We manage public or private cloud traffic, inspecting for security through various profiles. This includes managing traffic for southeast, east-west, inbound, and A access, applying security profiles to the traffic. I also work with the Check Point Next Generation Firewall and Palo Alto Firewalls.
VM-Series Next-Generation Firewall Bundle 1 [VM-300]
Palo Alto NetworksExternal reviews
External reviews are not included in the AWS star rating for the product.
Robust well dependable solution
Reliable Security with Advanced Features
2. User Friendly UI
3. High performance capabilities even under heavy workloads
2. When I was a beginner, it was a very steep learning curve as I never had experience working on it.
Using Palo Alto NGFW
Managing the Attack Surface
Often times you'll find other vendors referencing max throughput which is measured in really strict conditions and/or without utilizing full security features on firewall. This is often times really missleading. When you look at PANW firewall throughput, it's measured while having all the beneficial services running.
AppID is really mind blowing part of the Firewall. From Reducing the attack surface by approving exactly what is the bare minimum of necessary apps. (Firewall it self offloads this for you, using the Policy Optimizer) all the way to knowing the impact of using such appliactions.
Generaly, features by themselves are something that you expect from firewall to have, however the approach that was taken, Reducing the Attack surface, is really what makes the ZTNA possible. All the way from segmentation, continuously inspecting the traffic, only from specific users/groups, and only allowed applications is a unbeatable combination.
From creating a security zones (aka Segments), and only allowing traffic within explicitly defined zones,
Implementing user identification (either transparent or explicit) which has endless posibilities.
Using Security Profiles to inspect allowed traffic.
Using Decryption that is not intrusive by default. (Firewall bypasses decryption on certain errors, so users are not escalating to support)
Advanced threat prevention with visibility and control
What is our primary use case?
What is most valuable?
The most effective features for threat prevention include the threat prevention signature level, the application filter capability, and the visibility provided by the firewalls.
We use these tools to prevent all known and unknown threats using Palo Alto Networks' Wildfire and other data filtering tools to gather information, analyze traffic, manage malicious traffic, and offer visibility, control, and attack prevention.
What needs improvement?
When managing the firewall, it involves a Strata Cloud web browser that requires improvement to enhance deployment ease and call center efficiency.
Additionally, focusing more on enhancing the Stata Cloud Manager would be beneficial.
For how long have I used the solution?
I have used this solution for three years.
What do I think about the stability of the solution?
The solution is very stable and has been in the market for the last 16 weeks.
What do I think about the scalability of the solution?
We are very much satisfied with the tool's scalability.
It rates up to nine out of ten for scalability satisfaction.
How are customer service and support?
The support is quite responsive, but the support quality could be improved. They should focus on enhancing the support provided.
How would you rate customer service and support?
Positive
How was the initial setup?
The setup is easy; I would rate it ten out of ten for ease of setup.
What was our ROI?
Customers can see data within a week, indicating a quick return on investment.
What's my experience with pricing, setup cost, and licensing?
The pricing is at a reach level. I'm not the person who deals with exact pricing details.
What other advice do I have?
I recommend going with the VM series, as it integrates advanced technological standards on a single platform and supports Kubernetes and Docker, which other vendors often don't offer.
I rate the overall solution ten out of ten.