What is our primary use case?
I used it for two of my clients. One of the clients used it for Azure Virtual Desktop implementation and for blocking the internet for the other applications in the IaaS. The use case for the other clients was also similar. It was put in there for holding up traffic and filtering traffic.
How has it helped my organization?
It provided ease of maintenance. If a new firewall was needed, we only had to run the pipelines for this. So, the maintenance was very easy.
It reduced work by 30%. It saved maintenance and operational costs by 15%.
What is most valuable?
The HTTPS Inspection feature was useful where HTTPS traffic is scanned before it goes over the line.
Its interface is okay, and it is very adjustable. I like IP groups and other things that you can do with it.
What needs improvement?
Rules management could be better. You have all kinds of rules, and they can put something better in place there.
There should be better monitoring and logging. Currently, it is put in Sentinel. It should be more seamless and from the interface.
For how long have I used the solution?
It has been about two years.
What do I think about the stability of the solution?
Its stability is very good.
What do I think about the scalability of the solution?
It is scalable. It was used across multiple regions. One of them had about 3,000 users, and the other one had about 5,000 users.
How are customer service and support?
Their technical support is good. I would rate them an eight out of ten.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We used a different solution. We had on-prem Palo Alto.
How was the initial setup?
I was involved in its setup. I deployed it with Bicep pipelines. The maintenance was also via pipelines. Its setup was straightforward, especially with Terraform and Bicep. It was done in 10 minutes to 15 minutes.
It is a one-man job, but that is not our advice. It is better to have three or four people who have knowledge of the firewall system. If you have only one person and that person is sick, then you have a problem. You block the internet, and sometimes, you have to open it. So, it is better to do it with a small team. If there are a lot of changes, two to three people should be fine.
In terms of maintenance, there is only the maintenance of new ports or IP addresses, but that's operational management. That's not firewall management as such.
What was our ROI?
Our clients have seen about 25% return on investment.
What's my experience with pricing, setup cost, and licensing?
It is expensive, especially with the premium functions.
For one of the clients, it was very expensive. You have to use it more at an enterprise level, and there, it was not at an enterprise level. So, it was very costly, but security-wise, it was a very wise decision to use it that way.
Which other solutions did I evaluate?
The solution of Palo Alto and the other one, whose name I don't remember, were IaaS-based, but we wanted a platform as a service, and Azure Firewall is that.
What other advice do I have?
If you have an ecosystem based on, for instance, Palo Alto, it would be better to use a Palo Alto firewall because they have one way of working and one interface, but if you have a greenfield deployment or your on-prem is old or legacy, then I would advise going for Azure Firewall.
Its basic features were enough for us. The single sign-on experience was also okay. We had no problem with that. If required, we can use Privileged Identity Management or MFA. All these features are there within Azure.
I would rate it an eight out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: I am a real user, and this review is based on my own experience and opinions.