We primarily use Palo Alto Networks NG Firewalls as Foundry Network devices, but we also use them to filter internal network traffic.
Information Security Specialist at a government with 501-1,000 employees
Easy to configure, reliable, with an appealing syntax
Pros and Cons
- "The most important part of this solution is its reliability, as it just works without any fancy features."
- "Enhancements could potentially be made to the firmware to improve its inspectability."
What is our primary use case?
How has it helped my organization?
I don't believe there is a significant difference. It is similar to any Google firewall product in that it works as long as they are reliable.
What is most valuable?
The most important part of this solution is its reliability, as it just works without any fancy features. Users are mainly concerned about their ability to function consistently and dependably.
I believe that companies could potentially gain an advantage by leveraging their engineers' familiarity with certain interfaces. Typically, the familiarity factor plays a significant role in product selection, and if they have experience using certain interfaces, they are more likely to opt for those products.
In terms of the interface, I don't feel there is any distinction between this vendor and others. I believe that familiarity with the products itself is an important consideration.
What needs improvement?
With the use cases that I am familiar with, I don't believe that additional features would be of any benefit.
Adding more features generally causes more issues. I would prefer they focus on improving reliability rather than adding new features.
My preference would be to exclude machine learning since it must be capable of explanation. This is really important to us, and the performance must also be highly predictable. If it is implemented, at the very least, the option to disable it completely must be available.
In my view, machine learning is often a bothersome addition that can potentially compromise security by allowing unauthorized traffic to pass through undetected.
From my experience, this tends to occur in networks where all the traffic is clearly defined.
Enhancements could potentially be made to the firmware to improve its inspectability.
Buyer's Guide
Palo Alto Networks NG Firewalls
May 2025

Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
857,028 professionals have used our research since 2012.
For how long have I used the solution?
In my current job, I have been using Palo Alto Networks NG Firewalls for three years.
What do I think about the stability of the solution?
In my experience, Palo Alto Networks NG Firewalls have been a stable solution.
What do I think about the scalability of the solution?
It has been as scalable as you would expect.
I have experience working on both small office networks as well as larger ones spanning multiple locations, typically around three to five locations.
I have worked with a range from small office setups with around fifty devices to larger ones with a scale of maybe a thousand, two thousand, or even five thousand devices.
Which solution did I use previously and why did I switch?
I have experience with quite a lot of other vendors.
In my opinion, I find the configuration of this product more appealing than that of Cisco, but ultimately, it comes down to the preference of the organization's administrators. In terms of features, I don't see a significant difference between them; they all seem pretty standard to me.
I find their syntax more appealing, especially for the command line.
How was the initial setup?
I am rarely involved in the deployment.
Which other solutions did I evaluate?
When assessing firewalls for securing data centers consistently and across all workspaces or places, Palo Alto Networks NG Firewalls are suitable products.
From my experience, they have demonstrated excellent performance.
While it may not necessarily decrease downtime, it also doesn't cause any increase in downtime.
What other advice do I have?
Attending events like RSA has proven to be quite beneficial for me in terms of meeting new people and discovering interesting products. These events generated new contacts and partnerships for my organization.
I believe that we will likely evaluate and purchase at least one of the products in the near future.
It's a decent product, I would rate Palo Alto Networks NG Firewalls an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Security Consultant at a tech services company with 501-1,000 employees
Good application detection, strong antivirus capabilities and built-in machine learning
Pros and Cons
- "From my experience, comparing it to other products, the granularity you can have in the application is very good. The application detection is excellent. It's certainly one of the best."
- "The solution would benefit from having a dashboard."
What is our primary use case?
We primarily use the solution as a datacenter firewall for 0 trust security model
What is most valuable?
From my experience, comparing it to other products, the granularity you can have in the application is very good. The application detection is excellent. It's certainly one of the best.
The engine detector application is usually one of the best compared to any other firewall on the market, in my opinion. With it, I can do a lot of rules based on the application. If you have multiple internet links, you can have an application export from one link, and an application wire from another link. You can have security on the application. The security, for example, can have different functionalities. Basically, the granularity of rules is amazing in Palo Alto.
They have a good reputation for their antivirus capabilities.
The solution offers a strong URL based system or detection for malicious URL or malicious files.
They even have a machine learning algorithm. They do a lot of very advanced detection for files and URLs.
Once you deploy the product, you can basically forget about it. It has high customer satisfaction because it's always just working.
What needs improvement?
The solution would benefit from having a dashboard.
From a normal IPS after attack, routine attack and threat detection attack, in other words, the standard IPS detection attack, I don't see Palo Alto as very good compared to others. The standard network IPS functionality could be better. It's there in solutions like McAfee or Tipping Point, however, I don't see it here in this solution.
For how long have I used the solution?
We've been working with Palo Alto for about six years now.
What do I think about the stability of the solution?
From my experience, it's the best hardware compared to other NG firewalls from the perspective of performance stability. While the other firewalls lose 50 or 60% of performance when enabling all policies, Palo Alto loses 10 to 20% maximum, even with enabled IPS and fire detection and all. From our experience performance-wise, it's one of the best hardware solutions for firewalls.
We haven't lost performance really, so I would describe it as very stable. There are not any issues.
What do I think about the scalability of the solution?
Since the solution is hardware, there are some limitations in terms of scalability.
Usually, in hardware, you can't say it's scalable or not due to the fact that you have the limitations built-in related to the size of the box. The box has a maximum number that it can reach. You can add more hardware, however, the hardware itself is finite.
We usually do a POC first so we can get the figures for performance and we can put in a box that can support 20 or 30 people extra for future expansion.
How are customer service and support?
In general technical support is very good. That said, usually, when we face an issue, we try to solve it ourselves internally before going to level one support.
In general, we never have had a big issue with support. I don't have much experience with the support team to tell you if they're really good or not. Usually 80% of the cases we open, we talk with the distributor and finish the operation case directly with Palo Alto. It's more like a backend request and therefore I don't have much input that would be objective.
Which solution did I use previously and why did I switch?
As resellers, we also work with Cisco and some Forcepoint solutions.
I like that in Cisco there's more security parts, like IPS, and a Demandware engine.
I like Cisco, in general, more than Palo Alto if I'm comparing the two. However, from an application perspective, our application's usability and detection and firewall control using an application, it's Palo Alto that's the best on the market. That's, of course, purely from a firewall point of view. Even in terms of detection of the applications, it has the best system.
How was the initial setup?
The deployment depends on the client's environment as well as how they are using it. For example, an internet NG firewall on the internet, it takes, on average, a week between installation, integration, and tuning. Usually we don't do all the policies because we are system integrator. We do the main policies and we teach the customer and then do a handover to the user for tuning and all the installation extras.
If it's a data center project, it takes more time and effort. It takes a month sometimes due to the fact that we'll be dealing with a lot of traffic. The application and server are usually harder to control than internet applications like Facebook and other standard applications, and easier on the internet. Then there's also internal applications, custom applications, migrating applications, finance education applications, etc., which are not always direct from the customer or directly known.
In short, the implementation isn't always straightforward. There can be quite a bit of complexity, depending on the company.
What other advice do I have?
In general, I prefer hardware, and Palo Alto's is quite good. However, we have a couple of virtual deployments for cases as well.
I would definitely recommend the solution. It's one of the best firewalls on the market. I've worked with four different vendors in the past, and some of the most mature NG firewalls are Palo Alto's. It's their main business, so they are able to really focus on the tech. They spend a lot of time on R&D. They're always leading the way with new technologies.
While Cisco has more main products, Palo Alto really does focus in on NG firewalls. That's why I always see them as a leader in the space.
I'd rate the solution nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
Buyer's Guide
Palo Alto Networks NG Firewalls
May 2025

Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
857,028 professionals have used our research since 2012.
Technical Manager at PSR
Machine learning and sandboxing are what differentiate this product from competitors
Pros and Cons
- "The sandboxing is valuable and they are frequently updating their signature database. We get new updates every five minutes. That makes it easy to detect new and unknown attacks."
- "The configuration part could be improved. It's very difficult to configure. It doesn't have a user-friendly interface. You have to know Palo Alto deeply to use it."
What is our primary use case?
It is used for protection against attacks and it is very fast and reliable. We have a lot of use cases for it.
How has it helped my organization?
We are an implementation partner for Palo Alto. One of the companies we implemented its Next-Generation Firewalls for was previously using Barracuda. A ransomware attack happened and they lost all their backup data, and their configuration. Once we implemented Palo Alto for them, there were similar attacks but they were blocked.
Along with Prisma, it helps in preventing a lot of attacks, especially Zero-day attacks.
What is most valuable?
The sandboxing is valuable and they are frequently updating their signature database. We get new updates every five minutes. That makes it easy to detect new and unknown attacks.
What needs improvement?
The configuration part could be improved. It's very difficult to configure. It doesn't have a user-friendly interface. You have to know Palo Alto deeply to use it.
Also, it doesn't support open-source protocols like EIGRP. We had to find another solution for that.
For how long have I used the solution?
I've been using Palo Alto Networks NG Firewalls for the last six years.
What do I think about the stability of the solution?
Palo Alto suggests version 9.1.7 for stability. When new features come out, things are not as stable.
What do I think about the scalability of the solution?
It's scalable. I recommend it for its scalability.
We generally deploy these firewalls into larger environments, but the PA-400 series is affordable.
How are customer service and support?
There are problems with the technical support. When we are facing an attack, it's very difficult to get a hold of people from the TAC. It's not like Cisco, especially in India. There are very few members of Palo Alto TAC in India. Sometimes we get support from people in other countries.
How would you rate customer service and support?
Neutral
How was the initial setup?
The initial deployment of these firewalls is very complex. The registration is a very difficult task. You have to go to the partner portal to register and it's not user-friendly. All the other solutions are not like that. With Juniper, for example, it's very easy to handle their portal.
The deployment time depends on the customer environment but it normally takes around three weeks. Our implementation strategy is to first understand the network we are dealing with and how we can deploy Palo Alto.
What's my experience with pricing, setup cost, and licensing?
The pricing for Palo Alto is very high. The price difference with other vendors is huge because Palo Alto has been the market leader for the last five or six years, and they have a reliable product. Everybody knows Palo Alto, like Cisco routing and switching. It's likely that only enterprise-level customers can afford this kind of firewall.
Which other solutions did I evaluate?
Palos Alto's firewalls have machine learning software and sandboxing. Everything is one step ahead of all the competitors.
Still, almost all vendors provide the same things. They call their technologies by different names, but that's the only big difference in features.
What other advice do I have?
According to the industry reviews Palo Alto has been the market leader for the last five or six years. They have better technology and the hardware is also good. It's the pricing and user interface where there are issues. Apart from them, everything is fine.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Head of IT Infrastructure at a financial services firm with 1,001-5,000 employees
Provides a reliable central firewall
Pros and Cons
- "Identifying applications is very easy with this solution."
- "The reports it provides are not helpful."
What is our primary use case?
We use this solution as our central firewall, but not as a perimeter firewall. For our perimeter, we use another solution.
Our organization consists of roughly 2,000 to 3,000 employees.
What is most valuable?
Identifying applications is very easy with this solution.
What needs improvement?
I don't like the reporting. The reports it provides are not helpful. They should include more executive summaries and other important information — they're too technical.
For how long have I used the solution?
I have been using this solution for three years.
What do I think about the stability of the solution?
The stability is excellent.
How are customer service and technical support?
The technical support is good, but not excellent. Their responses can be quite vague and unhelpful at times.
Which solution did I use previously and why did I switch?
We used to use Checkpoint. We stopped using it because the price was too high.
How was the initial setup?
Considering our limited amount of experience, the initial setup was easy. Deployment took one month.
What about the implementation team?
A local reseller team of roughly three to five people implemented it for us — it was a great experience.
Which other solutions did I evaluate?
We evaluated Palo Alto, Checkpoint, Fortinet, and Cisco Firepower. Overall, it came down to the price — that's why we went with Palo Alto Networks NG Firewalls.
What other advice do I have?
This solution is very particular; it's only suited to specific companies — it's a commercial opportunity.
Overall, on a scale from one to ten, I would give this solution a rating of eight.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Director IT Security at a healthcare company with 501-1,000 employees
Good threat hunt capabilities, good support, and easy to deploy
Pros and Cons
- "Mechanically, all firewalls work in a similar fashion, but what makes Palo Alto different is that it also has some of the threat hunt capabilities. It is a little bit better than other vendors."
- "As things are evolving, we want to make sure that Palo Alto is able to keep up with what is going on outside. They should continue to do more intelligence-related enhancements and integrate with some of the other security tools. We want to have a more intelligent toolset down the road."
What is our primary use case?
Basically, it is for protection and security. We are using it to make sure that our network is as secure as possible. We are able to evaluate each stack in each pocket and take certain actions as needed when we look into some of the content of the payload.
We have on-prem deployments, and we also have SaaS-based services.
What is most valuable?
Mechanically, all firewalls work in a similar fashion, but what makes Palo Alto different is that it also has some of the threat hunt capabilities. It is a little bit better than other vendors.
What needs improvement?
As things are evolving, we want to make sure that Palo Alto is able to keep up with what is going on outside. They should continue to do more intelligence-related enhancements and integrate with some of the other security tools. We want to have a more intelligent toolset down the road.
For how long have I used the solution?
We implemented this solution last year.
What do I think about the scalability of the solution?
We currently have 25,000 users. Its usage won't increase a lot, but IT is changing very rapidly, and it would depend on the security model towards which we are moving.
How are customer service and technical support?
Palo Alto provides pretty good support.
How was the initial setup?
It is straightforward. The deployment duration varies because there are different modules and components, but it doesn't mean that we have to complete everything to make it work. For the core piece of it, it would probably take a couple of months to install, configure, and test.
What about the implementation team?
We have a vendor to help us. We have two or three people for its deployment.
What's my experience with pricing, setup cost, and licensing?
It has a yearly subscription.
What other advice do I have?
I would recommend this solution. I would rate Palo Alto Networks NG Firewalls an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Quality engineer of the 1st category at Modern Expo
Great protection without requiring a special dedicated network team; saves us a lot of time
Pros and Cons
- "Protection from a single packet and ease of making security rules."
- "It's not so easy to scale out your security capabilities."
What is our primary use case?
We have two 3000 Series Firewalls placed in our primary location. We have two sites and the secondary site uses the primary site for internet access. All traffic to the secondary location goes through a VPN tunnel. I'm a network administrator.
What is most valuable?
The value of this solution for me is the protection from a single packet and ease of making security rules. It also doesn't require a special dedicated network team, I'm able to do it myself. It's a time saver for me and now in this pandemic period, users have access from home.
What needs improvement?
I'd like to see some changes to the licensing policies and, on the technical side, improvement in scalability. It's not so easy to scale out your security capabilities. With the situation in business today, everybody lacks money and if you have to increase your resources and to constantly pay more for that, it becomes a problem.
For how long have I used the solution?
I've been using this solution for 10 years.
What do I think about the stability of the solution?
It's been 10 years and I don't remember any outages because of a hardware failure or a logical error in configuration. We had problems with servers or switches initially but it works like a charm now.
What do I think about the scalability of the solution?
Scalability is the main disadvantage of Palo Alto. They call themselves a firewall with router capabilities but it's not a router and it requires a good bandwidth in VPN which could become a problem because you have to scale to really big hardware. We can solve the issue with other solutions, but for me the idea is to have less devices in your environment.
It's all about the hardware.
How are customer service and technical support?
The support is quite good. A couple of months ago, I sent an email with an issue and we got an answer in 15-20 minutes. In my experience, Palo Alto support is one of the best, maybe the best support available.
Which solution did I use previously and why did I switch?
We previously used Juniper which is currently called Net Screen. I also looked at Sonic Wall. We carried out a proof of concept five years ago and they had to decide whether to go with Palo Alto or another vendor.
How was the initial setup?
For me, the initial setup is very easy. To get the device running with some capabilities but maybe not all security rules takes about an hour and it's the same for any upgrades. We have around 900 users and one admin person from our organization who deals with any issues.
What's my experience with pricing, setup cost, and licensing?
Palo Alto is an expensive solution, we currently have a three year contract. I'm not sure what our terms are. People always want cheaper, nobody wants to pay more. In our region, I think if Palo Alto was cheaper, more companies would buy the solution.
What other advice do I have?
I would absolutely recommend this product, it's expensive but I trust it. There is always room for improvement such as with scalability capabilities in Palo Alto. I know I'm not the only one who thinks this is an issue. It's possible that next time we will try virtualized firewalls, it may be a little cheaper for us. We would consider switching to something else but it would be a big move and quite complicated. Moving to a different vendor is a whole other story.
I rate this solution a nine out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Staff Security Engineer at a renewables & environment company with 1,001-5,000 employees
Stable and scalable, works well, and makes our environment more secure
Pros and Cons
- "The App-ID feature is the coolest feature because you don't need to open a new port. Apps are directly linked to the port. It provides one of the best ways to lock down the additional port switch."
- "Its software updates can be improved. It sometimes becomes very slow with the software updates for different features. It should have an External Dynamic List of data. The malicious IP is not frequently getting updated in Palo Alto, and this should be done."
What is our primary use case?
We are working on creating security policies on the firewall. We have just put GlobalProtect VPN in our company. We also have Prisma Access.
We have on-prem and hybrid cloud deployments.
How has it helped my organization?
It has strengthened our security policies and made our environment more secure. It has provided us more security features. Due to the rules that we have created on Palo Alto Firewall, all the malicious things have been stopped from coming into our environment.
What is most valuable?
The App-ID feature is the coolest feature because you don't need to open a new port. Apps are directly linked to the port. It provides one of the best ways to lock down the additional port switch.
What needs improvement?
Its software updates can be improved. It sometimes becomes very slow with the software updates for different features.
It should have an External Dynamic List of data. The malicious IP is not frequently getting updated in Palo Alto, and this should be done.
For how long have I used the solution?
I have been using this solution for six years.
What do I think about the stability of the solution?
Its stability is good.
What do I think about the scalability of the solution?
Its scalability is also good.
Which solution did I use previously and why did I switch?
We were using Cisco ASA previously. Palo Alto has strengthened our security policies. It has also made our environment more secure than Cisco ASA.
How was the initial setup?
Its initial setup is straightforward.
What other advice do I have?
I would rate Palo Alto Networks NG Firewall an eight out of ten. It has been working very well.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Security Head at a government with 51-200 employees
An innovative platform that secures our network
Pros and Cons
- "It's quite nice. It's very user-friendly, powerful, and there are barely any bugs."
- "The scalability of the firewalls could be improved."
What is our primary use case?
We plan to continue using this solution. Within our organization, there are roughly 1,000 employees using this solution.
What is most valuable?
We chose Palo Alto for its security features. It's quite nice. It's very user-friendly, powerful, and there are barely any bugs.
For how long have I used the solution?
We have been using this solution for roughly two years.
What do I think about the stability of the solution?
This solution is very stable.
What do I think about the scalability of the solution?
The scalability of the firewalls could be improved. You can't scale the physical firewalls because Palo Alto doesn't support clustering.
How are customer service and technical support?
The support could be improved. They could be faster.
They have a multi-layer model of support. If we're experiencing any issues, we have to go to our local partner. If our local partner can't help, then we have to go through a distribution layer that's certified from Palo Alto. If our issues can't be fixed, they will escalate them to the vendor. This can be quite annoying, to be honest.
With Cisco, for example, you can open a ticket directly with the vendors themselves, and they can escalate it internally, which is much faster.
Which solution did I use previously and why did I switch?
We used to use Juniper Firewalls.
How was the initial setup?
The initial setup is quite straightforward.
What about the implementation team?
We deployed this solution with some help from our local partners. Overall, deployment took a couple of days. A team of three deployed this solution.
What's my experience with pricing, setup cost, and licensing?
This solution is quite expensive.
What other advice do I have?
I would absolutely recommend this solution to others. Overall, on a scale from one to ten, I would give this solution a rating of nine.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2025
Product Categories
FirewallsPopular Comparisons
Fortinet FortiGate
Netgate pfSense
Cisco Secure Firewall
Check Point NGFW
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Fortinet FortiGate-VM
SonicWall NSa
Untangle NG Firewall
KerioControl
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Palo Alto the best firewall for an on-premise/cloud hybrid IT network?
- What are the main differences between Palo Alto and Cisco firewalls ?
- Expert Opinion on Palo-Alto Required.
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Features comparison between Palo Alto and Fortinet firewalls
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which is better - Palo Alto Networks NG Firewalls or Sophos XG?
- What are the main differences between Palo Alto firewalls and Cisco Secure Firepower?
- What is a better choice, Azure Firewall or Palo Alto Networks NG Firewalls?
- Which Palo Alto Networks NG Firewalls model is recommended for 1200 users?