We performed a comparison between OpenVPN Access Server and Prisma Access by Palo Alto Networks based on real PeerSpot user reviews.
Find out in this report how the two Enterprise Infrastructure VPN solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Its most valuable feature is that it is open source."
"OpenVPN Access Server is very stable."
"The product has strong encryption and scalability features. It provides security for private network connections."
"The initial setup was easy."
"I have found the stability to be good."
"I like that it's free."
"I have set the default routes to the VPN server so that all traffic is encrypted."
"The solution is secure and user-friendly."
"The solution improved the consistency of our security controls and the BCP. There has been a 20 percent reduction in TCO. Prisma Access also enabled us to deliver better applications by centralizing security management."
"The most valuable feature is the ability to change the gateway. For example, if there's a problem with a specific region or vendor, we can make modifications. The solution is scalable, and there are different gateways that can be created depending on the demand."
"We have an application called ADEM that helps us troubleshoot network-related issues. It helps us to isolate an issue whether it is on the ISP level, endpoint level, or system access level."
"It is geographically dispersed, and it sits on top of Google and AWS platforms. Therefore, you don't face the standard issues, such as latency or bandwidth issues, that you usually face in the case of on-prem data centers."
"Palo Alto Firewall is one of the best firewalls in the world."
"Overall, the cost savings, ease of deployment, and better VPN user experience and performance are valuable."
"Prisma helped us build a moat around our production systems. It's now impossible to log into our production from a non-MDM laptop. Prisma Access provides decent security overall."
"The most valuable feature of Prisma Cloud-native, in my opinion, is that it assists in identifying, analyzing, and remediating vulnerabilities."
"OpenVPN does not have the ability to selectively terminate connections."
"The stability of the solution could improve."
"The stability of the OpenVPN Access Server has room for improvement."
"The server configuration file needs to be improved, it's the biggest problem in the configuration process."
"The product’s connectivity is very slow. It could be faster."
"It could be faster. It could also be more stable."
"I'd like to have more control over the users when they are accessing the network."
"The interface could be a little bit better in future iterations."
"They can add some new characteristics. For example, when an incident triggers, they can automatically send a template for a particular match that is related to the policy. We don't have that right now. It is something to improve. There could be more automation for certain actions. For example, for a particular group, it can send an administrator alert to their manager. It was one of the concerns of our customers."
"When we deploy firewall rules via Panorama, we find it's a little bit slow. We have a global environment and might have 100 gateways or VPNs in the cloud. When we deploy something, it tries to deploy it one-by-one, and that can be slow."
"The documentation is generally good, but they could provide a more detailed description of all the configuration steps. I have to search for information or call support. Palo Alto could add more knowledge base articles about configuration with screenshots and walkthroughs. That would be helpful. When configuring a product, you want to see examples of how it is done."
"I would like the solution to support a different type of authentication. We can't configure a secondary method for our portal."
"The frequency of updates could be reduced."
"Palo Alto Prisma 10 came out over a year ago. Palo Alto added this identity management feature. The legacy way Palo Alto selected which user is sitting on an IP address it passes through has been clunky."
"The initial support team is not very good. Most of the time, I have found that they are one to three years experienced only. They don't have network expertise. They know about Palo Alto products but don't know how to troubleshoot the issues. We have to guide them most of the time to troubleshoot correctly since their approach is not developed."
"Sometimes, we encountered a portal crash. When we told Palo Alto they said it might be the browser or cache, but I think they need to improve it on their side."
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
OpenVPN Access Server is ranked 1st in Enterprise Infrastructure VPN with 27 reviews while Prisma Access by Palo Alto Networks is ranked 4th in Enterprise Infrastructure VPN with 27 reviews. OpenVPN Access Server is rated 8.2, while Prisma Access by Palo Alto Networks is rated 8.2. The top reviewer of OpenVPN Access Server writes "Stable, scalable, and easy to deploy". On the other hand, the top reviewer of Prisma Access by Palo Alto Networks writes "Makes us part of a bigger security ecosystem with updates taken care of for us, but pricing and support need work". OpenVPN Access Server is most compared with Fortinet FortiClient, Cisco AnyConnect Secure Mobility Client, Microsoft Azure VPN Gateway, Check Point Remote Access VPN and Sangfor EasyConnect, whereas Prisma Access by Palo Alto Networks is most compared with Netskope , Cisco Umbrella, Zscaler Private Access, Prisma SD-WAN and Microsoft Defender for Cloud Apps. See our OpenVPN Access Server vs. Prisma Access by Palo Alto Networks report.
See our list of best Enterprise Infrastructure VPN vendors.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.