Listing Thumbnail

    Palo Alto Networks Panorama

     Info
    Deployed on AWS
    Central management system for Palo Alto Networks Firewalls, WildFire Appliances and Log Collectors

    Overview

    Play video

    Panorama network security management enables you to control your distributed network of our firewalls from one central location. View all your firewall traffic, manage all aspects of device configuration, push global policies, and generate reports on traffic patterns or security incidents - all from a single console.

    Highlights

    • Greater visibility, tighter control, less effort

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    OtherLinux 11.2.8

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Palo Alto Networks Panorama

     Info
    Pricing and entitlements for this product are managed through an external billing relationship between you and the vendor. You activate the product by supplying a license purchased outside of AWS Marketplace, while AWS provides the infrastructure required to launch the product. AWS Subscriptions have no end date and may be canceled any time. However, the cancellation won't affect the status of the external license.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Additional details

    Resources

    Support

    Vendor support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Similar products

    Customer reviews

    Ratings and reviews

     Info
    4.3
    4 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    25%
    50%
    25%
    0%
    0%
    4 AWS reviews
    |
    60 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Richard Dombo

    Monitoring and managing multiple firewalls has become more efficient through centralized oversight and reliable logging

    Reviewed on Nov 12, 2025
    Review provided by PeerSpot

    What is our primary use case?

    We are still on Palo Alto Networks products because it is delivering value to our organization. We are using the products ourselves, so we function as a customer. We do not have much cloud presence, so most of our solutions are on-premises. We utilize the traditional features such as GlobalProtect  and are not using anything from Cortex. We have two PA-850 firewalls that are being managed by Palo Alto Networks Panorama .

    What is most valuable?

    I utilize Palo Alto Networks Panorama 's centralized view for monitoring. Palo Alto Networks Panorama serves as our log collector, with all logs from the firewalls being pushed to it. Palo Alto Networks Panorama has an ACC tab that I use to conduct monitoring.

    We do not currently have a SIEM  solution, so we are heavily relying on the monitoring features of Palo Alto Networks Panorama to conduct our investigations and log reviews. It is really heavily used because if you want to get visibility into the telemetries coming in and out of our network, Palo Alto Networks Panorama is what we rely on because we do not have a SIEM  solution.

    I do utilize Palo Alto Networks Panorama's advanced reporting, which comes with out-of-the-box features. I do reporting using Palo Alto Networks Panorama as part of my day-to-day activity. Every month, I need to send a report to my boss, and I use the Palo Alto Networks Panorama reporting feature to do that.

    I think Palo Alto Networks Panorama's application and threat visibility features are solid because the App-ID feature is excellent. It helps me to better understand the kind of traffic that I am monitoring by providing details of the protocol and application type. The threats monitoring feature is great, and comparing Palo Alto Networks to other competitors, while Palo Alto Networks is quite expensive, I am really satisfied with the threats monitoring features because I feel my company is getting value for what we are paying for.

    Palo Alto Networks Panorama's ability to manage multiple firewalls is solid as long as you ensure that you have the required resources for it, depending on the number of firewalls that you want to place under Palo Alto Networks Panorama. My Palo Alto Networks Panorama is a VM version, not a physical box, so from time to time, I have to ensure that the ESXi host hosting Palo Alto Networks Panorama has better capability in terms of IOPs, CPU, and memory. Once the resource requirement is adequate, Palo Alto Networks Panorama does a very good job because the log syncing ensures that the firewalls being managed by Palo Alto Networks Panorama are in sync and communicate with each other very well. Having Palo Alto Networks Panorama makes life easier because we cannot afford downtime, not even minimal downtime. With Palo Alto Networks Panorama, it helps you achieve high availability, whether active-passive or active-active, with ease.

    What needs improvement?

    I would say that while Palo Alto Networks Panorama reporting capability is functional, it is not really intuitive. The presentation is not really as advanced as what an advanced solution would have provided.

    I would like to improve the dashboards on Palo Alto Networks Panorama, especially because I work in an environment where my managers are not really that technical. They do a great job leading us, but they do not have a technical background. If the dashboard could be improved to suit more executive use cases when it comes to reporting, that would be excellent. It is basic as far as I am concerned, and from an executive standpoint, it is not really that good.

    I would rate Palo Alto Networks Panorama as a product nine or 9.5 out of ten because there is always room for improvement, especially on the dashboard. I think if they could improve the dashboard, I would give them ten out of ten because from a technical standpoint, the dashboard is good, but at an executive level, it is not really that good. I usually struggle when doing presentations to my bosses because the dashboard and reporting from Palo Alto Networks Panorama are not as polished as they could be.

    For how long have I used the solution?

    I have been using Palo Alto Networks Panorama personally for the past five years.

    How are customer service and support?

    I think the technical support by Palo Alto Networks is great because the response time is solid. Palo Alto Networks is so reliable that we hardly actually raise a ticket. It almost never breaks, so we rarely rely on technical support.

    I get advisory from Palo Alto Networks from time to time if there is a new Pan-OS or if there are vulnerabilities on the existing Pan-OS. We also conduct a BPA to address any security gap by ourselves. So we hardly actually rely on their technical support.

    We have had some issues related to SSL decryption. The SSL certificate we used had expired, so we renewed it. However, implementing it on Palo Alto Networks still presents pending issues. We raised support for that, and it has not been closed yet, but it is not entirely a Palo Alto Networks issue. I think it is more about the certificate. It is a pending issue, but it is not really critical, so we have not revisited it.

    How would you rate customer service and support?

    Positive

    What other advice do I have?

    Palo Alto Networks firewall is expensive as a whole product.

    In my region, which is Ghana, West Africa, most people usually use Sophos and FortiGate firewalls, so the price comparison was actually on Sophos and FortiGate.

    Sophos and FortiGate do not have any advantages over Palo Alto Networks Panorama because their machine learning capabilities are not top-notch as compared to Palo Alto Networks. That is why we are so satisfied to stay with Palo Alto Networks.

    We do not have Palo Alto Networks' threat intelligence platforms or data loss prevention features in our subscription. We have other ways of dealing with DLPs, but on the firewall, we do not have that feature activated.

    We are dealing with DLP  by other vendors, not Palo Alto Networks. We utilize Microsoft Office 365 , which has a feature called Purview  for DLP  capability. We are dealing with Microsoft products, specifically Exchange. Our Microsoft licensing includes E5 and E3, which come with certain features, and we utilize all those features.

    We go through a dealer regarding our partnership with Microsoft and Palo Alto Networks. We are not directly partners.

    We also use CyberArk PAM, and it is great to hear that Palo Alto Networks acquired CyberArk. My overall review rating for Palo Alto Networks Panorama is nine out of ten.

    Aditya-Wagh

    Centralized management and troubleshooting enhance operational efficiency

    Reviewed on Aug 07, 2025
    Review from a verified AWS customer

    What is our primary use case?

    I use Palo Alto Networks Panorama  for the management of all the firewalls. Apart from that, I use Cloud Prisma for VPN management, as well as connectivity to the production, non-production environment. I use three flavors of Palo Alto Networks: Panorama, Cloud Prisma, and the on-prem, physical Palo Alto firewalls in the data centers.

    I use Palo Alto Networks Panorama  for all our production, non-production firewalls, which are onboarded on Panorama. Whatever changes I make in the individual firewall, I push that to the Panorama, and Panorama pushes to the individual devices.

    What is most valuable?

    The granular control of Palo Alto Networks Panorama stands out for me, as you have centralized management or a centralized view for all the firewalls. It's easy to create security policy, easy to create NAT policy, and easy to do any configuration. Second is easy troubleshooting, so rather than going to all the firewalls, I can centrally troubleshoot. If any issue occurs, I have a centralized monitor tab, and centralized logs are there, so I can easily troubleshoot any issues from the Panorama itself.

    In terms of logging and reporting capabilities, there is centralized logging with Palo Alto Networks Panorama. In terms of ease of configuration and ease of troubleshooting, all individual firewalls forward logs to the Panorama, and Panorama forwards logs to the Syslog server. That is ease of configuration. The second thing is ease of troubleshooting, as all the centralized logs are present in the Panorama itself. Based on any issue occurred, I can troubleshoot it on the Panorama itself rather than going to the individual firewalls.

    It's very easy to integrate with infrastructure and other systems.

    What needs improvement?

    I do see some disadvantages with Panorama. If your staff is not technical enough, you have to be very careful if you have production devices on Panorama because once you push any changes, those get pushed on the individual firewalls. In terms of operation, it is quite important that the staff managing the Panorama should be technically sound enough, and they should know exactly what they are doing. If you break anything in terms of config push, that could lead to an outage. That is one of the most important things I would say. Apart from that, I don't see any disadvantages as such.

    For how long have I used the solution?

    I have been using it for more than five years.

    Which solution did I use previously and why did I switch?

    Earlier we were using bare-metal hardware devices in the data center. Now we migrated to the AWS  cloud, so we deployed the Palo Alto Networks Panorama firewall in the AWS  cloud, and we manage it from there.

    What was our ROI?

    I'm not at that position to comment on ROI since I started using Panorama.

    What's my experience with pricing, setup cost, and licensing?

    If you go with the cloud-based deployment, it is pretty much affordable. If you go with the physical bare-metal hardware, then it is quite expensive.

    What other advice do I have?

    This solution receives a rating of 10 out of 10.

    Which deployment model are you using for this solution?

    Public Cloud

    If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

    Amazon Web Services (AWS)
    Hailemichael Y.

    Panorama in Focus: Centralized Firewall Management at Scale

    Reviewed on Aug 07, 2025
    Review provided by G2
    What do you like best about the product?
    - Unified Control Plane: Panorama lets you manage thousands of Palo Alto NGFWs—up to 5,000 in Management Only mode—from a single interface.
    - Consistent Policy Enforcement: You can push security policies, device configurations, and updates across all managed firewalls, ensuring uniform protection and compliance.
    - Panorama collects logs from all managed devices, enabling centralized analysis of traffic, threats, and user behavior
    What do you dislike about the product?
    - Panorama must run a base PAN-OS version equal to or higher than the managed firewalls. This can complicate upgrades and mixed-version environments.
    - While the VM version of Panorama is flexible, hardware appliances strictly enforce device limits. Exceeding the licensed number of managed devices can cause commit failures.
    What problems is the product solving and how is that benefiting you?
    Decentralized Firewall Management
    - Problem: Managing configurations, policies, and updates across dozens or hundreds of firewalls is time-consuming and error-prone.
    - Solution: Panorama provides a centralized platform to push consistent policies, monitor traffic, and manage updates across all firewalls

    Inconsistent Security Policies
    - Problem: Different teams or sites may apply varying rules, leading to gaps in security posture.
    - Solution: Panorama enforces uniform policy templates and device groups, ensuring consistent security across the organization.

    Limited Visibility into Network Activity
    - Problem: Without centralized logging, threat detection and incident response are fragmented.
    - Solution: Panorama aggregates logs from all managed devices, enabling unified threat analysis, application monitoring, and forensic investigation.
    Cliff Girodo

    Extensive report customization provides essential insights

    Reviewed on May 05, 2025
    Review provided by PeerSpot

    What is our primary use case?

    Our primary use case for Palo Alto Networks Panorama  is as a firewall for internal and external traffic.

    What is most valuable?

    The most valuable feature of Palo Alto Networks Panorama , in my case, is the reporting. It provides all the necessary information. However, when extracting reports to a CSV file, the lack of correlation to the actual report generated is an issue. You get a CSV file with a vague name, which is inconvenient when sorting through multiple reports. Naming the reports properly for easier identification would be helpful. Despite this, the tool allows for extensive customization of reports, which is a significant advantage.

    What needs improvement?

    From the reporting side, naming the reports properly so that they can be easily identified would be an improvement. Other than that, it works well. There was a bug causing us to not get the latest information, but it was resolved with an upgrade.

    For how long have I used the solution?

    I have been working with Palo Alto Networks Panorama for at least three years.

    What do I think about the stability of the solution?

    Palo Alto Networks Panorama is very stable. In my three years of use, there was only one incident where I had a problem, but it was quickly resolved.

    What do I think about the scalability of the solution?

    It is easy to scale with no problems.

    How are customer service and support?

    The customer service and support are very good. We received excellent feedback from the third-party support providers.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    I was not involved in the initial setup, but I believe it would be quite easy.

    What's my experience with pricing, setup cost, and licensing?

    Palo Alto Networks Panorama is expensive but provides good value for money. For the higher end, the cost is justified. However, for the lower end, a reduction in cost could improve competitiveness.

    What other advice do I have?

    I really like the product. My involvement began when we faced an external denial-of-service attack on our cloud environment. After unsuccessfully battling the attack for a week, we deployed a Palo Alto firewall, which resolved the issue within hours. Since then, I have been impressed with Palo Alto. Overall, I rate Palo Alto Networks Panorama a nine out of ten.
    Waleed Aboda

    Centralized monitoring enhances control while seeking greater flexibility and rapid response

    Reviewed on Jan 10, 2025
    Review provided by PeerSpot

    What is our primary use case?

    I am still working for Lotus. We work with Palo Alto three series, Panorama, and Firewall Banu, specifically Firewall three series and five series.

    What is most valuable?

    I find this solution valuable for full monitoring, centralized control for reporting, and centralized management. These features are instrumental in achieving effective results.

    What needs improvement?

    The solution requires more flexibility and quicker response times. High-speed replies are crucial.

    Additionally, the AI module should be on-premises, not in the cloud. It should support more flexibility and OpenShift Direct, not just the basics.

    The virtualization feature needs to be more advanced.

    For how long have I used the solution?

    I have been using it for about one year.

    What do I think about the scalability of the solution?

    It is very good in terms of scalability.

    How are customer service and support?

    I would rate customer service as seven out of ten.

    How would you rate customer service and support?

    Neutral

    What's my experience with pricing, setup cost, and licensing?

    The setup cost is too high.

    What other advice do I have?

    Consider the environment, as it is very high priced. If you have money to spare, it's a good option. I would rate it a nine out of ten.

    View all reviews