It is our edge appliance. We use it for our edge security, and we also use it for our VPN termination.
We're using an old version of this solution. At this moment, I'm looking at migrating away from Palo Alto.
It is our edge appliance. We use it for our edge security, and we also use it for our VPN termination.
We're using an old version of this solution. At this moment, I'm looking at migrating away from Palo Alto.
The ease of use and the ease of configuration of our policies are the most valuable features.
Palo Alto could do better with integrating the Palo Alto Next-Gen Firewall with SD-WAN.
The biggest issue with Palo Alto is that they are expensive. They are very expensive for what they offer. They should improve their pricing.
I have been using this solution for six or seven years.
We have about a thousand users.
We have third-party support.
I used Cisco ASA.
Its installation was pretty straightforward. There were no problems there.
Deployment duration is difficult to tell because there is a whole world of planning and other things. It probably took a couple of days. You are, of course, always tweaking these things.
I haven't installed it here, but where I was before, we had two people doing it. I and a colleague did it ourselves.
It is expensive.
There are multiple firewalls out there. I am moving away from them because they are expensive, and they don't do what I want to do with them. I have plans of getting FortiGate instead.
I would rate Palo Alto Networks NG Firewalls a six out of ten.
We're basically an MSSP service provider. We use this solution as a network firewall for URL filtering, IPS, and IDS proxy services.
The Unified Threat Management (UTM) module, which consists of the basic firewall and IPS services, is what the majority of our customers use in Palo Alto Firewall.
Its scalability for on-prem deployments can be better. For an on-prem deployment, the hardware has to be replaced if the volume goes up to a certain level.
We have been using this solution for a couple of years.
It is stable.
It is much more scalable in a cloud deployment, but for an on-prem deployment, the hardware has to be replaced if the volume goes up to a certain level.
We have very few customers of this solution. We probably have five to ten customers.
Their technical support is very good. It is more often the AMC support that we have to take.
It is fairly easy. We're not seeing many challenges in these installations. The complete installation can take a lot of time because we have to configure all the policies and other things. After the hardware is installed and the network is connected, you need one or two people for configuring the policies for use cases.
After the hardware and software are procured, it is the AMC support that has to be renewed yearly.
We plan to keep using this solution depending on the customers' needs. We also have a cloud-based platform on Fortinet, and we provide it as a service.
I would rate Palo Alto Networks NG Firewalls an eight out of ten.
We use it as a firewall. We have VPN, IPSec, or site-to-site VPN. We also protect our few internal web services.
Everything is easy in Palo Alto Networks NG Firewall. It is very stable, easy to configure, and easy to upgrade. It is also very easy to create custom policies and applications. Everything can be done with the click of a button.
It is also good for the protection of web services. Nowadays, they have a rather new DNS security feature, which is pretty good and functional. We did a one-month trial, and it is the best product for the firewall network.
Its price can be improved. It is expensive.
Other vendors have pre-configured policies for the protection of web servers. Palo Alto has an official procedure for protecting the web servers. Many people prefer pre-configured policies, but for me, it is not an issue.
I have been using this solution for almost six years.
Our version is not scalable. The new version is scalable on the network interface. It comes with slots where you can put your SFP if you want a fiber or copper.
We have almost 600 users who use it for accessing the internet. We have about 50 to 70 VPN connections.
I didn't contact them because I don't get any technical issues with any feature of the firewall. I didn't have the need to open a case. If I have any issue, I am able to resolve it by using my cell phone and taking help from the internet.
I was using Check Point before Palo Alto. I am very disappointed with Check Point because I had to reboot power three to five times a week. Palo Alto Networks NG Firewall is comparatively very easy to manage and use. It has better logic for configuration than other firewalls.
The initial setup was straightforward. When I migrated from Check Point to Palo Alto Networks NG Firewall, it took about an hour and a half to reconfigure all policies and services.
I deployed it myself. The logic is very easy when you configure it. I did 90% percent of deployment on my own. For the remaining 10% deployment, I found the information on the internet.
I am the only user working on this firewall. I am a system administrator.
It is a little bit expensive than other firewalls, but it is worth every penny. There are different licenses for the kinds of services you want to use. When we buy a new product, we go for a three-year subscription.
We have not had any issue with this solution. I really hope that we continue to use this solution. Its price is higher than other solutions, and the company might go for another firewall.
I would recommend this solution to other users. I would rate Palo Alto Networks NG Firewalls a nine out of ten.
We deploy and provide support for this solution to our customers. The use case depends on customer requirements because Palo Alto Next Generation Firewall can be used as a data center firewall, perimeter firewall or on the cloud for a perimeter firewall or used with communications. Some customers use it for global protect connectivity. I am a senior network engineer and we are partners with Palo Alto Networks.
The best feature of this solution is the GlobalProtect, followed by the App-ID feature which is very good. I also like the VMS feature.
They've improved a lot of things but we'd like to see more mobility between on-prem and cloud based. I'd also like to see security synchronization between the firewalls. Managing can be difficult.
I've been providing this solution for over two years.
There are occasionally issues with reporting, otherwise stability is fine.
The scalability of this solution is fine.
Technical support is fine, although sometimes there have been delays. From a technical perspective, they are knowledgeable.
Now that I have some experience with it, the initial setup is simple. If it's being deployed on-prem, deployment takes a couple of days. But if it's a cloud deployment, we can complete deployment in a day.
Palo Alto is more expensive in comparison to Fortinet and other firewalls. It's okay because they do provide quality.
I would recommend this firewall still. Our system integrates well but it depends on customer requirements so we sometimes choose to go with an alternative firewall.
I would rate this solution an eight out of 10.
We are working on creating security policies on the firewall. We have just put GlobalProtect VPN in our company. We also have Prisma Access.
We have on-prem and hybrid cloud deployments.
It has strengthened our security policies and made our environment more secure. It has provided us more security features. Due to the rules that we have created on Palo Alto Firewall, all the malicious things have been stopped from coming into our environment.
The App-ID feature is the coolest feature because you don't need to open a new port. Apps are directly linked to the port. It provides one of the best ways to lock down the additional port switch.
Its software updates can be improved. It sometimes becomes very slow with the software updates for different features.
It should have an External Dynamic List of data. The malicious IP is not frequently getting updated in Palo Alto, and this should be done.
I have been using this solution for six years.
Its stability is good.
Its scalability is also good.
We were using Cisco ASA previously. Palo Alto has strengthened our security policies. It has also made our environment more secure than Cisco ASA.
Its initial setup is straightforward.
I would rate Palo Alto Networks NG Firewall an eight out of ten. It has been working very well.
We use it to control what users may access internally and externally, which covers everything. We are using its latest version. The model that we are using is 3220.
Its flexibility is the most valuable.
Its price can be better. They should also provide some more examples of configurations online.
I have been using this solution for one and a half years.
It is very stable.
We haven't scaled it because if you want to scale it upwards, you have to change the firewall.
I have sometimes used the local support here in Norway. That has been okay. There are no problems.
I have tried Sophos, Cisco, and FortiGate. This is the best firewall.
The initial setup is easy. There is good documentation for this.
Its price can be better. Licensing is on a yearly basis.
I would rate Palo Alto Networks NG Firewalls a ten out of ten. It is the best solution I have tried. I am happy with this solution.
We are using this solution for IDS, IPS, and VPN services.
Also, we are using it for gateway purposes. The development team accesses the data center, and the file intrusion prevention policy.
The most valuable features are the content ID, IPs, and the URL filtering service to enable protection.
The structure is much faster and more sophisticated than Cisco.
Their cloud support is smart.
This solution is very stable, but Cisco devices are stable at the hardware level. Palo Alto hardware is not equal to the level of the Cisco Device.
The hardware is weak.
In the next release, I would like to see faster support and the integrated system a 5G network, a next-generation firewall, and endpoint security.
I would like a collaboration system and reporting ASA policy needs to be smarter.
It's definitely a stable solution.
For LAN purposes, we have 700 plus users.
The technical support is good enough.
We are using Cisco support and they are very good.
The Palo Alto support is faster and their support is also good.
The initial setup is straightforward.
It takes a maximum of two days to deploy.
Two or three guys are enough to deploy and maintain it.
We used vendor support for the deployment.
We plan to continue the usage of this solution in the future and I would recommend it to others.
The product is very good, I would rate Palo Alto Networks NG Firewalls a nine out of ten.
The solution has many great features. I don't know if there's one single one that stands above and beyond everything, however.
The application visibility is excellent. There is no other solution that does it quite as well. Palo Alto definitely has an edge in that sense.
The ability of the security features to adapt is also very good. They offer great DNS protection.
They include everything from a network point of view and a security perspective. For the most part, the endpoints are great.
The interface and dashboards are good.
The GSW needs some improvements right now.
The endpoints could use improvement. The solution is mostly a cloud solution now, and there are a lot of competing solutions that are playing in the space and may be doing things a bit better.
The pricing could be improved upon.
We've been dealing with the solution for the last four or five years at least.
The stability of the solution is good. It's quite reliable. I haven't experienced bugs or glitches that affect its performance. It doesn't crash.
If you size everything appropriately, you shouldn't have any issues with scaling. It's quite good. Users can scale it up if they need to.
I'd say that technical support is excellent. They are very helpful. We've quite satisfied with the level of support we got from the company.
I've never dealt with Huawei, however, our company has worked with Cisco, Dell, and HP among other solutions.
The pricing of the solution is quite high. It's too expensive, considering there's so much competition in the space.
There aren't extra costs on top of the standard licensing policy. Still, Palo Alto seems to be adding some premium costs that competitors just don't have.
While we mainly deal with on-premises deployment models, occasionally we also do hybrid deployments.
We're not a customer. We're a systems integrator. We're a reseller. We sell solutions to our clients.
Palo Alto is very good at policymaking. It's like they have a single policy that you can use. Other solutions don't have single policy use, which means you have to configure everything. There may be many consoles or many tasks that you'll have to worry about other solutions. Multiple task configuration should not be there, and yet, for many companies, it is. This isn't the case with Palo Alto. Palo Alto is easy compared to Fortinet.
It's overall a very solid solution. I would rate it nine out of ten.