We performed a comparison between Juniper vSRX and Palo Alto Networks VM-Series based on real PeerSpot user reviews.Find out in this report how the two Firewalls solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
"I have integrated it for incidence response. If there is a security event, the Cisco firewall will automatically block the traffic, which is valuable."
"Cisco has the best documentation. You can easily find multiple documents by searching the web. Even a child can go online and find the required information."
"The initial setup was not complex."
"The user interface, the UI, is excellent on the solution."
"Cisco tech is always good and helpful. I would rate them as 10 out of 10."
"There are no issues that we are aware of. It does its job silently in the background."
"One of the most valuable features of Firepower 7.0 is the "live log" type feature called Unified Event Viewer. That view has been really good in helping me get to data faster, decreasing the amount of time it takes to find information, and allowing me to fix problems faster. I've found that to be incredibly valuable because it's a lot easier to get to some points of data now."
"The IP filter configuration for specific political and Static NAT has been most valuable."
"The most valuable features are application filtering, content filtering, the intrusion prevention system (IPS), and definitely the application firewall."
"The pricing is reasonable."
"It's basic functionality is probably the most valuable feature."
"This solution works well. Their switches and firewall are good."
"It is deployed on the customer site, and we manage the firewalls on this side."
"The hardware is stable."
"Using Palo Alto Networks Panorama, we were able to deploy a single point of management and visualization of the firewall infrastructure in cloud, on-premise and integrated with Azure to automate scale up. Its security features, i.e. anti-malware, threat prevention, URL Filtering, VPN, and antivirus are the most valuable. The ID-User integrated with AD and 2FA features are also very useful to provide secure access to servers and some users in the company. "
"Palo Alto’s Panorama centralized management system simplifies our security posture based on our requirements. Instead of manually pulling logs, then generating them into readable formats, it gives us the console in a readable format to view."
"With the improved visibility we now have, the traffic is being properly monitored, which means that we are better able to manage it. These are improvements that we saw very quickly."
"The initial setup was straightforward."
"Palo Alto Networks VM-Series is very easy to use."
"The most valuable feature is the CLI."
"The VM series has an advantage over the physical version because we are able to change the sources that the machine has, such as the amount of available RAM."
"The graphical interface should be improved to make the configuration easier, to do things with a single click."
"The initial setup was a bit complex. It wasn't a major challenge, but due to our requirements and network, it was not very straightforward but still easy enough."
"If they want to add better features to the current Cisco ASA, they can start by increasing the encryption. That is the only thing they need to improve."
"Third-party integrations could be improved."
"The reporting and other features are nice, but there is an issue with applying the configuration. That part needs some improvement."
"It would be great if some of the load times were faster."
"The maturity needs to be better."
"One area that could be improved is its logging functionality. Your logs are usually displayed on the screen, but if you want to go back one or two days, then you need another solution in place because those logs are overwritten within minutes."
"There are too many types of licenses, which can be confusing."
"The solution can be improved by allowing automatic updates for the OS devices."
"It is pretty complex to manage and could be easier."
"The GUI really needs a lot of work, and it has got worse with successive version updates."
"The reporting can be improved."
"Fortinet is more user friendly than Juniper. In terms of remote access, I actually prefer using Fortinet. It's much easier to configure."
"I would like to see an activity sensor for malicious content or sensor for viruses and malware."
"The web interface is very slow, and it needs to be faster."
"Integrative capabilities with other solutions should be addressed."
"We feel that the setup was complex. So, we asked the tech team about the setup process. They explained how to deploy it in the right way, which made it very simple."
"It would be helpful if we had a direct number for the support manager or the supporting engineer. That would be better than having to email every time because there would be less wait."
"The implementation should be simplified."
"At the beginning of the implementation, we had some difficulties with the scripts, but Palo Alto Networks support together with a local partner finally fixed it."
"It'll help if Palo Alto Networks provided better documentation."
The Cisco Secure Firewall portfolio delivers greater protections for your network against an increasingly evolving and complex set of threats. With Cisco, you’re investing in a foundation for security that is both agile and integrated- leading to the strongest security posture available today and tomorrow.
From your data center, branch offices, cloud environments, and everywhere in between, you can leverage the power of Cisco to turn your existing network infrastructure into an extension of your firewall solution, resulting in world class security controls everywhere you need them.
Investing in a Secure Firewall appliance today gives you robust protections against even the most sophisticated threats without compromising performance when inspecting encrypted traffic. Further, integrations with other Cisco and 3rd party solutions provides you with a broad and deep portfolio of security products, all working together to correlate previously disconnected events, eliminate noise, and stop threats faster.
The VM-Series is a virtualized form factor of our next-generation firewall that can be deployed in a range of private and public cloud computing environments based on technologies from VMware, Amazon Web Services, Microsoft, Citrix and KVM.
The VM-Series natively analyzes all traffic in a single pass to determine the application identity, the content within, and the user identity. These core elements of your business can then be used as integral components of your security policy, enabling you to improve your security efficacy through a positive control model and reduce your incident response time though complete visibility into applications across all ports.
In both private and public cloud environments, the VM-Series can be deployed as a perimeter gateway, an IPsec VPN termination point, and a segmentation gateway, protecting your workloads with application enablement and threat prevention policies.
Juniper vSRX is ranked 29th in Firewalls with 7 reviews while Palo Alto Networks VM-Series is ranked 18th in Firewalls with 7 reviews. Juniper vSRX is rated 7.0, while Palo Alto Networks VM-Series is rated 8.8. The top reviewer of Juniper vSRX writes "Good filtering capabilities, supports SSL inspection, helpful technical support". On the other hand, the top reviewer of Palo Alto Networks VM-Series writes "User-friendly interface, easy to monitor, and has a single pane of glass for reporting". Juniper vSRX is most compared with Juniper SRX, Azure Firewall, pfSense, Fortinet FortiGate-VM and Zscaler Cloud Firewall, whereas Palo Alto Networks VM-Series is most compared with Azure Firewall, Palo Alto Networks NG Firewalls, Fortinet FortiGate, Juniper SRX and OPNsense. See our Juniper vSRX vs. Palo Alto Networks VM-Series report.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.