This is a CASB product that we use to protect data that is in the cloud. We work with our client to protect them from unknown threats, as well as known threats such as the inadvertent sharing of files. An example of this is the uploading of a file by an admin that contains sensitive data that was not intended to be shared with anyone who is external to the organization, such as a Gmail address. This solution offers protection from these kinds of problems.
Architect - Cloud Serviced at a computer software company with 501-1,000 employees
Protects cloud data at rest and sends valuable notifications in a timely manner
Pros and Cons
- "This solution provides a DLP on the cloud and very few people have a scanning device for data at rest."
- "I would like to see support for custom applications."
What is our primary use case?
How has it helped my organization?
From my client's perspective, I can say that they had no control over their cloud data that they needed to protect. They had solutions that can handle their on-premise DLP, such as determining whether a particular service is malware-free. When it was on the cloud, such as Google Cloud, Google Drive, ServiceNow, or others, they were not sure how to protect it. With this solution, they are able to protect themselves, and also with data at rest. It has helped to protect against the propagation of malware from the cloud to the premises.
What is most valuable?
There are two features that I find very good. This solution provides a DLP on the cloud and very few people have a scanning device for data at rest. The second feature that I really like about this solution is the notifications that it provides. It provides me with timely notifications so that I can consider things such as whether actions are trusted or untrusted and I can quarantine the data on the fly.
What needs improvement?
There are a lot of cloud-based applications that are supported, such as Box, Skype, Google Drive, and SharePoint, but there are many more than have not been totally integrated. They cannot use in-house apps because they are not generic services. I would like to see support for custom applications.
There are also certain storage services that are not integrated, like AWS S3. If the services are created by the customer then it would be very nice to have those protected too.
Right now, this is a data at rest CASB, but it would be nice if it included features such as forward proxy or reverse proxy. It would be able to provide the OTP to those gateways and anyone who can integrate with Aperture can send the data to have it authenticated, via Aperture to the cloud, rather than just scanned. Essentially, if it can be made to act as an auth server, to automatically handle the forward proxy CASB, it would be good.
Buyer's Guide
Prisma Access by Palo Alto Networks
August 2025

Learn what your peers think about Prisma Access by Palo Alto Networks. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,670 professionals have used our research since 2012.
For how long have I used the solution?
Six months.
What do I think about the stability of the solution?
It seems to be a pretty stable product. It has been six months and we haven't seen many problems yet.
What do I think about the scalability of the solution?
Given that it is in the cloud, I don't think that there is an issue with the scalability. You can just add agents or perform more integration very easily and it will work. Unless the price model changes because it is already a bit pricey from the perspective of the end-user, it is not a problem.
The scalability is based on devices rather than users, but I can say that there are perhaps six cloud accounts with around ten or fifteen apps that they are trying to protect.
How are customer service and support?
The technical support is very friendly. They are aware of the solution and they can definitely help you if you are stuck with a problem.
Which solution did I use previously and why did I switch?
Our customer was not aware of how to protect their cloud data, and this is the first solution that they chose.
How was the initial setup?
The initial setup is simple. You just need to log into the Aperture cloud with your user ID and password, apply the license and you are done. After this, you just need to know how to integrate, but they already have documentation that can help you out.
The time required for deployment depends on how complex you are making the environment. If it's a very simple one, such as a Box or a Google Drive, then it will take around a day or two, maximum a week.
I would say that a complex environment may take between three and four weeks. It depends on the use case. If you want to do a POC setup on VPC or Google Drive then it may take less time. On the other hand, if you are integrating more services then it will take longer because you have to learn the product from scratch. There are no similar services.
Once this solution is configured, there is very little that you have to do unless the customer requests something new. If you integrate it with WildFire and AutoFocus, it will automatically get the latest volume or latest signatures, and it will notify you whenever that happens. If somebody is properly trained then one person can handle the maintenance.
What about the implementation team?
We deployed this solution for our customer. We also used agents, provided with Aperture, on the local devices so that they could be easily connected to the cloud.
What's my experience with pricing, setup cost, and licensing?
The pricing for this solution is on the higher end. Our customer felt that the solution was a bit overpriced but they had nothing that offered them better protection.
The licensing fees are on a yearly basis, and there are no additional costs.
Which other solutions did I evaluate?
There are now more vendors doing this, such as Oracle, but when we started there were very few. This is one of the reasons for choosing this solution.
What other advice do I have?
This is a fairly good product if you are looking for something to protect data at rest. There are alternatives, like Oracle and McAfee, that also provide similar solutions, but you should do a POC with them first. In fact, you should always start with a POC because everyone has different needs.
If you take the training that is available then you will be able to handle the maintenance yourself. There can be challenges when there are compliance issues, like somebody putting a file into quarantine. It will have to be taken out manually, and if the user is untrained then they will require technical help for this.
I would rate this solution eight and a half out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Network Engineer at Acliv Technologies Pvt Ltd
Enables us to easily monitor everything coming over the network and work accordingly
Pros and Cons
- "Monitoring is the most valuable feature because we can easily monitor all kinds of stuff coming over the network. We can check the dashboard and work accordingly."
- "One thing that would help is if we could get a guide. With Cisco, for example, you can just type the problem regarding your Cisco product and you will easily get your solution. In Palo Alto, however, it's not easy to find the solutions."
What is our primary use case?
We use this solution to secure the network. We block unwanted traffic.
How has it helped my organization?
We had a government project. When I was there, they asked to open some kind of port. We just had to initiate that traffic. Then we checked what kind of ports were blocked. We gave them the ports and after that they asked to open the port for the traffic application. We did the work accordingly.
What is most valuable?
Monitoring is the most valuable feature because we can easily monitor all kinds of stuff coming over the network. We can check the dashboard and work accordingly.
What needs improvement?
Overall it is actually very good. I haven't yet had any issue at all. One thing that would help is if we could get a guide. With Cisco, for example, you can just type the problem regarding your Cisco product and you will easily get your solution. In Palo Alto, however, it's not easy to find the solutions.
For how long have I used the solution?
We've been using this solution for about three years.
What do I think about the stability of the solution?
Stability is good.
What do I think about the scalability of the solution?
Currently, our network security team is taking charge of the firewall but behind that, the users have to go through the firewall. Initially, we had three or four firewalls, so two or three engineers were enough for the deployment and maintenance.
How was the initial setup?
The initial setup was a bit complex. It took two or three months and we are still continually working on it.
What's my experience with pricing, setup cost, and licensing?
The solution is actually very expensive. I don't know the particulars since the purchasing team dealt with it.
Which other solutions did I evaluate?
We just checked which firewall was top rated. We selected two such firewalls. One was Check Point and the other was Palo Alto. Both of them are comparatively good.
What other advice do I have?
Ultimately, Palo Alto is a very advanced firewall. The firewall uses activation awareness. This firewall can easily identify what applications are running behind the network. This is a good solution to use.
I would rate this solution as eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Prisma Access by Palo Alto Networks
August 2025

Learn what your peers think about Prisma Access by Palo Alto Networks. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,670 professionals have used our research since 2012.
IT Security at a real estate/law firm with 1,001-5,000 employees
Good user integration and technology features
Pros and Cons
- "The features I find most valuable is WildFire, user integration, and the basic technology features."
- "I would like to see better pricing and an easier logging process. Also, if there was a way to log a global log, everything could go onto the system. It would be better if there was a third log, otherwise one would have to do everything manually."
What is most valuable?
The features I find most valuable is WildFire, user integration, and the basic technology features.
What needs improvement?
I would like to see better pricing and an easier logging process. Also, if there was a way to log a global log, everything could go onto the system. It would be better if there was a third log, otherwise one would have to do everything manually.
For how long have I used the solution?
I've been using this solution for a couple of months now.
What do I think about the stability of the solution?
From an audit or security perspective, the solution has been very stable so far. But I am not sure if it will stay stable once deployment takes place.
How was the initial setup?
The initial setup was really straightforward.
What other advice do I have?
I will give this solution an eight out of ten rating because theoretically, I looked at a lot of other products but Palo Alto seems to be covering all aspects and I'm sure the competitors like to tell everybody they have more features, but I've not experienced it yet.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Director at a tech services company with 51-200 employees
Good architecture, software, and interface with strong endpoint protection
Pros and Cons
- "It's very stable. Sometimes after installing the boxes, we leave them for one or two years. We would just touch the box in the case of the customer needing new requirements or changes to the setup."
- "Their next release should provide solutions for the mobile environment."
What is our primary use case?
Most of our customers here in Egypt are looking for how to manage their boxes in simple ways. They want good performance as well.
How has it helped my organization?
We sometimes need to apply proactive service on specific applications. We can do it with Palo Alto Networks in just a few clicks. On some projects, we work with other vendors like Juniper or Check Point and we are really facing some obstacles applying policies and proactive service in specific applications. But Palo Alto and its next next-generation firewall offers especially proactive services on a specific type of application, and in applications like tracking features.
What is most valuable?
The next-gen firewall performance is very good. The solution has very good architecture, software, and interface.
What needs improvement?
They could improve the proactive service on this application and application tracking in their next release.
Their next release should provide solutions for the mobile environment.
For how long have I used the solution?
I've been using the solution since 2009.
What do I think about the stability of the solution?
It's very stable. Sometimes after installing the boxes, we leave them for one or two years. We would just touch the box in the case of the customer needing new requirements or changes to the setup. It has a very stable performance because they have very good architecture and software.
How are customer service and technical support?
We don't usually need technical support. My company is certified to provide the Tier 1 support for Palo Alto here in Egypt. Most of the time we are fielding the cases here in the technical support center in our company. Sometimes we need to escalate to their Tier 2 and Tier 3, and the response is very good. We are talking about just two hours to escalate to the next level of support. They have a very good policy about help features and support centers in our region here and in India.
How was the initial setup?
There are many ways to deploy for the firewall in general. Sometimes we propose a firewall as a perimeter firewall, to protect the internet connections. Sometimes, we propose the firewalls to protect the data center and protecting the institutional traffic between servers. So it depends on the deployment model and the customer requirements.
Depending on the client, it may take time to gather the info and requirements from the customers, so it takes anywhere from two business days to two months to finalize the whole deployment for the Palo Alto Networks.
What about the implementation team?
We have a technical team in our company that handles the implementation.
What's my experience with pricing, setup cost, and licensing?
Palo Alto is not a cheap product. It's expensive because they provide very good technology.
Which other solutions did I evaluate?
Here in Egypt, there are about 93 system integrators and we have a partnership with Fortinet. We consider our connections because we need to avoid conflict with our partners and conflict with other solutions in our portfolio. We choose Palo Alto and Check Point to avoid conflict with our partners. The market is very crowded with FortiGate technical solutions and partners, so we avoid these.
What other advice do I have?
We had a very good experience with their solutions, especially with their endpoint protections and the next-generation firewalls. We are a local distributor in Palo Alto here in Egypt. So we propose this technology to our customers and our partners here in Egypt.
Palo Alto offers very good technology and hardware. Its very good in this category of solution. You have options of providing or proposing to a customer a small box, or sometimes a mid range. It depends on the model and the deployment.
I would rate this solution 8 out of 10.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner.
Consultant at a political organization with 201-500 employees
Good interface and valuable feature set with an easy setup
Pros and Cons
- "The initial setup is very straightforward."
- "Dependencies of applications sometimes is a bit confusing."
What is our primary use case?
We primarily use the solution for firewall technologies.
What is most valuable?
The interface is very good and the feature set is very good. The investigation options, for example, in the data are very useful.
What needs improvement?
The dependencies of applications sometimes are a bit confusing. All the dependencies you have between applications can be confusing when you fill in things. It's mostly the configuration with the different applications. Extra guidance in using applications and things like that might be helpful.
In terms of features, at the moment, the features we use are all in there. But we don't even use the full feature set at the moment. So I don't really have any need for anything else. For now, there's not really anything missing.
For how long have I used the solution?
I have been using the solution for seven years.
What do I think about the scalability of the solution?
We've had no issue over the whole lifespan with any failures so we didn't have any problem with that. In terms of the scalability, supposedly the model you choose the scale goes up at the beginning. You can buy a firewall device and scalability is dependant on the model.
How are customer service and technical support?
We used an integrator so we don't need to contact their technical support directly.
How was the initial setup?
The initial setup is very straightforward. With the standard deployment, I think it took a few days.
What about the implementation team?
We used an integrator for the initial setup. They were very good.
What's my experience with pricing, setup cost, and licensing?
I think that the Palo Alto solution is very good. The licensing in comparison to other competitors is not really an issue. The price is not low but you can't compare with all the premium firewalls in its range. The licensing cost is about 18,000 euros.
What other advice do I have?
I would recommend the solution. The solution really depends on your budget, of course. If you have a really low budget it's not a low budget solution, so it can really depend on the budget you have. But if you have a budget for enterprise or best of firewalls I think you should take this solution into consideration.
I would rate this solution at 8.5 or 9 out of 10. No product, of course, is totally perfect and a ten is something that I don't think that exists. I think maybe it needs a bit more ease of how applications and dependencies run. Because sometimes you push a firewall rule and you get lots of dependencies so that could be a more manageable thing. Extra guidance in using applications and things like that would be helpful.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Director at a logistics company with 501-1,000 employees
Hands-off security that we don't have to maintain
Pros and Cons
- "Its hands-off security and the fact that we don't have to maintain it are the most valuable features."
- "They automatically update and they should give us time to fully understand what they're updating so that we can make sure it doesn't impact production."
What is our primary use case?
The company I work for mainly uses Palo Alto Networks Prisma SaaS to secure our network.
How has it helped my organization?
Having them there to support our network and watch in real-time has been a huge benefit.
What is most valuable?
Its hands-off security and the fact that we don't have to maintain it are the most valuable features.
What needs improvement?
They automatically update and they should give us time to fully understand what they're updating so that we can make sure it doesn't impact production.
What do I think about the stability of the solution?
It is a very stable solution and I would rate them best in its class.
What do I think about the scalability of the solution?
I believe in Palo Alto Networks' scalability. They will grow as our company grows.
Which solution did I use previously and why did I switch?
Before we started using this solution, we tried to secure our networks ourselves. That did not work out so we started using another vendor. However, since we switched over to Palo Alto Networks, we've watched them support our network in real-time and it has been a huge benefit.
How was the initial setup?
I wasn't personally involved in the initial setup, but our IT director was. He reported that it was straightforward and easy to configure.
What was our ROI?
It is difficult to determine a specific ROI as its main function is securing the network. Since installing this solution we haven't had any penetration or malware, so it has definitely kept us protected.
What's my experience with pricing, setup cost, and licensing?
I am not sure about the cost, but my advice to others would be that it is not a mistake going with them. You get what you pay for and I believe they are the best in their class.
Which other solutions did I evaluate?
We did evaluate other options but only Palo Alto Networks could offer what we were looking for.
What other advice do I have?
They're unique in that they're watching our network. They're just constantly updating and patching, watching for potential threats. As long as they keep on doing that but allow us time to understand what they're updating before they do it, it would help out.
You get what you pay for. They're the best in class. I would rate it a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Solution Architect // Network Consultant at a consultancy with 501-1,000 employees
Provides robust cloud security along with a host of valuable features
Pros and Cons
- "Palo Alto Firewall is one of the best firewalls in the world."
- "Though the monitoring is fine, the solution should improve its application graphs and interface monitoring."
What is our primary use case?
My clients used Prisma Access essentially for security in the cloud. We integrated their SD-WAN into Prisma Access.
What is most valuable?
Palo Alto Firewall is one of the best firewalls in the world. It's very clear about the policies and all the security features they have. Also, the user integration works very well in Palo Alto. The WiFi, anti-threat, web filtering features and IT/OT separation are also good.
What needs improvement?
Though the monitoring is fine, the solution should improve its application graphs and interface monitoring. Additionally, the pricing could be improved.
For how long have I used the solution?
I worked as a consultant on Prisma Access for one year for one integration project.
What do I think about the stability of the solution?
The product is very stable.
What do I think about the scalability of the solution?
The product is scalable. Our clients are medium-sized businesses. There are 1,500 users worldwide.
How are customer service and support?
The support is good. I rate the support an eight or nine out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
The solution is not easy to implement. The first setup is a bit more difficult, but it gets better. The solution is easy to maintain.
What about the implementation team?
A global partner did the setup.
What's my experience with pricing, setup cost, and licensing?
I'm still comparing, but the solution is quite expensive.
What other advice do I have?
I recommend people try the product out because it's really good. I rate Prisma Access an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Consultant
IT Manager at a tech services company with 1,001-5,000 employees
Offers quick consolidation but pricing is expensive
Pros and Cons
- "The tool's consolidation is pretty quick."
- "Prisma Access by Palo Alto Networks should consolidate the portals into a single portal. It is slow and takes more than ten seconds to load a page."
What is most valuable?
The tool's consolidation is pretty quick.
What needs improvement?
Prisma Access by Palo Alto Networks should consolidate the portals into a single portal. It is slow and takes more than ten seconds to load a page.
For how long have I used the solution?
I have been working with the product for two years.
What do I think about the stability of the solution?
I rate Prisma Access by Palo Alto Networks' stability a seven out of ten.
What do I think about the scalability of the solution?
I rate the tool's scalability an eight out of ten. My company has around 10-15 users.
How are customer service and support?
Prisma Access by Palo Alto Networks' technical team responds fast.
How would you rate customer service and support?
Neutral
How was the initial setup?
The tool's deployment difficulty is in the middle.
What's my experience with pricing, setup cost, and licensing?
Prisma Access by Palo Alto Networks has flexible licensing models with different categories. It comes with different features which can be removed if not needed. However, its pricing is high.
What other advice do I have?
I rate Prisma Access by Palo Alto Networks an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Prisma Access by Palo Alto Networks Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Product Categories
Secure Access Service Edge (SASE) Secure Web Gateways (SWG) Cloud Access Security Brokers (CASB) Enterprise Infrastructure VPN ZTNA as a ServicePopular Comparisons
Cisco Umbrella
Zscaler Internet Access
Fortinet FortiClient
Zscaler Zero Trust Exchange Platform
Cloudflare One
OpenVPN Access Server Enterprise
Microsoft Defender for Cloud Apps
Cato SASE Cloud Platform
Okta Workforce Identity
Cisco Secure Client (including AnyConnect)
Check Point Harmony SASE (formerly Perimeter 81)
Buyer's Guide
Download our free Prisma Access by Palo Alto Networks Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the better solution - Prisma Access or Zscaler Private Access?
- How does Prisma SaaS by Palo Alto Networks compare with Zscaler internet access?
- What is the difference between point solutions (SD-WAN, NGFW, SWG, VPN) and SASE?
- What questions do you need to ask when choosing a Secure Access Service Edge (SASE) solution?
- When evaluating Secure Access Service Edge (SASE), what aspect do you think is the most important to look for?
- Has anyone ever heard of secureaccess.com?
- What is the difference between SASE and SD-WAN?
- What is the difference between SASE and CASB?
- What SASE solution does your company use?
- Why is SASE (Secure Access Service Edge) important?