No more typing reviews! Try our Samantha, our new voice AI agent.
reviewer2279679 - PeerSpot reviewer
Senior Network Engineer at a manufacturing company with 10,001+ employees
Real User
Sep 29, 2023
Easy to use, efficiently inspects applications, secure and stable product
Pros and Cons
  • "It has its own logging system. You can go to monitoring and check the logs to see if a connection is getting blocked. You can use multiple types of logs to check if a file or a port is getting blocked or if there are any TCP resets from the source or destination. It's easy to troubleshoot with the monitoring and logging it provides."
  • "There seem to be some issues with TAC (Technical Assistance Center) or Palo Alto support. Anytime you open a case, a level one engineer joins, and then you have to escalate it to level two or three. The support system has changed in the past few years, and that's something they need to look into."

What is our primary use case?

Firewall implementation and firewall rule edition are the primary use cases.

What is most valuable?

It's very secure. It inspects the application. Compared to script-based or CLI-based firewalls, it's easier to use the GUI (graphical user interface) to implement the firewall. 

It has its own logging system. You can go to monitoring and check the logs to see if a connection is getting blocked. You can use multiple types of logs to check if a file or a port is getting blocked or if there are any TCP resets from the source or destination. It's easy to troubleshoot with the monitoring and logging it provides.

What needs improvement?

There seem to be some issues with TAC (Technical Assistance Center) or Palo Alto support. Anytime you open a case, a level one engineer joins, and then you have to escalate it to level two or three. The support system has changed in the past few years, and that's something they need to look into.

In future releases, I would add one feature where we can take a subnet or take an IP and create a list of rules that are for that IP. There is an option, but it's not as expansive as I would like. When you run a report, you have to run it for a hostname. And when you look at the report, you see the hostnames, but you don't see the IPs. Like, there is no additional column for seeing the IP of the hostname or the subnet of the hostname. So that creates an issue. You have to go into the file and take the export list of firewall rules, and then you have the hostname got have the IP, then you have to note down the IP addresses.

For how long have I used the solution?

I have been working with this solution for more than eight years. 

Buyer's Guide
Palo Alto Networks PA-Series
April 2026
Learn what your peers think about Palo Alto Networks PA-Series. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
893,915 professionals have used our research since 2012.

What do I think about the stability of the solution?

It is a very stable product.

What do I think about the scalability of the solution?

The solution scales easily. For example, when we did a migration, we brought in more than 14,000 firewall rules from Juniper into our Palo Alto. After importing, obviously, that's a huge number. But, after doing that, the CPU went really up because we have so many rules. And after having to talk with Palo Alto, they told us to get a better model. We have the 5500 model. So, we were asked to replace the Palo Alto with a bigger or better model. That's what we're gonna be doing.

We can absolutely update the firewalls with a better GPU and CPU. With a better CPU, it can handle more connections. Especially when the environment grows, adding new data centers and more applications. So, after a year or two, there is a need to either bring in more firewalls or upgrade the existing ones you have.

Currently, there are around 12 end users using this solution in our organization.

How are customer service and support?

There are certain issues when we open a ticket with TAC (Technical Assistance Center), the issue goes to engineering, and then they inform us that the fix for the issue we're having will be included in the next software update. 

So, there are some issues in the backend or with new features that don't work correctly. We usually open tickets for that, and then usually, they assure us that this issue will be fixed in the next update.

Which solution did I use previously and why did I switch?

Juniper environment we had was reaching the end of life. That's why, rather than bringing in new Juniper devices, the enterprise architecture team decided to go with Palo Alto.

How was the initial setup?

The initial setup was easy. I was migrating from the Juniper SLX firewall to Palo Alto, so I had to move a lot of firewall groups and create a script on the engine tool to facilitate the move. There were some hurdles. But, personally, it was pretty smooth. The transition was pretty smooth.

So we have physical on-premises, and also instances on the cloud, AWS Cloud.

What other advice do I have?

I would recommend using this product , but it's important to have whiteboard sessions with the network and another team to give them information on exactly how to check the BGP settings. You need to go over with the team the things they need to do on the GUI and on the CLI. So, you definitely need to educate the team before using it.

Overall, I would rate the solution an eight out of ten. It's very stable. There are some tools for pushing the rules to Panorama, pushing the rules to the device, especially if you're working with a team, if you're working on a rule and someone pushes to Panorama, or if they want to push your firewall rules. Someone could push you if you have set up something for a change and you need to the changes at a certain time, if another member comes in and puts a change, you definitely need to have your changes or your pushes to the device or to Panorama, you need to have good communication between the team. So there are some good and bad things with Panorama. As you work on it, you adjust.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Pratik Tupe - PeerSpot reviewer
Associate Process Manager at a computer software company with 5,001-10,000 employees
Vendor
Oct 19, 2023
Offers trained customer support, stability and ease of use
Pros and Cons
  • "It is scalable. But that depends on what model you are using."
  • "There are constant updates for the operating system. It is a nice thing also, but it has its own disadvantages. Continuous updates are there. The users face issues like, how often do I need to update that? Within a period of five months, I'm updating it two or three times. It gives them a feeling that they are not confident about their product and have to update it so frequently."

What is our primary use case?

In my role as a tech, I provided support for various firewalls, including the PA, PM, and virtual series. It wasn't limited to a specific product like the PA-800 series, PA-1000 series, PA-9000 series, PA-7000 series, or PA-5000 series. We received training for all firewall types.

How has it helped my organization?

Palo Alto gives proper training for the product, not cutting corners over that. They don't assume you have previous knowledge and experience and start working directly, which happens in most companies. 

So, they provide product training very thoroughly. This helps the support system to have the necessary knowledge, not just before starting to work or troubleshoot. 

In the 11 months, we were initially trained on various OS versions and given tools like vSphere because we didn't have access to the Palo Alto environment. 

Later, when we got access, we were given a tool to design our own networks, study them, and, if needed, raise concerns about issues. 

The engineers or senior engineers would then study and guide us. They trained us for new upgraded versions of the OS regularly. Even as a third party, we had complete access to the Palo Alto Networks domain, tools, database, knowledge base, and everything. 

This gave us the opportunity to build our skills and understand what Palo Alto requires us to do. We could troubleshoot it properly with customers. 

What is most valuable?


What needs improvement?

There are constant updates for the operating system. It is a nice thing also, but it has its own disadvantages. Continuous updates are there. The users face issues like, how often do I need to update that? 

Within a period of five months, I'm updating it two or three times. It gives them a feeling that they are not confident about their product and have to update it so frequently. 

Plus, there are certain bugs, like in the 10.1 version, it's had some bugs. Then, they are upgrading it to the 10.2 version. They are updating that for the bugs. But the time duration between the two is less than the others. 

If we go for Cisco, they don't have their OS upgrades frequently as parallel to us. So that's the disadvantage.  

For how long have I used the solution?

I was working on a project outsourced from Palo Alto to a company. I was employed in that company for 11 months. During that time, I received guidance and training directly from Palo Alto Networks. I served as a tech engineer for the entire duration. It was quite recent, about three or four months ago.

What do I think about the stability of the solution?

It is stable. It's just the thing about the frequent updates. So that's the only issue there. So if they somehow reduce that frequency, all these will be easy.

What do I think about the scalability of the solution?

It is scalable. But that depends on what model you are using.

However, other PA-Series models, such as the device on the APAC, are highly scalable and support other vendors.

Moreover, within the network, the device is scalable. 

How are customer service and support?

The customer service and support are really good. And they continuously ask the support team to go through some training updates. So, continuously, we have these updates on the KPIs on a knowledge basis. And the last time, we had this training on the latest version upgradation. So they continuously give the training.  

Which solution did I use previously and why did I switch?


How was the initial setup?

I was physically present during the setup processes because many times, customers come saying, "I have purchased this new product, but I don't know how to install it." 

There were two teams: the sales team was there, and they had their own engineers. They used to provide the customers. 

But at times, we also had to get involved in case there were any technical glitches or issues because the sales engineers did not do troubleshooting. 

So for that, some of our engineers got involved. At that time, we used to give the setup, whether it was a VM, a cloud, or a physical device. 

At times, customers lack the knowledge of installing and deploying it into the system. So, we used the knowledge base to supply them with articles on the basic level. But even if the customer couldn't understand that, then we used to set it up ourselves directly.

The setup and everything was pretty much given in the KB articles in the knowledge base. So that was pretty much good. And if the customer is not able to understand, then I used to do that.

What about the implementation team?

I supported both the cloud version, which is a VM version and the physical device.

For the cloud deployment of this product, you don't need to buy physical hardware, a modular device from Palo Alto, which is cost-effective and cost-efficient. It can be deployed in AWS or Azure, any cloud provider.

However, the disadvantage or the downside, I can say, is that it is on another network and it is software-based. It is not 100% under your control because it is mostly connected to the AWS or Azure environments. Some controls are not 100% with the user.

If I deploy a VM on the Azure network, then I have to define something compatible with the Azure network. That is the con for cloud deployment. But if the user needs cost-effective solutions, they can go for the cloud.

With the physical device or hardware, it is under your control. You can manage it properly and get excellent tech support directly from Palo Alto, unlike the cloud, where support has to be from both ends.

Sometimes, this creates confusion or complexity, but not always, but it may create complex support. In the case of the physical device, it does not because it is provided by one single vendor.

The disadvantage is that Palo Alto devices are costlier than other devices in the market, like Fortinet or CheckPoint. However, Palo Alto has an advantage in continuously striving to provide better support and upgrading their software or operating system.

On average, the time taken to deploy the solution actually depends on what the environment is and what other vendors are connected to it. So, if it is a Cisco router, where is it connected with what else is in the environment? It actually depends on that. 

And it also depends on how much the customer has, like network knowledge. So, if they need to have some policies to block or allow, IP addresses, and more, if they have all that handy, then it is like two hours or something, not more than that. So it's pretty well done. It is a faster thing. But if the customer is not that handy, then it makes it difficult for us.

Maitaince is not required unless there is some issue, like a manufacturing defect once or twice. It wasn't, of course, too many times. 

But sometimes, it occurs because the device gets old or there is a manufacturing defect. It was a hardware replacement directly. So,  it was pretty much good. That process was a piece of cake. 

Palo Alto Networks has a program that allows customers to transfer their device licenses to another company. This means that if you have purchased a Palo Alto Networks firewall and you no longer need it, you can sell it to another company, and they will be able to transfer the license to their name. But for that, I need to go to Palo Alto and first discuss it with them. So they have this other team. So they check and verify everything.

This is something that I have never encountered with any other vendor.

What's my experience with pricing, setup cost, and licensing?

The pricing is a bit on the higher side but it is reasonable because they give that kind of level of support and everything else.

What other advice do I have?

Overall, I would rate the solution an eight out of ten. The one con is that it's a little more expensive than others. But the pros here are that it has good support.

Overall, it is a good product, and you can definitely have it with other vendors. So it doesn't have any issue. If you only have Palo Alto, you cannot have others in the environment. You can definitely have others connected there. There is no issue. 

And the technical support team is also there to guide you. It's a very good team. So you can always go ahead and purchase Palo Alto. It's a little bit pricier than others. But it is worth it because you'll get other support and everything is very good.

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Palo Alto Networks PA-Series
April 2026
Learn what your peers think about Palo Alto Networks PA-Series. Get advice and tips from experienced pros sharing their opinions. Updated: April 2026.
893,915 professionals have used our research since 2012.
Patrick Brem - PeerSpot reviewer
Deputy senior network engineer at a manufacturing company with 201-500 employees
Real User
Apr 5, 2024
Provides excellent features and documentation and enables users to connect to the internet securely
Pros and Cons
  • "The documentation is great."
  • "The web interface is slow."

What is our primary use case?

We use the solution to connect to the internet. It is for a company that produces dog and cat food. We have enabled threat prevention.

What is most valuable?

The product makes me and my users feel safe. I like the URL filtering. I don't have to change or add something. I like the security analyzer a lot. I use it a lot to see if there are any configuration errors. It points me in the right direction. The documentation is great. We can find everything we want in the knowledge base. We can learn how to set things up. It is understandable. Even I know how to do it.

What needs improvement?

The web interface is slow. It is a pain. However, the rest of the device does what it's supposed to do. I rate the web interface a two or three out of ten. I rate the rest of the solution seven or eight out of ten. Integrating the tool into our security system was not quite easy. It has a steep learning curve. We have to think about things like security profiles. It would be nice if the vendor provided a penetration testing tool.

For how long have I used the solution?

I have been using the solution for a year and a half.

What do I think about the stability of the solution?

I rate the tool’s stability a nine out of ten.

What do I think about the scalability of the solution?

The box is a bit small for us. I think it is a purchasing error, though. We have 300 users.

How was the initial setup?

I rate the ease of setup a six out of ten.

What's my experience with pricing, setup cost, and licensing?

The licensing is great. We renew it, and it works. The pricing is fair. I rate the pricing a five out of ten.

Which other solutions did I evaluate?

We also use CrowdStrike for threat prevention. The Check Point products I worked with were very old. I have also used OPNSense and pfSense. OPNSense and pfSense are open-source solutions.

What other advice do I have?

We don't do much decryption of the encrypted traffic. I will recommend the tool to others. Overall, I rate the solution an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Team Lead, Infosec & Netsec Unit at Microgenesis Business Systems
Real User
Nov 13, 2023
Enabled us to monitor remote workers and take necessary actions, such as blocking problematic IP addresses
Pros and Cons
  • "A valuable feature that we can consider is the deployment time, which is significantly reduced. It is almost 90% faster compared to other solutions."
  • "As we migrate fully into the cloud, additional features like capacity upgrading and improvements to hardware resources will be necessary, especially since our equipment consists of older-generation switches and routers."

What is our primary use case?

There are various use cases, particularly for desktop scenarios. One of them involves exploring contacts. Virtual firewall use cases revolve around different scenarios, such as transitioning to the cloud. For instance, when Barclays uses Azure or AWS, there's a focus on meeting security obligations and implementing threat prevention to comply with regulations like GDPR or PPA. This includes creating segmentation to align with regulatory standards. As part of this process, security features available in cloud platforms like virtual firewalls and threat prevention are incorporated.

How has it helped my organization?

After the implementation here, especially since I work in the data center, I've noticed the significance of security. For example, Veeam, CDL, and other aspects became crucial, especially during the COVID period when users started working from home. This situation led to numerous blocks, and user profiles were getting blocked due to issues with IP addresses ending up on blocked lists. However, after implementing the 3M series virtual firewall, we were able to effectively manage security for our cloud applications, like those in AWS. This enabled us to monitor remote workers and take necessary actions, such as blocking problematic IP addresses. Consequently, we reduced the number of tickets raised with ISP providers.        

What is most valuable?

A valuable feature that we can consider is the deployment time, which is significantly reduced. It is almost 90% faster compared to other solutions. This leads to quicker deployment and less downtime.

What needs improvement?

I have found that the tool works well for me, but there are areas where security testing and protection could be improved, especially in virtual or cloud environments. However, in this project, once we deployed it, we haven't encountered any issues.

The cost is currently manageable, but as we migrate fully into the cloud, additional features like capacity upgrading and improvements to hardware resources will be necessary, especially since our equipment consists of older-generation switches and routers. So, I'm looking for additional capabilities in these areas.

For how long have I used the solution?

I've been working on my current project for more than two years now.

What do I think about the stability of the solution?

I would rate the stability a nine out of ten. 

What do I think about the scalability of the solution?

I would rate the scalability an eight and a half out of ten. 

How was the initial setup?

The deployment is quite straightforward, and it's faster than it used to be. This means that there is less downtime involved.

What's my experience with pricing, setup cost, and licensing?

From my perspective, managing the price is important, especially because we're a small business. For larger organizations like Barclays, we provide our requirements to the client, and they place the order on BigFix. It's their responsibility to consider their budget and make decisions accordingly. We appreciate the features we get, but the cost-sharing still depends on the client.

Which other solutions did I evaluate?

The client needs to provide approval for the POCs used by our team; it's not within my control.

What other advice do I have?

When evaluating options, you should consider team members who are knowledgeable in supporting next-generation firewalls like NGFW. We also need to factor in the specific product offerings. For instance, if we have options like the PA-440, PA-850, and PA-8350, we should compare their prices and features. It's important to make decisions based on the situation and the needs of the organization.

Considering factors like availability and the specific situation, I would rate this an eight. It's important to explore other potential cases as well.

I would rate the solution a nine out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
PeerSpot user
IT Coordinator at CSA Makati
Real User
Top 10
Mar 19, 2025
Customizable features enhance threat prevention capabilities
Pros and Cons
  • "The most valuable feature of Palo Alto Networks PA-Series is that it is highly customizable."
  • "The initial setup of Palo Alto Networks PA-Series is very complicated."

What is our primary use case?

The primary use case for Palo Alto Networks PA-Series is for the previous firewall.

What is most valuable?

The most valuable feature of Palo Alto Networks PA-Series is that it is highly customizable. So far, it works well in terms of threat prevention capabilities.

What needs improvement?

The interface of Palo Alto Networks PA-Series should be made much more user-friendly.

For how long have I used the solution?

I have used Palo Alto Networks PA-Series for five years.

What do I think about the stability of the solution?

I rate the stability of Palo Alto Networks PA-Series as nine.

What do I think about the scalability of the solution?

I rate the scalability of Palo Alto Networks PA-Series around seven.

How are customer service and support?

I rate the technical support from Palo Alto Networks as eight.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup of Palo Alto Networks PA-Series is very complicated.

What was our ROI?

The same device has been used for nine years and could be cost-effective.

What's my experience with pricing, setup cost, and licensing?

The price of Palo Alto Networks PA-Series is expensive.

What other advice do I have?

Although I would recommend Palo Alto Networks PA-Series to others, it would depend on budget and familiarity with the system. If they have the budget and know-how, it might be suitable. However, for users not accustomed to using Palo Alto, I would not suggest it. Overall, I rate this solution as an eight.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
DavidBerger - PeerSpot reviewer
IT Manager at a computer software company with 51-200 employees
Real User
Jan 31, 2024
Offers web filtering and application filtering and good multi-site environment
Pros and Cons
  • "The cloud-based aspect helps significantly. It integrates seamlessly with other Palo products like Prisma Cloud, offers robust VPN protection, and it's all in one convenient package."
  • "The UI definitely needs work. In my opinion, the UI could be simpler and more user-friendly for the average user."

What is our primary use case?

It's our basic firewall, mainly web filtering and application filtering. We use it in a multi-site environment, especially with cloud-based firewalls.

What is most valuable?

Web filtering and application filtering are the most valuable features. 

The cloud-based aspect helps significantly. It integrates seamlessly with other Palo products like Prisma Cloud, offers robust VPN protection, and it's all in one convenient package.

What needs improvement?

The UI definitely needs work. In my opinion, the UI could be simpler and more user-friendly for the average user.

For example, I encountered complexities with policy management. Policy management is one of the areas where the UI is not intuitive, and managing policies can be quite complex.

For how long have I used the solution?

I have been using this solution for one year. We work with all the technologies from Palo.

What do I think about the stability of the solution?

It is a stable product. I would rate the stability a nine out of ten. 

What do I think about the scalability of the solution?

I would rate the scalability a ten out of ten because cloud deployment makes it incredibly easy to scale.

High-tech, multi-site, or multi-region companies, regardless of size, can benefit from Palo Alto. 

How are customer service and support?

Faster response times would be more beneficial.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I have experience with Palo Alto's PA-Series and Fortinet FortiGate. 

However, my preference depends on the setup. If I'm looking at a single site, a straightforward deployment, I'd go with FortiGate. 

If I'm looking at multi-site, complex deployments and a cloud-based design, then Palo Alto.

How was the initial setup?

The initial setup is fairly complex. There's a definite learning curve involved in setting it up correctly.

What about the implementation team?

We require assistance from a third-party company for the setup.

What's my experience with pricing, setup cost, and licensing?

The prices are pretty high, definitely on the upper end. They're among the highest in the pricing tier Firewall category.

What other advice do I have?

In general, I'd rate this solution at least an eight out of ten. It has some room for improvement.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Brij Mohan - PeerSpot reviewer
Technical Lead at Happiest Minds Technologies
Real User
Nov 2, 2023
An exceptionally stable tool that offers updates and fixes every two or three months
Pros and Cons
  • "It is a stable solution. Stability-wise, I rate the solution a ten out of ten."
  • "With Palo Alto Networks PA-Series, I find that the support team takes a long time to resolve the issues that a user may face during the use of the product."

What is our primary use case?

My company operates at multiple sites. My company has multiple work-related departments, and for each department, we have multiple servers along with multiple printers and other devices. My organization has to restrict certain accesses based on company policies. Generally, my company has to look after what accesses are to be allowed and which are not to be allowed, based on source and destination. If some business cases require some access, then our company allows access for those on the firewall.

What is most valuable?

Palo Alto Networks generally offers some very good features, like antivirus, DLP, URL filtering, and dynamic blocking. All the attributes offered by Palo Alto Networks are quite good and fall under the next-generation firewall features.

What needs improvement?

With Palo Alto Networks, every two or three months, there are some updates or bug fixes that happen. Everything is good with Palo Alto Networks.

With Palo Alto Networks PA-Series, I find that the support team takes a long time to resolve the issues that a user may face during the use of the product. You need to keep describing your issues to the support team since Palo Alto Networks usually provides you with a few engineers who then connect you with another set of engineers, making it a long process. When it comes to the support offered by Palo Alto Networks, our company has seen that we need to escalate an issue to senior management, which takes a lot of time. The support part of the product can improve a little bit.

For how long have I used the solution?

I have experience with Palo Alto Networks PA-Series. My company has a partnership with Palo Alto Networks. I use the solution's recent version, which is PAN-OS 10.0.

What do I think about the stability of the solution?

It is a stable solution. Stability-wise, I rate the solution a ten out of ten.

What do I think about the scalability of the solution?

Scalability-wise, I rate the solution an eight and a half out of ten.

More than 5,000 people in our company use Palo Alto Networks PA-Series.

How are customer service and support?

I rate the technical support an eight out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Earlier, my company was involved with Cisco ASA Firewall and Check Point Software.

How was the initial setup?

The product's initial setup was easy.

The solution is deployed on an on-premises model.

If you are involved in the initial configuration part, then the deployment process related to the product may take around two or three hours.

What other advice do I have?

I rate the overall tool a nine out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer.
PeerSpot user
Serkan Tok - PeerSpot reviewer
Cyber Security Solutions Technology Consultant at a tech services company with 51-200 employees
Reseller
Apr 6, 2024
Easily adds new functions to existing hardware without any performance degradation and offers good network visibility and control
Pros and Cons
  • "It offers application-based policy enforcement. Palo Alto Networks firewalls help us recognize protocol anomalies, contrasting with other vendors that may require policies based on port numbers. With Palo Alto Networks, the port number isn't a constraint because their devices handle protocol traffic at Layer 7, allowing for accurate identification of protocol usage and port numbers. They can identify which protocol actually uses which port."
  • "In future releases, maybe Palo Alto can enhance and enlarge their portfolio with SIEM solutions. They already have an endpoint protection solution, SOAR solution, that's fine. But when it comes to standalone IDS/IPS solution or email security solution, for example, we don't have any product in that category for Palo Alto."

What is our primary use case?

We use Palo Alto Networks firewalls for our perimeter security defense.

How has it helped my organization?

We use it for threat prevention in our networks. Check permission, advanced URL filtering, and DNS security. There are different subscriptions, and we are actually using them all. 

We are really satisfied with the firewall's throughput and its threat prevention performance regarding network traffic. We can easily decrypt our SSL traffic and thanks to the technology named App-ID, it recognizes network protocols without relying on port numbers.

It operates at Layer 7, and its ability to recognize protocols even if they use a default port for another protocol is impressive. It alerts you to such anomalies. 

The single-pass architecture technology is particularly noteworthy because it allows for the addition of new functions to existing hardware without any performance degradation, even when all modules, like self-encrypted encryption, malware protection, threat protection, and industrial filtering, are enabled. This results in outstanding performance.

That's why we use Palo Alto Networks in our IT firm and recommend their devices to all our customers.

We also have functions related to network visibility and control. We use Panorama controllers, which operate in a geographically distributed architecture, allowing us to easily control, configure, and manage network devices. 

With single-touch provisioning, you can effortlessly add new files to your Panorama VM. It offers extensive features that we currently use.

Panorama is a Palo Alto Networks product optimized for firewalls. As for integration, we can easily integrate the PA-Series with popular brands, switches, and routers like Cisco, Extreme Networks, or HP Aruba across your local area network's switches and routers, enhancing application-based policy enforcement.

What is most valuable?

It offers  application-based policy enforcement. Palo Alto Networks firewalls help us recognize protocol anomalies, contrasting with other vendors that may require policies based on port numbers. 

With Palo Alto Networks, the port number isn't a constraint because their devices handle protocol traffic at Layer 7, allowing for accurate identification of protocol usage and port numbers.  They can identify which protocol actually uses which port. So, if there's an unplanned issue, like, for example, a hacker trying to create a DNS tunnel using a non-standard port (like 1536 instead of the usual 53), Palo Alto's Endpoint UI will easily detect it and allow you to take measures.

PA-Series includes built-in network packet brokers, a valuable feature as it allows SSL traffic to be decrypted just once. If you need to inspect this decrypted traffic further, there's no need for a third-party solution—Palo Alto Networks firewalls handle it themselves. 

What needs improvement?

In future releases, maybe Palo Alto can enhance and enlarge their portfolio with SIEM solutions. They already have an endpoint protection solution, SOAR solution, that's fine. 

But when it comes to standalone IDS/IPS solution or email security solution, for example, we don't have any product in that category for Palo Alto.

For how long have I used the solution?

I have been using it for two years. 

What do I think about the stability of the solution?

It's very reliable. Even if you have only one firewall, failures are rare. Moreover, the high availability feature allows two firewalls to sync with each other for continuous operation, ensuring stability.

How are customer service and support?

The customer service and support are good. Both local and global support teams are readily accessible and they report back in a short period. I've never encountered any issues with their support.

How would you rate customer service and support?

Positive

How was the initial setup?

The setup's ease depends on your experience and the resources at hand, like Palo Alto Networks' documentation. With the right information, it's not a problem.

For me, the deployment took around 30 minutes. 

What's my experience with pricing, setup cost, and licensing?

Many people think Palo Alto firewalls are expensive, but I don't feel that way. Let's compare it with Fortinet firewalls.

With Fortinet, every two or three years, the firewall generation changes, and they have limited support for older devices. But with Palo Alto, you still get support from the vendor for seven or eight years.

Also, many vendors prepare data sheets for their firewalls with most features disabled. For example, they might say their firewall has 20 gigabit throughput, but they don't mention if threat prevention or service encryption is on or off. With Palo Alto, even when you enable all the modules, it still provides the exact throughput they advertise.

If you're buying two firewalls, one from Fortinet and one from Palo Alto, both rated at 20 gigabit throughput, and you enable all the modules on the Fortinet one, it might downgrade to 10 or even 5 gigabit throughput. But with Palo Alto and all security modules enabled, you still get the full 20 gigabit throughput.

That's the key difference. That's why customers trust Palo Alto, and that's why it's a big player in network security.

What other advice do I have?

Overall, I would rate the solution a ten out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. reseller
PeerSpot user
Buyer's Guide
Download our free Palo Alto Networks PA-Series Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2026
Product Categories
Firewalls
Buyer's Guide
Download our free Palo Alto Networks PA-Series Report and get advice and tips from experienced pros sharing their opinions.