We have multiple firewalls in our infrastructure. Palo Alto Networks Panorama serves as the management interface for all our Palo Alto firewalls. As our organization has grown, there has been one company initially, but now three companies have merged into one, and we have increased the number of firewalls. For instance, we have a Palo Alto firewall in our Azure stack and a core firewall from another company that we’ve integrated into our data center. We use Palo Alto Panorama to manage all our Palo Alto firewalls across our infrastructure.
Senior IT infrastructure consultant at a tech services company with 51-200 employees
Serves as management interface offering robust logging and reporting capabilities
What is our primary use case?
How has it helped my organization?
We have centralized management for all Palo Alto firewalls. With the merger of three companies, each previously operating their own Palo Alto firewalls, we can now manage them efficiently through our operations using Panorama. Our network has become more complex as we run various services, including SD-WAN, across three sites. While the SD-WAN operates through a separate firewall, our core firewall remains Palo Alto. Additionally, we use Palo Alto as a perimeter firewall for our Azure stack. In total, we manage four firewalls with Panorama. We monitor various traffic types, including FTP, browser traffic, applications, and unified threat management. We also have SSL inspection enabled and are actively managing and monitoring SSL tunnels and threat management.
What is most valuable?
Palo Alto Panorama offers robust logging and reporting capabilities, allowing us to extract reports in a user-friendly GUI format with graphical representations. For example, we can track bytes sent and received for specific applications and users since we use Palo Alto XDR for analysis, reporting, and forensics.
We benefit from a certain level of customization in our reports, utilizing predefined templates and tailored reports. This includes user activity reports, application reports, and SaaS platform reports. We forward logs to a separate SIEM solution, enabling us to monitor TCP and inspect SSL traffic.
What needs improvement?
The logs from our virtual appliances show potential for improvement, particularly regarding their deployment in hypervisors like VMware, Proxmox, or Azure Stack. Monitoring the internal traffic between hosts with these hypervisors could be enhanced. While predefined reports are available, we often require customized reports tailored to the specific areas involving hypervisors.
Buyer's Guide
Palo Alto Networks Panorama
March 2026
Learn what your peers think about Palo Alto Networks Panorama. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,264 professionals have used our research since 2012.
For how long have I used the solution?
I have been using Palo Alto Networks Panorama for five years.
What do I think about the stability of the solution?
We use Palo Alto as a perimeter firewall for our public network, which can support nearly 40,000 users daily. About 7,000 to 10,000 users connect to the Internet through this firewall.
In addition, we utilize Palo Alto Global VPN for remote access. We have around 869 VPN users, primarily for remote work or when a government advisory requires the entire staff to connect. This solution integrates seamlessly with our Palo Alto firewall.
I rate the stability an eight out of ten.
What do I think about the scalability of the solution?
It's important to reference authoritative sources like Gartner. We selected the product based on their ratings and assessments. In terms of capability, Palo Alto remains one of the top solutions for on-premises security, XDRs, and cloud security posture management.
I rate the scalability a nine out of ten.
How are customer service and support?
The support team is very knowledgeable. We only contact them when our partner support or integrated support cannot resolve an issue. They respond quickly, joining within an hour if there’s a critical situation.
How was the initial setup?
We deployed our Palo Alto solution four years ago for the Azure Stack implementation. The complete deployment took around three months, as it's a comprehensive cloud solution similar to Azure or AWS.
If I were to replace my Palo Alto firewall today, I estimate it would take at least seven days to implement. Given our complex infrastructure, which includes SD-WANs and connections between three different data centers into one main center, this timeframe excludes the planning phase.
We are aligned with Palo Alto, as they are our partners. At times, we need to engage Palo Alto support directly due to our subscription with them, which was also established during the initial deployment.
What was our ROI?
Managing multiple firewalls across three large identities was becoming quite challenging. To address this, we implemented Palo Alto Panorama, which allows us to manage all our firewalls from a single interface. This has significantly improved our efficiency and manageability. It also helps us better use our current human resources; otherwise, we would need to hire several experts in Palo Alto to oversee the three data centers, which would be a cumbersome task.
What's my experience with pricing, setup cost, and licensing?
Palo Alto solutions are more expensive than other products, but this often depends on an organization’s specific requirements. The level of security and features needed will influence the decision. For example, VPN access is essential for our corporate users and consultants, as company policy mandates that they connect via VPN to access the corporate network. When purchasing bulk licenses, we receive discounts, which makes the cost comparison with other solutions more favorable.
What other advice do I have?
When it comes to security, complexity often accompanies it. With advancements over time and the integration of AI and new technologies, we're seeing improved features in the GUI compared to some online solutions.
The ongoing improvements with the latest firmware updates are a positive sign. Still, virtual firewalls or appliances face a challenge: They could provide more comprehensive information than what is currently available in the reports.
We also use the VPN functionality, which became crucial during COVID-19. Initially, we had around 610 users, and now that number has risen to about 890 users who connect remotely through Palo Alto GlobalProtect VPN. We've never considered switching to another solution because it is stable and reliable for our needs.
You encounter news about zero-day vulnerabilities and firewall firmware updates when browsing the internet. We've been using our Palo Alto solution for the past four years, and during this time, some devices were procured five years ago, while others, including our Palo Alto firewall, were acquired around three years ago. Each identity had IT staff coordinating individual updates, which was inefficient. Now, with a unified approach through Panorama, we can monitor and manage zero-day vulnerabilities more effectively. Panorama plays a crucial role in ensuring timely updates. The features we utilize depend on the complexity of our network and the number of applications hosted in our environment.
Suppose your infrastructure is extensive, and you need a reliable, secure SDR, UTM, and firewall solution. In that case, choosing a product with comprehensive capabilities that you can rely on for at least the next five years is crucial. Proper planning is essential; if you purchase something that isn’t reliable or only plan for six months to a year, it may not be appropriate for your needs. Palo Alto is one of the best secure solutions for organizations with complex infrastructures, such as multiple sites in different regions.
Overall, I rate the solution a nine-point five out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Solution Manager at DYXnet Group
Effortless policy integration and enhanced security management flexibility with good support
Pros and Cons
- "Panorama integrates security management by allowing easy modification of policy by account, IP, or application."
- "Palo Alto needs to improve deployment by making it easier to deploy an agent to a desktop."
What is our primary use case?
We deploy Prisma SD-WAN for our NetBackBot and sell Fortinet SD-WAN and Fortinet SRC solutions. We also provide both on-premises and account solutions. Our customers focus on security rather than DLP.
How has it helped my organization?
Palo Alto integrates the whole policy into the platform and deploys all policies to every end device, making it easy to manage and deploy policies for IT departments.
What is most valuable?
Panorama integrates security management by allowing easy modification of policy by account, IP, or application. This flexibility helps IT departments securely manage Internet security.
What needs improvement?
Palo Alto needs to improve deployment by making it easier to deploy an agent to a desktop. Currently, it's complex since the product cannot utilize the AD serving for deployment, which would be a desired improvement in the near future.
What do I think about the scalability of the solution?
Panorama is capable of managing complex network environments. Its scalability is rated nine out of ten.
How are customer service and support?
I am satisfied with their support and would rate it nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used to work with Fortinet products. However, our focus has shifted, though Fortinet products remain an alternative for our customers who are familiar with its platform.
How was the initial setup?
The initial setup can be complicated, specifically when deploying to desktops using batch files.
What's my experience with pricing, setup cost, and licensing?
Palo Alto Panorama might appear expensive to some enterprises, but its powerful platform justifies the cost.
Which other solutions did I evaluate?
We evaluate solutions like Fortinet, which has advantages in pricing and functionalities such as user-friendly deployment.
What other advice do I have?
I would recommend this solution to customers, though it can be very expensive. As an alternative, Fortinet solutions are also recommended.
I'd rate the solution nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Palo Alto Networks Panorama
March 2026
Learn what your peers think about Palo Alto Networks Panorama. Get advice and tips from experienced pros sharing their opinions. Updated: March 2026.
885,264 professionals have used our research since 2012.
Cyber Security Engineer, team lead at a wellness & fitness company with 10,001+ employees
Built-in proxy with the ability to maintain your own policies
Pros and Cons
- "The solution doesn't need a proxy for the Prisma Access Firewall."
- "When creating remote access for users, it would be beneficial to be able to base the object on on-premises or the cloud."
What is our primary use case?
Our company uses the solution for monitoring and policies. We monitor data, make rules for firewalls, and allow source IPs to destination IPs with respect to ports and services.
We also use UR filtering to allow or block things. We have a Prisma Access Firewall that we allow or block for remote users.
We use the solution in a hybrid model with multiple on-premises instances plus the cloud-based version.
What is most valuable?
The solution doesn't need a proxy for the Prisma Access Firewall.
We can maintain our own policies within the solution and block things from the proxy perspective.
What needs improvement?
When creating remote access for users, it would be beneficial to be able to base the object on on-premises or the cloud. We should be able to push policies based on a segregation or as a whole.
For how long have I used the solution?
I have been using the solution for one year.
What do I think about the stability of the solution?
The solution is stable and satisfies my use case. I rate stability an eight out of ten.
What do I think about the scalability of the solution?
The solution is scalable.
How are customer service and support?
My focus is limited and I have not needed technical support.
Which solution did I use previously and why did I switch?
We are replacing Cisco and our Forcepoint Proxy with the solution. Since we will be using the solution's proxy, it doesn't make sense to have two filtering instances.
How was the initial setup?
The setup is simple.
What about the implementation team?
We implemented the solution in-house.
What's my experience with pricing, setup cost, and licensing?
The solution is priced a bit higher than competitors and could be a bit more flexible for customers. I rate pricing a six out of ten.
Which other solutions did I evaluate?
There are multiple platforms available that include XDR and the Proxy.
The solution is very easy to use in comparison to the Forcepoint Proxy.
What other advice do I have?
Based on my limited use of the solution, I rate it an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
IT Security Engineer at a tech services company with 1,001-5,000 employees
Centralized management enhances firewall control
Pros and Cons
- "The main value of Palo Alto Networks Panorama lies in its ability to centralize management, similar to FortiManager."
- "The main value of Palo Alto Networks Panorama lies in its ability to centralize management, similar to FortiManager."
- "There is room for improvement in the graphical user interface (GUI), which is becoming outdated, especially the NAT section."
- "There is room for improvement in the graphical user interface (GUI), which is becoming outdated, especially the NAT section."
What is our primary use case?
I primarily use Palo Alto Networks Panorama for the global administration of firewalls and managing the GlobalProtect services. It is used for logging and standard firewall activity, and opening firewall rules. Additionally, it centralizes various tasks on the platform.
What is most valuable?
The main value of Palo Alto Networks Panorama lies in its ability to centralize management, similar to FortiManager. It provides a single dashboard for all firewalls, allowing centralized control over different feeder systems based on Palo Alto. It's a comprehensive solution for managing firewalls globally.
What needs improvement?
There is room for improvement in the graphical user interface (GUI), which is becoming outdated, especially the NAT section. However, it still meets expectations and works well for our needs.
For how long have I used the solution?
I have been using Palo Alto Networks Panorama for three years.
What do I think about the stability of the solution?
Stability is rated highly at nine out of ten.
What do I think about the scalability of the solution?
Scalability depends on whether it's a hardware or virtual machine model, and I rate it at eight out of ten.
How are customer service and support?
I rate technical support at seven out of ten. It depends on the case, with room for improvement in both quality and response time.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
In comparison, I prefer Panorama over FortiManager because Panorama includes all the modules needed for troubleshooting, unlike FortiAnalyzer. From an operational perspective, Panorama is better.
How was the initial setup?
The initial setup for Panorama is simple.
What other advice do I have?
Overall, I rate Panorama an eight out of ten and would recommend it to other users.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Sr. Cloud Security Architect at a tech services company with 11-50 employees
Enhances firewall policies with log collection but should improve AIOps integration
Pros and Cons
- "Panorama has improved the organization by enabling log collection, administration, and optimization of firewall policies. It supports policy migration and offers platform stability and decent uptime."
- "There needs to be an improvement in integrating AIOps functionalities into Panorama."
What is our primary use case?
I have used Panorama as a log collector and for administration. It's primarily used for optimizing firewall policy posts and reporting.
How has it helped my organization?
Panorama has improved the organization by enabling log collection, administration, and optimization of firewall policies. It supports policy migration and offers platform stability and decent uptime.
What is most valuable?
The valuable features of Panorama include log collection, policy optimization, ability to migrate policies from other platforms, and platform stability and uptime.
What needs improvement?
There needs to be an improvement in integrating AIOps functionalities into Panorama. I'd like to see a seamless integration with both on-prem and cloud environments. Furthermore, they should address the static nature of current additions instead of adding them through plugins.
What do I think about the stability of the solution?
There are no significant stability issues. The uptime and platform stability are fairly decent.
What do I think about the scalability of the solution?
Panorama does not bring in a lot of complexities. It's a straightforward setup, allowing licenses to add more devices without significant complications.
How are customer service and support?
The support has been good, benefiting from the partnership channels established with Palo Alto.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I previously worked with Cisco ALDM before using Palo Alto Panorama.
What's my experience with pricing, setup cost, and licensing?
I am not privy to a lot of the pricing details.
Which other solutions did I evaluate?
I have experience with AlgoSec or Tufin, but they are not exactly replacements for Panorama.
What other advice do I have?
To manage network security effectively, if the intent is cloud first, leverage Streta Cloud Manager. For hybrid or on-prem deployments, Panorama is suitable.
I would rate it a seven out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Director of cloud infrastructure at Injazat Data Systems
Provides a centralized and efficient management solution for multiple firewalls
Pros and Cons
- "The most valuable feature of Palo Alto Networks Panorama is its innovation and impressive capacity to handle network traffic efficiently."
- "A potential improvement for Palo Alto Networks Panorama could be a more competitive pricing structure."
What is our primary use case?
Palo Alto Networks Panorama is essential for those adopting a centralized landing zone firewall approach as it provides a unified management point for enforcing security policies. It becomes particularly crucial in multicast strategies and cloud environments, streamlining configuration and monitoring across multiple firewalls.
How has it helped my organization?
Using Palo Alto Networks has brought numerous benefits to our organization. It effectively addresses security vulnerabilities, incorporates advanced AI technology, ensures reliability, and continually innovates with a demand-driven approach to security features.
What is most valuable?
The most valuable feature of Palo Alto Networks Panorama is its innovation and impressive capacity to handle network traffic efficiently.
What needs improvement?
A potential improvement for Palo Alto Networks Panorama could be a more competitive pricing structure.
For how long have I used the solution?
I have been working with Palo Alto Networks Panorama for three years.
What do I think about the stability of the solution?
It is a fairly stable solution.
What do I think about the scalability of the solution?
I would rate the scalability of the product as an eight out of ten. We have approximately 30 to 40 customers using it.
How are customer service and support?
The technical support is good.
How was the initial setup?
The setup of Palo Alto Networks Panorama is moderately complex. In my experience, the deployment of Palo Alto Networks Panorama involves considering accessibility, and if it's on-premises, it may face challenges like procurement delays. The cloud version tends to be smoother and more straightforward for deployment.
What's my experience with pricing, setup cost, and licensing?
The pricing structure could use some improvement.
What other advice do I have?
I highly recommend Palo Alto Networks Panorama. It is a mature, solid, and innovative technology. Overall, I would rate it as a ten out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer. Implementer
Security Operations Expert at a pharma/biotech company with 10,001+ employees
Efficient firewall monitoring but lacks in customer support
Pros and Cons
- "Threat prevention and traffic monitoring are the most valuable features for us."
- "There is room for improvement in response time for tech support."
What is our primary use case?
We primarily use it for firewall monitoring, reviews, and policy-level monitoring.
What is most valuable?
Threat prevention and traffic monitoring are the most valuable features for us. We use them the most.
What needs improvement?
There is room for improvement in response time for tech support.
For how long have I used the solution?
I have been using this solution for three years.
What do I think about the stability of the solution?
The stability is good, so I would rate it around nine.
What do I think about the scalability of the solution?
I would rate the scalability an eight out of ten.
How are customer service and support?
The customer service and support team is okay because the response time depends on the case. For example, it can take a lot of time if they don't have a readily available solution.
Which solution did I use previously and why did I switch?
If compared with Cisco, I find Panorama is better and easier to use.
How was the initial setup?
Our technical team did the setup for us.
What other advice do I have?
Overall, I would rate the solution a seven out of ten.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Consultant at HCL Technologies
Great centralized management, makes it easy to push policies, and is easy to set up
Pros and Cons
- "In Panorama, installing the policy, and pushing the policy, it's quite seamless."
- "In Panorama, installing the policy, and pushing the policy, it's quite seamless."
- "The pricing is quite high."
- "The inbuilt RAM is quite low. If you are increasing the number of firewalls and you want to get this managed via this management server, there are some performance issues."
What is our primary use case?
Panorama is a management server that is used to manage the Palo Alto firewalls.
We have almost 20 firewalls in our environment managed by this particular server. Panorama is an appliance, it's not a firewall. It is a management server, which is used to manage or push the policies. If you want to install a policy on the firewall, or you want to allow legitimate traffic, then you leverage this management server.
How has it helped my organization?
It's helped with the centralization of policies and installation. It's helped us do everything in one place instead of one at a time.
What is most valuable?
In Panorama, installing the policy, and pushing the policy, it's quite seamless.
It is a centralized management tool. Instead of logging into each firewall and configuring it or deploying the policies, it's quite easy as everything is in one place. We can push the policy and install the policies centrally instead of individually on each firewall.
In order to push a policy via Panorama, we need to ensure that the firewall is syncing with the management server. I have hardly found any post-upgrade issue with the Panorama management server or the Palo Alto firewall. They are never out of sync.
The initial setup is straightforward.
It's scalable.
The solution is stable.
What needs improvement?
The inbuilt RAM is quite low. If you are increasing the number of firewalls and you want to get this managed via this management server, there are some performance issues. The cost of this product is more. However, the resources they have provided, the inbuilt resources, are less.
The pricing is quite high.
For how long have I used the solution?
I've been using the solution for more than ten years.
What do I think about the stability of the solution?
It is a stable solution. There are no bugs or glitches. It doesn't crash or freeze. It is reliable.
What do I think about the scalability of the solution?
We have approximately 20 firewalls, which is integrated with Panorama, and it's doing pretty good.
This solution is like the backbone of inbound and outbound services.
We have found the solution to be scalable.
In terms of scalability, it should be able to manage all the firewalls. That said, you need to consider capacity planning down the line for the number of resources, like the CPU memory, if it is low. How many resources are required to be increased to manage these number of firewalls is determined. Capacity planning definitely is required if you're looking for a scalable solution.
Right now, we have no plans to increase usage. We might not look at any increase until five or six years later.
How are customer service and support?
Technical support has been very good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Cisco does have this centralized management feature as well. They have an ASDM in the Cisco firewall, which is nothing more than a centralized management server. Even Nokia and Check Point have management servers.
Palo Alto is never out of sync with Panorama. However, I find I have issues with Check Point and syncing. We often need to troubleshoot in those scenarios.
We have Fortinet firewalls. Fortinet is a market leader in terms of Gartner metrics. We have Check Point firewalls as well. That said, Palo Alto is more into the cyber security solution. Everyone is following the footprints of Palo Alto as they were the first to imagine the industry, provide the necessary cybersecurity solutions and next-generation firewalls, and innovate on everything.
How was the initial setup?
The setup itself is very simple and straightforward. It's not overly complex.
In terms of maintenance, in terms of security, we do require additional resources. Once the security infrastructure is compromised, it'll need a business outage. So we require additional resources in the firewall technology.
What about the implementation team?
The deployment was handled in-house.
What was our ROI?
We have definitely seen an ROI.
What's my experience with pricing, setup cost, and licensing?
When it comes to pricing, compared to the OTC and MRC values, it's really high. They are the market leaders and due to their monopoly, whatever they will demand, we have to pay.
I would rate it five out of five in terms of value for money, however.
Which other solutions did I evaluate?
I've looked at almost every other product over the last 15 years. However, Palo Alto offers the best cybersecurity solutions.
What other advice do I have?
Palo Alto definitely a market leader in terms of firewall technology.
They have good features.
I'd rate the solution ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Palo Alto Networks Panorama Report and get advice and tips from experienced pros
sharing their opinions.
Updated: March 2026
Product Categories
Firewall Security ManagementPopular Comparisons
Tufin Orchestration Suite
Fortinet FortiGate Cloud
FireMon Security Manager
Skybox Security Suite
Azure Firewall Manager
AWS Firewall Manager
ManageEngine Firewall Analyzer
FortiGate Cloud-Native Firewall (FortiGate CNF)
Fortinet FortiPortal
Cisco Security Cloud Control
Cisco Secure Firewall Management Center
Juniper SD Cloud
Buyer's Guide
Download our free Palo Alto Networks Panorama Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the differences between Palo Alto Networks Panorama and AlgoSec?
- Which lesser known firewall product has the best chance at unseating the market leaders?
- Comparing network security vendors and devices
- When should companies use SSL Inspection?
- When evaluating Firewall Security Management, what aspect do you think is the most important to look for?
- What are the most important features you would be looking for in a firewall?
- How do I estimate the required firewall throughput for my organization?
- What are the pros and cons of Tufin, AlgoSec and RedSeal?
- Tasks to Perform on Preventive Maintenance.
- Why is network segmentation important?

















