It is deployed on the Azure cloud to inspect the outbound traffic, but in the near future we will be working to inspect inbound and Azure Express Route traffic as well.
IT Infrastructure Architect at a financial services firm with 10,001+ employees
Good stability, good support, and many useful security and threat prevention features
Pros and Cons
- "Using Palo Alto Networks Panorama, we were able to deploy a single point of management and visualization of the firewall infrastructure in cloud, on-premise and integrated with Azure to automate scale up. Its security features, i.e. anti-malware, threat prevention, URL Filtering, VPN, and antivirus are the most valuable. The ID-User integrated with AD and 2FA features are also very useful to provide secure access to servers and some users in the company. "
- "At the beginning of the implementation, we had some difficulties with the scripts, but Palo Alto Networks support together with a local partner finally fixed it."
What is our primary use case?
How has it helped my organization?
With Palo Alto VM-Series, we are capable through a single point of management and visualization both in infrastructure and on premises and in the cloud. This allows us to improve the speed to create new rules, speed up the resolution of problems, having a holistic vision of our firewall infrastructure.
What is most valuable?
Its security features, i.e. antimalware, threat prevention, URL Filtering, VPN, antivirus are the most valuable. The ID-User integrated with AD and 2FA feature is also very useful to provide access to servers and some users in the company.
What needs improvement?
It can be improved in areas such as DevOps and quality assurance. The installation rules deployment process we also improved when we deployed these firewalls. In terms of new features, for simplicity reasons, it is faster, because as I mentioned above we can reused the same rules and the same objects from the local PAN that has a Panorama such as the single point of supervision.
We are looking for ways to integrate with other cloud in the future. For this, we will require a more secure integration and encrypted connections with other companies.
Buyer's Guide
Palo Alto Networks VM-Series
May 2025

Learn what your peers think about Palo Alto Networks VM-Series. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
856,873 professionals have used our research since 2012.
For how long have I used the solution?
I have been using this brand for more than ten years in on premises (appliances). Now, we are expanding this features to our Azure tenant with PAN VM-Series + Panorama.
What do I think about the stability of the solution?
It is stable and robust solution. Through Panorama manager, we can scale up automatically if the demand increase. At the moment, we do not have any problems with its stability.
What do I think about the scalability of the solution?
We currently don't have many end-users of this solution. It is being used mostly for servers. We have around 100 servers. In the future, we plan to have more users. Our company has around 10,000 people.
How are customer service and support?
PAN provides good support in general through its partners in Chile
Which solution did I use previously and why did I switch?
No, the same brand is deployed, but in this case the change was a high availability architecture under Azure VM Scale Set mode.
How was the initial setup?
We had some complexity because we had no experience in implementing it in the cloud, but with the support of the partner and the endorsement of the brand it was solved quickly. It took us a couple of weeks to implement it, and then we started testing. (traffic stress, fault escenarios, scale up, vulnerability assessment, etc.)
What about the implementation team?
We took the professional services of a PAN partner or reseller in Chile. We had a good experience with them. They provide good support and have a qualified team working in security, together with the internal team of our company.
What's my experience with pricing, setup cost, and licensing?
Its cost is $75.000. This is the total cost, and it includes the license, implementation fee, and support for two years.
Which other solutions did I evaluate?
We also evaluated Check Point, Fortinet, and Azure Firewall. We needed a single point to manage the on-premises firewall and cloud firewall. Our focus was simplicity without losing the security.
Fortinet is growing in the industry. Many companies in Chile are adopting this brand. Our company has not yet adopted this solution. Our maintenance teams don't know this technology, which would have been a problem.
Check Point is a good brand. Their product is robust, but we found an issue in using their firewall manager with the hybrid architecture like ours, where we have both on-premises and on-cloud deployments.
Both are also a leader in Gartner Quadrant and Forrester together with Palo Alto.
Azure Firewall needs to improve.
What other advice do I have?
Good support from the brand and local partner in Chile.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Executive Cyber Security Consultant at a tech services company with 11-50 employees
An excellent solution for the right situations and businesses
Pros and Cons
- "The Palo Alto VM-Series is nice because I can move the firewalls easily."
- "It has excellent scalability."
- "The product needs improvement in their Secure Access Service Edge."
- "They made only a halfhearted attempt to put in DLP (Data Loss Prevention)."
- "Palo Alto is that it is really bad when it comes to technical support."
What is our primary use case?
Palo Alto VM-Series is something we recommend as a firewall solution in certain situations for clients with particular requirements who have the budget leeway.
What is most valuable?
The Palo Alto VM-Series is nice because I can move the firewalls easily. For instance, we once went from one cloud provider to another. The nice thing about that situation was that I could just move the VMs almost with a click of a button. It was really convenient and easy and an option that every firewall will not give you.
What needs improvement?
We would really like to see Palo Alto put an effort into making a real Secure Access Service Edge (SASE). Especially right now where we are seeing companies where everybody is working from home, that becomes an important feature. Before COVID, employees were all sitting in the office at the location and the requirements for firewalls were a different thing.
$180 billion a year is made on defense contracts. Defense contracts did not stop because of COVID. They just kept going. It is a situation where it seems that no one cared that there was COVID they just had to fulfill the contracts. When people claimed they had to work from home because it was safer for them, they ended up having to prove that they could work from home safely. That became a very interesting situation. Especially when you lack a key element, like the Secure Access Services.
Palo Alto implemented SASE with Prisma. In my opinion, they made a halfhearted attempt to put in DLP (Data Loss Prevention), those things need to be fixed.
For how long have I used the solution?
I have been using Palo Alto VM-Series for probably around two to three years.
What do I think about the stability of the solution?
I think the stability of Palo Alto is good — leaning towards very good.
What do I think about the scalability of the solution?
Palo Alto does a good job on the scalability. In my opinion, it has excellent scalability.
How are customer service and technical support?
My experience with Palo Alto is that it is really bad when it comes to technical support. When we have a situation where we have to call them, we should be able to call them up, say, "I have a problem," and they should ask a series of questions to determine the severity and the nature of the problem. If you start with the question "Is the network down?" you are at least approaching prioritizing the call. If it is not down, they should be asking questions to determine how important the issue is. They need to know if it is high, medium, or low priority. Then we can get a callback from the appropriate technician.
Do you want to know who does the vetting of priority really, well? Cisco. Cisco wins hands down when it comes to support. I do not understand that, for whatever reason, Palo Alto feels that they do not have a need to answer questions, or they just do not want to.
It is not only that the support does not seem dedicated to resolving issues efficiently. I am a consultant, so I have a lot of clients. When I call up and talk to Palo Alto and ask something like, "What is the client's password?" That is a general question. Or it might be something even less sensitive like "Can you send me instructions on how to configure [XYZ — whatever that XYZ is]?" Their response will be something like, "Well, we need your customer number." They could just look it up because they know who I am. Then if I do not know my client's number, I have got to go back to the client and ask them. It is just terribly inefficient. Then depending on the customer number, I might get redirected to talk to Danny over there because I can not talk to Lisa or Ed over here.
The tedium in the steps to get a simple answer just make it too complicated. When the question is as easy as: "Is the sky sunny in San Diego today?" they should not be worried about your customer representative, your customer number, or a whole bunch of information that they really do not use anyway. They know me, who I am, and the companies I deal with. I have been representing them for seven or eight years. I have a firewall right here, a PA-500. I got it about 11 years ago. They could easily be a lot more efficient.
Which solution did I use previously and why did I switch?
I have clients whose architecture is configured in a lot of different ways and combinations. I use a lot of different products and make recommendations based on specific situations. For example:
- I have one client that actually uses multiple VM-series and then at each one of their physical sites that have the K2-series — or the physical counterpart of the VM-series.
- I have other clients that use Fortinet AlarmNet. As a matter of fact, almost all my healthcare providers use Fortinet products.
- I have another customer that used to be on F5s and they had had some issues so switched to Fortinet.
- I have a couple of holdouts out there that are still using the old Cisco firewalls who refuse to change.
- I have a new client that is using a Nokia firewall which is a somewhat unique choice.
I have a customer that used to be on F5s and they had had some issues. The result of the issue was that they came to me and we did an evaluation of what they really needed. They came in and they said, "We need you to do an evaluation and when you are done with the evaluation, you need to tell us that we need Palo Alto firewalls." I said that was great and I sat down and got to work building the side-by-side comparison of the four firewalls that they wanted to look at. When I was done, just like they wanted the Palo Alto firewall was right there as the first one on the list. They selected the Fortinet firewall instead.
Nokia is specifically designed to address the LTE (Long Term Evolution, wireless data transmission) threats with faster networks and such. So it is probably not considered to be a mainstream firewall. The client who uses Nokia is a service provider using it on a cellular network. They are a utility and they are using Nokia on a cellular network to protect all their cellular systems and their automated cellular operations. The old Nokia firewalls — the one on frames — was called NetGuard. This client originally had the Palo Alto K-series and they switched over to the Nokia solution. That is my brand new Nokia account. They were not happy with the K-series and I am not sure why.
The thing about Cisco is nobody is ever going to fire you for buying a Cisco product. It is like the old IBM adage. They just say that it is a Cisco product and that automatically makes it good. What they do not seem to acknowledge is that just because their solution is a Cisco product does not necessarily make it the right solution for them. It is really difficult to tell a customer that they are wrong. I do not want to say that it is difficult to tell them in a polite way — because I am always polite with my customers and I am always pretty straightforward with them. But I have to tell them in a way that is convincing. Sometimes it can be hard to change their mind or it might just be impossible.
When I refer to Cisco, I mean real Cisco firewalls, not Meraki. Meraki is the biggest problem I think that I deal with. I do not have the network folks manage the Meraki firewalls differently than they manage their physical firewalls. I do not want there to be a difference, or there should be as little difference as possible in how the firewalls are handled. They do have some inherent differences. I try not to let them do stuff on the virtual firewalls that they can not do in the physical firewalls. The reason for that is because in defense-related installations it matters. Anytime you are dealing with defense, the closer I can get to maintaining one configuration, the better off I am. Unless something unique pops up in Panorama, I will not differentiate the setups.
I say that there are differences because there is a little bit of configuration that inherently has to be different when you are talking about physical and virtual firewalls, but not much. I can sanitize the virtual machine and show the cloud provider that since I was going into a .gov environment or a .gov cloud, that it met all the requirements as stated in the Defense Federal Acquisition Regulation Supplement. That is huge for our situation. Of course with a cloud provider, you are not going to have a physical firewall. Had we had a physical firewall, that becomes a bit of a chore because you have got to download the configuration file, then you have got to sanitize the configuration. Things like that become a bit of a burden. Having a VM-Series for that purpose makes it much easier.
I did not mention Sophos in the list. Sophos does a semi-decent job with that too, by the way. The only problem with Sophos is that they are not enterprise-ready, no matter what they say. I have deployed Sophos in enterprises before, and the old Sophos models did very well. The new ones do very poorly. The SG-Series — Sierra Golf — they are rock solid. As long as we keep going with them, our customers love it. It works. I have one client with 15,000 seats. They are running 11 or 12 of them and they have nothing but great things to say about the product. The second you go to the X-Series, they are not up to the task.
How was the initial setup?
Setting up Palo Alto is relatively quick. But I also have an absolute rockstar on our team for when it comes to Palo Alto installations. When he is setting it up, he knows what he is doing. The only thing he had to really learn was the difference between the VM-Series and the PA-Series.
I lay out the architecture and I tell people doing the installations exactly what has to be there. I sit down and create the rule sets. Early on, the person actually doing the fingers-on-the-keyboard complained a little saying that the setup was a little bit more complicated than it should have been. I agree, generally speaking. I generally feel that Palo Alto is more complicated than it needs to be and they could make an effort to make the installations easier.
But, installing Palo Alto is not as bad as installing Cisco. Cisco is either a language that you speak or a language that you do not. I mean, I can sit down and plot the firewall and get the firewall together about 45 minutes with a good set of rules and everything. But that is me and it is because I have experience doing it. Somebody who is not very well-versed in Cisco will take two or three days to do the same thing. It is just absolutely horrid. It is like speaking English. It is a horrid language.
What's my experience with pricing, setup cost, and licensing?
I do not have to do budgets and I am thankful for that. I am just the guy in the chain who tells you what license you are going to need if you choose to go with Palo Alto VM-Series. How they negotiate the license and such is not my department. That is because I do not resell.
I know what the costs might be and I know it is expensive in comparison to other solutions. I get my licenses from Palo Alto for free because they like me. I have proven to be good to them and good for them. When they have customers that are going to kick them out, I can go in and save the account.
I will tell you, they do practice something close to price gouging with their pricing model, just like Cisco does. When I can go out and I can get an F5 for less than half of what I pay for Palo Alto, that is a pretty big price jump. An F5 is really a well-regarded firewall. When I can get a firewall that does twice what a Palo Alto does for less than half, that tells me something.
Sophos decided that they were going to play with the big boys. So what they did is they went in and jacked up all their prices and all their customers are going to start running away now. The model is such that it is actually cheaper to buy a new firewall with a three-year license than it is to renew the Sophos license of the same size firewall for an older product. It sorta does not make sense.
Which other solutions did I evaluate?
I make recommendations for clients so I have to be familiar with the firewalls that I work with. In essence, I evaluate them all the time.
I work from home and I have two Cisco firewalls. I have a Fortinet. I have the Palo Alto 500 and I have a Palo Alto 5201. I have a Sophos. My F5 is out on loan. I usually have about eight or nine firewalls on hand. I never go to a client without firing up a firewall that I am going to recommend, testing it, and getting my fingers dirty again to make sure I have it fresh in my mind. I know my firewalls.
The VM-Series are nice because you can push them into the cloud. The other nice thing is whether you are running a VM-Series or the PA-Series, we can manage it with one console. Not without hiccups, but it works really well. Not only that, we can push other systems out there. For instance, for VMware, we are pushing Prisma out to them. VMware and the Palo Alto VM-Series do really well with Prisma. The issue I have with it is — and this is where Palo Alto and I are going to disagree — they are not as good at SASE (Secure Access Service Edge). I do not care what Palo Alto says. They do a poor job of it and other products do it better.
Palo Alto claims it is SASE capable, but even Gartner says that it is not. Gartner usually has the opinion that favors those who pay the most, and Palo Alto pays them well. So when Gartner even questions their Secure Access Service Edge, it is an issue. That is one of those places where you want the leader in the field.
From my hands-on experience, Fortinet's secure access service edge just takes SASE hands down.
What other advice do I have?
My first lesson when it comes to advice is a rule that I follow. When a new version comes out, we wait a month. If in that month we are not seeing any major complaints or issues with the Palo Alto firewall customer base, then we consider it safe. The client base is usually a pretty good barometer for announcing to the world that Palo Alto upgrades are not ready. When that happens, making the upgrade goes off our list until we hear better news. If we do not see any of those bad experiences, then we do the upgrade. That is the way we treat major revisions. It usually takes about a month, or a month-and-a-half before we commit. Minor revisions, we apply within two weeks.
I am of the opinion right now that there are some features missing on Palo Alto that may or may not be important to particular organizations. What they have is what you have to look at. Sit down and be sure it is the right solution for what you need to do. I mean, if the organization is a PCI (Payment Card Industry) type service — in other words, they need to follow PCI regulations — Palo Alto works great. It is solid, and you do not have remote users. If you are a Department of Defense type organization, then there are some really strong arguments to look elsewhere. That is one of the few times where Cisco is kind of strong choice and I could make an argument for using them as a solution. That is really bad for me to say because I do not like Cisco firewalls.
On a scale from one to ten (where one is the worst and ten is the best), I would rate the Palo Alto Networks VM-series as an eight-out-of-ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Palo Alto Networks VM-Series
May 2025

Learn what your peers think about Palo Alto Networks VM-Series. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
856,873 professionals have used our research since 2012.
A tool with a great support team that is useful for testing purposes of VMs
Pros and Cons
- "The main advantage of Palo Alto Networks VM-Series stems from the fact that you can access it with the help of cloud services."
- "With Palo Alto Networks VM-Series, it is hard for me to manage its network configuration part."
What is our primary use case?
I use Palo Alto Networks VM-Series for testing purposes of VMs.
What is most valuable?
The main advantage of Palo Alto Networks VM-Series stems from the fact that you can access it with the help of cloud services.
What needs improvement?
With Palo Alto Networks VM-Series, it is hard for me to manage its network configuration part. Regarding Palo Alto Networks VM-Series, I am figuring out whether to use interzone or intrazone networks for the VMs in our company's environment, which is very confusing. The aforementioned aspects of the solution can be considered for improvement.
In the future, whenever I try to onboard Palo Alto Networks VM-Series, it should allow for easy configuration, especially in terms of network connectivity. I want an easier setup and configuration in the product's future releases.
For how long have I used the solution?
I have been using Palo Alto Networks VM-Series for around a year. My company has a partnership with Palo Alto Networks.
How are customer service and support?
The technical support of Palo Alto Networks does reply to the cases or issues I file with the support team. The support is equally good for all the products that fall under Palo Alto Networks. I rate the technical support a nine out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
I rate the implementation process a six or seven on a scale of one to ten, where one is difficult and ten is easy.
During the implementation process of the product, I faced some issues related to the networking part and connectivity of VMs. I faced issues with how an end user could connect the VMs to a firewall or connect a firewall to VMs, but the same process was easy for me on a physical device firewall.
What other advice do I have?
I am more comfortable with the physical device firewall. I am actually trying to figure out things since I am not very familiar with the VM side of Palo Alto.
I would recommend Palo Alto Networks VM-Series since it is a cheaper product compared to the other tools available in the market. Apart from Palo Alto Networks VM-Series, I usually recommend Palo Alto Networks Cortex XSOAR and Palo Alto Networks Prisma Cloud.
I rate the overall product an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Senior Manager Network Engineering at a manufacturing company with 10,001+ employees
Good control over traffic with an advanced packet inspection engine, but it needs to include a secure web gateway
Pros and Cons
- "The most valuable feature is that you can control your traffic flowing out and coming it, allowing you to apply malware and threat protection, as well as vulnerability checks."
- "The disadvantage with Palo Alto is that they don't have a cloud-based solution that includes a secure web gateway."
What is our primary use case?
I am a firewall expert, although my job is not on the management side. I take care of the routing and switching aspects. We have approximately 1,000 firewalls in the company.
How has it helped my organization?
This product is a complete security system, wherein we provide direct internet access to our hub site.
What is most valuable?
The most valuable feature is that you can control your traffic flowing out and coming out, allowing you to apply malware and threat protection, as well as vulnerability checks.
It has an advanced engine that does parallel processing for packet and deep packet inspection. It also supports user authentication.
What needs improvement?
The disadvantage with Palo Alto is that they don't have a cloud-based solution that includes a secure web gateway. For example, if a person is working from home and you want a proxy then you have to rely on a secure web gateway. Palo Alto cannot do that because they don't have a cloud solution. So, if you want direct internet access and if you also want the proxies then Palo Alto is not a good choice.
For how long have I used the solution?
I have been working with the Palo Alto VM-Series for four years.
What do I think about the stability of the solution?
The stability is absolutely good and there is no problem with it.
What do I think about the scalability of the solution?
We have almost 3,000 branch offices set up across the globe.
Our intention is to increase usage of Palo Alto, adopting it for security in all of our future products.
How are customer service and technical support?
Technical support from Palo Alto is very good.
Which solution did I use previously and why did I switch?
We did not use another firewall product before this one.
How was the initial setup?
With any organization, if you want to change the firewalls that are being used in production then it's a hectic task. You have some rules and engines that can be used, but it's a step-by-step process.
Migrating from an existing solution to Palo Alto needs to be done in phases. Phase one would be installing the devices. Phase two is testing a lab setup and diverting traffic, then analyzing it. Finally, the third phase is to enable other features like threat protection, malware detection, and other advanced options.
Depending on the size of the organization, if a migration is well planned then it will take three to four months to complete.
The configuration is different between our branch offices in order to meet our requirements. Some use the hardware appliance, whereas others use the software version.
What about the implementation team?
We had a Palo Alto engineer who was assisting us, in-house, for our deployment. We also have support from our vendor, which provides LAN and WAN solutions.
Which other solutions did I evaluate?
We considered using Cisco ASA, but we chose Palo Alto because it can also act as a proxy for your hub site. Palo Alto is more advanced than the Cisco solution.
What other advice do I have?
This is definitely a product that I can recommend.
Overall, it is a good product, although it would be better if they offered a cloud proxy.
I would rate this solution a seven out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Manager, Information Technology at SWPA Corp
Good stability and the posture assessment feature is helpful
Pros and Cons
- "The most valuable feature is the Posture Assessment."
- "In the next release, I would like to see better integration between the endpoints and the firewalls."
What is our primary use case?
The primary use case of this solution is as a firewall for our servers.
We are running a total of 12 servers. Four of them are hardware servers and the rest are VMware servers. We have about 80 clients running Windows 10.
What is most valuable?
The most valuable feature is the Posture Assessment.
What needs improvement?
From my understanding, we used to have the Sophos firewall and a nice feature that is missing in Palo Alto is the heartbeat that monitors each endpoint. It would be helpful if Palo Alto monitored the status of every endpoint. It could be that it was not set up correctly.
In the next release, I would like to see better integration between the endpoints and the firewalls.
For how long have I used the solution?
I have been using Palo Alto for approximately 12 months.
What do I think about the stability of the solution?
The stability is good.
What do I think about the scalability of the solution?
We haven't explored the scalability yet.
We have approximately 80 Windows 10 clients, and we have approximately 85 users in our organization.
How are customer service and technical support?
Technical support is okay. It's the same across the board, you have good techs and you have bad techs.
At times, it's a little slow in getting back to us, but nothing out of the norm.
Which solution did I use previously and why did I switch?
Prior to using Palo Alto, we used a Sophos firewall.
How was the initial setup?
The initial setup was complex, but we were able to work through it.
What's my experience with pricing, setup cost, and licensing?
I would rate this solution an eight out of ten.
Which other solutions did I evaluate?
We evaluated quite a few solutions before choosing Palo Alto Networks VM-Series.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at Peristent Systems
Stable product with an easy installation process
Pros and Cons
- "It is an easy-to-scale product."
- "The product could be better in terms of performance than one of its competitors."
What is our primary use case?
We use the product to mitigate vulnerabilities for the applications running on particular VMs.
What is most valuable?
The product's most valuable feature is pricing.
What needs improvement?
Compared to Azure Firewall, the product could be better in terms of performance.
For how long have I used the solution?
We have been using Palo Alto Networks VM-Series for three years.
What do I think about the stability of the solution?
The product is stable.
What do I think about the scalability of the solution?
It is an easy-to-scale product and suitable for enterprises.
How are customer service and support?
Palo Alto's support is good. Whenever I raise a ticket, they immediately look into it and make a Zoom call.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have used Cisco's Next-Generation Firewall before. It works better than Palo Alto.
How was the initial setup?
Palo Alto's installation process is easy because we use Panorama tool to manage it. We can communicate and implement traffic policies, filtering, and other specific options with its help.
It requires two to three engineers and takes two days to complete the deployment. For maintenance, it requires a team of two engineers.
What other advice do I have?
It's good to work with Palo Alto Networks VM-Series. I recommend it to others and rate it an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
Consultant at a tech services company with 501-1,000 employees
Not dependent on the hypervisor so we can install it on Hyper-V Microsoft software and deploy it
Pros and Cons
- "The initial setup was straightforward."
- "Integrative capabilities with other solutions should be addressed."
What is our primary use case?
We use the solution for hands-on testing purposes and also for activating firewall re-entries, which is easy to accomplish. We only need to turn up the VM to the firewall. This serves users who are working at home due to the COVID-19 pandemic. We also utilize the solution in respect to several servers which are behind the firewall.
What is most valuable?
A valuable feature of the solution is that it is not dependent on the hypervisor so we can install it on Hyper-V Microsoft software and deploy it. We have even installed it on Nutanix 81, in which it is supported. It is not dependent on the platform and is stable.
What needs improvement?
When we activate the solution on Amazon, instead of AWS, GCP or another type of public cloud, we encounter problems, as our engineers are not yet completely hands-on in respects of the public cloud platforms. Still, they can configure the firewall just fine.
Integrative capabilities with other solutions should also be addressed.
For how long have I used the solution?
I have been using Palo Alto Networks VM-Series for the past five-and-a-half years.
What do I think about the stability of the solution?
The solution is reliable.
What do I think about the scalability of the solution?
We have tried to scale. The Western side of migration is very easy in terms of scalability. Our customers may increase their licensing counts in tandem with their increased performance requirements from the firewall. In this case, they would procure a VMP and the license. The activation of the firewall would be accomplished by the tech in the back-end. The customer would get the migration capabilities and procure the license without experiencing any downtime.
How are customer service and technical support?
There is room for improvement from the side of technical support.
How was the initial setup?
The initial setup was straightforward.
The deployment takes two days. This includes installing the solution on the OVO files, upgrading the firewall panel records, activating the license and configuring basic policies and rules. However, our setup was basic and did not involve business activity, which would necessitate a technical business setup. In such case, the process from start to finish may take a customer up to 10 or 15 days.
What's my experience with pricing, setup cost, and licensing?
The VM series is licensed annually.
The option exists to procure a basic license. With this, the firewall feature comes with the application and the board, with everything in code. A subscription is included.
Which other solutions did I evaluate?
The solution is cost effective in comparison to others.
What other advice do I have?
We deploy the solution on-premises for customers and organizations, although we also do so via AWS.
There are around 16 users connected to the VMP firewall.
The security feature is really good, although there would be a bit of a learning curve when it comes to the cloud.
I rate Palo Alto Networks VM-Series as a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Assistant Professor at Facultatea de Economie și Administrarea Afacerilor din Iași
A user-friendly solution with a highly intuitive web interface
Pros and Cons
- "Palo Alto Networks VM-Series is very easy to use."
- "It'll help if Palo Alto Networks provided better documentation."
What is our primary use case?
I am the guy they call up first for the central infrastructure and configuration of the malware, firewall, and main applications, and I use Palo Alto Networks VM-Series for that.
What is most valuable?
Palo Alto Networks VM-Series is very easy to use. It takes maybe one week to learn how it works, but the suite itself is very flexible. After you install it, it's very easy to use because of the intuitive web interface.
It's great for me at the moment. I have all I need. All the traffic is very well filtered, and I believe it's the future of the firewall.
What needs improvement?
The firewall itself is very complex. You have to do a lot of research, look through all the documentation, consult, and figure out how to use it. It's not so easy as a regular firewall, like Hypertable. It'll help if Palo Alto Networks provided better documentation. It would be even better if they had simple documentation on some use cases as well.
For how long have I used the solution?
I have been using Palo Alto Networks VM-Series for about one month.
What do I think about the stability of the solution?
At the moment, Palo Alto Networks VM-Series has been stable.
How are customer service and technical support?
I have used the Palo Alto Network's technical support before, and it's fine for the moment.
How was the initial setup?
Palo Alto Networks VM-Series is a VMware appliance and very simple to install. It must be turned on to change the default password and to configure the IP address, and that is all. After that, it's easy because it has a very intuitive web interface.
What about the implementation team?
I implemented Palo Alto Networks VM-Series on my own.
What's my experience with pricing, setup cost, and licensing?
Because I work for a university and the URL is for the institution, it's a free license for us.
What other advice do I have?
On a scale from one to ten, I would give Palo Alto Networks VM-Series a nine.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Palo Alto Networks VM-Series Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Microsoft Defender for Endpoint
Microsoft Defender for Office 365
Cisco Secure Firewall
Palo Alto Networks NG Firewalls
Check Point NGFW
Azure Firewall
Microsoft Defender for Identity
Juniper SRX Series Firewall
Fortinet FortiGate-VM
SonicWall NSa
KerioControl
Buyer's Guide
Download our free Palo Alto Networks VM-Series Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Which product do you recommend: Palo Alto Network VM-Series vs Fortinet FortiGate?
- Is Palo Alto the best firewall for an on-premise/cloud hybrid IT network?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Features comparison between Palo Alto and Fortinet firewalls
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?
- How does Azure Firewall compare with Palo Alto Networks VM Series?
- What do you recommend for a corporate firewall implementation?
- Comparison of Barracuda F800, SonicWall 5600 and Fortinet
- Sophos XG 210 vs Fortigate FG 100E
- Which is the best network firewall for a small retailer?