Comprehensive Protection with Palo Alto Networks Next-Generation Firewalls
What do you like best about the product?
I like that Palo Alto Networks Next-Generation Firewalls are easy to use, very reliable, and give strong protection against all kinds of cyber threats. They make it simple to see and control what’s happening on the network, which helps keep everything safe.
What do you dislike about the product?
They can be a bit expensive compared to other options, and sometimes setting up advanced features takes extra time and expertise. Updates can also cause brief interruptions if not planned well.ease of integration and customer support
What problems is the product solving and how is that benefiting you?
It protects our network from hackers, viruses, and unwanted traffic. This keeps our data safe, reduces downtime, and gives us peace of mind knowing our systems are secure.
Powerfull firewall, with many features and powerfull tools to strengthen a network.
What do you like best about the product?
I enjoy using the zone based firewall system. It allows you to group interfaces into zones rather than having a single interface per zone, which helps in large networks. It also has powerfull tools to monitor and improve an existing network, such as using the ACC and policy optimiser.
The routing engine is quite good, allows you to create complex routing paths which is usually reserved for larger routing devices.
Deploying on a VM compared to physical appliances is also great.
TAC is quite quick to reespond to any issues.
What do you dislike about the product?
Not being able to select mgmt interface in a different order when deploying as a VM.
Having a limitation of 1 subnet per interface as a DHCP scope.
ACC feels outdated, it should be updated to a more easier to understand interface.
What problems is the product solving and how is that benefiting you?
Being able to create policies that use application type rather than port. Which is a game changer to traiditonal firewalls using port based policies.
Although not used a lot, using user based policies further strengthens policy access, incorporating zero trust architecture is easier.
Dynamic threat updates helps secure devices and services without manual intervention.
Cybersecurity with AI Muscles | A Look at Palo Alto Networks
What do you like best about the product?
it’s just super helpful ‘cause you can actually see what’s going on in your network and stop bad stuff before it gets messy. And like, everything’s in one spot, so you’re not jumping between a million tools. Makes life easier,
What do you dislike about the product?
Tbh the setup can be a pain, especially if you’re new to it. There's kinda a learning curve, and some stuff feels more complicated than it needs to be
What problems is the product solving and how is that benefiting you?
With Palo Alto, we’ve implemented application-aware policies to control traffic more precisely, especially between sensitive services. It’s helped us enforce zero-trust principles by segmenting traffic based on user identity and device context
Experience with integrated visibility and ongoing support fulfills requirements effectively
What is our primary use case?
We have a Firewall as well as a Synapse solution, and we have EDR, XDR as well. The Palo Alto Networks VM-Series Firewall is what we are using.
What is most valuable?
From a Synapse perspective, they have better visibility, better CV detection, better exposure detection, and it is in a single tool, so we are happy with it.
The integration of Palo Alto Networks VM-Series within my existing network infrastructure and security tools is good; they are resilient, and we can integrate with anything easily.
What needs improvement?
There is one thing regarding Palo Alto Networks VM-Series that they need to look into, which is ISPM, Identity Security Posture Management, and other than that, I could see there are multiple things which they have already been doing well.
Technical support is good for Palo Alto Networks VM-Series, but sometimes for new feature requests, we are facing challenges. We are the conglomerate, so individual business has different requirements, which we are expecting some new requests for. Whenever any custom requirement exists in an existing tool, they are taking much time with the engineering team, which is the only thing I'm expecting them to improve. Other than that, this product is very good.
I think overall security is something they need to make into a single pane of glass to help the customer who is using only the single Palo Alto Networks vendor, so they will get end-to-end visibility in a single console.
For how long have I used the solution?
I have been using them for around three years.
What do I think about the scalability of the solution?
My experience with the scalability of Palo Alto Networks VM-Series is good; whenever we are facing any issues, they are helping, and it is a scalable environment.
How are customer service and support?
Technical support is good for Palo Alto Networks VM-Series, but sometimes for new feature requests, we are facing challenges.
How would you rate customer service and support?
What other advice do I have?
We are generally satisfied with Palo Alto Networks VM-Series.
I would rate Palo Alto Networks VM-Series technical support an eight out of ten.
I would recommend Palo Alto Networks VM-Series to others.
I am a customer of Palo Alto Networks.
Actually, we are trying to migrate to Cortex Cloud; currently, we are using Prisma, so we are in the phase to migrate to Cortex Cloud, but have not yet migrated, so I am not experienced with it and cannot give feedback about it.
We haven't used Prisma Access Browser.
Overall rating: 10/10
Reliable and feature-rich firewall solution for enterprise security needs.
What do you like best about the product?
One thing I really like is how intuitive the user interface is. The dashboard makes it easy to monitor traffic and set up policies without needing to dig through complex menus. The threat prevention and application control features are also top-notch, especially the App-ID feature that gives more granular control over traffic. The performance has been rock solid even during peak loads. Their integration with cloud-based threat intelligence helps a lot with zero-day attacks and emerging threats.
What do you dislike about the product?
The main downside is the learning curve in the beginning. If you’re new to Palo Alto, the terminology and rule management style are a bit different compared to other firewalls like Cisco or Fortinet. Also, licensing costs can add up quickly if you want all the advanced features like WildFire or Threat Prevention. Another small gripe is that some firmware upgrades have caused brief outages, so you need to plan maintenance windows carefully.
What problems is the product solving and how is that benefiting you?
Multiple security challenges - access, traffic monitoring, preventing malicious activity/programs. Also the provision of details when it comes to the specific user and apps and access records makes it easier to manage
It has been defenitely great
What do you like best about the product?
The way that it can be used also how easy is to understand everything, truly a powerful tool to use in the CiberSecurity area, helps a lot when matter most
What do you dislike about the product?
I would not say that is dislike, however interface could be more user friendly, however it is still great for what it does and what it helps, keep it up
What problems is the product solving and how is that benefiting you?
One again I would not say that there is a problem at all, everything works as expected how is expected, so no problems, things that could improve however it’s great
Rock-solid perimeter security with unmatched application visibility
What do you like best about the product?
Palo Alto’s App-ID and Threat Prevention engines give us granular control over traffic we never had with our previous stateful firewall. We can write policies around business apps instead of IP/port combos, then verify exactly what was allowed/blocked in the detailed logs. WildFire zero-day analysis has already caught two pieces of unknown malware in the last quarter, and the cloud signatures hit our gateways within minutes. Centralized management in Panorama is another highlight one commit pushes our rules to three sites, so audit time dropped from hours to minutes.
What do you dislike about the product?
Licensing is pricey and can be confusing (Threat Prevention, WildFire, DNS Security, etc.). The web UI occasionally lags when committing large rule-set changes, and the learning curve for first-time admins is steep expect to spend time in the docs or take the EDU-210 course. Support is generally solid, but faster response requires the higher-tier contract.
What problems is the product solving and how is that benefiting you?
Before we moved to Palo Alto, we juggled a traditional port-based firewall, a separate IPS, and far too many manual rules. That setup left gaps: users could tunnel apps over random ports, malware sometimes slipped past signature updates, and every audit felt like a scavenger hunt through spreadsheets.
The PA NGFWs solved three big headaches at once:
1. App-based policy instead of IP/port juggling. With App-ID we now write 15 clean rules around business apps rather than dozens of port rules. Audits take minutes, not hours.
2. Built-in threat and zero-day protection. WildFire and DNS Security catch phishing callbacks and unknown executables before they land on endpoints. Since go-live we’ve seen a \~70 % drop in malware tickets and zero ransomware scares.
3. Unified visibility and management. Panorama pushes configs to HQ and branches in one commit, and the detailed logs make troubleshooting a two-minute task instead of a war-room event.
Bottom line: fewer security incidents, cleaner audits, and a lot more time for the team to focus on strategic projects instead of constant rule-tweaking.
A Comprehensive and Reliable NGFW Solution We Trust
What do you like best about the product?
What I appreciate most about Palo Alto Networks Next-Generation Firewalls is their robust and granular control over network traffic. The ability to identify applications, users, and content (App-ID, User-ID, Content-ID) is unparalleled, allowing us to create highly specific security policies that go far beyond simple port and protocol blocking. The threat prevention capabilities, including WildFire for zero-day threat analysis, are top-notch and have significantly improved our security posture. I also find the centralized management interface (PAN-OS itself, and Panorama for larger deployments) relatively intuitive for such a powerful device, making administration and monitoring efficient. The visibility it provides into network activity is crucial for troubleshooting and incident response.
What do you dislike about the product?
The primary downside, for us and many others, is the cost. Palo Alto Networks firewalls are a premium product, and the initial investment plus ongoing subscription and support costs can be substantial, especially for smaller organizations. While powerful, the sheer number of features and configuration options can also present a steep learning curve for new administrators who aren't familiar with the PAN-OS ecosystem. We've also found that some advanced feature licensing can be a bit complex to navigate, and sometimes troubleshooting very specific or niche issues can require deep dives into documentation or support tickets, which, while generally helpful, can take time.
What problems is the product solving and how is that benefiting you?
Palo Alto Networks NGFWs are solving several critical security challenges for our organization. Firstly, they provide robust protection against a wide array of cyber threats, from common malware to sophisticated zero-day attacks, thanks to features like Threat Prevention subscriptions and WildFire. This significantly reduces our risk of breaches and data loss. Secondly, the App-ID feature gives us unparalleled visibility and control over the applications running on our network, allowing us to block unsanctioned or risky apps and enforce granular policies. This has helped us curb shadow IT and improve overall network performance. Thirdly, User-ID integration allows us to tie security policies to actual users and groups rather than just IP addresses, which is essential in our dynamic environment. This has simplified policy management and improved our security posture by ensuring appropriate access levels. The overall benefit is a much stronger, more intelligent security framework that adapts to evolving threats and business needs.
Palo alto Networks NGFW is the best firewall in performance.
What do you like best about the product?
What I love about PAN NGFW, it is resilent in performance and It enhances performance by processing traffic efficiently. Also It detect and blocks zero-day threat in real-time without affecting the firewall performance.
What do you dislike about the product?
Our customers complain about, It's very expensive and some of our customers mention that support is inconsistent, even for premium plans. Desipite those there is nothing to complain about.
What problems is the product solving and how is that benefiting you?
PAN NGFW is solving our customers in giving advanced security features like AI-driven threat prevention, deep visibility into encrypted traffic and automated security updates without affecting the performance of the firewall it self and the normal traffic flow.
Great product, allows for at home use and connection to company systems
What do you like best about the product?
Palo Alto firewall allowed easy user-interface to select gateway location for ease of access in connecting and using VPN to work from home, keeping DoD related material and servers safekeeping.
What do you dislike about the product?
Product sometimes automatically connects me to a wrong gateway VPN location, for example instead of Southeast, it will use North America which will increase latency and work server access delays.
What problems is the product solving and how is that benefiting you?
PA NG Firewalls solving the need for safekeeping multinational company resources and collaborative use with ease of access including company internal websites and sensitive business trade secrets.