The solution is more towards the front of the security stack.
We use both AWS and Alibaba Cloud.
The solution is more towards the front of the security stack.
We use both AWS and Alibaba Cloud.
The single pass architecture has helped a lot in the implementation and maintenance of Palo Alto Networks. It changed the customer's opinion on UTM platforms. In the past, when customers used UTM platforms, they feared the security features would impact the performance and slow down the network, causing some instability. However, with the single pass architecture, Palo Alto has demonstrated that you can use a lot of the security features without having an impact on the security and network performance. Therefore, most of our customers will dare to use most of Palo Alto Networks' security features.
Palo Alto NGFW provides a unified platform that natively integrates all security capabilities. Most of our customers are busy. They cannot afford the time to learn very complicated user interfaces and configuration procedures. With Palo Alto Networks, they offered a unified user interface for all its NG Firewall products and Panorama. I think it reduces some of our customers' maintenance time.
Palo Alto NGFW’s unified platform has helped our customers eliminate security holes. With a unified platform, customers can deploy the NG Firewall both in the data center edge, inside the data center, and in the product/public cloud environments. They have the same user interfaces and platform, so they can be maintained by a single unified platform called Panorama. Customers can use Palo Alto Network NG Firewalls in all the places where they need to protect their environments. This helps to decrease security holes.
Over the past one or two years, Palo Alto Networks has added a lot of features into the NG Firewall products. I think this is becoming more complicated for our customers. Therefore, we could use some best practices, best practice tools, and implementation guides for some of the complicated features.
I have been using it for eight years, though my company does not use it.
Compared to its competitors, the stability of NG Firewalls is very good. We have faced some strange problems with the hardware platform or operating system. Most of these customer cases come from complicated configs and bugs. However, stability is very good overall.
Scalability is not that good. Palo Alto Networks NG Firewalls product is for middle-sized and small businesses. It has fixed parts and capacities for processing. Some of their higher-end products have the scalability to expand capacities, but only a few customers can afford their larger product.
I would rate it as eight to nine out of 10. Most of the technical engineers, who provide support for our customers, are efficient. There are one or two Tier 1 tech support engineers who often don't have answers.
Palo Alto NGFW’s unified platform has helped to eliminate multiple network security tools and the effort needed to get them to work together with each other. Before using Palo Alto Networks NG Firewalls, customers might need to implement Layer 4 firewalls, IPS and possibly an antivirus, gateways, and maybe web proxies for all their devices. With Palo Alto NGFW’s unified platform, if a customer can do all the config and security policies on one platform, then this will merge all their security things onto a single platform.
The initial setup is not complex; it is straightforward. Our users only need a cable and some basic steps to configure the management interface. Then, it can set up the NG Firewall and ensure that the network and routing are working as expected in the environment. I think its steps are easier than most of its competitors. The initial setup takes one or two hours.
The full setup time depends on the features, then whether the environment or customer needs are complicated or not.
For our implementation strategy, we talk to our customers and work out documents for all their configs, which includes basic information that we need to know for implementing the firewall. Then, we follow the documents and do the implementation. We also may modify some content of the documents as the project processes.
It needs one or two employees with enough skills to manage and maintain it. They may need to modify firewalls, firewalls security rules, and possibly inspect alerts that are generated from firewalls.
By having a customer operate on a unified platform, they can do the application control, traffic control, threat protection, and URL filtering on a single platform. This effectively reduces the workload on all their networks and security tools.
Cheap and faster are the opposite sides of security. Security inspections have some technical and money costs. If you just purchase some cheap, fast firewalls, then you will lose a lot of the security features and fraud protection capabilities.
My company uses Cisco Firepower NGFW Firewall, not Palo Alto Networks NG Firewalls. We started our cooperation with Cisco a lot longer than with Palo Alto Networks. We have been working with Cisco to expand their business in China for more than 20 years, which is why the leaders in our company might be choosing Cisco products.
Most of our customers have been using Palo Alto Networks for a long time and do not want to change to another vendor. The unified user interface is a big benefit for them.
Palo Alto NGFW’s DNS Security is an effective way to detect and block DNS tunneling attacks, because most competitors do not have these techniques to detect the DNS tunneling on a single device. They require maybe a SIM or some analysts. So, this is something quite creative for Palo Alto Networks.
For our customers, I would tell them that Palo Alto Networks NG Firewalls is easy to use, but probably difficult to master. It has a very easy to use interface and configuration utility, but it has a lot of advanced features that need some deep knowledge of the product.
No product can guarantee 100% evasions being blocked, but I think Palo Alto is among the top of the threat inspection vendors. From the NSS Labs Test Report, we can see that Palo Alto Networks always has a top score.
Machine learning in a single firewall is not that accurate or important for our customers. Since it will only see some network traffic, it cannot connect everything together, like endpoints and servers. Therefore, our customers do not value the machine learning techniques on a single firewall very much.
We may review the alerts generated by machine learning modules, then we can see if the alerts are real alerts, not false positives. This may tell us how efficient machine learning is.
Very few customers in China have used the Palo Alto NGFW’s DNS Security module. It is a new feature that was introduced only two years ago. Customers already know what the product can provide in terms of protection. Its DNS Security provides something that is not really easy to understand. Also, it increases the cost of the firewall because it requires another license to be implemented, and the cost is not low.
DNS Security is very impressive, and I think it will be an efficient way to block the rapidly changing threat landscape and maybe Zero-day attack methods.
Biggest lesson learnt: If you want to protect something, you need to gain visibility of the entire network. NG Firewalls provides a deep visibility into network traffic.
I would rate Palo Alto Networks NG Firewalls as nine out of 10.
We use Palo Alto Networks NG Firewalls as a gateway for our data center and server files because they are a reliable and robust device, and the best in the security field. We also use their threat intelligence and threat protection services, which are like brass fittings.
Palo Alto enables telemetry and enriches their systems to protect our network against threats, which is why machine learning helps us secure our network.
Palo Alto Networks NG Firewalls have enhanced our security by around 20 percent.
The solution provides a unified platform that natively integrates all of our security capabilities.
Palo Alto Networks NG Firewalls help eliminate security holes by stopping all the known and unknown vulnerabilities that we are seeing in our network.
The single-path architecture has improved performance and latency.
The application awareness feature that recognizes application IDs and vulnerability protection are Palo Alto Networks NG Firewalls' most valuable features.
The price is high and has room for improvement.
We have Elite Plus partner support, which means we always have to speak to a partner to open a case. However, not all of the partners are knowledgeable or helpful.
I have been using Palo Alto Networks NG Firewalls for two years.
Palo Alto Networks NG Firewalls are stable.
When it comes to virtual machine editions or the cloud, I think they are more scalable than hardware.
We have three administrators, 1,000 end users, and up to 400 servers that use Palo Alto Networks NG Firewalls.
We previously used Fortinet FortiGate firewalls but switched to Palo Alto Networks NG Firewalls for their superior performance. We also chose Palo Alto Networks because Gartner's reviews of their firewalls have consistently been better than those of Fortinet.
The initial setup is straightforward. However, enabling the security features and starting traffic inspection can be complex. The physical installation is easy.
The deployment for one device takes one day.
We have seen a return on investment in the two years that we have been using the solution.
Palo Alto Networks NG Firewalls' price is expensive.
I give Palo Alto Networks NG Firewalls a nine out of ten.
I recommend Palo Alto Networks NG Firewalls.
We use this solution to protect the perimeter and use it as a proxy for the servers.
We have the firewalls installed in our data center at present and are planning to put them in the corporate and branch offices as well.
A couple of years ago, we removed the explicit proxy for the servers and made the proxy transparent for the servers. We were able to make it softer for the servers' web filtering.
Palo Alto Networks NG Firewalls provide a unified platform that natively integrates all security capabilities. They have a couple of solutions in the cloud that we are trying to add to our ecosystem.
Because Palo Alto Networks NG Firewalls are installed in our data center, it is very important that Palo Alto embeds machine learning in the core of the firewall to provide inline, real-time attack prevention. We need to protect our servers.
The cloud could be improved. I would like to have more visibility of the network vulnerabilities as well.
I've been using Palo Alto Networks NG Firewalls for more than five years.
The stability is good.
Palo Alto Networks NG Firewalls have good scalability.
Palo Alto's technical support is good, and I would rate them an eight out of ten.
Positive
Overall, I would rate Palo Alto Networks NG Firewalls a nine on a scale from one to ten.
We use Palo Alto Networks NG Firewalls for security purposes and to mitigate risk.
Palo Alto Networks NG Firewalls enabled us to have better visibility overall.
The inline, real-time attack prevention provided by embedded machine learning is not bad.
Also, the firewalls are moderate in terms of securing data centers consistently across all workplaces, i.e., from the smallest office to the largest data centers.
We have been able to reduce downtime because we have better visibility. We're faster and can act preemptively.
Palo Alto Networks NG Firewalls do not provide a unified platform that natively integrates all security capabilities.
Customer support could be improved.
I've been using this solution for about one year.
Palo Alto Networks NG Firewalls are stable.
The firewalls' scalability is good.
I would rate Palo Alto's network support a six out of ten.
Neutral
We have seen a slight ROI, enough to justify the cost of the solution.
The cost is steep, but most firewalls cost a lot.
If you're looking for the cheapest and fastest firewall, I would not recommend Palo Alto NG Firewalls.
Overall, I would rate Palo Alto Networks NG Firewalls an eight out of ten.
I place a high value on attending the RSA Conference. I get a lot out of it because I'm able to learn about up-and-coming companies. I can see what options are available, whether someone's doing it better, and if I can get a cheaper option.
Attending RSAC does have an impact on my organization’s cybersecurity purchases made throughout the year.
We use Palo Alto Networks NG Firewalls for segmentation and basic routing. They are the gatekeepers for the network.
I like being able to investigate anonymous VPNs and also like to use traffic-capturing features. We've had some anonymous VPNs coming to our network, and we're trying to make sure that internal users are not able to use those to get past our security.
Palo Alto Networks NG Firewalls have a very nice interface for logging and monitoring. I find it easy to navigate and use, and the interface is organized as well. I can find answers within a couple of hours and have seen time savings.
We have Azure firewalls that are licensed through Palo Alto. It's super important that Palo Alto Networks NG Firewalls provide a unified platform that natively integrates all security capabilities because we are moving almost entirely to Azure. Thus, the more Azure integration we have, the better it's going to be for us long term.
These firewalls have been efficient at securing data centers consistently across all workplaces.
We haven't had many downtime issues with Palo Alto.
The customer-facing side needs to be improved in terms of the engagement and involvement of support staff.
My first exposure to this solution was about a year and a half ago.
The firewalls are relatively stable. We have a few that go up and down, but that has more to do with licensing issues than with the firewall itself.
Technical support needs to be improved with regard to the time to respond and the response itself. We've been getting the same responses over and over again. It would help us out a lot if the technical support staff were more engaged or involved.
From what I've heard from our firewall engineer, I would rate technical support a four out of ten.
Neutral
We utilize GlobalProtect and have seen a better return on investment with regard to security and peace of mind.
Licensing is a big issue for us because of the complexity and the lack of engagement from Palo Alto. It has been hard to talk with them as we don't get the best answers.
We are always evaluating other vendors and are currently looking at Cisco. Though both Palo Alto and Cisco firewalls are feature-rich and provide very good value, Cisco is better at customer engagement. They are easier to talk to as well.
Palo Alto Networks NG Firewalls are not the cheapest and fastest, but they are one of the top ones in terms of the most effective firewalls.
Overall, I would rate NG Firewalls an eight out of ten. They're definitely a top competitor.
I love the opportunity to see technical demos and take hands-on tours with some of the products at RSA conferences. They are the best part because I get to learn and gain exposure to new technology. It is particularly helpful when we want to look at other avenues.
Palo Alto Networks NG Firewalls are being used for cloud security in our organization. Along with that, we have implemented SD-WAN, secure access, and XDR. These are the primary firewalls that we have in place.
Essentially, we have almost all of their products across their three suites.
The previous brand we used had a steeper learning curve for our engineers and analysts compared to Palo Alto, which is easier to use.
We also have an excellent partner in Costa Rica who works with Palo Alto's team there, providing valuable support. Overall, our experience with Palo Alto has been very positive.
Some of Palo Alto Networks NG Firewalls' valuable features are their powerful capabilities and user-friendliness.
Our security team has found it easy to learn and obtain the necessary certifications and training from Palo Alto.
Overall, we have had a very positive experience with this suite of solutions, including the training they have provided us.
We like the Palo Alto ecosystem and how its different suites of products integrate seamlessly.
The sharing of information has enhanced our security posture as a company. Overall, our experience with Palo Alto has been very positive.
I believe that It is important that the firewall integrates machine learning to take advantage of all the information that is available, all the data that is available.
You have to integrate machine learning AI and things like that to be able to be a step ahead of the hackers.
Using Palo Alto Networks NG Firewalls, we have experienced zero downtime.
The solution is user-friendly, which is important as it allows us to concentrate on other essential aspects of the company rather than spending time and effort maintaining the solution.
The level of control and granularity in terms of rule customization could be enhanced. However, compared to our previous solution, Palo Alto provides much better drill-down capabilities.
It is a solid solution.
We have been using Palo Alto Networks NG Firewalls for six years.
It is a very solid, stable solution. We haven't had any issues with it, you know when we have to do updates there are no problems whatsoever. it's a very good solution.
Scalability is an important issue. It is very scalable.
We are currently protecting around 11,000 endpoints.
In my experience, I would rate the technical support a ten out of ten.
They are excellent.
Positive
Initially, I was involved in the setup, but then other team members took over and completed the work. In the end, we reviewed and went over the setup together.
We had a lot of support from their local partner So it was very straightforward at the time.
I didn't come across any significant issues, but as engineers, we are always prepared to face challenges.
Nowadays, nothing works as simple as plug-and-play like it used to be. However, we try to reduce the likelihood of issues as much as possible by working closely with project managers and performing thorough preparations beforehand.
Before doing the implementation. It was okay.
I believe we have seen a return on investment.
The time we used to spend on various tasks previously has significantly reduced with the implementation of Palo Alto Networks.
The system is very reliable with no downtime, providing us with a sense of security that is important in cybersecurity.
The price of Palo Alto Networks NG Firewalls is high, but it is worth it if you have the budget for it.
Budget is always an important factor in decision-making, but it was within our budget, and we were impressed by what we heard, tested, and experienced with Palo Alto.
It is difficult to know and assume the thought process of others. If they have budget constraints, there may be other manufacturers with a lower price point that would be a good fit. We try to evaluate from different angles, not just the budget, but also the technology and how it will fit with our needs. We look for strong capabilities where necessary, such as with Sophos and WatchGuard for smaller companies.
It can be difficult to know the thought process behind a company's decision when it comes to choosing a firewall solution. Budget constraints may play a role, and there are other manufacturers that offer lower price points, which can be a good option. However, it's important to consider technology and how it fits with the company's needs, as well as the strength of the solution.
Smaller companies like Sophos and WatchGuard also offer solid platforms, and they may be a good fit for those looking for a lower price point. Ultimately, it's important to assess what's important for the company and find a solution that fits those needs, both in terms of functionality and price.
Our process for evaluating firewall solutions usually involves consulting Gartner for their feedback, having sessions with our analysts, and focusing on the leading firewall manufacturers.
We evaluated several firewall manufacturers, including Check Point and Fortinet, but ultimately, we as a group decided that Palo Alto was the best fit for us.
The decision was not solely mine but rather made by our managers based on the evaluations and presentations given by each vendor.
We were particularly impressed with Palo Alto's presentation and even visited their headquarters located south of San Francisco. And we just felt comfortable, and it was a good decision.
The RSA sessions have been very informative and enjoyable. Today is actually my last day at the expo, and I've been visiting some of the manufacturers that we already work with as well as some that I want to learn more about. Overall, I think it's been a great experience.
From an engineering standpoint, the expo is a great opportunity to connect with knowledgeable people beyond the marketing façade. It's worth investing time to engage with them, learn about their products and solutions, and find out what they're working on and what's upcoming.
Attending RSA has had a significant impact on our company's cybersecurity purchases for the next year. In fact, I am here with two other colleagues who are actively researching and taking notes on various companies and their offerings. They are gathering valuable information to inform our future purchasing decisions.
We've been coming here for many years now, and we'll not come back. It's a good place to get up to date on what's happening.
I would rate Palo Alto Networks NG Firewalls a ten out of ten.
We deployed Palo Alto Networks NG Firewalls for inbound and outbound protection, as well as DMC protection, in our data center.
The key aspect of this solution that provides the most value is its next-gen capabilities, which represented a significant change for us. Previously, we had been using Check Point.
We switched to this solution due to its advanced next-gen capabilities, which allowed us to create rules based on applications rather than ports or protocols. As a result, the solution became much more relevant to our needs compared to our previous solution.
Palo Alto Networks NG Firewalls allowed for more flexibility in defining rules, as it was based on applications rather than strict port and protocol definitions. This made it easier to adapt to changing needs and configurations.
We were able to automate things using the API. Savings are minimal, but we save a significant amount of time when we deploy rules that we learn when we deploy the policy. Is the process still the same? Perhaps the implementation will take only a few hours or minutes.
We have been exclusively using it for the Next-Gen firewall, MDPN, and remote access for a while.
It integrates the core capabilities into one.
To make it more affordable, we had to separate the integrated features into individual components. The integrated solution was more expensive than when we broke it down into separate components.
I have been using Palo Alto Networks NG Firewalls for over five years, and perhaps even as long as ten years.
The stability of Palo Alto Networks NG Firewalls is very good.
We have upgraded it several times for additional features, and we have never experienced any crashes or performance issues. Overall, it has been quite stable.
In terms of scalability, the cost is a limiting factor. We can buy a large number of them, but it would not make financial sense for us to do so due to the high cost.
In contrast to the cloud environment where you can scale incrementally and horizontally, in our case, we have to purchase the entire unit. As a result, scaling our responsibilities becomes challenging.
We have around 2,000 compute resources that need protection, so getting a large firewall is necessary to safeguard our environment.
Technical support is very good.
I would rate the technical support an eight out of ten.
F5 and Cloudflare are types of support that were really good. There is no escalation whatsoever. The first person you get to already is the top-notch technical person.
With Palo Alto, you have to escalate, but eventually, you get to a good one.
Positive
The deployment process was easy.
We used a migration tool to transfer from our previous firewall to Palo Alto, and it proved to be quick.
We received support from a Palo Alto sales engineer.
While Palo Alto is expensive, it's still the better option compared to the other two vendors that were evaluated since they didn't provide the necessary performance and benefits.
Overall, the expenses for Palo Alto are manageable, and it's worth the investment.
It's too expensive.
Although Palo Alto is a good and fast product, it is not the most affordable option out there, and it may not be the easiest to use.
We evaluated Cisco and Fortinet.
During our evaluation process for selecting a firewall vendor, we prioritize performance as the number one factor.
Price range is ranked second in importance.
Other important factors include ease of use, API support, and next-gen features, all of which are used as evaluation criteria. We have previously used Magic Quadrant, but it is important for us to carefully choose our firewall vendor.
Integrating machine learning at the core of Palo Alto Networks NG Firewalls would be highly beneficial. The ability to automatically detect threats without the need to create rule sets manually would be a game changer.
Attending events like RSA is valuable to me because it allows me to explore different vendors and products. Sometimes, I come across new vendors that I haven't heard of before, which is good.
Attending events like RSA can have a significant impact on our company's cybersecurity purchases throughout the year. If we come across a new vendor with a fresh approach to protecting the company or identifying threats, we are definitely interested in exploring their offerings.
I would rate Palo Alto Networks NG Firewalls an eight out of ten.
As a Security Engineer, I use this solution for protection. I put in additional rules and also use the solution for forensic investigations and to look at traffic logs.
I like that Palo Alto Networks does a good job of keeping the firewall updated with the latest threat signatures.
We use Panorama, so we're able to manage an entire array of firewalls in one console. It's really useful because we can make one change and deploy it to all of our firewalls.
Palo Alto Networks NG Firewalls do a great job at providing a unified platform that natively integrates all security capabilities. For example, we can easily export our firewall logs into our SIEM. We have so many tools to manage that having a unified platform makes our job easier.
This firewall is great at securing data centers consistently across all workplaces.
We have high availability, and Palo Alto Networks NG Firewalls helped reduce downtime.
The performance of the Panorama interface needs to be improved. It tends to be very sluggish at times.
I've been using Palo Alto Networks NG Firewalls for five years.
I have not heard of any complaints or issues regarding the stability of the firewalls.
We can easily add nodes into Panorama with no problem. As such, scalability is not an issue. We have an enterprise environment with approximately 15,000 users in multiple countries.
I haven't had to call technical support, but my colleagues have. They've always spoken positively about the experience and would probably rate the technical support an eight out of ten.
Positive
My organization used Cisco Secure Firewall ASA and switched to Palo Alto Networks NG Firewalls because Cisco was lagging behind in many features. For example, the management interface on the ASAs was awful compared to that in the NG Firewalls.
We have absolutely seen an ROI in the fact that we haven't ended up in the news. We can look at any time and see all the threats that have been stopped by Palo Alto Networks NG Firewalls.
If you are looking for the cheapest and fastest firewall, I would say that it's a risky angle to take. Security costs money, and you'll get what you pay for.
The benefits I receive from attending an RSA conference are networking, meeting people and having conversations face-to-face, making contacts in the industry, getting suggestions about products, and attending briefings about specific products.
Also, attending RSAC can have an impact on your organization’s cybersecurity purchases because you may find out about products that you hadn't heard of before.
Overall, I would rate Palo Alto Networks NG Firewalls an eight on a scale from one to ten.