VinodPol - PeerSpot reviewer
Vice President and Head - IT Telecom, Software License Management and Collaboration at a tech vendor with 10,001+ employees
Real User
Top 10
ATP provides superior security, it integrates well using the API, and the support is good
Pros and Cons
  • "The most valuable feature is the security provided by the ATP."
  • "I would like the option to be able to block the traffic from a specific country in a few clicks."

What is our primary use case?

We use this firewall as part of our overall security solution. It is used to protect our perimeter on the internet side. We have the on-premises version installed for our offices and the cloud-based version for our cloud offerings. For our cloud setup, we use both Azure and AWS.

What is most valuable?

The most valuable feature is the security provided by the ATP. It is definitely better than the security provided by other firewalls.

The API is available for integration with tools for automation and AI, which is very good.

What needs improvement?

The interface contains some decentralized tools, so simplifying it would be an improvement.

I would like the option to be able to block the traffic from a specific country in a few clicks.

Some of the implements under artificial intelligence should provide better visibility in terms of my traffic, such as where it originates and where it is going.

Better integration with industry tools would allow me to do quicker automation and reduce my operational costs.

For how long have I used the solution?

We have been using the Palo Alto Next-Generation firewall for almost five years.

Buyer's Guide
Palo Alto Networks NG Firewalls
April 2024
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,857 professionals have used our research since 2012.

What do I think about the scalability of the solution?

This solution is definitely not scalable. Although it is a next-generation firewall, it has its limitations in terms of policies. At one point in time, it becomes the bottleneck, which is something that we have to optimize.

We are using this firewall at between 10 and 15 locations.

How are customer service and support?

We have been in contact with technical support and we are satisfied with the service.

Which solution did I use previously and why did I switch?

We also use FortiGate VDOM, although this is for internal protection. The FortiGate interface is simpler in design than Palo Alto.

Prior to Palo Alto, we were using the Cisco ASA platform. When it was through with its lifecycle, we switched. Seeing the next-generation firewall competition in the market, Cisco definitely has a larger portfolio, but it is not as competitive in the security domain. Solutions from Palo Alto and Fortinet are better in this space.

How was the initial setup?

It is easy to install and we did not find the initial setup complex at all. The basic firewall can be set up, and then it takes a little time for the hardening. In total, the deployment can usually be completed within two or three hours.

What's my experience with pricing, setup cost, and licensing?

The pricing is competitive in the market.

What other advice do I have?

Palo Alto NG is definitely a firewall that I recommend for the right size of deployment.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Information Security Specialist at UAEU
Real User
Great firewalling protection up to the application level; easily configured with good reporting
Pros and Cons
  • "Provision of quality training material and the reporting is very good."
  • "Need improvement with their logs, especially the command line interface."

What is our primary use case?

We are basically using a double protection layer in which we take care of all our DMV, VPN, tunnels, and internal network. We are basically using it for application based configuration  controlling our traffic on applications with layers four to seven. We are customers of Palo Alto and I'm an information security specialist. 

What is most valuable?

I like the training material they provide and the reporting is very good. The solution is very easy to configure, and very easy to understand and explain. Compared to firewalls offered by their competitors, I find it easier to use and more thorough. The most important thing the solution provides is, of course, the firewalling up to the application level.

What needs improvement?

There could be improvement with their logs, especially their CLI. When you go to the command line to understand the command line interface it's tricky and requires a deep understanding of the product. We recently faced one issue where the server side configuration changed and it wasn't replicated at the firewall. It required us to tweak things and now it is working fine. Finally, the HIPS and audio call features could be improved. 

For how long have I used the solution?

I've been using this solution for two years. 

What do I think about the stability of the solution?

In the past two years I haven't had any issues with the stability. That applies to the hardware, software, upgrades, updates, new feeds. I haven't faced any big issue, you can say that. 

What do I think about the scalability of the solution?

We are using their big boxes, like the 7,000 series. So it's already at that level. We're already using 120 GB, like three 40 gigs and it's working fine for us. You can scale as you wish.
We have over 10,000 people using the service through this firewall. It's working 24/7 and it's been that way for the past two and a half years. 

How was the initial setup?

The initial setup is not complex. It took us 15 to 20 days because we were migrating from the other firewall. The strategy was to take the backup and simultaneously create a leg and transfer to that. The first time we deployed, we used the integrator recommended by the vendor. That worked very well. Our team worked with the integrator. We planned everything and they supervised us. 

We currently have four people helping with maintenance. They are security admins and their job is with the firewalls, like configuring and maintaining and upgrading all those things. 

Which other solutions did I evaluate?

Yes, we evaluated other options. Cisco was there, as was FortiGate. We were using Juniper at that time, and then Palo Alto came into picture. We carried out a comparison of pricing, support, features, etc. and then we made our choice. It was really the next generation features and application level security that were key to our decision. 

What other advice do I have?

The advice I can give is that this is a good solution: Easy to deploy, easy to manage, easy to understand, reporting is very good, and it will give you the full picture up to the layer seven. Their VPN service is very good. 

The good thing is that whenever you need to train anyone on these devices, it's very easy to explain. Previous firewalls I've used, required a lot more work before you could configure. This isn't like that, it takes maybe 30 minutes and it's done. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Palo Alto Networks NG Firewalls
April 2024
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,857 professionals have used our research since 2012.
PeerSpot user
Technology consultant at a tech services company with 501-1,000 employees
Real User
GUI is very user friendly, good documentation provided, implementation is straightforward
Pros and Cons
  • "The GUI is simple and the solution is straightforward."
  • "Support should be improved, wait times can be long."

What is our primary use case?

Our primary use case of the Palo Alto firewall is to control incoming and outgoing traffic as the firewall is deployed at the perimeter. Also we have used a VPN in that device so remote users can access the internal networks. We are partners with Palo Alto and I'm from the implementation team and work as a technology consultant. 

What is most valuable?

The GUI is very simple in Palo Alto and I like that. We rarely have any issues but when we do, the stability of the solution is very good. All the options they offer; creating objects, configuring VPN, it's all pretty simple and straightforward. The solution is continuously in use in our company. 

What needs improvement?

The support could definitely be improved. Whenever I call the tech engineers, there's a long wait time. For an additional feature, I'd like to see the segmentation in policy. Check Point has a good feature for segmenting policies that I'd like to see implemented in Palo Alto. It would make things easier for the operation team to create & identify particular policies, or to place a policy in that segment. Finally, there are limitions to the hardware in the number of objects & policy we can create is limited which is not the case with Check Point or FortiGate.

What do I think about the stability of the solution?

The stability is good in the Palo Alto firewall.

What do I think about the scalability of the solution?

The Palo Alto firewall cannot increase the RAM and we can't do that either. We're unable to increase any physical boundaries of the firewall. That is one of the cons of Palo Alto. Our organization is pretty large and I am currently working on Palo Alto for three clients. I have a total of about 10 clients who are using the Palo Alto firewall. 

How was the initial setup?

The initial setup is pretty straightforward. We just had to do the initial configuration of hardware, deploy our Panorama VM and integrate with hardware firewall, and it is pretty simple. It's also quite self-explanatory. 

What's my experience with pricing, setup cost, and licensing?

We have five-year contracts with Palo Alto. I know the solution is on the expensive side but I'm not involved in licensing and don't have the numbers. 

Which other solutions did I evaluate?

I have also worked on Check Point and FortiGate, the hardware firewall. The Check Point Firewall has three-tier architecture where one security gateway & management server is there & smart dashboard is deployed on Windows. The application is required to control the Gateways. On other hand In Palo Alto, we just take GUI access of the firewall or Panorama to deploy any security policies and the architecture is very simple. As mentioned, the downside of Palo Alto is that there is a limitation to the number of objects that can be created. 

What other advice do I have?

I would 100% recommend this solution and they have provided pretty good documentation on their website, so it's easy for operations as well.

I rate this solution a nine out of 10. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Sr. Product Management Specialist at a comms service provider with 10,001+ employees
Reseller
A stable and easy-to-deploy solution with good support and useful UTM module
Pros and Cons
  • "The Unified Threat Management (UTM) module, which consists of the basic firewall and IPS services, is what the majority of our customers use in Palo Alto Firewall."
  • "Its scalability for on-prem deployments can be better. For an on-prem deployment, the hardware has to be replaced if the volume goes up to a certain level."

What is our primary use case?

We're basically an MSSP service provider. We use this solution as a network firewall for URL filtering, IPS, and IDS proxy services.

What is most valuable?

The Unified Threat Management (UTM) module, which consists of the basic firewall and IPS services, is what the majority of our customers use in Palo Alto Firewall.

What needs improvement?

Its scalability for on-prem deployments can be better. For an on-prem deployment, the hardware has to be replaced if the volume goes up to a certain level.

For how long have I used the solution?

We have been using this solution for a couple of years.

What do I think about the stability of the solution?

It is stable.

What do I think about the scalability of the solution?

It is much more scalable in a cloud deployment, but for an on-prem deployment, the hardware has to be replaced if the volume goes up to a certain level.

We have very few customers of this solution. We probably have five to ten customers.

How are customer service and technical support?

Their technical support is very good. It is more often the AMC support that we have to take. 

How was the initial setup?

It is fairly easy. We're not seeing many challenges in these installations. The complete installation can take a lot of time because we have to configure all the policies and other things. After the hardware is installed and the network is connected, you need one or two people for configuring the policies for use cases.

What's my experience with pricing, setup cost, and licensing?

After the hardware and software are procured, it is the AMC support that has to be renewed yearly.

What other advice do I have?

We plan to keep using this solution depending on the customers' needs. We also have a cloud-based platform on Fortinet, and we provide it as a service.

I would rate Palo Alto Networks NG Firewalls an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Ragesh Alappurath - PeerSpot reviewer
Senior Network Engineer at Almoayyed Computers
Real User
Top 10
Great GlobalProtect and App-ID features; easy implementation and good integration
Pros and Cons
  • "GlobalProtect and App-ID features are very good."
  • "Lacks mobility between on-prem and cloud based."

What is our primary use case?

We deploy and provide support for this solution to our customers. The use case depends on customer requirements because Palo Alto Next Generation Firewall can be used as a data center firewall, perimeter firewall or on the cloud for a perimeter firewall or used with communications. Some customers use it for global protect connectivity. I am a senior network engineer and we are partners with Palo Alto Networks. 

What is most valuable?

The best feature of this solution is the GlobalProtect, followed by the App-ID feature which is very good. I also like the VMS feature. 

What needs improvement?

They've improved a lot of things but we'd like to see more mobility between on-prem and cloud based. I'd also like to see security synchronization between the firewalls. Managing can be difficult. 

For how long have I used the solution?

I've been providing this solution for over two years. 

What do I think about the stability of the solution?

There are occasionally issues with reporting, otherwise stability is fine. 

What do I think about the scalability of the solution?

The scalability of this solution is fine. 

How are customer service and technical support?

Technical support is fine, although sometimes there have been delays. From a technical perspective, they are knowledgeable. 

How was the initial setup?

Now that I have some experience with it, the initial setup is simple. If it's being deployed on-prem, deployment takes a couple of days. But if it's a cloud deployment, we can complete deployment in a day. 

What's my experience with pricing, setup cost, and licensing?

Palo Alto is more expensive in comparison to Fortinet and other firewalls. It's okay because they do provide quality. 

What other advice do I have?

I would recommend this firewall still. Our system integrates well but it depends on customer requirements so we sometimes choose to go with an alternative firewall.

I would rate this solution an eight out of 10. 

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Sr. Solution Architect at a tech vendor with 501-1,000 employees
Reseller
Good interface and dashboards with excellent application visibility
Pros and Cons
  • "The interface and dashboards are good."
  • "The pricing could be improved upon."

What is most valuable?

The solution has many great features. I don't know if there's one single one that stands above and beyond everything, however.

The application visibility is excellent. There is no other solution that does it quite as well. Palo Alto definitely has an edge in that sense.

The ability of the security features to adapt is also very good. They offer great DNS protection.

They include everything from a network point of view and a security perspective. For the most part, the endpoints are great.

The interface and dashboards are good.

What needs improvement?

The GSW needs some improvements right now.

The endpoints could use improvement. The solution is mostly a cloud solution now, and there are a lot of competing solutions that are playing in the space and may be doing things a bit better.

The pricing could be improved upon.

For how long have I used the solution?

We've been dealing with the solution for the last four or five years at least.

What do I think about the stability of the solution?

The stability of the solution is good. It's quite reliable. I haven't experienced bugs or glitches that affect its performance. It doesn't crash.

What do I think about the scalability of the solution?

If you size everything appropriately, you shouldn't have any issues with scaling. It's quite good. Users can scale it up if they need to.

How are customer service and technical support?

I'd say that technical support is excellent. They are very helpful. We've quite satisfied with the level of support we got from the company.

Which solution did I use previously and why did I switch?

I've never dealt with Huawei, however, our company has worked with Cisco, Dell, and HP among other solutions.

What's my experience with pricing, setup cost, and licensing?

The pricing of the solution is quite high. It's too expensive, considering there's so much competition in the space.

There aren't extra costs on top of the standard licensing policy. Still, Palo Alto seems to be adding some premium costs that competitors just don't have.

What other advice do I have?

While we mainly deal with on-premises deployment models, occasionally we also do hybrid deployments.

We're not a customer. We're a systems integrator. We're a reseller. We sell solutions to our clients.

Palo Alto is very good at policymaking. It's like they have a single policy that you can use. Other solutions don't have single policy use, which means you have to configure everything. There may be many consoles or many tasks that you'll have to worry about other solutions. Multiple task configuration should not be there, and yet, for many companies, it is. This isn't the case with Palo Alto. Palo Alto is easy compared to Fortinet. 

It's overall a very solid solution. I would rate it nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: reseller
PeerSpot user
PeerSpot user
Vice President, Security Engineering at a financial services firm with 1,001-5,000 employees
Real User
Provides us with Zero Trust segmentation and an easy-to-use centralized control
Pros and Cons
  • "This solution not only provides better security than flat VLAN segments but allows easy movement through the lifecycle of the server."
  • "I wish that the Palos had better system logging for the hardware itself."

What is our primary use case?

We use this solution for Zero Trust Data Center Segmentation with layer 2 Palo Alto firewalls. Segmentation has allowed us to put servers into Zones based off VLAN tags applied at the Nutanix level and can change "personalities" with the change of a VLAN tag. Palo Alto calls the "Layer 2 rewrite". By default, all traffic runs through a pair of 5000 series PAs and nothing is trusted. All North and South, East and West traffic is untrusted. No traffic is passed unless it matched a rule in the firewalls. There is a lot of upfront work to get this solution to work but once implemented adds/moves/changes are easy.

How has it helped my organization?

This solution not only provides better security than flat VLAN segments but allows easy movement throughout the lifecycle of the server.

What is most valuable?

The most valuable feature is the ease of use of the central Panorama to control all firewalls as one unit for baseline rules and then treat each firewall separately when needed.

What needs improvement?

I wish that the Palos had better system logging for the hardware itself.

For how long have I used the solution?

We have been using this solution for four years.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Analyst at a non-tech company
Real User
Provide an additional level of network security and vigilance
Pros and Cons
  • "I like the firewall's vulnerability management features, which give you reminders to update your system and update your OS."
  • "The built-in machine learning features provide some automation, but I think there should be an option for manual review because nothing replaces the human eye."

What is our primary use case?

An NG firewall provides an additional level of network security and vigilance. It also helps us manage activities using privileges and a zero-trust approach. 

What is most valuable?

I like the firewall's vulnerability management features, which give you reminders to update your system and update your OS. Palo Alto Networks NG Firewalls provide a unified platform that integrates all security capabilities. It provides pretty good consistency across locations. 

What needs improvement?

The built-in machine learning features provide some automation, but I think there should be an option for manual review because nothing replaces the human eye. 

For how long have I used the solution?

We have used NG Firewalls for a little more than a year and a half. 

What do I think about the stability of the solution?

Palo Alto Networks NG Firewalls are pretty stable. 

What do I think about the scalability of the solution?

Palo Alto Networks NG Firewalls scale up enough for my workplace. Beyond that, I could not say. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2024
Product Categories
Firewalls
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros sharing their opinions.