Our primary use case was to configure our PSAs for our customized configuration.
Assistant Manager at Net One Systems
Security is a lot easier than its competitors and it has well-integrated software
Pros and Cons
- "I like that it has high security."
- "Palo Alto is a lot easier especially in regards to security."
- "The whole performance takes a long time. It takes a long time to configure."
- "The whole performance takes a long time. It takes a long time to configure."
What is our primary use case?
What is most valuable?
I like that it has high security.
What needs improvement?
The whole performance takes a long time. It takes a long time to configure.
For how long have I used the solution?
I have been using Palo Alto for six years.
Buyer's Guide
Palo Alto Networks NG Firewalls
May 2026
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
895,151 professionals have used our research since 2012.
How are customer service and support?
I contact Palo Alto by email or by phone. Their support is good.
Which solution did I use previously and why did I switch?
I have previously worked with Cisco ASA. Palo Alto is a lot easier especially in regards to security. It is a well-integrated software.
How was the initial setup?
The difficulty of the deployment depends on our clients' environment and their requests.
We require a two-member team for support.
In terms of how long it takes to deploy, again, it depends on the customers' environment. If the request is easy, it can take around two weeks.
What other advice do I have?
I would rate Palo Alto a nine out of ten.
In the next release, they should simplify the deployment process.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
Sr. Solution Architect at a tech vendor with 501-1,000 employees
Good interface and dashboards with excellent application visibility
Pros and Cons
- "The interface and dashboards are good."
- "The application visibility is excellent, and there is no other solution that does it quite as well, with Palo Alto definitely having an edge in that sense."
- "The pricing could be improved upon."
- "The pricing of the solution is quite high. It's too expensive, considering there's so much competition in the space."
What is most valuable?
The solution has many great features. I don't know if there's one single one that stands above and beyond everything, however.
The application visibility is excellent. There is no other solution that does it quite as well. Palo Alto definitely has an edge in that sense.
The ability of the security features to adapt is also very good. They offer great DNS protection.
They include everything from a network point of view and a security perspective. For the most part, the endpoints are great.
The interface and dashboards are good.
What needs improvement?
The GSW needs some improvements right now.
The endpoints could use improvement. The solution is mostly a cloud solution now, and there are a lot of competing solutions that are playing in the space and may be doing things a bit better.
The pricing could be improved upon.
For how long have I used the solution?
We've been dealing with the solution for the last four or five years at least.
What do I think about the stability of the solution?
The stability of the solution is good. It's quite reliable. I haven't experienced bugs or glitches that affect its performance. It doesn't crash.
What do I think about the scalability of the solution?
If you size everything appropriately, you shouldn't have any issues with scaling. It's quite good. Users can scale it up if they need to.
How are customer service and technical support?
I'd say that technical support is excellent. They are very helpful. We've quite satisfied with the level of support we got from the company.
Which solution did I use previously and why did I switch?
I've never dealt with Huawei, however, our company has worked with Cisco, Dell, and HP among other solutions.
What's my experience with pricing, setup cost, and licensing?
The pricing of the solution is quite high. It's too expensive, considering there's so much competition in the space.
There aren't extra costs on top of the standard licensing policy. Still, Palo Alto seems to be adding some premium costs that competitors just don't have.
What other advice do I have?
While we mainly deal with on-premises deployment models, occasionally we also do hybrid deployments.
We're not a customer. We're a systems integrator. We're a reseller. We sell solutions to our clients.
Palo Alto is very good at policymaking. It's like they have a single policy that you can use. Other solutions don't have single policy use, which means you have to configure everything. There may be many consoles or many tasks that you'll have to worry about other solutions. Multiple task configuration should not be there, and yet, for many companies, it is. This isn't the case with Palo Alto. Palo Alto is easy compared to Fortinet.
It's overall a very solid solution. I would rate it nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. reseller
Buyer's Guide
Palo Alto Networks NG Firewalls
May 2026
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
895,151 professionals have used our research since 2012.
President at MT-Data
Awesome stability, great firewall capabilities, and a rather straightforward initial setup
Pros and Cons
- "The solution allows us to set parameters on where our users can go. We can block certain sites or ads if we want to."
- "The stability is awesome."
- "We're working with the entry-level appliances, so I don't know what the higher-end ones are like, however, on the entry-level models I would say commit speeds need to be improved."
- "On the entry-level models I would say commit speeds need to be improved; if I make changes on the firewall and I want to commit changes, that can take two or three minutes to commit those changes."
What is our primary use case?
We primarily use the solution for the firewalls. We're also using the next-gen features to shape what's going on. For example, to figure out what is allowed out and what isn't allowed out on a layer-7 application-aware firewall. We can block based on the application, as opposed to port access.
How has it helped my organization?
The solution helped us stop being policemen to our users. We don't have to run around telling people they can't do certain things. We can just not allow it and walk away from it. We're not out there seeing who is doing what, we just don't allow the what.
What is most valuable?
The solution allows us to set parameters on where our users can go. We can block certain sites or ads if we want to.
The firewall capabilities are very good.
What needs improvement?
We're working with the entry-level appliances, so I don't know what the higher-end ones are like, however, on the entry-level models I would say commit speeds need to be improved.
The appliances I'm working on are relatively old now. We're talking five-year old hardware. That slow commit speed might be addressed with just the newer hardware. However, even though it is slow, the speed at which they do their job is very acceptable. The throughput even from a five-year-old appliance shocks me sometimes.
Currently, if I make changes on the firewall and I want to commit changes, that can take two or three minutes to commit those changes. It doesn't happen instantly.
The solution doesn't offer spam filtering. I don't know whether it's part of their plan to add something of that aspect in or not. I can always get spam filtering someplace else. It's not a deal-breaker for me. A lot of appliances do that, and there are just appliances that handle nothing but spam.
For how long have I used the solution?
I've been using the solution for five years.
What do I think about the stability of the solution?
The stability is awesome. I haven't had any issues with the solution stability-wise. I've got the same firewalls that have been out there for five years and they work great.
What do I think about the scalability of the solution?
I don't work with enterprise-class products. I'm not in that environment. However, so as far as I know, Palo Alto has products that will go that large. Panorama may be able to scale quite well. You can manage all your appliances out of it. They are a very popular license.
Their GlobalProtect license is very much like Cisco's AnyConnect. It does the endpoint security checks. It makes sure they've got the latest patches on and the antivirus running and they've got the latest antivirus definitions and whatnot installed before they allow the VPN connection to happen. It's quite nice.
How are customer service and technical support?
Their support is very good. I've never had any issues with their support. I would say that we've been satisfied with their level of service.
Occasionally there may be a bit of a language issue based on where their support is located.
How was the initial setup?
The initial setup is pretty typical. It's like any firewall. As long as you've worked with next-gen firewalls, it's just a matter of getting your head around the interface. It's the same sort of thing from one firewall to the other. It's just a matter of learning how Palo Alto does stuff. Palo Alto as a system, for me, makes a whole lot of sense in the way that they treat things. It makes sense and is easy to figure out. That's unlike, for example, the Cisco firewalls that seem to do everything backwards and in a complicated way to me.
I haven't worked with enough Cisco due to the fact I don't really like the way they work. That isn't to say that Cisco firewalls are bad or anything. It's just that they don't operate the way I think. That might have changed since they acquired FireEye which they bought a couple of years back.
What's my experience with pricing, setup cost, and licensing?
I know the solution is not inexpensive. It depends on what you ultimately sign up for or whether you just want the warranty on the hardware.
What other advice do I have?
I'm not really a customer. I'm like a consultant. I'm an introduction expert. If I think a client needs a certain technology I point them in the direction of whoever sells it. I do go in and configure it, so I do have experience actually using the product.
When I'm looking for something, I just find someone that sells Palo Alto and I redirect the client towards them. I'm not interested in being in a hardware vendor. There's no money in it. There's so much competition out there with people selling hardware. It doesn't matter where the client gets it from.
We tend to use the 200-series models of the solution.
I'd rate the solution eight out of ten. They do a very good job. The product works well.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Network Security Engineer at Locuz Enterprise Solutions Ltd
Good IPS/IDS capability and good technical support, but more OTP features are needed
Pros and Cons
- "The most valuable features are the IPS/IDS subscriptions."
- "In terms of stability, we have had a very good experience with this product."
- "In the future, I would like to see more OTP features."
- "In the future, I would like to see more OTP features."
What is our primary use case?
We are using this firewall for security purposes.
What is most valuable?
The most valuable features are the IPS/IDS subscriptions.
The user interface is fine.
What needs improvement?
In the future, I would like to see more OTP features.
The price of this product should be reduced.
For how long have I used the solution?
We have been using the Palo Alto Next-Generation Firewall for more than two years.
What do I think about the stability of the solution?
In terms of stability, we have had a very good experience with this product. I would say that it is excellent.
What do I think about the scalability of the solution?
Scalability has not been an issue. It's good.
How are customer service and technical support?
The technical support from Palo Alto is good.
How was the initial setup?
I was not present for the initial setup and deployment. Prior to that, I was not part of the planning.
What other advice do I have?
My experience with Palo Alto is good and I definitely recommend this product. That said, there is always room for improvement.
I would rate this solution a seven out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Vice President, Security Engineering at a financial services firm with 1,001-5,000 employees
Provides us with Zero Trust segmentation and an easy-to-use centralized control
Pros and Cons
- "This solution not only provides better security than flat VLAN segments but allows easy movement through the lifecycle of the server."
- "This solution not only provides better security than flat VLAN segments but allows easy movement through the lifecycle of the server."
- "I wish that the Palos had better system logging for the hardware itself."
- "I wish that the Palos had better system logging for the hardware itself."
What is our primary use case?
We use this solution for Zero Trust Data Center Segmentation with layer 2 Palo Alto firewalls. Segmentation has allowed us to put servers into Zones based off VLAN tags applied at the Nutanix level and can change "personalities" with the change of a VLAN tag. Palo Alto calls the "Layer 2 rewrite". By default, all traffic runs through a pair of 5000 series PAs and nothing is trusted. All North and South, East and West traffic is untrusted. No traffic is passed unless it matched a rule in the firewalls. There is a lot of upfront work to get this solution to work but once implemented adds/moves/changes are easy.
How has it helped my organization?
This solution not only provides better security than flat VLAN segments but allows easy movement throughout the lifecycle of the server.
What is most valuable?
The most valuable feature is the ease of use of the central Panorama to control all firewalls as one unit for baseline rules and then treat each firewall separately when needed.
What needs improvement?
I wish that the Palos had better system logging for the hardware itself.
For how long have I used the solution?
We have been using this solution for four years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security Unit Manager at EEMC
Protects your network against attacks and threats and enables you to know what's going on in your network from security perspective
Pros and Cons
- "The initial setup was very easy."
- "This solution has really helped the technical engineers to deliver the implementation faster than before."
- "The advanced manual protection needs to be improved a little bit because they used to make a cloud manual analysis for the cloud."
- "Their support is very limited. It's limited compared to the competitors."
What is our primary use case?
Upstream and data center NGFW.
How has it helped my organization?
Security, visibility and control, you can secure your environment from many types of attacks such as virus, malware, DoS attacks, intrusions, bad URLs, bad domains with basic DNS security which it an awesome feature.Visibility, that you will be aware of the is going on inside your network, such as malicious activities, decrypt the encrypted packets, as well as policy audit review.
This solution has really helped the technical engineers to deliver the implementation faster than the before.
What is most valuable?
All of the features are good. The new release of the new basic platform provides you with a huge number of features, such as policy review, DNS security, Machine learning, Network traffic profiling, Bare metal analysis
What needs improvement?
(Malware) On-prime scanning should be considered.
Endpoint management (traps) better to be on-prime than cloud.
QoS, It should be more sophisticated than it is now.
TAC support should cover meddle east area by Arabic support, such as in France, Germany, Italy and Japanese.
For how long have I used the solution?
I have been using the solution for more than nine years.
What do I think about the stability of the solution?
I like the stability of the solution. From a stability perspective, all of them are stable. Sometimes Cisco's older versions, maybe from two years ago, were not as stable. Now, Cisco has improved its firewall and security products.
What do I think about the scalability of the solution?
In terms of scalability, no security products are scalable to upgrade. Not ever. While assuming you are dealing with scalability, you have room to increase or to have room to expand, but actually, you don't because there is limited support. Even if you bring in the highest model, it's still limited.
How are customer service and technical support?
Their support is very limited. It's limited compared to the competitors. They need multi-language support. Now, they provide support in English only.
If anyone in the Middle East opens a ticket, they have to do it in Arabic but they get support in English, not in Arabic. The communication between the technical people or the campus sites to the vendors now is in English.
How was the initial setup?
The initial setup was very easy. All the initial setups have become very easy. Before, the setup used to take a week to implement a firewall. Now it's a couple of minutes or one day maximum for fine-tuning. To fine-tune the firewall it can take one day, two days if you are junior. In terms of how many people you will need to deploy the solution, it depends because the firewall is not a straightforward technology like any security program.
What about the implementation team?
We used on-site security advisors.
What was our ROI?
7 years
What's my experience with pricing, setup cost, and licensing?
In terms of pricing, every model has a license. For example a small model, the license around 1,000 USD. The next one around 2,000 USD. The next range is 11,000 USD to 13,000 USD. It's expensive compared to PaloAlto competitors.
Which other solutions did I evaluate?
Yes, was fortinet
What other advice do I have?
Palo Alto's firewall protects your network against attacks, threats, and many other things. Networking can be more advanced. You can upgrade the edition of Palo Alto. There's competition between Palo Alto and Fortinet firewalls. Most IT security people don't know which to pick. For a basic firewall, I recommend Fortinet because it has two or three basic firewalls. I personally need a data center firewall. Datacenter firewalls I would recommend FortiGate because of the support. It provides a high level of support.
The latest Palo Alto release has many new features. It can provide you with audits, and policy auditing for a policy review. This allows you to know what's going on inside the network from a quality perspective because sometimes you can create new policies - up to one million policies. You can choose policies, and sometimes you get something by mistake. It provides you with an ability to view or do a policy review or policy audit. This is a major feature. It's a very important feature because before it was impossible to bring the visibility to the policy audits to let me know what's going on inside my policies. Now Palo Alto has provided this feature.
In terms of advice I'd give to someone considering this solution, I'd say they should read more before going to the implementation phase. They have to read the administrative guides, and product guides before going to implementation. They have to check the platform because different versions of the platform have some new features. The technical people have to review before going to implement it because sometimes they don't need to upgrade this platform or this version. It is not a stable version. You have to read more before going to do the implementation. Ask an advisor, the vendors or call Palo Alto. You can call them, they have great coverage in any country in the world. You can ask the technical engineers what is the best design, their recommended design.
I would rate this solution an eight out of 10.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Consultant for the Chairman at Financial Literacy Knowledge Hub
Enables us to differentiate between Oracle and SQL traffic but it could use more reporting tools
Pros and Cons
- "We have found the application control to be the most valuable feature. Also, Layer 7, because all other products are working up to the maximum capacity. But Palo Alto is benefiting us, especially in application control management. We are able to differentiate between Oracle traffic and SQL traffic."
- "We have found the application control to be the most valuable feature, and Palo Alto is benefiting us, especially in application control management, as we are able to differentiate between Oracle traffic and SQL traffic."
- "The solution needs some management tool enhancements. It could also use more reporting tools."
- "The solution needs some management tool enhancements."
What is our primary use case?
We use the firewall for securing the data center. We have designed it to be a two-stage firewall. We have a perimeter firewall which is not Palo Alto, and then the Palo Alto firewall which is acting as a data center firewall. We are securing our internal network, so we have created different security zones. And we assign each zone a particular task.
What is most valuable?
We have found the application control to be the most valuable feature. Also, Layer 7, because all other products are working up to the maximum capacity. But Palo Alto is benefiting us, especially in application control management. We are able to differentiate between Oracle traffic and SQL traffic.
What needs improvement?
The solution needs some management tool enhancements. It could also use more reporting tools. And if the solution could enhance the VPN capabilities, that would be good.
For how long have I used the solution?
I have been working with this solution for four to five years now.
What do I think about the stability of the solution?
The solution is very stable, but I think the local providers have no sufficient products. We are looking for more support.
What do I think about the scalability of the solution?
The solution is very scalable. We are trying to increase usage. We are planning already to increase our internet center. We are planning to extend our users to around 1,500. Currently, we have about 700 users.
How are customer service and technical support?
The local consultant support needs some improvement. External support is sufficient for us.
How was the initial setup?
The initial setup was easy for us to implement.
What about the implementation team?
We used a consultant for the deployment portion.
What other advice do I have?
I would rate this solution 7 out of 10.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Vice President & Head Technology Transition at a tech services company with 10,001+ employees
The solution is generally stable, and easily scalable
Pros and Cons
- "The solution is scalable"
- "We have seen a return on investment; some of the use cases that we have already delivered to the organization have shown that a lot of threats have been identified and have been blocked, and at the same time, the effort was significantly reduced on the deployment of new routes based on this."
- "The support could be improved."
- "The support could be improved."
What is our primary use case?
We have multiple IPS applications, and other multiple use cases.
What is most valuable?
We are using pretty much all of the features. This is deployed in our parameter and pretty much provides for different functionalities, for all incoming traffic and outgoing traffic.
What needs improvement?
The support could be improved.
The next release could use more configuration monitoring on this one, and additional features on auditing.
For how long have I used the solution?
I've been using the solution for three years.
What do I think about the stability of the solution?
The solution is generally stable. There are no issues. We have forty-thousand users.
What do I think about the scalability of the solution?
The solution is scalable, yes. We don't plan on increasing usage.
How are customer service and technical support?
We are being provided with decent support but some of the RCS, some of the issues can be resolved much faster.
Which solution did I use previously and why did I switch?
We were using Check Point. We switched because of certain features: entire equity, ideas, application visibility, single interfacing, etc.
How was the initial setup?
The initial setup was complex. We're in the process of replacing it in seventy or so locations, and setup is still ongoing, but going well. It was complex because of the multiple zones that we had to create. We had multiple interfaces so there are multiple complexities that we had to address. We don't require extra staff to maintain the solution.
What about the implementation team?
We implemented through a system integrator.
What was our ROI?
We have seen a return on investment.
I don't have data points, but some of the use cases that we have already delivered to the organization have shown that a lot of threats have been identified and has been blocked. I don't know how you can quantify that. At the same time, the effort was significantly reduced on the deployment of new routes based on this.
What's my experience with pricing, setup cost, and licensing?
I think, if you compare, they're a little costly next to Cisco of Check Point, but they offer a lot of other additional features to look at. The licensing is annual, and there aren't any additional fees on top of that.
Which other solutions did I evaluate?
We actually did not but we were using two or three other products already, so we had a good idea of what to expect.
What other advice do I have?
I'd say the blueprint of the implementation needs to be ready before you start the implementation of the product. The product is generally stable and the team provides a good presence on it, but at the end, if you're putting it in the mission-critical data center, the planning needs to be extensive.
I would rate this solution an eight and a half out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2026
Product Categories
FirewallsPopular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos Firewall
Cisco Secure Firewall
WatchGuard Firebox
Check Point Quantum Force (NGFW)
Cisco Meraki MX
Check Point Harmony SASE (formerly Perimeter 81)
Azure Firewall
Check Point Cloud Firewall (formerly CloudGuard Network Security)
SonicWall TZ
Fortinet FortiGate-VM
Palo Alto Networks VM-Series
Juniper SRX Series Firewall
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Palo Alto the best firewall for an on-premise/cloud hybrid IT network?
- What are the main differences between Palo Alto and Cisco firewalls ?
- Expert Opinion on Palo-Alto Required.
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Features comparison between Palo Alto and Fortinet firewalls
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- What are the main differences between Palo Alto firewalls and Cisco Secure Firepower?
- Which is better - Palo Alto Networks NG Firewalls or Sophos XG?
- What is a better choice, Azure Firewall or Palo Alto Networks NG Firewalls?
- Which Palo Alto Networks NG Firewalls model is recommended for 1200 users?












