Manager ERP (Insurance) at a manufacturing company with 10,001+ employees
Real User
Top 10
Nov 3, 2025
I use it for one of my customers, and my role is to help my customer with the solution. They use it for their IoT devices in the field, and they have a lot of sensors out there for their heating equipment and air conditioning systems.
I use Palo Alto Networks IoT Security ( /products/palo-alto-networks-iot-security-reviews ) for discovering automation devices and detecting various types of data traffic on automation infrastructures. It is used to identify potential vulnerabilities in remote access devices, which are critical points for infrastructure security.
Chief Information Security Officer at Packages Group
Real User
Top 5
Nov 11, 2024
We are an insurance-based company, and we had some regulatory requirements that needed to be fulfilled. We've used Palo Alto primarily for our network security needs. It was part of our infrastructure for over three years before being replaced.
Our primary use case for Palo Alto Networks IoT Security is for the operational technology (OT) network. We have industrial systems, referred to as ICS or Industrial Control Systems, to control manufacturing devices. The IoT subscription is necessary for various compliances, such as ICS compliance or SCADA compliance. For that, we have Palo Alto Networks Firewall and IoT Security ensuring adequate security is in place.
We use Palo Alto Networks IoT Security. The on-premises firewalls send logs to the customer's Cortex Data Lake. The IoT solution collects these Cortex Data Lake logs to suggest security policies for the firewall automatically. We provide an automated security posture by integrating artificial intelligence and Cortex Data Lake data.
Learn what your peers think about Palo Alto Networks IoT Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
We offer IoT devices for applications such as fleet management solutions. When developing these devices, we want to explore security tools that can safeguard these types of device management solutions.
Network and Security Engineer at a consultancy with 10,001+ employees
MSP
Top 5
Dec 27, 2021
In our organization, we use the product "PA 3220" for Security and NAT policy configuration to block unwanted traffic. We can create different zones in our network, such as trusted, untrusted, DMZ. advance threat protection, and anti-malware protection. We can create site-to-site and remote site VPNs as per users' requests. With the help of the SP3 engine, we can allow traffic with a high level of performance. We are able to configure the high availability as Active-Active or Active-Passive to load balance the traffic on the firewall interface. A vulnerability assessment is also done.
Palo Alto Networks IoT Security enhances device classification and security through a cloud-based AI engine. It integrates seamlessly with third-party systems, supporting zero-trust policies and efficient network management.Focused on securing on-premises and industrial control systems, Palo Alto Networks IoT Security utilizes AI-driven integration with Cortex Data Lake for automated security policy management. It aids endpoint security, IoT log monitoring, and regulatory compliance, offering...
I use it for one of my customers, and my role is to help my customer with the solution. They use it for their IoT devices in the field, and they have a lot of sensors out there for their heating equipment and air conditioning systems.
I use Palo Alto Networks IoT Security ( /products/palo-alto-networks-iot-security-reviews ) for discovering automation devices and detecting various types of data traffic on automation infrastructures. It is used to identify potential vulnerabilities in remote access devices, which are critical points for infrastructure security.
We are an insurance-based company, and we had some regulatory requirements that needed to be fulfilled. We've used Palo Alto primarily for our network security needs. It was part of our infrastructure for over three years before being replaced.
Our primary use case for Palo Alto Networks IoT Security is for the operational technology (OT) network. We have industrial systems, referred to as ICS or Industrial Control Systems, to control manufacturing devices. The IoT subscription is necessary for various compliances, such as ICS compliance or SCADA compliance. For that, we have Palo Alto Networks Firewall and IoT Security ensuring adequate security is in place.
We use Palo Alto Networks IoT Security. The on-premises firewalls send logs to the customer's Cortex Data Lake. The IoT solution collects these Cortex Data Lake logs to suggest security policies for the firewall automatically. We provide an automated security posture by integrating artificial intelligence and Cortex Data Lake data.
We use Palo Alto Networks IoT Security for firewall protection to keep our client's data safe.
We offer IoT devices for applications such as fleet management solutions. When developing these devices, we want to explore security tools that can safeguard these types of device management solutions.
We use this solution as a network firewall related to IoT.
In our organization, we use the product "PA 3220" for Security and NAT policy configuration to block unwanted traffic. We can create different zones in our network, such as trusted, untrusted, DMZ. advance threat protection, and anti-malware protection. We can create site-to-site and remote site VPNs as per users' requests. With the help of the SP3 engine, we can allow traffic with a high level of performance. We are able to configure the high availability as Active-Active or Active-Passive to load balance the traffic on the firewall interface. A vulnerability assessment is also done.