Coming October 25: PeerSpot Awards will be announced! Learn more

Palo Alto Networks WildFire OverviewUNIXBusinessApplication

Palo Alto Networks WildFire is #1 ranked solution in top ATP (Advanced Threat Protection) tools. PeerSpot users give Palo Alto Networks WildFire an average rating of 8.2 out of 10. Palo Alto Networks WildFire is most commonly compared to Cisco ASA Firewall: Palo Alto Networks WildFire vs Cisco ASA Firewall. Palo Alto Networks WildFire is popular among the large enterprise segment, accounting for 58% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a comms service provider, accounting for 20% of all views.
Palo Alto Networks WildFire Buyer's Guide

Download the Palo Alto Networks WildFire Buyer's Guide including reviews and more. Updated: September 2022

What is Palo Alto Networks WildFire?
WildFire™ cloud-based threat analysis service is the industry’s most advanced analysis and prevention engine for highly evasive zero-day exploits and malware. The cloud-based service employs a unique multi-technique approach combining dynamic and static analysis, innovative machine learning techniques, and a groundbreaking bare metal analysis environment to detect and prevent even the most evasive threats.
Palo Alto Networks WildFire Customers
Novamedia, Nexon Asia Pacific, Lenovo, Samsonite, IOOF, Sinogrid, SanDisk Corporation
Palo Alto Networks WildFire Video

Archived Palo Alto Networks WildFire Reviews (more than two years old)

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
CEO at E-DIRECT CLOUD SOLUTIONS SP. Z O.O.
Real User
Offers good protection against zero-day malware
Pros and Cons
  • "The most valuable feature is the cloud-based protection against zero-day malware attacks."
  • "The only complaint that we receive from our customers is in regards to the price."

What is our primary use case?

We are a solution provider and WildFire is one of the security products that we implement for our customers. We are also using it for testing purposes.

It is primarily used to check for cloud-based malware.

How has it helped my organization?

Nowadays, this product is very important for customers because there are a large number of zero-day attacks. It gives them a sense of security and confidence because you never know what type of malware will be invented tomorrow.

What is most valuable?

The most valuable feature is the cloud-based protection against zero-day malware attacks.

What needs improvement?

The only complaint that we receive from our customers is in regards to the price. Our clients are happy with the technical aspects, but the cost is expensive.

Some customers complain that it takes a long time to make changes to the configuration, but this depends on the customer and the environment. It may not be a problem that is directly related to the product. There are a lot of changes that need to be made for the security of a big company.

The technical support team in Poland should be larger.

Palo Alto needs to invest more in marketing because there is not enough awareness for the brand in Poland. 

Buyer's Guide
Palo Alto Networks WildFire
September 2022
Learn what your peers think about Palo Alto Networks WildFire. Get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
632,611 professionals have used our research since 2012.

For how long have I used the solution?

We have been using WildFire for one year.

What do I think about the stability of the solution?

We have not experienced any problems related to stability in our environment, and have not had any such complaints from our clients. 

How are customer service and support?

We have not had any issues that required going outside of our own technical team.

The Palo Alto team in Poland is very small, so getting an engineer's time can be a challenge.  If you have a small team then it's hard to support everybody. The local distributor has taken over some of the responsibilities for solving technical issues that customers have.

My thinking is that we don't have to contact technical support with serious issues because we don't have big problems with the product. I'm sure that there are bigger customers in need of support, and it may be lacking in Poland, but of course, there is an international team that can handle issues as well.

Which solution did I use previously and why did I switch?

We deal with other vendors including Cisco and Fortinet, and we see a trend where more and more companies are implementing a WildFire-type solution into their products.

Fortinet is the market leader in Poland, in part because of their pricing. Another important thing is that if you want to implement a PoC and need a device of any kind, it is readily available from Fortinet. However, with Palo Alto, it cannot be done so quickly.

We have been in contact with Cisco technical support, and it is much easier to contact an engineer than it is with Palo Alto. The Cisco support is really good in Poland.

How was the initial setup?

When it comes to installation and configuration, it is very good. The length of time required for deployment depend on the number of features and how much configuration has to be done. Typically, it takes between one and three weeks.

We also deploy WildFire using VM models so that we can test various solutions for our clients.

What about the implementation team?

Our in-house team is responsible for the deployment, maintenance, and support.

What's my experience with pricing, setup cost, and licensing?

This is an expensive product and the market for Palo Alto in Poland could be much bigger if the pricing was comparable to Fortinet. We have lost a lot of deals to Fortinet over the price issue.

As an example, if somebody is satisfied with Fortinet and they only need to renew their subscription then it is difficult to convince them to try a completely new device at a higher price.

What other advice do I have?

WildFire is always a product that we recommend for our Palo Alto clients because it tracks potential malware in the cloud and it is very important to prevent these types of attacks.

In today's climate with the pandemic, a lot of staff are working offsite and remotely, leading to a surge in internet usage. This makes the work environments prone to various threats, which is one of the reasons that products like WildFire are so important.

Overall, from our point of view, it is a good product that works well.

I would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Senior Network Engineer at a retailer with 10,001+ employees
Real User
Top 20
Quick technical support, easy to set up, and is part of a complete product

What is our primary use case?

I work on the network equipment in our company including switches, routers, firewalls, VPN, and all of the perimeter devices. Palo Alto WildFire is one of the products that we use to secure our network.

Generally, it detects threats to our network and blocks them. This includes checking applications for malware.

What is most valuable?

What I like about Palo Alto is that it is a complete product, with everything in it.

What needs improvement?

In the future, I would like to see more automation in the reporting.

For how long have I used the solution?

We have been using WildFire for between four and five years.

What do I think about the stability of the solution?

This product is pretty stable.

What do I think about the scalability of the solution?

Our network and security group are the ones who use it. We haven't had to scale beyond that.

How are customer service and technical support?

We don't have a lot of contact with technical support but when we do, they are pretty quick.

Which solution did I use previously and why did I switch?

I haven't used another solution that is better than this one.

How was the initial setup?

The initial setup is straightforward. It was not complex for me at all.

What's my experience with pricing, setup cost, and licensing?

The pricing is highly expensive.

What other advice do I have?

From my perspective, Palo Alto is the best solution in the market. This is the reason that we implemented it.

I would rate this solution an eight out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Palo Alto Networks WildFire
September 2022
Learn what your peers think about Palo Alto Networks WildFire. Get advice and tips from experienced pros sharing their opinions. Updated: September 2022.
632,611 professionals have used our research since 2012.
Managing Director at a tech services company with 1-10 employees
Real User
Offers improved security with good technical support

What is our primary use case?

We are a solution provider and Palo Alto WildFire is one of the products that we implement for our customers. One of the things that we do is design firewalls for companies that need to enhance their security.

What is most valuable?

The most valuable feature is the improved security that it offers.

What needs improvement?

The price of WildFire should be reduced in order to make it more affordable for our customers.

Deployment to mobile devices should be easier.

How are customer service and technical support?

I have not been in contact with technical support, although my colleagues tell me that the experience with them is very good.

How was the initial setup?

Being the solution designer, I do not have experience with the installation and setup process.

What about the implementation team?

Our in-house team is responsible for deployment and maintenance. We have a couple of engineers who are familiar with it.

What other advice do I have?

There is no one product that can give you 100% protection, but Palo Alto WildFire has some good features. Overall, WildFire is a good product and I recommend it.

I would rate this solution a nine out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
Managing Director at a tech services company with 1-10 employees
Real User
Provides good service and has good technical support

What needs improvement?

I think they should lower the price of this solution. They are losing customers because the price is too high. 

The deployment model could be better.

WildFire is quite unknown in my country. They should develop a better system for teaching their customers how to use this solution and its features.

How are customer service and technical support?

The technical support is good; they provide good service.

What other advice do I have?

On a scale from one to ten, I would give this solution a rating of nine. I would like to give it a ten, but nobody's perfect.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
Dwayne Samson - PeerSpot reviewer
Senior Analyst Security and Compliance at a insurance company with 5,001-10,000 employees
Real User
It has great stability and we see a lot of value from it
Pros and Cons
  • "For example, if a security Intel threat talks about an IOC. We can then go to our MSP and say, "Is there a signature for this particular type of malware that just came out?" And if they'll say yes, then we'll say, "Okay. Does it apply to these firewalls? And have we seen any hits on it?" There's absolutely value in it."
  • "It's not really their problem, it's a problem across the board. There will always be problems with interrupted traffic. We have to set it up where we're playing a middle man game where we're stripping it out, looking at it, and then putting it back together and sending it on its way. That requires CPU cycles. And there's some overhead with that."

What is our primary use case?

WildFire is being deployed based on vendor and security best practices and recommendations from our Managed Service Provider. leveraging their inherent knowledge it allows us to think outside the box. 

What is most valuable?

When  a security Intel threat talks about an IOC. We can then go to our MSP and ask, "Is there a signature for this particular type of malware?" The response is generally  yes, it is applied almost in real time. 

What needs improvement?

It's not a problem specific to the technology, it's a problem across the board. All the encrypted traffic can be a challenge. Becoming a man in the middle requires CPU cycles, causing additional  overhead.


What do I think about the stability of the solution?

The stability's great as long as its sized correctly. no huge hits from a CPU or RAM from a performance perspective. It would be prudent to monitor performance statistics. 

What do I think about the scalability of the solution?

The way it's delivered, I don't see scalability being an issue.

How are customer service and technical support?

We're a managed service, so we've got to fill in the middle that's running interference for us.

How was the initial setup?

The initial setup is really straightforward. Turn the WildFire service on within firewalls and then apply that service to the security policies you want.

What's my experience with pricing, setup cost, and licensing?

Some services require additional licensing. WildFire was one of the services we definitely wanted out of the gate. Suggestion is to determine your requirements of services and map back to the cost of turning on the service.

What other advice do I have?

Install the solution set it up the service in alert mode. Run reports and determine how you want it tuned, them move into block mode. You may want to go to  block mode right away with known out of the box threats. 


Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user1191063 - PeerSpot reviewer
Network Manager at 3C Information Solutions Inc
Real User
Simple to set up, offers malware protection and web filtering, and the VPN works well
Pros and Cons
  • "The most valuable feature for us is the VPN."
  • "When you contact support, there is no guarantee that they will be available to help you tackle the issue that you are facing."

What is our primary use case?

We had two 800-Series Palo Alto Firewalls, but as they reached end-of-life, we began researching alternatives. Ultimately, we chose to switch to Cisco Firepower, so we no longer use WildFire.

What is most valuable?

The most valuable feature for us is the VPN. We used GlobalProtect for the VPN, as well as site-to-site.

It is very simple to use.

What needs improvement?

The support needs to be improved because it takes too long to resolve severity-one issues.

Better integration with third-party products and services is needed.

The need to implement their own multifactor authentication, rather than relying on third-party add-ons for it.

They have malware protection and web-filtering in place, although they are not as effective as Titan or Cisco Umbrella.

For how long have I used the solution?

I began working with Palo Alto WildFire a year ago when I joined the company.

What do I think about the stability of the solution?

It is a solid, stable network solution.

What do I think about the scalability of the solution?

In terms of scalability, Palo Alto is at the top of the market.

Managing this solution we had six network administrators, who are network analysts. In terms of end-users, the entire company was using the Palo Alto network.

How are customer service and technical support?

When you contact support, there is no guarantee that they will be available to help you tackle the issue that you are facing. Sometimes you are left on the phone for three or four hours before you can speak with an engineer, which is very, very poor. If you have an emergency situation or a network outage of severity-one, then you cannot wait for hours to support your clients.

Which solution did I use previously and why did I switch?

Palo Alto was the first solution of this type that we used. However, we have recently purchased Cisco Firepower and no longer work with Palo Alto products.

Prior to Firepower being released, Palo Alto was very simple and better than Cisco ASA. Now, however, Firepower is simpler and the support is outstanding. With Cisco, if you have a severity-one outage then it will be less than ten minutes before you get an engineer on the phone to help you.

I have also worked with Check Point and Juniper solutions, and I feel that scalability-wise, Palo Alto is better than the rest, except for perhaps Cisco, where it is neck and neck.

How was the initial setup?

The setup is not complex. When you come from a CLI background of Cisco ASA or any other platform, Palo Alto is much easier. As long as you are familiar with the general steps in the procedure, it is not difficult.

What's my experience with pricing, setup cost, and licensing?

This solution is very pricey and it depends on the package that you implement. There are sometimes promotions on, which can save on costs.

What other advice do I have?

The Palo Alto models that we were using are the PA800-500 and PA830. 

I have seen people in different organizations and different industries set their firewall solutions up in different ways. It depends on the level of support, in terms of who will be maintaining the network. It also includes the level of knowledge they have, as well as their management preference. Some people choose Palo Alto because they don't care about the costs, and it is an easy solution to use, especially if they are already familiar with it. I would say that if they have the budget then this is a good choice and I recommend it.

However, if they are looking to consolidate all of their services, then the option to choose is definitely Cisco. It's a cloud-based solution with malware protection, filtering, and everything you need all in one box. It makes a lot of difference.

Finally, some people prefer FortiGate because the pricing is good and it is simple to use, whereas some people prefer Check Point for other reasons. It's an individual choice, but it should be well researched before the final choice is made.

I would rate this solution an eight out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
JasonMcFeetors - PeerSpot reviewer
Information Technology Manager at a construction company with 51-200 employees
Real User
Good technical support and provides automatic analysis that saves us time in filtering email
Pros and Cons
  • "Using WildFire has reduced the number of viruses and the amount of malware that comes into our system, which means that I don't have to rely on the end-users to identify it."
  • "It would be nice if there was an easier way to install and deploy it, such as through the inclusion of wizards."

What is our primary use case?

We have the Palo Alto Firewall sitting on the edge and everything that comes through it is analyzed. Even if anything comes through via email, it is forwarded to the WildFire service, which then opens up email attachments to see if they do any damage to the system. If it reports back that the attachment should not be forwarded then it keeps it out.

WildFire has discovered a lot of stuff that our other anti-spam tool did not, so it has been quite good.

How has it helped my organization?

Using WildFire has reduced the number of viruses and the amount of malware that comes into our system, which means that I don't have to rely on the end-users to identify it. This results in less chance that our systems will get infected. I would estimate that there has been a 15% - 20% reduction in that kind of stuff getting through.

What is most valuable?

The most valuable feature is where it automatically opens up the emails and checks to see if any damage occurs to the system. That's something that would be difficult for us to do here manually, simply because we get so many emails coming in. I think about 80% of the emails we get are spam and for us to be able to manually go through that, one by one, looking to see whether they are good or not, would take perhaps 50 people full-time.

What needs improvement?

Palo Alto is very tech-heavy, and the average user can't just go and deploy one. You really need to know what you're doing. I've been doing IT for more than 25 years and I sometimes have to double-check things or ask for help. The reason is that there is so much included in the solution. It would be nice if there was an easier way to install and deploy it, such as through the inclusion of wizards. Having a more complex product generally means that you need more technical expertise, although if very experienced people are still having trouble then it is probably worth revisiting and trying to improve.

It would be nice to have some sort of remote management tool. As far as I'm aware, they don't have a tool that runs on a mobile device, so you need to be in front of a workstation in order to get it up and running. If I had a remote tool that allowed me to access it then it would be very helpful. Even if I have to VPN into the network, that's fine, because being able to remotely do stuff on my phone would be useful. Everything is going that way.

For how long have I used the solution?

We have been using Palo Alto WildFire for about seven years.

What do I think about the stability of the solution?

This solution is quite stable and we've had very few problems.

We did have one false positive that nobody was able to figure out, including Palo Alto and our consultants. Ultimately, I was able to find the problem, write some code and embed it, and that has kept the problem from reoccurring. Otherwise, it has been rock solid.

It is quite extensively used in our organization. Literally, it is used non-stop.

What do I think about the scalability of the solution?

This solution is quite scalable. The specific solution that we have was sized for our environment but I know that you can get other models that will scale up or down, depending on what you need. I think that it should work fine, regardless of what type of organization you're in.

We have between 60 and 70 users. Everybody from the CEO to delivery drivers, office workers, and mobile employees use this solution.

How are customer service and technical support?

Technical support from Palo Alto is very strong. Whenever I've had problems, they've been able to help me out, every single time. I've gone to them with some pretty complex stuff and they will sit with you until it's done. They have technical support that follows the sun, so if I've got somebody who is in the same timezone and their shift ends, they will transfer me to another person who is just starting their day and can spend another eight hours with me, if necessary. 

The biggest lesson that I learned from using this solution is not to hesitate to call support. You're going to bang your head against the wall trying to figure things out, and meanwhile, these guys are just sitting there waiting to help you. They will figure things out a lot faster than you will. 

Which solution did I use previously and why did I switch?

The company did have a previous solution. I don't know what it was, but the switch to this product was based on the recommendation from the telco.

How was the initial setup?

The initial setup is fairly complex.

One of the challenges is that you often need to have a third-party implement the solution, and whoever handles the task needs to understand your network and your use case extremely well. They have to know it so well that really, they need to be an employee and work with the environment in order to roll it out properly. It's difficult to do, so that means you need to have a highly technically skilled individual who can go in and implement stuff that works with the company. Unfortunately, most smaller companies just don't have that kind of person.

From the point that we first started talking about it, followed by the installation, setting it up, and testing, it probably took a couple of months. We first implemented a test network, which was segmented off and used in parallel. We had some people who were willing to test the new system and helped us to gain confidence in the implementation. Once it was complete, we brought everybody over to the new network and remove the old one.

What about the implementation team?

We had a consultant come in and he did an okay-job. However, I had to go back in later on and rework a bunch of stuff, simply because he didn't understand the environment.

The company we used was Telus, which is a telco in Canada. When the primary consultant would run into problems then he would call somebody else, who in turn called somebody else. In total, we had several people from Telus who were working on the implementation.

For the deployment staff, you will be needing two or three people. They have to have an understanding of the business, networking, networking protocols, and security.

With respect to the maintenance, it is pretty hands-off. One or two people can handle it, as long as they've got a strong understanding of how the Palo Alto system works. The only time you really need to touch it is if you need to make a modification to the web filtering rules or if you need to modify the configuration to allow for different services or different devices on the network.

What was our ROI?

This solution saves us a pile of money because we don't have to manually go through all of our emails.

What's my experience with pricing, setup cost, and licensing?

Smaller organizations may find it a bit costly. It is not a cheap solution, simply because of everything that it can do, so there might be a cost barrier for smaller organizations.

We pay between $3,000 and $4,000 CAD ($2,200 - $3,000 USD) per year to maintain this solution. There are different charges the depend on the different options, such as WildFire or different virus signatures. 

What other advice do I have?

This is a very good solution and from a technical perspective and it does a fantastic job. At the same time, we are actually planning on getting rid of it, as it is probably overkill for what we need. I think that when they were looking at this device, they didn't really know where to turn. I was not working here at the time, so they took the recommendation from their telco.

My intention is to replace it with four or five individual firewalls, which gives us a little bit of redundancy and does some other things for us. Palo Alto has a lot of advanced stuff that it brings with it, and we don't have a need for it.

Specifically for WildFire, we're shifting away from on-premises email and going to a cloud-based email system. In that type of managed solution, the provider handles messaging security.

My advice for anybody who is researching this solution is to consider the requirements and the cost. I guarantee that this product will do what you need, but you have to make sure that what you need is what it provides. It is possible that there is more in there than what you'll actually use, so you need to think about whether it is worth the cost. The reason that we're changing is cost-related. For what they are charging us every year, I will completely replace all of our hardware, get exactly what we need, and only pay for it once. We will be saving $3,000 - $5,000 CAD ($2,200 - $3,800 USD) every year after this, just because we don't have those licensing costs associated with it.

The bottom line is that this solution has the ability to do an awful lot of stuff, and if it were easier to configure then it would be even better.

I would rate this solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user1189212 - PeerSpot reviewer
Technical Support Engineer at a venture capital & private equity firm with 501-1,000 employees
Reseller
Excellent threat protection, great technical support, and an easy setup
Pros and Cons
  • "The way that the solution quickly updates to adjust to threats is the solution's most valuable aspect. When there's a security attack, within five minutes, all Wildfire subscribers have access to updates so that all systems will be safe. Its threat prevention is way better than other vendor products."
  • "The size of Palo Alto's cloud is big but it could be easier to use from a product management perspective."

What is our primary use case?

We primarily use Wildfire products to prevent attacks. As resellers, we showcase the Wildfire capabilities like handling known and unknown threats on the customer side. 

What is most valuable?

The way that the solution quickly updates to adjust to threats is the solution's most valuable aspect. When there's a security attack, within five minutes, all Wildfire subscribers have access to updates so that all systems will be safe. Its threat prevention is way better than other vendor products.

What needs improvement?

In terms of threat prevention capabilities, the solution doesn't need any improvements that I can see. We've been quite satisfied.

The size of Palo Alto's cloud is big but it could be easier to use from a product management perspective.

For how long have I used the solution?

I've been using the solution for nine months now. I'm new to Palo Alto Networks but I have been using the solution since I started working with Palo Alto Networks on the reseller side.

How are customer service and technical support?

We've dealt with technical support in the past. Once you open a ticket from the support portal, you will be assigned an engineer. That engineer will only focus on your case until it is solved. It's unlike other vendors that don't necessarily give you the same engineer or service representative for the same ticket. It offers good continuity when there are issues to be resolved. We've been quite satisfied with their level of service.

Which solution did I use previously and why did I switch?

I've used Sophos Firewall in the past. They can also block or scan threats. 

How was the initial setup?

The solution is very straightforward. Setting it up is easy. We just create a Wildfire profile then apply it on the security parcel. It is pretty straightforward.

What's my experience with pricing, setup cost, and licensing?

The pricing of the solution is a bit higher, but it's worth the extra money you will spend because of the protection that you get.

What other advice do I have?

I really recommend Palo Alto Networks. Out of 10 stars, I would give 11. 

I would recommend the solution because it's so easy to deploy and when you read the security profiles, it's very easy to handle, unlike other vendors. When it comes to threat protection, the features are easy to use and understand.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Other
Disclosure: My company has a business relationship with this vendor other than being a customer: reseller
PeerSpot user
Information Security Officer at a government with 501-1,000 employees
Real User
The automatic threat determination makes it a perfect complement to a Palo Alto Firewall
Pros and Cons
  • "The most valuable feature is the Automatic Verdict, to recognize whether something is a threat, or not."
  • "I would like to see them continue on their developmental roadmap for the product."

What is our primary use case?

Our primary use case for this solution is for threat intelligence, to detect threats.

How has it helped my organization?

This solution has given us a higher level of assurance that we don't have an active threat.

What is most valuable?

The most valuable feature is the Automatic Verdict feature that recognizes whether something is a threat or not.

What needs improvement?

I would like to see them continue their developmental roadmap for the product.

For how long have I used the solution?

Approximately one year.

What do I think about the stability of the solution?

We have never experienced any downtime or inaccuracies.

What do I think about the scalability of the solution?

This product is super scalable.

How are customer service and technical support?

Their technical support is excellent.

Which solution did I use previously and why did I switch?

We previously used a different solution but it was ineffective and didn't integrate well.

How was the initial setup?

The initial setup for this solution was very easy. You just turn it on and put it in monitoring mode. One person can deploy and maintain this product.

What about the implementation team?

We implemented in-house.

What was our ROI?

The ROI is pretty much right away.

What's my experience with pricing, setup cost, and licensing?

The licensing fees are on an annual basis and there are no costs in addition to the standard fees.

Which other solutions did I evaluate?

Before choosing this solution we evaluated OpenDNS.

What other advice do I have?

WildFire is a perfect complement to a Palo Alto Firewall, it's invaluable.

I would rate this solution a ten out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Girish Vyas - PeerSpot reviewer
Architect - Cloud Serviced at a comms service provider with 10,001+ employees
Real User
Top 20
Traffic is scanned in a single flow which improves the response times for the user
Pros and Cons
  • "They have many different options with Palo Alto WildFire and the set-up is quick. If you have all the details in hand, it does not take more than 15 minutes to deploy a firewall."
  • "There are certain changes that I was expecting in the previous version, and I hope that they are soon fixed. All of the problems that I have faced so far have been resolved."

What is our primary use case?

We use Palo Alto Networks WildFire for firewall and IT services. We also use it for bank security requirements. They are remarkable for support of threat analysis on files. 

How has it helped my organization?

There are always problems with the operational files. You can only do malware identification. That is the way that this device functions.

All of the traffic is scanned in a single flow, which improves the response times for the user. This is how Palo Alto Networks WildFire helps our organization.

What is most valuable?

We appreciate the support of Palo Alto Networks WildFire for our next-generation firewall equipment in deployment.

What needs improvement?

There are certain changes that I was expecting in the previous version, and I hope that they are soon fixed. Their database has good Information over threats because of Unit42 however there is a serious competition to the product from Cisco ThreatGrid and Umbrella

I don't think there are any major features that are different from Palo Alto versus their competitors but with time the PA needs to improvise on products and threat feed if it needs to be the leader

For how long have I used the solution?

More than five years.

What do I think about the stability of the solution?

I regularly work with companies with over 2000 users and they safely use Palo Alto Networks WildFire. I haven't seen any problems with stability. 

At my company, we use it regularly. For my previous customers, it's a first for them to use Palo Alto products.

What do I think about the scalability of the solution?

Using virtual settings, scalability with WildFire is awesome. On the physical configuration, it is harder and more independent. The scalability is limited there. 

There are very good options available with the Palo Alto Networks WildFire. They have given me options for all the support that I need. 

With internet speed, the settings range from 2GB or 10GB to 40GB. There are a lot of internet settings options, so I guess they're very scalable in that.

We are not an overly large company, so I can say safely around 400 to 2000 is the user base of people that we support.

How are customer service and technical support?

Palo Alto's customer support is good. They are awesome. I would rate them nine out of ten for technical support services.

Which solution did I use previously and why did I switch?

We have not compared this product with other but we would like to evaluate the options if they are available. 

How was the initial setup?

They have many different options with Palo Alto WildFire and the setup is quick. The deployment normally takes around 15 minutes.

If you have all the details in hand, it does not take more than 15 minutes to deploy a wildfire and integrate them. Most of it has been deployed before the said timeframe. The only challenge is for tuning on policies and implementing it with DLP to make sure it is in compliance. The key point that I look for while protecting the customer is to make sure that they don't have any opportunities for a malware attack.

What about the implementation team?

An integrator was not required for deployment. I did the installation myself. We had very good documentation. I just needed to read the documentation thoroughly and it was deployed.

What's my experience with pricing, setup cost, and licensing?

Palo Alto does not require any additional costs to the standard licensing fees, but we have the regular license model. If I just want a firewall, then I need to buy two licenses. 

If we use a VM base, then I need to buy the VM base license, along with the support package from the provider. However, without the license fee, I need to buy IPS support separately.

Other products like Cortex Data Lake support also need to be licensed separately, but that is a wonderful feature. 

With Palo Alto, I can just go buy whatever extra features I want, and they give me a 30-day free license, so that is useful for me.

I can go ahead and buy the product, or if it is not for me anymore, it is free to try. That is a good way to sell their products too. Our subscription runs on a yearly base.

What other advice do I have?

On a scale from 1 to 10, I would give Palo Alto Networks WildFire a 8 for safety.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
IT Network Consultant Engineer - Projects and ICT Infrastructure Services at a energy/utilities company with 1,001-5,000 employees
Consultant
Helps us when segmenting and securing the network
Pros and Cons
  • "It helps us when segmenting and securing the network and all sort of technologies, all sort of next generation needs. It's next generation phases of firewall like anti-virus, sandboxing, wifi, and VPN."
  • "Other vendors have some sort of bandwidth management built into the firewall itself and Palo Alto is missing that."

What is our primary use case?

Our primary use cases are for firewalls, cloud, and on-premise.

How has it helped my organization?

It helps us when segmenting and securing the network and all sort of technologies, all sort of next generation needs. It's the next generation phases of firewall like anti-virus, sandboxing, wifi, and VPN. 

What is most valuable?

All of the features are quite good. 

What needs improvement?

Other vendors have some sort of bandwidth management built into the firewall itself and Palo Alto is missing that.

If there was anything extra for the endpoint security and VNC that would be good, but again it's coming with Palo Alto and must come with some additional cost.

For how long have I used the solution?

More than five years.

What do I think about the stability of the solution?

It's very stable. With respect to scalability and stability both, I would say are quite scalable and very steady. I haven't seen any issues.

What do I think about the scalability of the solution?

This solution is being used corporate-wide, more than a couple thousand people. 

How are customer service and technical support?

Most of the time their technical support has been perfect. A few times a few of the tech support engineers did not have strong knowledge. Overall, though, it's good. 

Which solution did I use previously and why did I switch?

I have worked with Cisco, Fortinet, Juniper, CheckPoint, too many of them.

How was the initial setup?

The initial setup was straightforward. The setup took less than an hour, it's a simple firewall setup. 

What other advice do I have?

It's a stable product. It's pretty expensive but with respect to value for money, it's okay.

I would rate it a nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
it_user839463 - PeerSpot reviewer
Associate Director at a tech services company with 10,001+ employees
Real User
At the end of the day, even in spite of application controls, it's on top of the charts in terms of functionality.
Pros and Cons
  • "Being an application-based firewall, this is one of the critical focus factors along with the threat prevention services it provides."
  • "It is stable and pretty much scalable."
  • "As a firewall and 360 degrees of security, there needs to be more maturity."
  • "The initial setup was complex."

What is our primary use case?

My primary use case of this solution is on-frame and in-cloud security of the infrastructure.

How has it helped my organization?

We use this with different clients in the financial sphere, the health sector, and the insurance sector. Across all of these different verticals, we use this product.

What is most valuable?

Being an application-based firewall, this is one of the critical focus factors along with the threat prevention services it provides.

What needs improvement?

As a firewall and 360 degrees of security, there needs to be more maturity. And, the industry is currently moving towards automation and orchestration. I would like to see more of this in the product. They are part of the future roadmap to AI (Artificial Intelligence).

What do I think about the stability of the solution?

It is stable, and we are also trying to integrate this with the Palo Alto MIME shell. We did that, and also I have inquired recently about Evident, which is a recent acquisition. So I have requested for demos, and still I did not see any response from Palo Alto yet. This is something that we would like to explore.

What do I think about the scalability of the solution?

It's pretty much scalable. We were able to manage both the cloud, and also the on-frame devices or appliances from centralized management station. So, we just implemented in the  migration onto the cloud.

How are customer service and technical support?

We used tech support to help us implement the product initially. 

Which solution did I use previously and why did I switch?

I have prior experience with Cisco Firepower. But, they are very expensive in comparison to Palo Alto.

How was the initial setup?

The initial setup was complex because we were switching from traditional firewalls to application-based firewalls. We needed Palo Alto's help insetting up initially. From there, we tried to understand, and followed suit with implementation.

What's my experience with pricing, setup cost, and licensing?

It is a reasonable price compared to other solutions on the market.

What other advice do I have?

Some of our clients used to have the traditional firewalls so where we do have enabled the application control but being it's a pretty small firewall. At the end of the day, even in spite of them demanding the application controls, it's on top of the firewall functionality (especially in terms of controlling the applications). So, after implementing the Palo Alto firewalls, they have achieved more than what is expected, and we are able to control the number of applications; who gets to have access, and what is flowing inside the network. Anything that is traversing the firewall, is available right now.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Ahmed Ismail - PeerSpot reviewer
Security Solutions Architect at a tech services company with 51-200 employees
Real User
The cloud-based services are a nice feature.
Pros and Cons
  • "The cloud-based services are a nice feature."
  • "My primary use case for this solution is for a secure gateway."
  • "I think it would be nice for Palo Alto to work without the connection to the cloud. It is 100% powerful when connected to the cloud. But, if you disconnect from the cloud, you only get 40-50% power."

What is our primary use case?

My primary use case for this solution is for a secure gateway. It creates a proxy or an appropriation for the suspicious files that can be damaging. 

How has it helped my organization?

The cloud-based services are a nice feature.

What needs improvement?

I do not find it as secure as other solutions. Furthermore, the cloud-based solutions are still not legally available in countries like Saudi Arabia, Iran, and Russia. Some countries do not allow the service according to country obligations. They can not use the cloud services for government offices. So, Wildfire is not allowed in several locations.

I think it would be nice for Palo Alto to work without the connection to the cloud. It is 100% powerful when connected to the cloud. But, if you disconnect from the cloud, you only get 40-50% power.

For how long have I used the solution?

More than five years.

Which solution did I use previously and why did I switch?

I have previous experience with FireEye and Symantec. I find that Symantec is a standalone on an enterprise level secure market, which I cannot say for WildFire.

How was the initial setup?

The initial setup was straightforward and easy.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Head Of Operations at RAH InfoTech (P) Ltd
Reseller
I like the attention to detail. It is easy to manage.

What is our primary use case?

The primary use case for this solution is the attention to detail. IT is also easy to manage, and easy to use. It is a really good product.

How has it helped my organization?

The reporting feature helps our performance. 

What is most valuable?

I really like the product, it is easy to manage and easy to use.

For how long have I used the solution?

Less than one year.

What do I think about the stability of the solution?

In the duration of our use, it has been stable.

What do I think about the scalability of the solution?

It is a scalable product. We have had no issues with scalability.

How is customer service and technical support?

I have not had issues with technical support of this solution.

How was the initial setup?

The initial setup was very easy for us. 

What's my experience with pricing, setup cost, and licensing?

The pricing is OK, it is not too expensive.

Which other solutions did I evaluate?

We looked at other products, but found PaloAlto to be the best solution for our needs.

What other advice do I have?

I would give this product a rating of 9 out of 10 due to some slight issues of performance.

Disclosure: My company has a business relationship with this vendor other than being a customer: I am a reseller of this solution.
PeerSpot user
Network System Administrator at a government with 1,001-5,000 employees
Real User
It catches modified signatures of known viruses
Pros and Cons
  • "Their technical support is outstanding and top-notch."
  • "It catches modified signatures of known viruses."
  • "They should make their user interface a little more user-friendly."

What is our primary use case?

We don't want a virus. We don't want people visiting unknown sites and opening us up to any type of malware or any type of virus attacks.

How has it helped my organization?

We haven't had a virus. That is a good thing. It makes my job easier. For the organization as a whole, no viruses mean people keep their jobs, which is a good thing.

It is an outstanding solution. It is one of the top solutions out there from what we have tested, and we have even tested Cisco Firepower.

What is most valuable?

You can see everything that's going on in your network. It constantly updates their signatures and new anti-spyware signatures. That is updated daily.

It catches modified signatures of known viruses. It is an easy interface to use. 

What needs improvement?

They should make their user interface a little more user-friendly.

For how long have I used the solution?

Three to five years.

What do I think about the scalability of the solution?

We are a decent size organization. If the product can fit our organization, it should be able to fit pretty much any other organization just as well.

How is customer service and technical support?

Their technical support is outstanding and top-notch.

How was the initial setup?

They were things that only somebody who had worked with Palo Alto before would probably be able to break down, then tell you how to set up your initial rule sets and explain what exactly they do. The vendor helped us look at what we have going out versus what is coming in.

What about the implementation team?

They provided in-house support when we initially set it up. They made sure that we were supported from start to finish. Any questions we had, we had someone that we could reach out to, and we had an answer within a matter of minutes to hours. They are very responsive and easy to work with.

What other advice do I have?

Test it in your environment because everyone's environment is different.

Most important criteria when selecting a vendor:

  • Price matching up with features.
  • Support
  • SLA agreements
  • Customer relationship management.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Bachir Elsitt - PeerSpot reviewer
Network Security Engineer at Data Consult
Real User
With this product, we receive the best monitoring and reports
Pros and Cons
  • "​Installing this product as a datacenter firewall for segregation and segmentation, and also configuring policies between zones has improved my organization."
  • "With this product, we receive the best monitoring and reports.​"
  • "​The VPN and decryption need improvement."
  • "​They provide a medium level of technical support."

How has it helped my organization?

Installing this product as a datacenter firewall for segregation and segmentation, and also configuring policies between zones.

What is most valuable?

Threat Prevention and WildFire features should be enabled in Palo Alto. With this product, we receive the best monitoring and reports.

What needs improvement?

The VPN and decryption need improvement.

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

No, I did not encounter any issues with Palo Alto's firewall. The product is very stable.

What do I think about the scalability of the solution?

No, but you should do the rightsizing before buying the product. 

How are customer service and technical support?

They provide a medium level of technical support.

Which solution did I use previously and why did I switch?

I used Cisco. Palo Alto is better for datacenter and Cisco for perimeter.

How was the initial setup?

Straightforward to use.

What's my experience with pricing, setup cost, and licensing?

More expensive than other firewalls.

Which other solutions did I evaluate?

We evaluated Cisco Firepower.

What other advice do I have?

My advice is to install Palo Alto's firewall as a datacenter. You should enable the features (Threat Prevention (AS, AV, and Vulnerability Protection), File Blocking, URL Filtering, WildFire, etc.).

Palo Alto's firewall is the best firewall right now. I have used Palo Alto since 2014.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
PeerSpot user
PeerSpot user
Sr. Network Engineer at a tech services company
Consultant
Strengthens existing protections, provides significant visibility into files and apps moving through the company's systems
Pros and Cons
  • "Detailed reporting on analysis of content. The inspections are easily applied to security policy profiles and profile groups, and may be assigned on a per-rule basis."

    How has it helped my organization?

    This product/feature is an enhancement to traditional company/corporate AV and VP solutions, not a replacement. As such, it strengthens existing protections and provides significant visibility into files and applications that are moving through the company's systems.

    What is most valuable?

    Detailed reporting on analysis of content. The inspections are easily applied to security policy profiles and profile groups, and may be assigned on a per-rule basis.

    For how long have I used the solution?

    One to three years.

    What do I think about the stability of the solution?

    No stability issues.

    What do I think about the scalability of the solution?

    No scalability issues.

    How are customer service and technical support?

    I have never accessed PAN (Palo Alto Networks) technical support regarding this feature.

    Which solution did I use previously and why did I switch?

    This is a fairly unique feature offered by Palo Alto Networks (may be comparable to FireEye). As such, it was an addition to our existing protection suites.

    How was the initial setup?

    Very straightforward. Basically, a few check boxes and desired behaviors.

    What's my experience with pricing, setup cost, and licensing?

    It is expensive, a feature more accessible to enterprise class customers, but provides an enhanced possibility that Zero- or near-Zero-day threats may be identified and mitigated. The cost of the product weighed against the potential impact of even one successful crypto malware-type exploit may justify the expense.

    Which other solutions did I evaluate?

    No, again this "WildFire" is a fairly unique feature. The closest comparison may be FireEye, but I have not used that product.

    What other advice do I have?

    Consider your level of exposure to exploits of any nature. Also, consider the impact (cost and loss of business) of even one successful exploit to help make a business decision regarding this product.

    I would also advise that the decision should be considered with regard to the company's ability/willingness to provide the assets to keep abreast of these types of products and features. There are no set and forget type functions.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Azadur Sarker - PeerSpot reviewer
    Deputy Manager at a tech services company with 201-500 employees
    Real User
    The IDA and IPS system filtering provide an enhancing network and endpoint security for the client
    Pros and Cons
    • "High availability with active-active and active-passive modes."
    • "The data analytical system for deployment needs to improve."

    How has it helped my organization?

    It provides the enhancing network and endpoint security for the client through its IDA and IPS system filtering.

    What is most valuable?

    The most valuable features are:

    • High availability with active-active and active-passive modes.
    • Redundant power input for increased reliability.
    • Fan-less design.

    What needs improvement?

    The data analytical system for deployment needs to improve.

    How are customer service and technical support?

    Technical support is excellent, I would rate it a 10/10.

    How was the initial setup?

    It is quite easy to set up.

    What's my experience with pricing, setup cost, and licensing?

    The pricing and licensing option should be categorized for various countries such as for Bangladesh.

    Which other solutions did I evaluate?

    We looked at Forcepoint NGFW.

    What other advice do I have?

    Technical support is excellent and it is a promising option.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    it_user531378 - PeerSpot reviewer
    Senior Network and Security Engineer
    Vendor
    Was instrumental in blocking new threats before other anti-virus tools were able to detect them.
    Pros and Cons
    • "WildFire has been instrumental in blocking a number of new threats, before common desktop anti-virus tools were able to detect them."

      How has it helped my organization?

      WildFire has been instrumental in blocking a number of new threats, before common desktop anti-virus tools were able to detect them. When Wannacry first came out, wildfire was detecting it and dropping incoming threats within seconds. We were dropping over 10,000 files per day with no additional firewall load at all.

      What is most valuable?

      Dynamic analysis.

      What needs improvement?

      I am very happy with WildFire and can see no obvious areas of improvement at this point.

      What do I think about the stability of the solution?

      This product is rock solid in terms of stability.

      What do I think about the scalability of the solution?

      There were no problems with scalability. We have rolled out more firewalls to clients, and no scalability issues were found.

      How are customer service and technical support?

      Technical support is fine. We have never needed to contact them regarding WildFire.

      Which solution did I use previously and why did I switch?

      We previously used Fortinet. However, we found it to miss a lot of incoming viruses, because at the time, they had no sandbox style service.

      How was the initial setup?

      The setup was very easy. Simply license the feature and enable it within your scanning profiles.

      What about the implementation team?

      This feature is implemented in-house.

      What was our ROI?

      As soon as it began dropping incoming threats, measured in days, that desktop scanners could not find, it hit its ROI.

      What's my experience with pricing, setup cost, and licensing?

      It's not particularly cheap, but it is absolutely worth it.

      Which other solutions did I evaluate?

      We evaluated Fortinet and Cisco.

      What other advice do I have?

      Do it.

      Disclosure: I am a real user, and this review is based on my own experience and opinions.
      PeerSpot user
      PeerSpot user
      Senior Systems Administrator/Network Engineer at a retailer with 1,001-5,000 employees
      Vendor
      Provides credential-based attack prevention.
      Pros and Cons
      • "Whole team can use the firewall and understand it."
      • "The GUI is better in 8.0, but I still feel it lacks the fast response most of us desire. Logs are much quicker."

      How has it helped my organization?

      • Much more visibility during an attack lifecycle; found a lot of infected hosts and vulnerabilities.

      What is most valuable?

      • App-ID
      • Easy migration
      • Credential-based attack prevention
      • PBF easily configured
      • Whole team can use the firewall and understand it

      What needs improvement?

      The GUI is better in 8.0, but I still feel it lacks the fast response most of us desire. Logs are much quicker.

      What do I think about the stability of the solution?

      We have not encountered any stability issues.

      What do I think about the scalability of the solution?

      We have not encountered any scalability issues.

      How are customer service and technical support?

      Customer Service:

      Customer service is excellent. Their support is top-tier for sure.

      Technical Support:

      Technical support is excellent. Their support is top-tier for sure.

      Which solution did I use previously and why did I switch?

      We previously used legacy Cisco ASA. We switched because it was buggy and had no visibility; it was not easy for the rest of my team to use.

      How was the initial setup?

      Initial setup was straightforward.

      What about the implementation team?

      A vendor team implemented it. They were amazing.

      What's my experience with pricing, setup cost, and licensing?

      It IS a bit expensive, but I think you get what you pay for. Value is there.

      Which other solutions did I evaluate?

      Before choosing this product, we also evaluated Check Point, Cisco, and Fortinet.

      Disclosure: I am a real user, and this review is based on my own experience and opinions.
      PeerSpot user
      M.K. Goyal - PeerSpot reviewer
      M.K. GoyalAsst General Manager(C&IT) at NMDC Iron & Steel Plant
      User

      It is a good solution leaves other vendors far behind

      See all 3 comments
      Girish Vyas - PeerSpot reviewer
      Architect - Cloud Serviced at a comms service provider with 10,001+ employees
      Real User
      Top 20
      It crashes too frequently for a few boxes, but they have the best tech junkies I have worked with.

      What is most valuable?

      • App-ID
      • User-ID
      • Ease of deployment and usability
      • Filtering Mechanism like SP3 Engine

      How has it helped my organization?

      From a technical perspective this has given us a new high as this is how a technology solution should function. From a sales perspective, we have been able to pitch the solution to new customers as it seems cheap to customers when we bundle the solution, compared to getting each device for individual functions.

      What needs improvement?

      • IP SLA tracking
      • GRE tunnel support

      I believe these are the major improvements in the pipeline.

      For how long have I used the solution?

      I've been using it for four years.

      What was my experience with deployment of the solution?

      It crashes too frequently for a few boxes, which could be expected from a new vendor as it evolves. The best part is RMA, as you get the box back quickly if you have it in the contract.

      What do I think about the stability of the solution?

      No issues encountered.

      What do I think about the scalability of the solution?

      No issues encountered.

      How are customer service and technical support?

      Customer Service:

      If it is Arrow support, it's pathetic. I wouldn't recommend them. However, if you go directly with the PA team they are the best tech junkies I have worked with.

      Technical Support:

      6/10.

      Which solution did I use previously and why did I switch?

      We used to have Netscreen as our favourite, but it went EOL. Being an MSP we have to have expertise with all the devices. Although, Netscreen is our favourite.

      How was the initial setup?

      I would say that this is difficult to answer, as the setup would be adaptable based on the mode you use, and the way the firewall can be configured. If you ask an expert it would be straightforward. If you ask a newbie, it would be not that difficult to configure if you follow the mentioned steps.

      What other advice do I have?

      Go forward, this is an amazing device to be implemented if you have the cost to bear.

      Disclosure: I am a real user, and this review is based on my own experience and opinions.
      PeerSpot user
      it_user333885 - PeerSpot reviewer
      it_user333885EMEA Corporate Sales - Advanced Cyber Security Solutions at a tech company with 5,001-10,000 employees
      Real User

      Hi Srinivas, I have Pa200 and with 20 nodes connected I'm getting around 46mgps out of 50mbps line with enabling all the security features activated. Best advice would be reaching out to a local Palo Alto Networks partner and asking for a POC. Let me know if you would need help with this. buslu@paloaltonetworks.com

      See all 4 comments
      PeerSpot user
      Presales Technical Consultant at a tech services company with 51-200 employees
      Consultant
      The way that the product process or handle the traffic, is one of the best in the industry.​

      Valuable Features:

      It has one of the best WebUIs that I have used, because at a glance looks simple, but offers us a lot of options to secure all the traffic that is passing through the device (or all traffic that the user decides to pass through). Besides, the way that scan the applications to detect what kind of application is do not affect anything about the device's performance. The way that the product process or handle the traffic, is one of the best in the industry.

      Improvements to My Organization:

      Well, I work as a security consultant, so one of my functions is to help and provide to the end users with recommendations about technologies or process to secure their network. So, one of my customer decide to migrate from TMG/UMG to Palo Alto, it took a while, but during this process, I showed them many ways to improve their current security with Palo Alto, and after a while, they are very comfortable with the technology, for them now, it is easier to apply some kind of web filtering or application filtering than the past.

      Room for Improvement:

      I'd like to see a wizard to create IPSec VPNs. They need to  improve the graphics to show the network behavior.

      Deployment Issues:

      Deployment is easy.

      Stability Issues:

      The stability is acceptable.

      Scalability Issues:

      It depends about the project, but offers a good HA option.

      Other Advice:

      Always show to the customer what the product can do for them and what not, is a good practice, because they can open their eyes and to be sure what are the benefits of that technology. Always analyze the network topology, using the customer's network diagram and ask every doubt that you have, for my experience a good analysis and deployment plan give us a successful implementation.

      Disclosure: I am a real user, and this review is based on my own experience and opinions.
      PeerSpot user
      it_user326337 - PeerSpot reviewer
      it_user326337Customer Success Manager at PeerSpot
      Consultant

      What would you like to know about network behavior that you currently cannot know/see?

      PeerSpot user
      Data and Storage Systems Manager at a media company with 1,001-5,000 employees
      Vendor
      Palo Alto is an easy to manage firewall.

      Palo Alto is an easy to manage firewall. It connects successfully in AD and LADP for user based policy. It has rich application info for app.based policies and it gives enough IDS performance. New policy compile is speedy.

      Disclosure: I am a real user, and this review is based on my own experience and opinions.
      PeerSpot user
      it_user292647 - PeerSpot reviewer
      IT Security Engineer at a tech services company with 51-200 employees
      Consultant
      It can do on-premises sandboxing and detect attacks by malware embedded on files and URLs, but it should handle many more file types without sending .APK files to the cloud for sandboxing.

      What is most valuable?

      It can do sandboxing on the premises, and it can be directly integrated with Palo Alto NGFW. The malware information on the file that has been sandboxing will be directly updated to the Palo Alto NGFW, and added to the Palo Alto Networks NGFW malware signature library. Also, the credential data within the file that has been sandboxing still be kept on the premises.

      How has it helped my organization?

      Palo Alto Networks WildFire can detect many types of attacks that are using malware embedded on files/URLs with minimum time, and it can increase the effectiveness of resources (time and people) to prevent the malware.

      What needs improvement?

      In my opinion, it could be developed to be dependent not only on signatures, but also on patterns and behavior of malware. What I would like to see in the next version/release is to be able to handle much more file types on premises during deployment, because now on premises deployment a .APK file must be sent to the cloud for sandboxing.

      For how long have I used the solution?

      I can't remember exactly, but probably more than six months.

      What was my experience with deployment of the solution?

      For now, I have no issues with the deployment.

      What do I think about the stability of the solution?

      For now, I have no issues with the stability.

      What do I think about the scalability of the solution?

      For now, I have no issues with the scalability.

      How are customer service and technical support?

      Customer Service:

      Both customer server and technical support are very good.

      Technical Support:

      In our case, before we contact Palo Alto Networks technical support, we can contact the Palo Alto Networks local distributor, who provide Palo Alto Networks technical support locally.

      Which solution did I use previously and why did I switch?

      I forgot what the name or product that used previously, but the reason I choose Palo Alto Networks wildfire is it integrated with Palo Alto Networks NGFW that already used on the network environment

      How was the initial setup?

      The initial setup of Palo Alto Networks WildFire is simple.

      What about the implementation team?

      We’re the ones who implement the Palo Alto Networks WildFire in our customers environments.

      What was our ROI?

      It’s not about what we will get directly from having Palo Alto Networks WildFire as an ATD device, but it’s all about the loss of resources you suffer if you don't have it implemented.

      Disclosure: My company has a business relationship with this vendor other than being a customer: We are Palo Alto Networks partner and reseller.
      PeerSpot user
      it_user333885 - PeerSpot reviewer
      it_user333885EMEA Corporate Sales - Advanced Cyber Security Solutions at a tech company with 5,001-10,000 employees
      Real User

      Please refer to hybrid cloud deployment for WF500, with this setup you may pass the APK files which is not likely to have any confidential information to Wildfire Threat Intelligence Cloud and get the verdict. https://www.paloaltonetworks.com/documentation/70/pan-os/newfeaturesguide/wildfire-features/wildfire-hybrid-cloud.html

      See all 3 comments
      it_user221883 - PeerSpot reviewer
      Network Systems Manager with 51-200 employees
      MSP
      A custom script is required to put the SSL Decryption certificate into Mozilla Firefox but it is a very comprehensive and secure firewall.

      What is most valuable?

      User identification and the Applipedia are the most useful. The integration of the Applipedia with the application identification at layer seven makes it a very comprehensive, and secure, firewall.

      How has it helped my organization?

      We have the ability to see what traffic is coming and going in a much deeper and more detailed fashion. We have also found, and stopped, several malware applications before they infected the endpoints.

      For how long have I used the solution?

      I've used it for five months.

      What was my experience with deployment of the solution?

      During initial testing we were too strict on what was allowed outbound. We ended up needing to open up more broad categories. We also found that several websites do not function well with the SSL Decryption feature. We also found that a custom script is required to put the SSL Decryption certificate into Mozilla Firefox.

      What do I think about the stability of the solution?

      No the product has been very stable and reliable.

      What do I think about the scalability of the solution?

      We implemented it in a smaller environment but, find that the 3000 series has plenty of power and has the ability to grow with us as we provide north-south as well as east-west security between internal environments.

      How are customer service and technical support?

      Customer Service:

      Customer service is very friendly and responsive to any request.

      Technical Support:

      I have found the tech support to be impressive. Support agents are available 24/7, and I have never waited for more than an hour to speak with an agent. I would consider the first team you call to be equivalent to most level two or three engineers.

      Which solution did I use previously and why did I switch?

      Previously we used Cisco ASA 5510 and Fortinet. Fortinet was an old version and was phased out due to this. The Cisco ASA was replaced do to the limited capability of the out of box functionality and reporting.

      How was the initial setup?

      Initial set-up was straightforward and easy. We were able to get both devices on the network and set-up to look at traffic within a few hours on split up time. The products complexity came from the terms and the overall thinking of how the product works.

      What about the implementation team?

      We did it in-house.

      Which other solutions did I evaluate?

      Before choosing Palo Alto we also reviewed Cisco ASA, Fortinet, and Sophos.

      What other advice do I have?

      The product is straightforward to implement, though if you are looking for a quick implementation, I would suggest bringing in an expert.

      Disclosure: I am a real user, and this review is based on my own experience and opinions.
      PeerSpot user

      Could you let me know the bandwidth before and after installation of the device. How much was the reduction in speed. How about performance in VPN ?

      See all 2 comments
      it_user217794 - PeerSpot reviewer
      Chief Information Security Officer at a financial services firm with 51-200 employees
      Vendor
      The deployment of Wildfire was surprisingly easy but inspection over different protocols needs to be improved.

      What is most valuable?

      Being able to discover malicious files unknown to most AV vendors.

      How has it helped my organization?

      It has allowed me to stop new attacks before they could gain a foothold in my network.

      What needs improvement?

      • Inspection over different protocols (not just HTTP/FTP)
      • Inspecting more file types
      • Providing information back to the community that it uses to support its product.

      For how long have I used the solution?

      I've used it for three years. However, my current company isn't using the product. I took a different engineering route into the company and I decided to use other protection solutions and not Wildfire.

      What was my experience with deployment of the solution?

      The deployment of Wildfire was surprisingly easy.

      What do I think about the stability of the solution?

      Wildfire itself was a very stable product.

      What do I think about the scalability of the solution?

      I never had any issues with scalability. When I enabled it, it seemed to work in the environment that the firewall was already servicing.

      How are customer service and technical support?

      Customer Service:

      Great when I was at a large company but average or less than average at a small company.

      Technical Support:

      Overall their support people are better than most tech companies.

      Which solution did I use previously and why did I switch?

      There was no solution in this space before Wildfire. Both FireEye and Wildfire came onto the market right around the same time.

      How was the initial setup?

      It was straightforward as I could, literally, turn on the firewall settings in five minutes or less.

      What about the implementation team?

      You really don't need to pay to turn it on. The configuration is very simple.

      What was our ROI?

      There are two levels of Wildfire.

      1. The free version which is great, so I would guess there is no ROI on this version
      2. Then there is the subscription version of the service and this is a very affordable yearly subscription per firewall

      What's my experience with pricing, setup cost, and licensing?

      Initially, the product doesn't cost anything for the first tier of usage you can prove the product before buying it.

      Which other solutions did I evaluate?

      • FireEye
      • Blue Coat
      • ProofPoint.
      • Even as the more the list of products I look at each year is pretty long.

      What other advice do I have?

      If you're running Palo Alto firewalls there is no reason not to use it at the free level. Once you have run it for a while at the basic level, you can make an educated decision if it's worth paying for the subscription (it is).

      Disclosure: I am a real user, and this review is based on my own experience and opinions.
      PeerSpot user
      it_user333885 - PeerSpot reviewer
      it_user333885EMEA Corporate Sales - Advanced Cyber Security Solutions at a tech company with 5,001-10,000 employees
      Real User

      Best bit is out of 27000 customers of Palo Alto Networks, you are getting intel from every single PA appliance which resembles to millions of users' data. The time for wait is about to drop to 5min from 15min.

      See all 2 comments
      Buyer's Guide
      Download our free Palo Alto Networks WildFire Report and get advice and tips from experienced pros sharing their opinions.
      Updated: September 2022
      Buyer's Guide
      Download our free Palo Alto Networks WildFire Report and get advice and tips from experienced pros sharing their opinions.