We use it for our edge firewalls and our east-west and north-south traffic for our firewalls. We have also deployed each firewall to every site for our Layer 3 connections back to our data center.
IT Network Engineer at a energy/utilities company with 201-500 employees
Supports Single Pass Architecture, stops any attack on the line, and saves time
Pros and Cons
- "I like all the threat alerts and WildFire. I also like scanning because everything that comes into our network via customers is scanned. We're an electric company, so every one of the bills is scanned and emailed in and out of our network."
- "I like the reports, but I wish the reporting was a little better. When I set up the automatic reports to come in, they're pretty basic. I would like them to be a little more advanced at the ACC monitoring and things like that. I still enjoy all the daily alerts that I get and all the daily PDFs and reports, but I just feel that it could expand upon the visualization of the reports."
What is our primary use case?
How has it helped my organization?
Since we've integrated it into our east-west traffic and north-south traffic, I feel that it has reduced the number of viruses or other things in our endpoints. I wish to expand it more all the way to our endpoint computers so that we have end-to-end firewall security through Palo Alto.
It provides a unified platform that natively integrates all security capabilities. This is very important to me because I'm in IT infrastructure. I take care of the entire operations network and everything that flows north and south, east and west, and inside and out of our data center. It's very important that we have Palo Alto to protect us.
It embeds machine learning in the core of the firewall to provide inline, real-time attack prevention. When any packet comes through the network, everything is like a first pass. It goes through every single part of our network, and we don't have a delay in alerts or network security. It stops any attack on the line.
What is most valuable?
I like all the threat alerts and WildFire. I also like scanning because everything that comes into our network via customers is scanned. We're an electric company, so every one of the bills is scanned and emailed in and out of our network.
What needs improvement?
I like the reports, but I wish the reporting was a little better. When I set up the automatic reports to come in, they're pretty basic. I would like them to be a little more advanced at the ACC monitoring and things like that. I still enjoy all the daily alerts that I get and all the daily PDFs and reports, but I just feel that it could expand upon the visualization of the reports.
Buyer's Guide
Palo Alto Networks NG Firewalls
January 2026
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,114 professionals have used our research since 2012.
For how long have I used the solution?
I've been using this solution for seven years.
What do I think about the stability of the solution?
The stability is great. They're not going anywhere. They're the industry leader.
What do I think about the scalability of the solution?
It doesn't matter whether you are small or large, Palo Alto will fit your needs.
How are customer service and support?
I'm in Pacific Standard Time. During the day, I have great support, and after 5:30, I don't have great support. During my business hours, I would rate their support as a ten out of ten. I love Palo Alto's support. However, at night, when the sun changes and I go to a different area, it's not always the best at level 1. If the incident was like having a system down, the support would be better, but after hours or 5:30, I have a harder time.
Which solution did I use previously and why did I switch?
We were using Cisco ASA. We switched because of its ease to use and the GUI. There is also Single Pass Architecture, which is related to the way a packet flows through our network. It doesn't have to go through one area into another area. It's all at one, and it just separates. It gives me the best visibility of our network and firewalls.
What was our ROI?
It has decreased the time of technicians in researching the vulnerabilities. We also do web filtering, so that helps. Web filtering has changed things because we used to use Websense, and it's night and day.
What's my experience with pricing, setup cost, and licensing?
It's very expensive. However, we usually use all of the subscriptions and threat alerts on any firewall that uses the internet. For each edge security endpoint, we use all subscriptions. Otherwise, we just utilize the threat alert, the antivirus, WildFire, etc.
What other advice do I have?
Palo Alto is the best firewall company. Whether you're a small company or a large company, it will fit your needs.
By attending this RSA Conference, I was hoping to find new security solutions. However, I seem to like my existing Palo Alto security solutions. In terms of the impact of the RSA Conference on our organization’s cybersecurity purchases, it depends on what we're looking for at the time of attending an RSA Conference. Right now, we're looking for something that I didn't really see here. We're looking for security, but this means we need a security operations center (SOC), whereas we're small. We just don't have that type of network. This is almost too much. However, that's why we have Palo Alto Networks.
I would rate it a nine out of ten. It's not perfect, but it's pretty good. Palo Alto is the best firewall security network that I could possibly purchase.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Software Engineer at a tech vendor with 501-1,000 employees
Provides a unified platform that natively integrates all security capabilities
Pros and Cons
- "Their Prisma log collection is pretty great. Our product collects the logs, and it definitely makes the configuration of log collection easier."
- "Everything has been great. More machine learning would be something great to see, but I don't know if it's a priority for Palo Alto."
What is our primary use case?
We're partners. Essentially, we take all the Palo Alto firewall policy information and all the device information, and we put it on a single pane of glass for them.
How has it helped my organization?
It provides a unified platform that natively integrates all security capabilities. This communication between security devices or security platforms is pretty important.
It helps to reduce downtime in our organization, but I don't have the metrics.
What is most valuable?
Their Prisma log collection is pretty great. Our product collects the logs, and it definitely makes the configuration of log collection easier.
What needs improvement?
Everything has been great. More machine learning would be something great to see, but I don't know if it's a priority for Palo Alto.
For how long have I used the solution?
We're partners with Palo Alto. We've been partnering with them for about ten years for their firewalls.
What do I think about the stability of the solution?
It's pretty stable.
What do I think about the scalability of the solution?
It's pretty scalable. Palo Alto does a great job across the board from small businesses to large enterprise solutions.
How are customer service and support?
I have not had direct communication with their support.
Which solution did I use previously and why did I switch?
We've worked with different firewall solutions such as Check Point, Cisco, ACI, and Fortinet, but Palo Alto is definitely among the ones that I like to work with.
What was our ROI?
Overall, it provides a wide range of features for securing an environment.
What's my experience with pricing, setup cost, and licensing?
You get what you pay for.
What other advice do I have?
The RSA Conference is great. You get to see a wide range of products all in one place. In terms of security, this is the place to be. It has been a great experience.
I believe attending the RSA Conference has an impact on our organization’s cybersecurity purchases made throughout the year afterward. It gives us a good forecast as to where the industry is going and what's to come so that we can be better prepared to partner with all different vendors.
To a colleague at another company who says, “We are just looking for the cheapest and fastest firewall,” I would say that Palo Alto is definitely not the cheapest. It's one of those things where you prefer quality.
Overall, I'd rate this solution a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Palo Alto Networks NG Firewalls
January 2026
Learn what your peers think about Palo Alto Networks NG Firewalls. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,114 professionals have used our research since 2012.
Head of Engineering at a tech services company with 11-50 employees
Has a user-friendly dashboard and a more complete IPS
Pros and Cons
- "Palo Alto Networks NG Firewalls' IPS is more complete and is very good. This is a user-friendly solution that is easy to install, and it provides the best protection."
- "Palo Alto needs to improve their training. They do not invest in their partners. I have been a partner for seven years, and it is very expensive for me to certify my engineers."
What is our primary use case?
We have clients in the government and supermarkets, for example, who use this firewall for integration with EDR, NDR, CN, and IPS.
What is most valuable?
Palo Alto Networks NG Firewalls' IPS is more complete and is very good. This is a user-friendly solution that is easy to install, and it provides the best protection.
It's very important that Palo Alto Networks NG Firewalls embed machine learning in the core of the firewall to provide inline, real-time attack prevention because all components are moving laterally these days. We need tools that follow the zero-trust model.
These firewalls have helped reduce downtime in our organization as well.
What needs improvement?
Palo Alto needs to improve their training. They do not invest in their partners. I have been a partner for seven years, and it is very expensive for me to certify my engineers.
For how long have I used the solution?
I've been working with these firewalls for almost seven years.
What do I think about the stability of the solution?
The firewalls are very stable.
What do I think about the scalability of the solution?
Palo Alto's scalability is not as good as that of Check Point. With Check Point, I can integrate the firewall with other products.
How are customer service and support?
We do not have technical support in Brazil, so I would rate it a two out of ten. However, Palo Alto's technical support in the US is good, and I would give them a rating of eight out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have worked with Check Point, but it's very difficult to configure. Palo Alto is much easier to configure, and the dashboard is very user-friendly as well.
How was the initial setup?
Because I have worked with Palo Alto for seven years, the initial setup is very easy for me. However, new engineers may find the configuration difficult.
What's my experience with pricing, setup cost, and licensing?
Palo Alto Networks NG Firewalls are very expensive compared to other firewalls such as Fortinet. As a result, Palo Alto is losing some of its market share.
What other advice do I have?
I would rate Palo Alto Networks NG Firewalls an eight out of ten because it's a good product.
I like attending RSA conferences because it gives me the opportunity to see what competitors are doing and what is new on the market.
Attending RSAC does have an impact on our cyber security purchases, but I would like to see manufacturers offer more training, certifications, labs, and demos at RSAC.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Program Manager, Cybersecurity at a wholesaler/distributor with 1,001-5,000 employees
Provides good security and visibility, and integrates well with our SIEM
Pros and Cons
- "The most valuable feature is advanced URL filtering. Its prevention capabilities and DNS security are also valuable. It pinpoints any suspicious activities and also prevents the users from doing certain things."
- "Palo Alto should improve their support. It's sometimes difficult to get the right technician or engineer to fix the problem as soon as possible."
What is our primary use case?
We use Palo Alto as our perimeter firewall. We also use the GlobalProtect VPN solution.
How has it helped my organization?
It gives visibility into different threats. There is a wide range of threats that can be identified.
We collect logs from Palo Alto into our Rapid7 SIEM solution. It's pretty well integrated. This integration is important because we don't necessarily want a solution from the same vendor. I know Palo Alto has Cortex for collection. Being open to other vendors in order to ingest the data or logs is a great thing.
Palo Alto has embedded machine learning in the core of the firewall to provide inline, real-time attack prevention, which is important because AI is the future. All cybersecurity companies are going to start using it. It's definitely a good thing. We just need to make sure that there's still the human component because AI can still fail.
Palo Alto has a wide range of different appliances or virtual machines. It can be installed anywhere from a small branch to a data center. It helps to secure small businesses to large enterprises.
What is most valuable?
The most valuable feature is advanced URL filtering. Its prevention capabilities and DNS security are also valuable. It pinpoints any suspicious activities and also prevents the users from doing certain things. For example, DNS security prevents users from reaching certain websites, so it's really interesting.
What needs improvement?
Palo Alto should improve their support. It's sometimes difficult to get the right technician or engineer to fix the problem as soon as possible.
For how long have I used the solution?
We have been using Palo Alto for at least five years.
What do I think about the stability of the solution?
They're pretty robust. They also have Unit 42, which is their threat intelligence team. They make you feel safer because they can identify the threats and then implement protection from those into their firewall.
What do I think about the scalability of the solution?
Scalability is pretty good on the virtual side. Because the virtual environment licensing model is based on credit, if you don't wanna use UI protection tomorrow, you can get rid of it and use those credits for another product or another license.
How are customer service and support?
Because of the pandemic, there's a lot of turnover and the quality of the support technicians is not great. I hope they will improve. I would rate their support a seven out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I didn't use any other solution previously.
How was the initial setup?
It was straightforward. They have great documentation. We use Palo Alto in the Azure environment, and their Azure documentation is one of the best documentation I've ever seen. It's very detailed. It can be confusing sometimes because there's a lot of information, but it's definitely good. They're good at documenting, and their knowledge base is really interesting for troubleshooting. There's a lot of useful information.
What about the implementation team?
We deployed it ourselves. We didn't use any company to deploy it.
What was our ROI?
It's hard to tell. It's preventing attacks, but I don't have any specific case where I can say whether a particular attack would not have been blocked by another vendor.
What's my experience with pricing, setup cost, and licensing?
It can be quite expensive, but there's a good incentive for the three-year contracts. The part that is especially confusing is for the virtual environment. The credits or the licensing system can be very confusing.
Which other solutions did I evaluate?
We didn't evaluate any other options.
What other advice do I have?
As a result of my experience with Palo Alto NGFW, to a colleague at another company who says, “We are just looking for the cheapest and fastest firewall,” I would say that the cheapest and fastest means there is a potential risk of breach. Even though Palo Alto is quite expensive, it definitely makes you feel secure. The configuration of the appliances or virtual machines is pretty straightforward, so you don't need to be highly trained in order to be the administrator of the platform.
It's important to attend an RSA Conference even if you're already a customer. That's because you might not be necessarily aware of the new products, so going to an RSA Conference can help you identify new solutions that may be valuable for your company.
Attending an RSA Conference will have an impact on our organization’s cybersecurity purchases made throughout the year afterward. There are a lot of different vendors that I've found, and I will probably get in touch soon.
Overall, I would rate this solution a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer.
Team Leader at a manufacturing company with 51-200 employees
We can manage everything from a single pane of glass, deploy all that out, and make sure it goes through each firewall and updates correctly
Pros and Cons
- "I like the navigation of the general Panorama solution. I can easily navigate around and get to the thing I need. I'm not wasting time trying to find something."
- "Personally, I feel that their dashboards for reporting and things like that need some improvement."
What is our primary use case?
Our use cases include combining multiple next-gen firewalls and bringing them into the Panorama centralized platform.
How has it helped my organization?
In general, it's one of the better firewall brands out there. It definitely has the investment and the dedication of the Palo Alto team to constantly improve their product and move forward. They're not a static company, like some of the other companies out there, and that's why I like them.
From a firewall perspective, there is a unified platform that natively integrates all security capabilities, which is good because there is a single pane of glass. I don't have to go to every single firewall to look at certain things. I don't have to go to every single firewall to deploy rules. I can use Panorama to deploy the rules, so it's a one-stop job type of thing.
For securing data centers consistently across all workplaces, all next-gen firewalls pipe into the same Panorama centralized management solution. We can manage everything from a single pane of glass, deploy all that out, and make sure it goes through each firewall and updates correctly. That's huge. If you had to do it manually and you had thirty locations, that'd be like a day's job versus thirty minutes.
Having a centralized platform where they all feed into the Panorama solution significantly drops firewall-by-firewall management. We can use the Panorama solution to communicate with all of them.
What is most valuable?
I like the navigation of the general Panorama solution. I can easily navigate around and get to the thing I need. I'm not wasting time trying to find something.
What needs improvement?
Personally, I feel that their dashboards for reporting and things like that need some improvement.
For how long have I used the solution?
We've been using Palo Alto for one to two years.
What do I think about the stability of the solution?
It has been very stable so far.
What do I think about the scalability of the solution?
So far, it has been scalable enough to hit multiple divisions.
How are customer service and support?
I have not personally contacted their support. That just dictates that they have a good product.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We also use Cisco firewalls.
How was the initial setup?
I am not directly involved in its deployment, but I do help manage it. To my knowledge, the deployment was straightforward. It was easy to connect them into the Panorama platform.
What about the implementation team?
There was a consultant. They knew their stuff.
What was our ROI?
There is typically no return on investment for firewalls because it's an IT cost, and we don't make money because we don't resell them.
What's my experience with pricing, setup cost, and licensing?
It's pretty good.
Which other solutions did I evaluate?
We evaluated Fortinet and Check Point.
What other advice do I have?
The value I receive from attending an RSA Conference is huge because I visit all my vendor partners to understand their roadmaps for the future. Attending an RSA Conference has had an impact on our organization’s cybersecurity purchases made throughout the year afterward because it brings out new features and subsets of the vendor partners. Also, if there is a deficiency in any of the current ones we currently use, we'll go engage other providers in order to find out if they can reach that gap or not, and then it'll dictate future proof of concepts and decisions.
Palo Alto embeds machine learning in the core of the firewall to provide inline, real-time attack prevention, but I personally haven't experienced that. It's a good thing that there hasn't been an attack where that became useful, but that's great to know.
As a result of our experience with Palo Alto NGFW, to a colleague at another company who says, “We are just looking for the cheapest and fastest Firewall,” I would say, "Go with Palo Alto."
Overall, I would rate Palo Alto NGFW an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Cloud and Data Center Ops at a financial services firm with 201-500 employees
Provide a unified platform that natively integrates all security capabilities
Pros and Cons
- "The most valuable aspect of this solution is pre-sales and post-sales because of the support and relationship building."
- "The solution could be more cost-effective."
What is our primary use case?
We chose Palo Alto Networks NG Firewalls to replace our outdated firewalls.
How has it helped my organization?
The overall security of the organization has been improved.
What is most valuable?
The most valuable aspect of this solution is pre-sales and post-sales because of the support and relationship building.
Palo Alto Networks NG Firewalls provide a unified platform that natively integrates all security capabilities.
The integration of all security capabilities in Palo Alto NG Firewalls provides a unified platform, which is crucial as it reduces complexity.
Having machine learning embedded in the core of the solution for in-line, real-time attack prevention is of great importance to us, it is a top priority.
This is significant because it enables automation, reducing the number of man-hours needed.
When evaluating the ability of Palo Alto Networks NG Firewalls to secure data centers consistently across all workplaces, I would give it a rating of eight out of ten.
By using Palo Alto Networks NG Firewalls, we have been able to decrease our downtime by several hours per month.
What needs improvement?
The solution could be more cost-effective.
For how long have I used the solution?
I have been using Palo Alto Networks NG Firewalls for two years.
What do I think about the stability of the solution?
Palo Alto Networks NG Firewalls is a very stable solution.
What do I think about the scalability of the solution?
Palo Alto Networks NG Firewalls are easily scalable.
Which solution did I use previously and why did I switch?
We previously used Barracuda Networks.
We switched to Palo Alto Networks NG Firewalls after having a bad experience with our previous vendor for firewall solutions.
Palo Alto is more forward-thinking when compared to Barracuda.
How was the initial setup?
I was involved in the initial setup. It was complex in multiple ways.
The solution itself is not a simple solution.
What about the implementation team?
An integrator assisted us with the deployment.
They were helpful and knowledgeable.
What was our ROI?
I have experienced a return on investment with Palo Alto Networks NG Firewalls. One benefit is that there are fewer man-hours required for deployment and maintenance.
What's my experience with pricing, setup cost, and licensing?
That solution's pricing and/or licensing are very convoluted.
What other advice do I have?
Based on my experience with Palo Alto Networks NG Firewalls, if a colleague at another company said they were only looking for the cheapest and fastest firewall, I would not recommend Palo Alto.
I would rate Palo Alto Networks NG Firewalls a nine out of ten.
Attending an RSA conference provides high value and helps us to see the impact of our organization's cybersecurity purchases annually.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
CISO at a comms service provider with 51-200 employees
It offers better Layer 7 protection than competing solutions and it's easier to deploy
Pros and Cons
- "Palo Alto offers better Layer 7 protection than competing solutions by Cisco and Fortinet. I also like the VPN client more. The interface is simple, so administrators can deploy and configure it much faster than other firewalls"
- "The first level of support will usually do nothing for you. If you're an IT company, you're not looking for level one support. You need to escalate. Other vendors have a direct support line for enterprise clients, but not Palo Alto."
What is our primary use case?
I use NG Firewalls for perimeter defense.
How has it helped my organization?
We've seen better throughput compared to our previous firewall. End-users are happier with their connections through Palo Alto.
What is most valuable?
Palo Alto offers better Layer 7 protection than competing solutions by Cisco and Fortinet. I also like the VPN client more. The interface is simple, so administrators can deploy and configure it much faster than other firewalls. The interoperability with other vendors is excellent. We can connect Palo Alto firewalls to all our other solutions.
What needs improvement?
I would like to see more artificial intelligence. However, that is going beyond firewalls to products like Prisma. Palo Alto has those features in an entirely different ecosystem. It isn't a problem. Machine learning is valuable, but I rely more on threat intel.
For how long have I used the solution?
I have been using Palo Alto's solutions since 2014.
What do I think about the stability of the solution?
I rate Palo Alto NG Firewalls a nine out of ten for stability. We have had zero downtime except for scheduled maintenance. The firewalls are in a cluster that never goes down.
What do I think about the scalability of the solution?
The scalability is excellent because you can always purchase a bigger firewall as you grow.
How are customer service and support?
I rate Palo Alto's support a seven out of ten. It is good overall but worse in some regions. The first level of support will usually do nothing for you. If you're an IT company, you're not looking for level-one support. You need to escalate. Other vendors have a direct support line for enterprise clients, but not Palo Alto.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
Palo Alto has a better interface and integration with other solutions than competing vendors. The only drawback is the price. Go with FortiGate if you're looking for a firewall that is cheap and decent. If you can't afford Palo Alto, FortiGate is the next cheapest.
How was the initial setup?
We can deploy Palo Alto firewalls faster and easier than most other solutions. We assess the traffic, buy the appropriate size, and implement it.
What was our ROI?
Palo Alto firewalls are expensive, but they're worth what we pay.
What other advice do I have?
I rate Palo Alto NG Firewalls a nine out of ten. Technical support has some room for improvement, and there are several minor issues that aren't worth mentioning.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Software Engineer at a manufacturing company with 10,001+ employees
An excellent firewall solution with outstanding features, and multi-level perimeter security functionality
Pros and Cons
- "We like the fact that this product can provide multiple layers of protection depending on our clients requirements, and can be configured to whatever level of protection and the specific protocols that they want."
- "We would like to see the external dynamic list for this solution improved. The current version does not automatically block malicious IP addresses, which would be very useful."
What is our primary use case?
We use this solution for perimeter security and security profile purposes. This covers anti-virus and anti-spyware, as well as cyber security vulnerabilities through URL and file blocking.
What is most valuable?
We like the fact that this product can provide multiple layers of protection depending on our clients requirements, and can be configured to whatever level of protection and the specific protocols that they want.
We also like the fact that this solution has a wide range of features covering all types of system security, not focusing on just one area. Everything is geared into a single module, which means we no longer need several different devices.
As well as the single module functionality, this solution allows us to easily see the active sessions and how many users we have connected. Complete information, on one screen.
What needs improvement?
We would like to see the external dynamic list for this solution improved. The current version does not automatically block malicious IP addresses, which would be very useful.
For how long have I used the solution?
We have been using this solution for the last seven years.
What do I think about the stability of the solution?
We have experienced 100% stability with this solution.
What do I think about the scalability of the solution?
The scalability of this solution depends on the management CPU that is being utilized. To manage high level traffic, it requires high-specification hardware to be used, or performance can be affected.
How are customer service and support?
This vendor not only provides a lot of very clear documentation, but also has a community center to allow for self-diagnosis and fixes.
However, if this does not resolve the issue, the technical support team are very responsive and quick to fix any problems we take to them.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup of this solution is straightforward, particularly when migrating from a different product and using their centralized management tool. This provides a configuration file that completes the majority of the setup automatically. All traffic is then automatically diverted through this firewall
The firewall is then registered in the providers portal, which allows for updates to be applied when they are released without the need for manual intervention.
What about the implementation team?
We implemented this using one member of our in-house team, and the deployment took three days to complete.
However, there was some pre-implementation work to be done registering firewall serial numbers, connecting console cables etc, but this is all straightforward.
What's my experience with pricing, setup cost, and licensing?
This solution is quite expensive because along with the license there is premium partner support that has to be purchased as a default addition.
There is also a specific Threat Prevention License that has to be requested and purchased separately. However, licenses can be purchased for specific periods as opposed to just an annual offering.
Which other solutions did I evaluate?
We actually tested multiple solutions, and choose this one because it gave us the most benefits in one product.
What other advice do I have?
We would advise organizations who are migrating from a different provider to inquire about the centralized management console, and to understand the full costs involved up front.
Also, despite the fact that this solution provides a lot of features, there will still be areas that aren't covered as this only works on perimeter level security.
I would rate this solution a 10 out of 10.
Which deployment model are you using for this solution?
Private Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Product Categories
FirewallsPopular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos Firewall
Cisco Secure Firewall
WatchGuard Firebox
Cisco Meraki MX
Check Point Quantum Force (NGFW)
Azure Firewall
SonicWall TZ
Check Point Harmony SASE (formerly Perimeter 81)
Fortinet FortiGate-VM
Juniper SRX Series Firewall
SonicWall NSa
KerioControl
Buyer's Guide
Download our free Palo Alto Networks NG Firewalls Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- Is Palo Alto the best firewall for an on-premise/cloud hybrid IT network?
- What are the main differences between Palo Alto and Cisco firewalls ?
- Expert Opinion on Palo-Alto Required.
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Features comparison between Palo Alto and Fortinet firewalls
- Is Palo Alto Networks NG Firewalls better than Check Point NGFW?
- Which is better - Palo Alto Networks NG Firewalls or Sophos XG?
- What are the main differences between Palo Alto firewalls and Cisco Secure Firepower?
- What is a better choice, Azure Firewall or Palo Alto Networks NG Firewalls?
- Which Palo Alto Networks NG Firewalls model is recommended for 1200 users?













