Try our new research platform with insights from 80,000+ expert users
NGfrwall677 - PeerSpot reviewer
Sales Engineer at a wholesaler/distributor with 51-200 employees
Real User
Good configuration capabilities, easy scaling abilities, and good functionality
Pros and Cons
  • "Good functionality and features."
  • "Could also use better customer support."

What is our primary use case?

I use the solution for firewalls.

What is most valuable?

I find the configuration the most valuable.

What needs improvement?

The support in our country can be slow sometimes. It's a slow website. It could also use better customer support.

For how long have I used the solution?

I have been using this solution for 1.5 years.
Buyer's Guide
Palo Alto Networks NG Firewalls
May 2025
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
856,873 professionals have used our research since 2012.

What do I think about the stability of the solution?

The solution's stability is normal.

What do I think about the scalability of the solution?

My impression of the scalability is that it is easy.

How are customer service and support?

I contacted technical support a lot of times. Most of the time, they were pretty good, but sometimes technical support couldn't resolve the issue, and they don't know what to do.

How was the initial setup?

The setup of the firewalls has medium difficulty. On one configuration it was easy, and on another one it was hard. Sometimes it's normal to configure sometimes it's more complex. You only need one person, maybe two, for deployment at a company.

What about the implementation team?

I did the implementation myself.

What's my experience with pricing, setup cost, and licensing?

At our company, we sell the solution for another vendor, and they sell to another vendor. So our pricing is more expensive than other vendors. 

Which other solutions did I evaluate?

I didn't look at any other vendors.

What other advice do I have?

The functionality is good and so are the features. In terms of implementing the solution, I wish it was better. I would rate the solution 8 out of 10, mostly due to the technical issues I've experienced.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
PeerSpot user
Sales Solutions Engineer at a tech services company with 201-500 employees
Reseller
Enables us to evaluate traffic in the customer environment by providing detailed reporting on the traffic and applications
Pros and Cons
  • "One of the best firewalls on the market."
  • "The user interface is a bit clumsy and not very user-friendly."

What is our primary use case?

The primary use for this product is for security as a firewall by a sales engineer for the guest environment.

How has it helped my organization?

It allowed us to evaluate traffic in the customer environment by providing detailed reporting on the traffic and applications.

What is most valuable?

The WildFire feature is one of the best features in this firewall. WildFire extends the capabilities of Palo Alto firewalls to block malware. The best feature for the reseller is Service Lifecycle Reviewer, SLR. You deploy Palo Alto Network Firewall to the customer environment and it collects data about customer environment, customer traffic. After a week, Palo Alto generates a report to review the traffic. The report tells what applications were touched and how users used these applications in the environment, as well as additional details. So for resellers, you just go to the customer, deploy the Palo Alto in the basic mode so the customer doesn't need to customize anything in their environment because Palo Alto works to meter traffic out of the box.

Of course, the reports register app ID, user ID, the space of the app IDs, the database of these app IDs and other common data. It is a great feature in the Palo Alto product.

What needs improvement?

The manufacturer can improve the product by improving the configuration. Some of the menus are difficult to navigate when trying to find particular features. It is not entirely intuitive or convenient. You might need to configure a feature in one menu and next you need to go to another tab and configure another part of the feature in another tab. It's not very user-friendly in that way. On the other hand, it's still more user-friendly than using the console. But this is certainly one feature they can improve.

What do I think about the stability of the solution?

It's a great firewall, really one of the best in the market. It is one of few firewalls that can claim to be better than Cisco. It functions well, is very stable, and its reputation is known in the market.

What do I think about the scalability of the solution?

I think that the product is very customizable. If you don't need to protect a lot of assets, you can buy a small firewall at a low price for small needs, but if you need you can buy a bigger solution with more features. Scalability is very easy with Palo Alto Networks.

Which solution did I use previously and why did I switch?

Actually, I have moved away from using this product because of changes in duties.

How was the initial setup?

Installation is really very straightforward. You just need to plug it in and connect to the environment and that's all. Deployment time depends on the size of the environment and customer needs. Some customers just need two or three policies and that's all. But some customers need more policies designed to cover the needs of specific departments. So deployment depends on the size of your environment. If it's a small company, it's not very hard to deploy the main features of Palo Alto, it may take an hour but not more than a day. It depends on the customer needs and size of the environment.

What about the implementation team?

I work as the system integrator, so I install instances of Palo Alto myself. It was the first security product that I learned to work with.

Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller.
PeerSpot user
Buyer's Guide
Palo Alto Networks NG Firewalls
May 2025
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
856,873 professionals have used our research since 2012.
reviewer1132443 - PeerSpot reviewer
Works at a computer software company with 201-500 employees
Real User
Country blocking, URL filtering, reporting, and visibility help to enforce our acceptable use policies
Pros and Cons
  • "One of the things I really like about it is that we have the same features and functions available on the entry-level device (PA-220), as do large corporations with much more costly appliances."
  • "The initial configuration is complicated to set up."

What is our primary use case?

I use the PA-220 to protect the LAN at my small-ish (about twenty people) office. We have several remote users who use the GlobalProtect VPN. As we move into a data center for hosting, I'll buy a second PA-220 to set up a site-to-site VPN. We also have a VM-50 for internal testing and lab use. 

How has it helped my organization?

I'm writing this review because it's a great product and I think it's ranked much too low on the review ratings. One of the things I really like about it is that we have the same features and functions available on the entry-level device (PA-220), as do large corporations with much more costly appliances.

With all the bells and whistles turned on, I can block access to websites based on their location (country), content, or other criteria. The reporting is really useful and shows me the most frequently used applications, and provides me with great visibility as to what my network users are doing on the internet. With this firewall in place, I can finally enforce the variety of acceptable use policies which have existed only on paper. 

What is most valuable?

The most valuable features are blocking traffic by country, and URL filtering to improve policy compliance and our overall cybersecurity posture. The ad blocker is also pretty handy. Moreover, the VPN client has turned out to be more useful than I initially thought, and the users love the 'one-click' connect. 

What needs improvement?

The initial configuration is complicated to set up. You really have to know what you're doing. I attribute that to all of the features and functions that are built into the product. Luckily, Palo Alto has a great support site and you can find contractors who are knowledgeable in the technology.

For how long have I used the solution?

One year.

How are customer service and technical support?

Technical support for this solution is great.

Which solution did I use previously and why did I switch?

Previously we used a pfSense firewall. I was very unhappy with it, as it had a limited feature set and was not intuitive to configure. 

How was the initial setup?

The initial setup is complex, due to all the features offered. You really have to know what you're doing.

What about the implementation team?

Implemented through a vendor who was knowledgeable with the product. It took at least a few months of tweaking before we got the firewall to the point it's currently at. 

What's my experience with pricing, setup cost, and licensing?

It will be worth your time to hire a contractor to set it up and configure it for you, especially if you are not very knowledgeable with PA firewalls. 

Which other solutions did I evaluate?

We looked at Cisco Meraki, but I wasn't really all that happy with it. 

What other advice do I have?

I've used it and I'm very happy. Frankly, I think this site under-rates the technology, as it should be in at least the top three.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Network Engineer at Acliv Technologies Pvt Ltd
Real User
Secures and deeply analyzes connections
Pros and Cons
  • "The most valuable feature is the ability to deeply analyze the connection or connection type."
  • "Overall it is good. It is reliable and easy to understand. However, the monitoring feature could be improved."

What is our primary use case?

We use this solution to block malicious or suspicious activity by creating policies that define which action should be blocked or allowed.

How has it helped my organization?

The firewall is a security device. We use this solution to create policies like ISPs for a specific purpose. We only allow the policies for a particular application, so this is a way for the firewall to secure an unwanted connection.

What is most valuable?

The most valuable feature is the ability to deeply analyze the connection or connection type.

What needs improvement?

Overall it is good. It is reliable and easy to understand. However, the monitoring feature could be improved.

They have many solutions already. I don't think I have seen any missing features. Every device has different functions, but as a firewall, this solution has a lot.

For how long have I used the solution?

I have been using this for three years.

What do I think about the stability of the solution?

Stability is good.

What do I think about the scalability of the solution?

There are no scalability issues to date.

We have about 2,500 users behind the firewall using this solution. I think we don't have any requirement to increase usage. Currently, we have around 2,500 users, but if this increases, we may need a new requirement.

We hired one or two people to maintain the solution.

How are customer service and technical support?

Technical support is good. Once you call up with your issue, it takes around one or two hours for them to contact and give you a solution accordingly.

Which solution did I use previously and why did I switch?

We were using Cisco ASA. We switched because of legal reasons and difficulty to understand. That's why they had decided to change to Firewall.

How was the initial setup?

It is very easy to use. It's straightforward, easy to understand, and easy to configure.

What about the implementation team?

Deployment time depends on your requirements. If you talk about the system requirements, it hardly takes up to 15 or 20 minutes for the configuration.

That said, it totally depends on your requirements: What kind of policy you require that supports what kind of block, etc.

The deployment time would change based on these requirements, but the system configuration: accessing the internet and creating policies hardly takes 20 minutes.

Deployment is configured by administrators, so if we have any kind of issue in policies or any confusion, we get tech support.

What's my experience with pricing, setup cost, and licensing?

Pricing is yearly, but it depends. You could pay on a yearly basis or every three years.

If you want to add a device or two, there would be an additional cost. Also, if you want to do an assessment or another similar add-on you have to pay accordingly for the additional service.

Which other solutions did I evaluate?

We also evaluated Check Point and Fortinet solutions.

What other advice do I have?

This solution is easy to understand, reliable, and user-friendly.

I would rate this solution as eight out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Partnerf4b9 - PeerSpot reviewer
Partner & vCISO at a tech services company with 51-200 employees
Real User
It has better manageability and overall features than its competitors
Pros and Cons
  • "We standardized on the product and got rid of several other types of firewalls from different vendors."
  • "It is very scalable."
  • "I would like integration with Evident.io and RedLock."
  • "The data loss prevention (DLP) capabilities need to be beefed up."

What is our primary use case?

Firewall.

How has it helped my organization?

We standardized on the product and got rid of several other types of firewalls from different vendors.

What is most valuable?

The firewall has a lot of sub-capabilities underneath it.

What needs improvement?

I would like integration with Evident.io and RedLock.

The data loss prevention (DLP) capabilities need to be beefed up.

What do I think about the stability of the solution?

The stability is good.

What do I think about the scalability of the solution?

It is very scalable.

How are customer service and technical support?

We have had that many problems, so we haven't had to engage with their tech support.

Which solution did I use previously and why did I switch?

I was not pleased with my previous solutions.

We switched to Palo Alto for better manageability and overall features.

How was the initial setup?

The initial setup was pretty straightforward.

What about the implementation team?

We deployed in-house.

What's my experience with pricing, setup cost, and licensing?

Annually, the licensing costs are too much.

What other advice do I have?

I would certainly encourage someone to look into this solution.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user961413 - PeerSpot reviewer
IT Technician / Support
User
I like GlobalProtect, the URL filtering and the threat prevention, but the boot time should be improved on

What is our primary use case?

Finding a solution for easy management, where the company is protected in a matter where an unwanted software is blocked.

How has it helped my organization?

Functional and very futureproof but a bit hard to manage, and the worst thing is that it takes almost 20 mins to boot up, and to commit a config takes half that time.

What is most valuable?

  • GlobalProtect
  • URL filtering
  • Threat prevention. 

These features are great, but they have drawbacks and could be a bit better, flexible, and easy to manage since it takes the admin time to get them right. 

What needs improvement?

  • Boot time
  • Easy UI for the non-network specialists
  • Commit time
  • Virtualization
  • Credit to Palo Alto knowledgebase. 

For how long have I used the solution?

One to three years.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
PeerSpot user
Network Security Engineer at Data Consult
Real User
Gives us visibility and protection for the entire network
Pros and Cons
  • "I like to install Palo Alto mainly on the data center side to have visibility into all VLANs. That gives full visibility into the core."
  • "I'm thinking about a new feature. They have decryption. It's a good idea to use decryption on Palo Alto. It would be good if they had offloading of the traffic, and if they could decrypt the traffic and offload it. Like, for example, ASM on our site. We have an SSL decryption to offload the traffic. We could use that on Palo Alto."

What is our primary use case?

I used Palo Alto firewalls for plenty of projects and have many use cases.

When working with App-ID, it is important to understand that each App-ID signature may have dependencies that are required to fully control an application. For example, with Facebook applications, the App‑ID Facebook‑base is required to access the Facebook website and to control other Facebook applications. For example, to configure the firewall to control Facebook email, you would have to allow the App-IDs Facebook-base and Facebook-mail.

How has it helped my organization?

I like to install Palo Alto mainly on the data center side to have visibility and protection into the network because we can configure the SVI (layer 3) on Palo Alto instead of the core switch.

It gives us full visibility and protection for the core of the network.

What is most valuable?

Visibility and Protection

It gives us good visibility into the network, and this is very important because it's the core of the network. All the packets go through the firewall.

MFA is a new feature in Palo Alto and it's good to use it.

What needs improvement?

I'm thinking about a new feature. They have decryption. It's a good idea to use decryption on Palo Alto. It would be good if they can offload the traffic.
Like, for example, SSL Offloading on F5. They have an SSL decryption to offload the traffic. 

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

Palo Alto is very stable. I worked on Cisco products like FTD and Firepower, and they are not as stable as Palo Alto. Also, some Fortigates are not stable. Palo Alto, as far as I know, is the most stable firewall compared to these others.

What do I think about the scalability of the solution?

The solution is scalable because they are now using the next generation security network. They are integrating with endpoint protection. Palo Alto now has traps, so they integrate their traps and the next generation with the cloud. So it is scalable.

How are customer service and technical support?

Technical support in Cisco is better than Palo Alto. In Cisco, you can directly talk to the top engineers.

Which solution did I use previously and why did I switch?

We were using Cisco ASA. When Cisco moved to the next generation firewall or tried to move to the next generation firewall when they acquired Sourcefire, and they announced Firepower on ASA, it was not a good option.
They had tool management so you could configure ASA from the CLI and you could configure it on the Firepower. You need to redirect the traffic from ASA to Firepower. It was not a good idea. The packets were processed but there was latency in the packets. 
Nowdays, FTD has many problems and bugs.

When selecting a vendor, the important criteria is how much the appliance is powerful and if it gives me the feature that I want, not an appliance that does everything and it will affect the throughput. Also, the value of the product, the price. 

There has to be a match between the price and the features.

Which other solutions did I evaluate?

Palo Alto, Cisco.

What other advice do I have?

Buy Palo Alto and try its features. In Palo Alto, you have select prevention, scan over AV, anti-spyware, vulnerability protection. and file blocking. you have good feature like WildFire to protect against unknown malware.

I rate Palo Alto at eight out of 10 because it gives me visibility and protection. This visibility and protection are very important nowadays to protect you from hackers.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
InfTech4985 - PeerSpot reviewer
Head, Information Technology at a construction company with 201-500 employees
Real User
Meets our expectations, providing application control, antivirus, and content filtering
Pros and Cons
  • "It has the typical features of a next-generation firewall. It can do application control, antivirus, content filtering, etc."
  • "I would like to see more in terms of reporting tools and the threat analysis capabilities."

What is our primary use case?

It is our main firewall. It has performed well. It meets our expectations.

What is most valuable?

It has the typical features of a next-generation firewall. It can do application control, antivirus, content filtering, etc. And in terms of performance, the value for money of the model that we bought is sufficient for our size.

What needs improvement?

I would like to see more in terms of reporting tools and the threat analysis capabilities.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

It's very stable.

What do I think about the scalability of the solution?

For our current size and our projected growth, it is sufficient. We are expecting to grow to about 1000 users. This is the type of bandwidth we need, based on our typical usage. The specific model we bought can scale up to that number. We built in that room for growth.

In addition, we can expand the scope not just as a firewall but also by doing some sandboxing and through integration with endpoint security solutions.

How are customer service and technical support?

I don't believe we have used any support directly from Palo Alto itself because we bought it through a local reseller. We engaged them to help us configure it and to put up some of the firewall rules that we need. So we work with a local vendor.

Which solution did I use previously and why did I switch?

We had another box before and it wasn't a next-generation firewall. We needed to change to a next-generation firewall so we compared a few of the top players in the market and Palo Alto was the right one, in terms of the features that we need.

We were using an outdated firewall and, because of the growing threats, things were getting through. We were not able to filter some of the traffic the way we wanted. It was high time that we went with a next-generation firewall.

In terms of a vendor, in my case, I was referred to the local vendor, the one that we would be deploying and working with on the implementation. We definitely look for the competency, their knowledge of the subject matter, in this case, firewall technology, networks, etc., and their knowledge of the product. And, of course, the other factor is their commitment and their value-added solutions because sometimes we need them to go beyond to address a certain problem that we may have.

How was the initial setup?

I don't think setup is that complicated. There was just a bit of a learning curve because none of us had any experience with Palo Alto. But we know firewalls and it worked. It wasn't that difficult.

Which other solutions did I evaluate?

We called in proposals for different products, bigger players, like Check Point, Fortinet, Cisco. We set the criteria we need and had them make proposals. We found, based on the submissions, that Palo Alto seemed to be the one that had the most complete solution. We did a proof of concept to prove that whatever they said they can do, they can do. Once we passed that stage we proceeded with the purchase of the Palo Alto unit.

It came down to the technical evaluation we did. They did well in terms of performance. In addition, we liked the support terms that were proposed by the reseller. We also looked at certifications and reviews, at the NSS Labs reports, and other industry ratings. Palo Alto seemed to be up there. Also, looking toward the future, we can actually subscribe to sandboxing services in the cloud. There are also options for us to integrate with endpoint security solutions.

What other advice do I have?

List your requirements, give them the proper weighting, and look at what future options are available if you stick with the solution. Then do your evaluation. And don't forget the vendor, the local support, their competency and their commitment. You can have the best product in the world but if you don't get the right person to support you, it's a waste. You would probably better off with a second- or a third-tier product if you have an excellent, competent, and committed vendor to support you.

I would rate Palo Alto at eight out of 10 because of the performance, the security features, and policy management, the reporting capabilities, and the optional upgrades or extensions that we can do, like sandboxing. It also offers an option for our integration with our endpoint security.

We are going to revamp our endpoint security architecture. One of the options we're looking at is how we can integrate that with solutions from Palo Alto, because then we can have a more consolidated view, instead of using a third-party solution as the endpoint security. Finally, the local support is important.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2025
Product Categories
Firewalls
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros sharing their opinions.