Try our new research platform with insights from 80,000+ expert users
PeerSpot user
Sr. Systems Analyst at a manufacturing company with 5,001-10,000 employees
Real User
Top 20
Jun 14, 2017
It can manage devices in groups based on their use. The application ID capabilities have been useful for things like Active Directory.
Pros and Cons
  • "Firewalls: The application ID capabilities have been very useful for things like Active Directory, and not having to identify every port that Microsoft has decided to use."
  • "The ability to add scheduled jobs would be a significant improvement. Panorama has the ability to push out OS updates, but it would be nice to be able to schedule those updates so not to affect the site during normal business hours."

What is most valuable?

Panorama: Provides a central management capability for all of the firewalls. It has the ability to manage the devices in groups based on their use. We use the firewalls in two primary functions and the ability to provide management of the different groups of firewalls is very useful.

Firewalls: The application ID capabilities have been very useful for things like Active Directory, and not having to identify every port that Microsoft has decided to use.

How has it helped my organization?

I can’t say that it has significantly improved the functions of the organization over the firewalls that we were previously using. The addition of a good central management capability has helped improve the management of the firewalls, but the functions for the service that is provided to the users has not significantly changed.

What needs improvement?

Panorama: The ability to add scheduled jobs would be a significant improvement. Panorama has the ability to push out OS updates, but it would be nice to be able to schedule those updates so not to affect the site during normal business hours.

Firewalls:

  • (1) App-ID is good, but could be better. We use off ports for some common services and App-ID does identify the application correctly, but the rule allowing the traffic does not allow the traffic without adding the ports to the rule. This negates the need for App-ID in the rule. If App-ID worked as I think it should, we would use it and then block the common port.
  • (2) Integration with Microsoft Active Directory incurs significant additional traffic across the WAN circuits. We have a number of GCs across our environment and the configuration of Active Directory in the firewalls requires significant communications to all of the GCs across our environment. We were seeing the firewalls generate around 500kb of WAN traffic communicating with all of the GCs. After reviewing the configuration with Palo Alto support, the config was correct. While we do want to be able to use the User-ID functionality of the firewalls, that kind of overhead is not acceptable.

For how long have I used the solution?

We have been using Panorama and the PAN FWs for just over one year.

Buyer's Guide
Palo Alto Networks Panorama
January 2026
Learn what your peers think about Palo Alto Networks Panorama. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,928 professionals have used our research since 2012.

What do I think about the stability of the solution?

So far we have not seen any issues with stability.

What do I think about the scalability of the solution?

We have not run into any issues with scalability.

How are customer service and support?

Technical support with Palo Alto has been very good and responsive.

Which solution did I use previously and why did I switch?

We previously were using Cisco ASA devices. The switch was made based on central management and the NGFW functions. The timing was in the middle of Cisco delivering their NGFW functionality. The other issue that led to the move was when Cisco presented their recommended replacement for the existing devices, they recommended their Meraki line with Internet management, which was not in line with our requirements for many of our more sensitive firewalls.

How was the initial setup?

Initial setup is very easy. After working with a few new installations we were able to put together a script to apply the new firewalls to setup the management access, Panorama location, high availability (HA) configuration and the initial IP stack. This makes it easy to start the OS updates and initial rules from Panorama. By having the HA setup scripted, it also makes the OS updates a single download instead of a download for each device. The HA connection allows the firewalls to copy the OS over to the other firewall with the single download. That is important because there are several large downloads necessary to update the OS to the current OS levels.

What's my experience with pricing, setup cost, and licensing?

Pricing is high compared to other vendors in the same space. Licensing is also fairly high for different functions to be added on, like Intrusion detection/prevention, user VPN, URL filtering. Some firewall vendors offer the “additional” licensing/functions as part of their license for the device and then others offer it like Palo Alto.

Which other solutions did I evaluate?

The original decision was made by a different group within the company. The re-evaluation included Cisco ASA, Cisco Meraki, Fortinet and Palo Alto.

What other advice do I have?

Talk to other customers. Start with the ones recommended by the vendor, but also in forums as well. Everyone understands that recommended customers are handpicked and forums can be contain spurned customers. But if you look for information regarding specific functions that you need, you can find more useful information. Make sure if you hear something glowing from a vendor recommended customer about a function, check on that function online.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Sontas Jiamsripong - PeerSpot reviewer
Account Presale at a tech services company with 1,001-5,000 employees
Real User
May 3, 2023
A scalable solution for centralized monitoring
Pros and Cons
  • "We use the solution for centralized monitoring."
  • "Clients need to have an alarm and alert system from which they can forward the trigger. The product needs to improve its integration as well."

What is our primary use case?

We use the solution for centralized monitoring. 

What needs improvement?

Clients need to have an alarm and alert system from which they can forward the trigger. The product needs to improve its integration as well. 

For how long have I used the solution?

I have been working with the tool for seven years. 

What do I think about the stability of the solution?

I would rate the product's stability a seven out of ten. 

What do I think about the scalability of the solution?

The product is scalable. 

How are customer service and support?

The product's support needs to improve. 

How was the initial setup?

The product's deployment was simple. 

What's my experience with pricing, setup cost, and licensing?

The product's pricing is high but flexible. It now follows the pay-per-use pricing model. I would rate the tool's pricing a five out of ten. 

What other advice do I have?

I would rate the product a seven out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Palo Alto Networks Panorama
January 2026
Learn what your peers think about Palo Alto Networks Panorama. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,928 professionals have used our research since 2012.
it_user1416468 - PeerSpot reviewer
Network Engineer at a tech services company with 1-10 employees
Real User
Jun 2, 2022
Beneficial centralized control, scalable, and reliable
Pros and Cons
  • "The most valuable features of Palo Alto Networks Panorama are centralized management. We can manage all our firewalls."
  • "Palo Alto Networks Panorama could improve by making the solution less expensive."

What is our primary use case?

We use Palo Alto Networks Panorama to monitor and have centralized control.

What is most valuable?

The most valuable features of Palo Alto Networks Panorama are centralized management. We can manage all our firewalls.

What needs improvement?

Palo Alto Networks Panorama could improve by making the solution less expensive.

For how long have I used the solution?

I have been using Palo Alto Networks Panorama for one year.

What do I think about the stability of the solution?

Palo Alto Networks Panorama is a stable solution.

What do I think about the scalability of the solution?

I have found Palo Alto Networks Panorama to be scalable and it is easy.

We have two engineers that use the solution.

Which solution did I use previously and why did I switch?

I have previously used Fortinet FortiGate, but we found Palo Alto Networks Panorama had a lot more features and this is why we switched.

How was the initial setup?

The initial setup of Palo Alto Networks Panorama was simple. The time of the implementation depends on the environment.

What about the implementation team?

We used an integrator for the implementation of Palo Alto Networks Panorama.

What's my experience with pricing, setup cost, and licensing?

The price of Palo Alto Networks Panorama could be lower.

What other advice do I have?

I rate Palo Alto Networks Panorama an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1454613 - PeerSpot reviewer
VP of IT at a tech services company with 51-200 employees
Real User
Aug 16, 2021
Reliable, easy to install, with good support
Pros and Cons
  • "It's a reliable solution."
  • "It could be more secure."

What is our primary use case?

Palo Alto Networks Panorama is a centralized monitoring solution that can monitor remote locations, firewalls, configuration management, and patch updates on a single dashboard.

We are system integrators. We deploy solutions for our client base.

What is most valuable?

It's a reliable solution.

What needs improvement?

It could be more secure.

For how long have I used the solution?

I have been using Palo Alto Networks Panorama for more than five years.

We are using the latest version.

What do I think about the stability of the solution?

Palo Alto Networks Panorama is a stable product.

What do I think about the scalability of the solution?

It's a scalable solution. We have more than 50 customers in our organization.

How are customer service and technical support?

Technical support is very good.

How was the initial setup?

The installation of Palo Alto Networks Panorama is straightforward.

The deployment time is based on the client's input. The deployment can take one day, and two days for testing.

We have more than 20 engineers to maintain more than 50 locations.

What other advice do I have?

I would recommend this solution to other users who are interested in using it.

I would rate Palo Alto Networks Panorama a ten out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator
PeerSpot user
PeerSpot user
PS & Technical Manager at a tech services company with 11-50 employees
Real User
Top 5Leaderboard
Sep 16, 2024
Useful management functionalities an god performance but needs better integration
Pros and Cons
  • "Panorama provides management functionalities."
  • "Integration between Panorama and the Edge Firewall has a lot of issues, like different configuration assets, configuration object templates, lack of flexibility, and not a good browser."

What is our primary use case?

We are dealing with Palo Alto Networks as a firewall.

What is most valuable?

Panorama provides management functionalities.

What needs improvement?

Integration between Panorama and the Edge Firewall has a lot of issues, like different configuration assets, configuration object templates, lack of flexibility, and not a good browser. It needs improvement in saving and synchronization.

For how long have I used the solution?

We have been dealing with Panorama for one year.

What do I think about the stability of the solution?

There is no issue about performance. However, keeping the communication between Panorama and the Edge Firewall is a big issue if there is a different configuration version between both Panorama and Firewall.

What do I think about the scalability of the solution?

We are not working over a complex network, but Panorama manages about six to eight firewalls. We may face a lot of issues when scaling up.

How are customer service and support?

The first layer of support is not very good. The second layer is better.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We switched from a different solution.

What other advice do I have?

Panorama has a lot of issues accessing and configuring the firewall or deploying the firewall from Panorama. I'd rate the solution five out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Download our free Palo Alto Networks Panorama Report and get advice and tips from experienced pros sharing their opinions.
Updated: January 2026
Buyer's Guide
Download our free Palo Alto Networks Panorama Report and get advice and tips from experienced pros sharing their opinions.