Palo Alto Networks NG Firewalls Primary Use Case
We use three types of firewalls for comprehensive network security. Our perimeter firewall, a Palo Alto Networks NG Firewall, safeguards our network from external threats by controlling access at the network's edge.
View full review »VR
Venkatasubramanian Rajagopal
Director IT Infrastructure and Operations at a analyst firm with 51-200 employees
It was set up for VPN tunnels and inbound file access in my previous organization. We also had connections from our on-prem systems to any cloud systems, meaning Azure, AWS, or site-to-site VPNs.
View full review »Palo Alto Networks NG Firewalls are primarily used for perimeter security, typically deployed in pairs at most locations. Smaller sales offices often have just one, while larger facilities prioritize security with more firewalls due to their broader operational scope. These firewalls are also highly valuable in mixed environments where standardized security features are essential.
View full review »Buyer's Guide
Palo Alto Networks NG Firewalls
June 2025

Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
859,687 professionals have used our research since 2012.
AA
Ankar Aung
Student at a educational organization with 201-500 employees
In my previous company, we used Palo Alto Networks NG Firewalls for the government, specifically for the Security Operation Center (SOC). We used it not only for on-premises but also for the cloud infrastructure in AWS. Instead of using the cloud-native firewall, we implemented Palo Alto Networks NG Firewalls to inspect the traffic.
The version we work with varies based on the customer.
View full review »We use Palo Alto Networks Next-Generation Firewalls in our data center to manage security for both east-west and north-south traffic. These firewalls provide comprehensive protection for various traffic types, ensuring secure communication within the data center and between the data center and external networks.
View full review »SM
Senthil Kumar Manian
Director at Zuci Systems
The primary use case is enterprise-level security. Our organization utilizes Palo Alto Networks Next-Generation Firewalls for internal security measures, including SD-WAN and SSL authentication configurations to establish secure network connections through the firewall.
View full review »The primary use case for Palo Alto is to address traffic-related issues and manage configurations pushed from Panorama to Palo Alto Firewalls. Additionally, it handles GPU-related challenges, global protect, and IP internal problems.
Both FortiGate and Cisco firewalls process network traffic sequentially, meaning each packet passes through security engines, e.g., security profiles and URL filtering, one by one, which can be time-consuming. In contrast, Palo Alto Networks NG Firewalls utilize single-pass parallel processing. When a packet arrives on an interface, the firewall creates multiple copies and sends them to all relevant security engines simultaneously. This parallel approach significantly reduces processing time and increases overall efficiency.
View full review »We use Palo Alto firewalls to secure the enterprise network and connect our branch offices with our data centers.
View full review »IP
IgorPinter
Director at PULSEC
For Palo Alto Networks NG Firewalls, clients mostly use this as a ZTNA solution, so it works as a perimeter firewall combined with ZTNA for external access and all other related functions.
View full review »VL
Valentyn Lytvynov
IP / Operations Support System Engineer; Pre-Sales Engineer at Avantguard.it
In our country, there are multiple use cases. Usually, it is for virtual cases or virtual environments and source areas.
View full review »MK
Mihilesh Kumar
Specialists - IT Operations Services at Coforge Growth Agency
I mainly use Palo Alto Networks NG Firewalls as the firewall device, and I deploy it at the perimeter of the networks to secure our infrastructure.
By implementing Palo Alto Networks NG Firewalls, we mainly wanted web security and protection from DDoS and other attacks. We also wanted to provide a VPN solution so that mobile users could work from anywhere.
View full review »Palo Alto Networks NG Firewalls are our perimeter firewalls that protect the network from external attackers. They provide visibility into network activity, from layer four to layer seven, including application visibility, user awareness, and content awareness. These features are crucial for any network and organization, regardless of size, whether it's 20 users or two million users – they all need a firewall.
View full review »OF
OtokarFio
Presales Engineer at Vodafone
I use Palo Alto Networks NG Firewalls as a perimeter firewall for VPN accesses to secure data centers and complex networks, involving multiple sites connecting through a single point to the internet. At that point, I set up the security for all sites.
View full review »
SM
Senthil Kumar Manian
Sr. Manager - Systems & Networks at Aspire Systems
We use Palo Alto Networks NG Firewalls for visibility and protection of our network.
View full review »We implemented Palo Alto Networks NG Firewalls as our intrusion prevention system to filter layer seven traffic and perform SSL inspection through deep packet inspection at the application layer.
We use Palo Alto Networks NG Firewalls for layer three packet filtering of east-west and north-south traffic and layer seven filtering through web filtering.
View full review »We are managing services for our customers. I am mostly dedicated to Palo Alto.
I have had a very good experience with Palo Alto firewalls and Panorama. We have used Palo Alto firewalls for multiple use cases. We have used them at the perimeter as well as in the data center. I have experience in 5000 series, 7000 series, and 3000 series. I have worked with most of them.
View full review »I have used it in a couple of different ways. One way was to use it as a perimeter device and to act like a traditional firewall for controlling the traffic in and out of the network and doing intrusion detection. It was more of a filtering-type device for remote access and VPNs.
At another job, we used it as a site-to-site VPN. We scanned customer applications and code over a site-to-site VPN. These were the two main use cases that I have done over the last eight years with Palo Alto.
View full review »I am using it primarily for on-premise network protection.
View full review »JN
Jeremiah Ngure
Technical Services Lead at Telenet Solutions
We partner with vendors primarily to foster better understanding and relationships. Our core business is system integration, where we cater to diverse customer requirements. A customer might approach us with a specific need, and we deliver. A product like Palo Alto's XDR or EDR endpoint protection is popular due to its features, but ultimately, the choice depends on individual customer requirements, including extra services or integrations. We currently have around six customers using Palo Alto.
Aside from the usual content filtering and application filtering, the primary driving force for Palo Alto Networks NG Firewalls has been the SD-WAN. Additionally, ADR has also been a significant factor. All our clients also use Palo Alto as their firewall solution.
I primarily help users migrate from traditional firewalls to Palo Alto NG Firewalls. This involves troubleshooting, assisting with application control and backup configuration, and teaching users how to optimize the firewall for their needs. Additionally, I guide users through the process of redesigning their firewalls and migrating their servers, which often includes helping them understand and manage the vast number of applications they have. Sometimes, the firewall cannot identify specific applications, requiring customization to ensure accurate recognition and security. Currently, I am working on a management query language, which involves collaborating with other teams to assess the necessity of specific applications and connections between the firewall and various assets. This ensures optimal security and network efficiency.
We primarily use Palo Alto Networks NG Firewalls for a DMZ firewall. Its primary function is to separate our network into four layers: a DMZ zone for all publishing services, an internal zone for internal user access to publishing services, a zone for terminating connections between VPN consultants and internal services, and a zone for Internet access.
We implemented Palo Alto Networks NG Firewalls to secure our network and control access using filtering and application control. We also use Palo Alto WildFire for vulnerability scanning.
We have Palo Alto Networks NG Firewalls deployed on the cloud and on-prem.
View full review »As a reseller, our primary customers utilizing Palo Alto Networks NG Firewalls are in the financial services, government, and manufacturing sectors. They select Palo Alto Networks NG Firewalls due to their superior performance and security capabilities compared to alternative firewall solutions.
View full review »On certain levels, it protects our information. Luckily, I had switched to Palo Alto as our VPN solution for our users. We finished that in December of 2019, just in time for COVID to hit. We had a system that was able to support 650 to 700 users remoting into our campus through the VPN. This was a huge use case for us, as it was not intended to be the solution for COVID, but it turned out to be the solution for COVID. So, it was a great use case. Obviously, we want to protect our servers, virtual servers in the cloud, and on-prem.
We have the eighth fastest supercomputer in the world. Unfortunately, we don't get to protect that because it has so much data going through it, i.e., petabytes a day. There isn't a firewall that can keep up with it. We just created a science DMZ for that kind of stuff as well as large data movers since we do weather data for the world. We research the ocean, sky, and solar weather. We have 104 universities who work with us around the world. Therefore, we need to have data available for all of them. We need to be protected as much as we can.
We started with Palo Alto 5060, then the 3060 came in, which was the next form. We have now switched to an HA system and have four firewalls as our base: a pair of 5220s and a pair of 5250s. We have been running the different OSs from PAN-OS 8.0, 8.1, 9.0, 9.1, and then 10.1. We are about to move to 10.2. We are in the process of doing that over the next week. We like to stay on the cutting edge because they are always adding more features and security.
We have it deployed in a number of different ways. We have our four main firewalls, which have two high availability pairs. One is set primarily for users and outward-facing functions. Therefore, our DMZ servers, staff, and guest networks are on one pair of firewalls. Back behind the scenes, labs and our HR department are on a separate set of firewalls. We call them: untrust and trust. Then, we have another set of firewalls, both in our Wyoming supercomputing center and in our Boulder main campus, which runs a specific program that has a DOD contract that requires more security, so they have their own set of firewalls. We also have firewalls in Azure Cloud for our tests and production environments. I am in the process of purchasing another VM firewall to put on the AWS Cloud. The last set that we have is at our Mauna Loa Solar Observatory, where we have an HA pair of just 800s because we only have a one gig radio link down the side of the volcano to the University of Hawaii.
We have between 1,200 and 1400 staff at any given time. Essentially all of them use the solution one way or another, either to access systems or through the VPN. We also have remote users who aren't employees but instead collaborators, and they can be anywhere in the world and remote into our systems. We then have people who are doing PhD programs at universities around the world who need to get into our systems to download data sets as part of their PhD or Master's program. Thus, the solution is not limited to our employees.
View full review »We have implemented peripheral firewalls and micro-segmentation within our LAN network. To further segment our data center, we have deployed firewalls in the middle of the network. Additionally, we utilize Palo Alto Networks NG Firewalls in our GCP environment for various use cases, including URL filtering, URP, file blocking, and threat prevention.
View full review »We provide localization services and use Palo Alto Networks NG Firewalls to protect our environment.
We have two on-premises Palo Alto Networks NG Firewalls that are managed in the cloud.
View full review »NG Firewalls form the edge between customers' networks and the internet. They often provide load balancing to multiple internet providers. In most cases, people use NG Firewalls for more than just a basic firewall function.
The intrusion detection and prevention feature is usually the most significant piece that people want because it provides layers of protection against malware, ransomware, and things of that nature.
View full review »IS
Ibrahim Sherif
IT System Administrator at Bouri
We're using Palo Alto Networks NG Firewalls as a backup hardware solution. When the main firewalls have an issue, we're using the backup solution and hardware firewalls to avoid any network issues or prolonged downtime.
View full review »We use the solution for all the capabilities that the firewall offers, including proxy filtering, VPN connection, and Next-Gen firewall capability. We integrate the solution with clients that use ExpressRoute, which is a very common and popular service in Australia. We route all our client's local traffic, 10.x, and the client's Class B public address traffic all into Palo Alto Networks NG Firewalls. We use the solution to provide hub and spoke integration, web filtering, and for VPN.
The solution is a fully managed centralized firewall service for both public and private traffic, including on-prem traffic and Azure traffic.
View full review »In most cases, our use cases were for migration and conversions. People were coming off of dated Cisco platforms and other types of firewall technologies that might not have met next-generation standards, like App-ID. Then, Palo Alto Unit 42 had to go out there and investigate with threat hunters, etc, which was not that well-known or used. Then, Palo Alto sort of showed everybody that world back in 2007 or 2008.
Mostly, I was dealing with people migrating off of their platforms onto Palo Alto. Unfortunately, in most cases, they wound up just converting them into service-based firewalls, like what they were already using, because they weren't ready to accept the requirements behind actually creating an effective App-ID policy yet for their company.
It wasn't well adopted at first. Even though everybody wanted it, people were putting it in and not really fully deploying it. Once I started working for Palo Alto, we had a whole lot more control over getting people to actually utilize the technology, like it was meant to be used. Mostly, it was going in as a service-based firewall with some App-ID. However, people weren't really taking advantage of the SSL decryption and other things necessary to truly utilize the firewall effectively.
I have an active customer who has 600 users using Palo Alto. I have another active customer with 300 users using Palo Alto.
View full review »We use Palo Alto Networks NG Firewalls in our offices and data centers.
View full review »Palo Alto is used as our organization's perimeter firewall. In fact, it is our data center. We use it to protect our perimeter level. The model that we use is the PA-5020, which is a bare metal device.
I currently work in ISP operations, where we host DNS servers for customers and also have a few AAA servers for broadband authentication. In Sri Lanka, there are ADSL customers and broadband customers, who authenticate against our AAA service. Additionally, we also protect our internal members using Palo Alto firewalls.
View full review »We are using PA-820. This Palo Alto series is being used in our separate branch office. We are managing surveillance and internet activities with this Next-Generation security firewall. We are using the UTM features and running best security practices through this firewall. Moreover, VPNs and other remote access security features are being implemented in our environment with this firewall.
View full review »On-premises, we used Cisco but replaced our core firewall world with Palo Alto because we wanted more visibility. Plus, we were looking for features such as IPS for PCI compliance. We wanted next-generation capability, but we had the ASA traditional firewall with Cisco, which doesn't do much, so we replaced it with Palo Alto.
In the cloud, we use Palo Alto for the zero trust implementation. Initially, we tried to work with the Azure firewall, but we found a lot of limitations in terms of visibility. It couldn't provide us with the same visibility we wanted for Layer 4 and above.
The solution is deployed both on cloud and on-premises. The cloud provider is Azure.
We have about 6,500 endpoints in my organization and five administrators.
View full review »Some of my customers have Palo Alto firewalls, and the use cases include security policies, VPN connections, remote access, side-to-side VPN, and some user ID functionality. To solve these problems, I usually use the web UI monitor, system logs, end capture, CLI, etc.
We don't have large-scale implementations in Poland as you'd find in Western Europe, but last year I did a big Palo Alto project with 20 Next-Generation firewalls and it was a success. We deployed eighteen PA 800 CVS firewalls for branch offices and a PA 52 series and NPA 5200 series at the data center. It was a high-availability model. The project was a migration from previously used Palo Alto firewalls, including the PA 500, 3000 series, PA 800 series, and PA 32 series. About 95 percent of our firewalls are on-premises, but some customers in Poland want to move to cloud solutions like Prisma Cloud.
View full review »AG
Adarsh Gopakumar
Manager at a tech services company with 51-200 employees
We use the solution to filter out the traffic from our internal networks, not a public-facing network.
View full review »We use Palo Alto Networks Next-Generation Firewalls daily to create firewall rules that permit network traffic for specific applications and end users.
We use various models, including the 800, 400, and 3200 series. The specific model required depends on the size of the remote site where it will be deployed.
View full review »We are a consulting group that specializes in deploying Palo Alto Networks NG Firewalls for a telecom-related partner in Pakistan. Additionally, we implemented global protection for remote users. Furthermore, we configured different policies for internal users based on their job designations and privileges, such as URL filtering and application controls.
Our primary use for the solution is as a perimeter device and firewall.
View full review »It is on-prem. We wanted to implement a multiple architecture for our network security. That is why we looked at the Palo Alto product. It is famous for its multi-layer security architecture and firewall.
There are five users: two senior expert administrators and one junior administrator from our data center team and two security engineers from our security team.
View full review »We use the solution for IPS. Palo Alto's firewall is really good compared to firewalls like FortiGate, Cisco, or any other competitor.
We're able to monitor traffic based on the source destination and geolocation. The firewall allows us to restrict user access. For example, we have restricted user access to the chat feature on Facebook.
There are about 170 total users on the client side. On the administrative side, we have two or three people.
We're using version PA-200. The solution is deployed on-premises.
View full review »I'm working in a company that focuses on giving support to different enterprise companies. We help customers with a virtual environment as well as on-prem firewalls.
Before the COVID situation, most of the firewalls were on-prem firewalls, and during the pandemic, there were a lot of problems trying to deliver the firewalls and put them in place. It was taking a lot of time. So, most of the customers have taken a virtual approach for that. A lot of customers with on-prem firewalls are going for a virtual approach.
We are using the most recent version of it.
View full review »We use it for perimeter security because it gives application layer security and we also use it for VPN access.
We use the PA-3200 and PA-200 models. In terms of the version, we are one version behind the latest one. The latest version is 11, and we are still on version 10.
View full review »We have multiple offices across the United States. Palo Alto Networks NG Firewalls is the best solution for securing our network, and the best part is that we can provide a single working solution.
We use these firewalls to manage wastewater systems for over a hundred municipalities across the country. As a result, we exclusively use them in the operational technology (OT) space.
View full review »GT
Geo Thomas
Network Security Engineer at Diyar United Company
I have deployed it as my internal firewall in the cloud. I also have it on-premises as my perimeter firewall. I am also running Palo Alto in my DMZ.
I'm using the PA-5532 Series. We have cloud and on-premises deployments. The cloud deployment is on the Azure public cloud.
View full review »AA
Arturo Aguilar
Specialized Engineering Services at Netcontroll
Generally, it is used for the main function of the firewall. It protects the applications and the servers of clients from attacks. We use it as a perimeter firewall for the traffic from the internet, and it is also being used because one of the customers needed a solution for PCI compliance. We have put the firewall between servers inside the network to do segmentation. So, with the firewalls, specific communication is open between the clients and the servers, between the servers, and between the servers, applications, and the database.
We have PA-5000 and PA-850 series firewalls. In terms of the version, we are using version 9.1, which is not the most recent version. It is the previous one. We manage all firewalls from Panorama.
View full review »These are gateway firewalls to the Internet for every site. At a majority of the sites, we use the firewall as our gateway for the network below.
Previously, we used them just for the Internet firewall and Internet security side. However, in the last year or two, we have started to migrate them as the gateway routers, e.g., as gateways for the networks below. They are doing Internet firewalling as well as firewalling for the networks below.
We are using the PA-220s, PA-440s, PA-820s, PA-3250s, and PA-5250s. We are using all of those hardware models. Then, we are running the PAN-OS 10.1.3 on those.
We have around 40 locations worldwide. At minimum, we have one Palo Alto Networks NG Firewall at each location. At some of the larger sites, we have two Palo Alto Networks NG Firewalls in HA configuration. Then, at our headquarters and disaster recovery site, we have two at each site.
View full review »TI
Tijoy CI
Senior Network Security Engineer at a tech services company with 51-200 employees
We use the solution to access clients.
View full review »BR
Brijesh Rajput
Cybersecurity architect at a consultancy with 10,001+ employees
We use Palo Alto Networks NG Firewalls for our network security. We deployed the solution on both the cloud and on-prem.
View full review »We use this solution as our external firewall and VPN.
View full review »We started using this solution as a basic firewall, and then, we ended up with URL filtering, IPS, and decryption.
View full review »We used the solution as an edge or internet firewall where we were running IPS/IDS and doing filtering on it, apart from the other security features. We are still using it for our users' VPN activity and to manage site-to-site VPN tunnels with other clouds, like AWS and Azure, so that there is connectivity back and forth between those cloud providers and our on-prem data center.
View full review »I design networks for our customers; I always use a high-speed packet filter upfront because I work for a Juniper partner company. This is usually a Juniper SRX series firewall and it does most of the easy work. Behind that, I add a more intelligent firewall, Palo Alto NGFW. We are partnered with Palo Alto, but that's not the main reason we use their solution. I worked with Check Point products for four years, and the Palo Alto alternative seriously impressed me. Here in Hungary, Palo Alto is considered the de facto intelligent firewall, for good reason.
I work for an integrator and support company, and I support our customer's security platforms; we have many customers with Palo Alto Networks NG Firewalls.
View full review »GH
Gerry Hicks
CyberSecurity Network Engineer at a university with 5,001-10,000 employees
We're slowly migrating our on-premises solutions to the cloud. We implemented the next largest size VM for the PA-7050s because we're using 7050s on-premises, due to the bandwidth requirement of 100 GBS.
After changing our firewalls to 7050s last year and this year, both our internal firewalls and our border firewalls are 7050s.
View full review »It is a data center firewall solution and a centralized management for remote office firewall solutions. We have 30-odd remote offices where we are putting firewalls in to replace the standard routers that we used to have. This solution will give us a little bit of routing and firewall capabilities.
We are deploying the PA-440 Series in our remote offices.
View full review »The solution is to provide protection for our cloud-based server resources.
View full review »We use Palo Alto Networks NG Firewalls to protect our end-to-end environment.
View full review »We protect certain applications in the data center with Palo Alto Networks NG Firewalls.
View full review »We use the solution to protect our internal network from external threats.
Up until recently we were not using multilayer firewalls and were using several solutions that are combined in Palo Alto Networks NG Firewalls.
View full review »We use the solution as a firewall for our network. We can manage our traffic between internal traffic and external traffic handling. The solution protects the traffic and we manage the standard firewall issues.
View full review »We use Palo Alto Networks NG Firewalls to protect small businesses that work within the defense industrial base.
View full review »We have had use cases for defending our resources against external access or authenticating particular traffic or appropriate traffic for access.
View full review »We use Palo Alto Networks NG Firewalls for cybersecurity and network security for our infrastructure for our districts, worldwide.
View full review »For security purposes, we use Palo Alto Networks NG Firewalls for both the edge and data center.
View full review »We use the solution to protect our network environment. We use three versions: 230, 440, and 820.
View full review »We use this solution for perimeter security and security profile purposes. This covers anti-virus and anti-spyware, as well as cyber security vulnerabilities through URL and file blocking.
We use it to see and detect malware. It is also used for antivirus, anti-spyware, anti-malware, vulnerability, and Wildfire analysis. We support different kinds of authentication as well: Kerberos, LDAP, TACACS, and SAML. All in all, it is a security device that you can have anywhere on your network, as per the design considerations.
It is deployed in two different ways, either on-premises or on the cloud, which may require a different hypervisor.
View full review »I use Palo Alto Networks NG Firewalls to handle my perimeter security, which is the most critical point of my network.
View full review »QV
Quoc Vo
Director Of Technology at La Jolla Country Day School
We basically use it to protect our network from various malicious activities out there. We have two subscriptions. We have the WildFire subscription, which is similar to DNS filtering. We also have Threat Protection, which allows the firewall to inspect traffic up to Layer 7. It inspects applications as well as unknown applications, quarantining and stopping things. So, you are not always chasing, "What applications should I be running on this device?" It does a good job of all of that. The management of it is a little tricky, but that is how it goes.
We are running the PA-3250s. We have two of them. They operate in Active/Passive mode. Therefore, if one fails, then the other one takes over.
View full review »AA
Alaa Amro.
IT engineer at a financial services firm with 201-500 employees
We use Palo Alto Networks NG Firewalls as a gateway for our data center and server files because they are a reliable and robust device, and the best in the security field. We also use their threat intelligence and threat protection services, which are like brass fittings.
View full review »We use this solution to protect the perimeter and use it as a proxy for the servers.
We have the firewalls installed in our data center at present and are planning to put them in the corporate and branch offices as well.
View full review »We use Palo Alto Networks NG Firewalls for security purposes and to mitigate risk.
View full review »We use Palo Alto Networks NG Firewalls for segmentation and basic routing. They are the gatekeepers for the network.
View full review »We deployed Palo Alto Networks NG Firewalls for inbound and outbound protection, as well as DMC protection, in our data center.
View full review »As a Security Engineer, I use this solution for protection. I put in additional rules and also use the solution for forensic investigations and to look at traffic logs.
View full review »We mainly use the solution for traditional firewall boundaries.
View full review »We are resellers. We're testing this solution in our network and learning about the scalability, how to set up the firewall, and the rules. It's a layer 7 firewall, so we want to know about the capabilities and detection.
The solution is deployed on-premises.
View full review »Almost all of my deployments are regulated to each firewall perimeter or as a data center firewall. The perimeter firewalls are deployed to control the user traffic and establish IPv6 VPN connections between a company's headquarter and its branches. This solution comes with threat prevention and URL filtering licenses for perimeter deployment. For data center deployments, the solution is deployed as a second layer of protection for the network traffic, especially for VLANs. It also prevents lateral movement of network attacks.
Almost all of my deployments in the Middle East are deployed on-prem. There is no acceptance of cloud solutions, especially for government and banking rules.
We use Palo Alto Networks NG Firewalls as internet firewalls, LAN or WAN firewalls, as well as data center firewalls.
View full review »We have deployed Palo Alto Networks NG Firewalls and every web filter security available. So, we came to know each website user who got blocked and the "not required" categories. These categories are permanently blocked, and if any changes are required in these categories, we will first get approval from management.
ES
Eric Steidle
Network Analyst at a recreational facilities/services company with 1,001-5,000 employees
It is our main Internet firewall. It is used a lot for remote access users. We also use the site-to-site VPN instance of it, i.e., LSVPN. It is pretty much running everything. We have WildFire in the cloud, content filtering, and antivirus. It has pretty much all the features enabled.
We have a couple of virtual instances running in Azure to firewall our data center. Predominantly, it is all physical hardware.
I am part of the network team who does some work on Palo Alto Networks. There is actually a cybersecurity team who kind of controls the reins of it and does all the security configuration. I am not the administrator/manager in charge of the group that has the appliance.
View full review »RC
Qiwei Chen
Security Team Technical Manager at ECCOM Network System Co., Ltd.
The solution is more towards the front of the security stack.
We use both AWS and Alibaba Cloud.
View full review »We use it to segregate traffic between different tenant instances and to manage secure access to environments, DMZ zones, and to communicate what the firewall is doing.
View full review »AV
Andriy Voitynskyi
CAO at Bank "LVIV"
Our primary use case is protecting our clients from remote threats on the internet. These firewalls are very powerful and important for our business.
View full review »Our primary use case is to provide our clients with an internet gateway.
View full review »We use it for our edge firewalls and our east-west and north-south traffic for our firewalls. We have also deployed each firewall to every site for our Layer 3 connections back to our data center.
View full review »NP
Nilson Primo
Head of Engineering at a tech services company with 11-50 employees
We have clients in the government and supermarkets, for example, who use this firewall for integration with EDR, NDR, CN, and IPS.
View full review »Our use cases include combining multiple next-gen firewalls and bringing them into the Panorama centralized platform.
View full review »We chose Palo Alto Networks NG Firewalls to replace our outdated firewalls.
View full review »Palo Alto Networks NG Firewalls are being used for cloud security in our organization. Along with that, we have implemented SD-WAN, secure access, and XDR. These are the primary firewalls that we have in place.
Essentially, we have almost all of their products across their three suites.
View full review »I use NG Firewalls for perimeter defense.
View full review »KP
KumarPranay
Solutions Architect at HCL Technologies
We are using it for network layer protection. And we have added all the Layer 7 protection there is, such as sinkhole protection and spyware and adware detection.
We use them to do quite a bit of URL filtering, threat prevention, and we also use GlobalProtect. And application visibility is huge for us. Rather than having to do port-based firewalling, we're able to take it to an application level.
View full review »AH
ASHRAF ALI HASSAN
Senior Manager Network Design at MEEZA, Managed IT Services Provider
We use this firewall to segment our network into two parts and control traffic between them, providing a secure and efficient way to manage our network.
View full review »We use Palo Alto Networks NG Firewalls for our gateway security.
View full review »We use Palo Alto Networks NG Firewalls mostly for firewalls.
View full review »We're partners. Essentially, we take all the Palo Alto firewall policy information and all the device information, and we put it on a single pane of glass for them.
View full review »We use Palo Alto as our perimeter firewall. We also use the GlobalProtect VPN solution.
View full review »I am a customer of Palo Alto Networks. If any issue arises, I raise a ticket with Palo Alto.
View full review »We use Palo Alto Networks NG Firewalls with Prisma and cloud environments.
View full review »TH
Tirut Hawoldar
Manager IT Security & Infrastructure at Currimjee Jeewanjee & Co. Ltd.
We have implemented our own private cloud where we host different services for a number of internal companies that are part of a group. We have financial companies, hospitality, and construction companies; a large variety. We use Palo Alto to provide security protection for all these companies.
View full review »We use it as an Internet-facing parameter firewall. In my environment, it has security and routing. It is on a critical path in terms of routing, where it does a deep inspection, etc.
View full review »MG
Reviewer32052
Presales Specialist at a tech services company with 1-10 employees
We have had a couple of big projects with government companies here in Ukraine. One of those projects involved three data centers with a lot of security and network requirements, and we implemented Palo Alto as part of this project.
The use case was to build the new data centers with a firewall that would not only work on the perimeter but also for internal traffic. We deployed eight PA-5200 Series firewalls and integrated them with VMware NSX, and they're working together.
View full review »We use Palo Alto Networks NG Firewalls to manage the villains. Basically, to protect the environment.
View full review »IK
IIan Kogan
Security team leader at a aerospace/defense firm with 10,001+ employees
We deployed the Palo Alto Next Generation Firewall on the perimeter of the network, so all traffic that flows to the company from the internet and from the company to the internet scanned by the Palo Alto Networks Firewall. In addition, all of the internal traffic from LAN users to services that are on the DMZ zone traverse the Palo Alto Firewall.
View full review »AM
Asad Mukhtar
Information Security Specialist at UAEU
We are basically using a double protection layer in which we take care of all our DMV, VPN, tunnels, and internal network. We are basically using it for application based configuration controlling our traffic on applications with layers four to seven. We are customers of Palo Alto and I'm an information security specialist.
We primarily use Palo Alto Networks NG Firewalls as Foundry Network devices, but we also use them to filter internal network traffic.
View full review »GS
Georges Samaha
Security Consultant at a tech services company with 501-1,000 employees
We primarily use the solution as a datacenter firewall for 0 trust security model
View full review »SM
Sarvajith Mony
Technical Manager at PSR
It is used for protection against attacks and it is very fast and reliable. We have a lot of use cases for it.
View full review »We use this solution as our central firewall, but not as a perimeter firewall. For our perimeter, we use another solution.
Our organization consists of roughly 2,000 to 3,000 employees.
View full review »Basically, it is for protection and security. We are using it to make sure that our network is as secure as possible. We are able to evaluate each stack in each pocket and take certain actions as needed when we look into some of the content of the payload.
We have on-prem deployments, and we also have SaaS-based services.
View full review »MV
Maksim Vedernikov
Quality engineer of the 1st category at Modern Expo
We have two 3000 Series Firewalls placed in our primary location. We have two sites and the secondary site uses the primary site for internet access. All traffic to the secondary location goes through a VPN tunnel. I'm a network administrator.
View full review »We are working on creating security policies on the firewall. We have just put GlobalProtect VPN in our company. We also have Prisma Access.
We have on-prem and hybrid cloud deployments.
View full review »We plan to continue using this solution. Within our organization, there are roughly 1,000 employees using this solution.
View full review »JC
Jon Cole
Network Manager at a financial services firm with 1,001-5,000 employees
It is our edge appliance. We use it for our edge security, and we also use it for our VPN termination.
We're using an old version of this solution. At this moment, I'm looking at migrating away from Palo Alto.
View full review »We're basically an MSSP service provider. We use this solution as a network firewall for URL filtering, IPS, and IDS proxy services.
View full review »In manufacture, we use this solution as a firewall and an internal gateway. Additionally, we use it for traffic control which keeps strategic traffic separate from production traffic.
We primarily use the product for web browsing and in order to protect some sites that we are publishing to the web internet.
View full review »We use it for LAN users, internet access, and more. The NG Firewall has many functions like user control, access control for servers, natural controls based on applications, schedules, ports, RTs, and IPS functionality with antivirus or security functionality. We also use it to control internet access, traffic shaping for bandwidth control, and fraud prevention.
View full review »We mainly use it for perimeter protection between the internet and the local network. We are using it for application control. We exploit the applications with some policies about how the network traffic is going to be from the local LAN to the external network and vice versa. We are protecting our network from outsiders and stopping them from getting into the network.
View full review »Normally, we use our firewall at the perimeter level. We are using Palo Alto Networks NG Firewalls as a firewall as well as using a few of their functionalities like the Vulnerability Protection, its IPS module. Additionally, we have remote VPN's on those firewalls, like GlobalProtect. So we are using all the features which are provided by Palo Alto.
View full review »The solution is typically used for antivirus and antimalware purposes, to help protect an organization against attacks.
View full review »We primarily use the solution for our internal network.
View full review »JH
Jan Hammer
Marine Consultant/Captain/Senior DPO at Jan Arild Hammer
We use it to control what users may access internally and externally, which covers everything. We are using its latest version. The model that we are using is 3220.
View full review »The solution can be used in the data center it can be used as perimeter firewalls and gateways as well. It can be used anywhere. From the systems side, the data center side, or I typically recommend that it be deployed in a VM, as it may be able to see the internet traffic and specifically it would basically look into the details of a virtualized environment as well.
Our primary use case is for the perimeter connection of our clients in the network. Our client brings their services to their clients, and they have the option to connect to a webpage. With Palo Alto Networks NG Firewalls they can safely provide a username and password to their clients.
It is mainly on-premise, because the majority of the clients at this point want that kind of option. But many of them are already asking for the cloud option, like Prisma, for example.
MM
MIhajlo MItev
System Administrator at a mining and metals company with 51-200 employees
We use it as a firewall. We have VPN, IPSec, or site-to-site VPN. We also protect our few internal web services.
View full review »We are using this solution for IDS, IPS, and VPN services.
Also, we are using it for gateway purposes. The development team accesses the data center, and the file intrusion prevention policy.
View full review »We deploy and provide support for this solution to our customers. The use case depends on customer requirements because Palo Alto Next Generation Firewall can be used as a data center firewall, perimeter firewall or on the cloud for a perimeter firewall or used with communications. Some customers use it for global protect connectivity. I am a senior network engineer and we are partners with Palo Alto Networks.
View full review »We use both the NG and VM series of Palo Alto firewalls. We sell and install them for clients to provide the best security that money can buy. Additionally, adding SD WAN on the same edge device has made an all-in-one, security-edge-intelligent routing solution possible without sacrificing performance or a secure environment.
View full review »KH
Kenichi Harada
Assistant Manager at Net One Systems
Our primary use case was to configure our PSAs for our customized configuration.
View full review »We use this firewall as part of our overall security solution. It is used to protect our perimeter on the internet side. We have the on-premises version installed for our offices and the cloud-based version for our cloud offerings. For our cloud setup, we use both Azure and AWS.
View full review »MG
Mark Gleghorn
President at MT-Data
We primarily use the solution for the firewalls. We're also using the next-gen features to shape what's going on. For example, to figure out what is allowed out and what isn't allowed out on a layer-7 application-aware firewall. We can block based on the application, as opposed to port access.
View full review »MS
Mahmoud Salaheldin
Security Unit Manager at EEMC
Upstream and data center NGFW.
View full review »JS
Jonny Su
IS&S Europe and Global Infrastructure Manager at a manufacturing company with 10,001+ employees
We use this solution as a firewall. We use it for VPN setup, threat protection, and for internet breakout also. We actually deploy several different versions. We have a TA200, a PA820, and a PA3200 series.
View full review »GB
Gopinath B
Associate cloud system admin at Innocap
We use the solution to secure our Internet traffic and the application traffic from the Internet.
There is also no need to connect to a VPN most of the time.
View full review »An NG firewall provides an additional level of network security and vigilance. It also helps us manage activities using privileges and a zero-trust approach.
View full review »Our main use of this solution is to create micro segmentations only in the public cloud, and use the data we receive to see threats passing through the Vnets.
I am a reseller of Palo Alto Networks.
View full review »These firewalls are only used for perimeter purposes, in gateway mode.
View full review »I am using the solution for protecting the network organization from threats.
View full review »We use this solution to protect our network.
View full review »We are using it for data center protection, intrasystem security, endpoints protection, load balancing, and DHCP.
View full review »ST
Swapnil Talegaonkar
Technology consultant at a tech services company with 501-1,000 employees
Our primary use case of the Palo Alto firewall is to control incoming and outgoing traffic as the firewall is deployed at the perimeter. Also we have used a VPN in that device so remote users can access the internal networks. We are partners with Palo Alto and I'm from the implementation team and work as a technology consultant.
We primarily use the solution as security - as a next-generation firewall.
View full review »We primarily use the solution for traditional firewalling. We use it for VPN connections - especially now that people are doing work from home. This solution is our VPN gateway.
View full review »I am currently testing Palo Alto and preparing for an exam.
View full review »It protects from any unwanted traffic or any kind of attack toward your LAN. It just minimizes the risk. It does not completely eradicate the risk.
We have the latest version of this solution.
View full review »We've put it in hospitals and very large private and government businesses. We have its latest version.
View full review »We use it for perimeter security.
View full review »We shifted an existing network from Cisco to Palo Alto. It was like a branch to head office network.
We have done public and private cloud deployments as well as on-prem deployments. We are using versions 8, 9, and 10.
VK
Vladimir Kiseliov
Information Technology Project Manager at JSC "Penkiu kontinentu komunikaciju centras"
We have several use cases for this solution. They include anti-virus, user identification, two-factor authentication for VPN, and application filtering.
View full review »We use these firewalls on-premise. We use them as a central gateway for internet security. We also use them for organizing access to the internet from organizations, and security access rules.
View full review »We use a very basic model with a small installation to secure a small office segment with 50 users.
View full review »AM
AnkitMittal
Network Engineer at Vibs
We are a solution provider and this is one of the firewalls that we implement for our clients.
View full review »I deploy this solution for our clients. Firewalls can be used when you want to achieve SD-WAN connectivity. In a client's VPN or site-to-site VPN, it can be used to secure networks locally. If you have an extender or server room, you can secure your IT infrastructure for your servers. The solution can be installed on edge to protect your internal network. If you have services running on AWS or Google Cloud, or Alibaba Cloud, it can be deployed there. Some clients have a hybrid kind of infrastructure. I'm a service delivery engineer and network security lead and we are customers of Palo Alto.
View full review »We primarily use this product to protect our network.
View full review »We use this product as our perimeter firewall.
View full review »AS
Abhirup Sarkar
Director, Middle East, East India & SAARC at DMX Technologies
We were mainly using it because we had two ISP links, so it was a kind of gateway device. Whenever a link went down, the firewall used to automatically switch over to the secondary link so that the internet connectivity is kind of highly available.
View full review »We are a solution provider and one of the Palo Alto products that we implement for our clients is the Next-Generation Firewall. It is used to protect your workflows in cloud environments, be it Azure, AWS, or Google. It can also protect your applications' databases that are on-premises.
View full review »We are a system and development company, and we sell this solution and many other solutions to our customers.
We work on all the models, not a specific one. The model depends on the sizing. We also consider future expansion of a customer's environment for deploying a model.
View full review »KZ
Khawaja AhsanZia
Network Security Engineer at a tech services company with 11-50 employees
I'm a network security engineer and we are platinum partners with Palo Alto.
View full review »We are a solution provider and this is one of the firewall solutions that we implement for our customers. We present this product to customers and also handle the onsite installation.
Our clients use it to secure their network infrastructure.
View full review »AE
Antonio El Khoury
System Engineer at IRIS
We resell products by Palo Alto and Cisco, and this next-generation firewall by Palo Alto is one of the products that we are familiar with.
View full review »Our primary use case was for perimeter protection.
View full review »ST
Shrihari Taluri
Senior Network Security Engineer at Locuz Enterprise Solutions Ltd
We are using this firewall for security purposes.
View full review »MH
Mike Hancock
Vice President, Security Engineering at a financial services firm with 1,001-5,000 employees
We use this solution for Zero Trust Data Center Segmentation with layer 2 Palo Alto firewalls. Segmentation has allowed us to put servers into Zones based off VLAN tags applied at the Nutanix level and can change "personalities" with the change of a VLAN tag. Palo Alto calls the "Layer 2 rewrite". By default, all traffic runs through a pair of 5000 series PAs and nothing is trusted. All North and South, East and West traffic is untrusted. No traffic is passed unless it matched a rule in the firewalls. There is a lot of upfront work to get this solution to work but once implemented adds/moves/changes are easy.
IG
Ibrahim Ghanem
Head of Information Network Security at FRA
We use the firewall for securing the data center. We have designed it to be a two-stage firewall. We have a perimeter firewall which is not Palo Alto, and then the Palo Alto firewall which is acting as a data center firewall. We are securing our internal network, so we have created different security zones. And we assign each zone a particular task.
View full review »RK
Kumar_Rajesh
Vice President & Head Technology Transition at a tech services company with 10,001+ employees
We have multiple IPS applications, and other multiple use cases.
View full review »Our solution is now based on clustering and load balancing. We can add more nodes to our environment to accommodate the new load within our company.
We have about 2,000 to 2,300 users on Palo Alto NG firewall support.
Palo Alto has a line of products for different customers. If you do the sizing it from the beginning, considering that you are a growing company, it is fine.
You need to plan for the future, which means that you have to pay in advance through investment. With Palo Alto NG Firewalls, the cost will be higher.
View full review »I'm using many solutions. I'm working as a CTO for a big company here. I work with Palo Alto and Cisco.
View full review »AJ
Aleksandar Jovanovic
System Engineer at E-smart systems
We use this solution for WAN routing, NAT, VPN tunnels, granular security policies, URL filtering, antivirus, threat prevention, sandboxing, decryption, high availability, and reporting.
View full review »I primarily use this solution for the core banking network. It's for core security. So it's to protect against intrusion, to protect against any kind of cyber attack that can happen to it. It protects our core infrastructure.
EB
EmreBektas
Senior Technical Consultant at Exclusive GRP
We're customer facing; each customer uses it for a different purpose. Some use NG Firewalls for IPS capability, some for application capabilities, these kinds of things.
View full review »I use the solution for firewalls.
View full review »DL
Denis L
Sales Solutions Engineer at a tech services company with 201-500 employees
The primary use for this product is for security as a firewall by a sales engineer for the guest environment.
View full review »I use the PA-220 to protect the LAN at my small-ish (about twenty people) office. We have several remote users who use the GlobalProtect VPN. As we move into a data center for hosting, I'll buy a second PA-220 to set up a site-to-site VPN. We also have a VM-50 for internal testing and lab use.
View full review »RR
Rakesh Rawat
Network Engineer at Acliv Technologies Pvt Ltd
We use this solution to block malicious or suspicious activity by creating policies that define which action should be blocked or allowed.
View full review »Firewall.
View full review »Finding a solution for easy management, where the company is protected in a matter where an unwanted software is blocked.
View full review »BE
Bachir Elsitt
Network Security Engineer at Data Consult
I used Palo Alto firewalls for plenty of projects and have many use cases.
When working with App-ID, it is important to understand that each App-ID signature may have dependencies that are required to fully control an application. For example, with Facebook applications, the App‑ID Facebook‑base is required to access the Facebook website and to control other Facebook applications. For example, to configure the firewall to control Facebook email, you would have to allow the App-IDs Facebook-base and Facebook-mail.
It is our main firewall. It has performed well. It meets our expectations.
View full review »The customers primarily use this solution for a firewall.
View full review »My primary use cases for this solution have been the firewall, file analysis, and remote-access VPN.
View full review »Buyer's Guide
Palo Alto Networks NG Firewalls
June 2025

Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
859,687 professionals have used our research since 2012.