Our primary use case was for perimeter protection.
Innovative, advanced threat protection is the most valuable feature.
I don't see any specific room for improvement.
The user interface is probably not as slick as it could be.
I have been using Palo Alto for three years.
We're on-premises primarily at the moment, but also a cloud product.
The stability is generally pretty good. I haven't heard any complaints from our customers around Palo Alto's stability. It's one of the reasons why they're the leaders in this space.
We've got our own team for maintenance. My company is a large multinational with 20,000 employees.
I have contacted their support once. It's very good support. They help me to fix our problem quickly.
The initial setup was complex. It's not very intuitive. You need to know what you're doing for the initial setup, you need to be a Palo Alto expert.
If you compare it to their competitor Fortinet, Fortinet's FortiGate product is a lot easier to install, if you're not an expert.
The time it takes to deploy depends on how complex the deployment needs to be for the client. If it's a basic deployment, is going to take around two days.
My advice would be to make sure the firewall is configured properly.
I would rate it an eight out of ten. Not a ten because you have to be really excellent before you get a ten out of me.
In the next release, I would like to have the ability to auto-generate rule and policy, based on known traffic, based on the baseline. That is a feature that I think Palo Alto should be able to have in some form or fashion to auto-generate and propose a policy and rules set, after putting the file into a learning mode for some period.