Try our new research platform with insights from 80,000+ expert users
Vishal Giri - PeerSpot reviewer
Palo Alto Networks support, Co-Manage and Professional Services engineer / Consultant at a tech services company with 11-50 employees
Consultant
Top 20
Provides granular Zero Trust least privilege policy recommendations
Pros and Cons
  • "I like the threat information, and we can share the logging data with Cortex Data Lake."
  • "There can be more automation in terms of security and detection. It is already good."

What is our primary use case?

Our customers want to manage the security of their cameras and endpoints such as servers. If there is any malware or a security risk on a device such as a camera, they can monitor the IoT logs and just quarantine the device.

How has it helped my organization?

We have good visibility over the network and all devices that are connected with IoT Security. We have malware risk assessment and inventory information.

It provides granular Zero Trust least privilege policy recommendations. The coverage depends upon the customer's use and risk rating. If they have a high risk, the policy has to be created or changed accordingly. It depends upon the risk and the customer. Policy creation is 10% faster because of these recommendations.

Our customers get an inventory as well as information about all the threats and risks. It is very useful for operations. IoT devices are very critical for the operations of the company, and it makes operations easy.

It does risk assessment at the backend, and based on its threat intelligence, it gives us the threats.

It is fast and it gives proper results. It works properly. There has been about a 20% time savings.

What is most valuable?

I like the threat information, and we can share the logging data with Cortex Data Lake. If you have a Cortex subscription, you can integrate all logs with Cortex Data Lake. It is a good option, and it is very useful for all the customers. We recommend this integration with Cortex Data Lake to our customers for security.

The dashboard is good. I like the organization and navigation of the dashboard. They have an executive summary and information about security and inventory. They have put the thumbnails properly. That is a very good feature. I like the management aspect of the dashboard.

It is very easy to use. Palo Alto always provides good documentation. The configuration part is clearly explained in the Palo Alto documentation. There are no complications. It is very useful.

What needs improvement?

There can be more automation in terms of security and detection. It is already good. We have been using it only for a year, and it has been good. Over the next couple of years, we will get more details about what more they can implement into IoT Security.

Buyer's Guide
Palo Alto Networks IoT Security
October 2025
Learn what your peers think about Palo Alto Networks IoT Security. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
873,085 professionals have used our research since 2012.

For how long have I used the solution?

I have been working on Palo Alto support for the last five years, and I have been working with Palo Alto Networks IoT Security for the last one year.

What do I think about the stability of the solution?

It has only been a year. At this time, I would rate it a seven out of ten for stability.

What do I think about the scalability of the solution?

Its scalability is very good.

How are customer service and support?

I would rate their support an eight out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We have not used any other solution before.

How was the initial setup?

It is deployed on the cloud. Its deployment is straightforward. It is not complicated.

A new deployment takes about one week because we have to collect all the device information. It depends on the customer's requirements and environment. It depends on their network and how many devices they have, but usually, one week is enough for deployment.

What about the implementation team?

Me and my colleague work on the deployment. Most of our clients are medium enterprises. 

In terms of maintenance, we generally do not require any maintenance window. Only for a reinstallation, we need the maintenance window.

What other advice do I have?

I can recommend it to others. I do not know about other products or vendors, but when it comes to Palo Alto Networks IoT Security, there is good management of IoT devices. Palo Alto manages all the products perfectly.

It is not complicated. By referring to Palo Alto documentation, you can use the product very well. There are no complications. It will definitely protect all your devices.

I would rate Palo Alto Networks IoT Security an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
PramodhKumar - PeerSpot reviewer
Backup and Storage specialist at Bosch Global Software Technologies
Real User
Stable and scalable IoT security solution that provides easy access to engineers for support
Pros and Cons
  • "This solution has been most valuable for establishing a VPN and implementing allow/deny rules. It has also enabled us to create security policies. It is an easy solution to customise when it comes to creating templates and pulling reports."
  • "The reporting for this solution could be improved. The logs we receive are only saved for one week. We would like to have the database timeframe increased to a month or two for historical reporting as well as increased storage capabilities to support this data and reporting."

What is our primary use case?

We use this solution as a network firewall related to IoT. 

What is most valuable?

This solution has been most valuable for establishing a VPN and implementing allow/deny rules. It has also enabled us to create security policies. It is an easy solution to customise when it comes to creating templates and pulling reports. 

What needs improvement?

The reporting for this solution could be improved. The logs we receive are only saved for one week. We would like to have the database timeframe increased to a month or two for historical reporting as well as increased storage capabilities to support this data and reporting. 

For how long have I used the solution?

I have used this solution for more than three years. 

What do I think about the stability of the solution?

This is a stable solution. 

What do I think about the scalability of the solution?

This is a scalable solution. We have approximately 10,000 users that this solution supports. 

How are customer service and support?

We have received really good support from Palo Alto. It is easy to log a ticket and get hold of a Palo Alto engineer.

What other advice do I have?

I would rate this solution an eight out of ten. 

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Palo Alto Networks IoT Security
October 2025
Learn what your peers think about Palo Alto Networks IoT Security. Get advice and tips from experienced pros sharing their opinions. Updated: October 2025.
873,085 professionals have used our research since 2012.
Enterprise Security Architect at Nish Tech
Real User
Has comprehensive features but needs a more centralized information management system
Pros and Cons
  • "From a security standpoint, it provides a comprehensive range of standard security features that align with our requirements."
  • "It would be beneficial to have a more centralized and user-friendly platform that could consolidate all the necessary information, which proved challenging during the initial POC phase."

What is our primary use case?

We offer IoT devices for applications such as fleet management solutions. When developing these devices, we want to explore security tools that can safeguard these types of device management solutions.

What is most valuable?

From a security standpoint, it provides a comprehensive range of standard security features that align with our requirements. The IoT security tool we selected has a distinct advantage in terms of its feature set as it allows us to perform security scans on a per-device basis and obtain comprehensive results for all our devices.

What needs improvement?

It would be beneficial to have a more centralized and user-friendly platform that could consolidate all the necessary information, which proved challenging during the initial POC phase. We would rate the comprehensiveness and visibility as a four out of five because certain challenges need to be addressed and improved.

For how long have I used the solution?

I have been using it for a year now.

How was the initial setup?

The initial setup was a smooth experience and it only took us a day or two to complete it.

What about the implementation team?

We deployed approximately twenty devices solely for the purpose of the POC.

What other advice do I have?

Overall, I would rate it seven out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user