problems. The performance can suffer occasionally.

2020-09-23T06:10:03Z
author avatar
Top 10Real User

Pricing is always something that consumers hope will be addressed in their favor. I think that some method of allowing for more customization and open integration with other controls within the enterprise is something that we want to have. We want to be able to have more orchestration of disparate parts. I think the features that most of the features that I would like to see are currently being implemented. Behavioral heuristic analysis of connections, for example. That is something that I know is being done now.

2020-09-16T08:18:00Z
author avatar
Top 10Real User

I'd like to see improvement in the speed and reliability of the solution. They're the two things most important to me right now.

2020-09-16T08:18:00Z
author avatar
Top 5LeaderboardReseller

I don't see many places to improve the solution. For us, it's working quite well. The solution should improve the speed at which they make changes on the system. Historically, they've been a bit slow in that respect. They should apply changes to the box quicker and more often.

2020-06-28T08:51:00Z
author avatar
MSP

I think the multitenancy of this solution can be improved. I would also like to see better management task automation for the trial environment. That is missing in this solution. In the next version, I would like to have more integration with the cloud and with the services delivered by Palo Alto. It isn't very task integrated at this stage. I would also like more dashboard management.

2019-09-05T05:37:00Z
author avatar
Consultant

The general customer feedback is when saving the configuration, it takes a long time. That needs to be fixed. The troubleshooting, the debugging part is also a little bit of a pain. It's not user-friendly on the interface to do our debugging when comparing it with other firewalls, like Forcepoint. It would be nice to have a real-time traffic monitoring console similar to Forcepoint firewalls where you can see in real-time instead of having to keep on refreshing, or maybe a command on the console where you are able to see the traffic. The solution needs to work on speeding up the committing time.

2019-08-30T04:51:00Z
author avatar
Real User

There is room for improvement in the integration within endpoint detection. They need to do some integration between endpoints and the firewalls. They also need to add a mobile version for product so we can access the interface easily.

2019-08-29T08:53:00Z
author avatar
Consultant

I have had some leakage issues before, but it was solved. I would, however like to see better integration with other products.

2019-08-26T06:42:00Z
author avatar
Real User

The dual WAN functionality is missing in this solution.

2019-08-25T05:17:00Z
author avatar
Real User

The solution needs to improve its pricing model. Panorama needs to work on its configuration issues. They should also focus on firewall management. Many clients have multiple firewalls, so Palo Alto should offer better management of them. They could model themselves off of AlgoSec, or maybe FireMon which are other very good firewall management tools.

2019-08-19T05:47:00Z
author avatar
Real User

It can take a few minutes to test to see if any changes are successful or not. This needs to be improved. A change commit should take a second, not a minute or more. Panorama does suffer from performance issues, which they need to resolve. Also, technical support isn't very responsive and could use some improvement.

2019-08-07T06:15:00Z
author avatar
Real User

My pain point is the automation process is not well-documented. There are some things that they could improve on there. If you go in the system to search for something, it is not intuitive. They could really improve that. There is a concept of device groups and a concept of templates. The templates can allow for inheritance, but the device groups do not.

2019-03-11T07:21:00Z
Learn what your peers think about Palo Alto Networks Panorama. Get advice and tips from experienced pros sharing their opinions. Updated: October 2021.
541,708 professionals have used our research since 2012.