My primary use case is to ensure there's no need for a separate IDS or IPS solution.
Senior Network Engineer at a retailer with 10,001+ employees
Provides everything you want in one place
Pros and Cons
- "The most valuable feature is that the product can do everything in a single device, including the firewall, rules, and the PBL. It also has good routing and switching."
- "An area for improvement would be the technical support, which can be slow."
What is our primary use case?
What is most valuable?
The most valuable feature is that the product can do everything in a single device, including the firewall, rules, and the PBL. It also has good routing and switching.
What needs improvement?
An area for improvement would be the technical support, which can be slow.
For how long have I used the solution?
I've been working with this solution for over five years.
Buyer's Guide
Palo Alto Networks URL Filtering with PAN-DB
May 2025

Learn what your peers think about Palo Alto Networks URL Filtering with PAN-DB. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,604 professionals have used our research since 2012.
What do I think about the stability of the solution?
This solution has pretty good stability.
What do I think about the scalability of the solution?
The scalability of this solution is pretty good.
How are customer service and support?
The support team is pretty quick when you first open a case but can be difficult to contact later on.
How was the initial setup?
The initial setup was pretty simple.
What's my experience with pricing, setup cost, and licensing?
This product is more expensive, but that's because it provides everything.
What other advice do I have?
I would rate this solution as eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Sr. Systems Analyst at a manufacturing company with 5,001-10,000 employees
The ability to manage blacklists and whitelists easily is very useful, especially for internal access and limiting outbound access
Pros and Cons
- "Being able to manage blacklists and whitelists easily is very useful, especially for internal access and limiting outbound access."
- "For hosting sites like Blogspot, they host sites that should be in different categories, but get lumped together in general. There needs to be more granularity or multiple categorizations."
What is our primary use case?
We are not using it for the general population, just for a select group of users in an isolated subnet. We are using it primarily as a whitelist with little reliance on the PAN-DB.
How has it helped my organization?
I cannot say that PAN-DB has provided any significant improvements, since we are using it primarily as a white list.
What is most valuable?
Being able to manage blacklists and whitelists easily is very useful, especially for internal access and limiting outbound access.
What needs improvement?
The biggest improvement is the categories per site. For hosting sites like Blogspot, they host sites that should be in different categories, but get lumped together in general. There needs to be more granularity or multiple categorizations.
For how long have I used the solution?
One to three years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Palo Alto Networks URL Filtering with PAN-DB
May 2025

Learn what your peers think about Palo Alto Networks URL Filtering with PAN-DB. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
851,604 professionals have used our research since 2012.
Deputy manager IT at Hyundai Nishad
Provides Threat Protection Across a Variety of Internet Connections
Pros and Cons
- "The Palo Alto solution has improved our organization by providing threat protection across a variety of internet connections. Our company also gets valuable insights regarding threat analysis."
- "One way Palo Alto can improve is by offering sandboxing. I don't know if they currently offer a sandboxing feature together with the firewall or not. They should provide secure sandboxing with the firewalls."
What is our primary use case?
We operate in the automotive industry. Internally we work with computing and networking equipment, concentrated on collecting, storing, processing, and distributing enormous amounts of data. Our company deploys this solution for internal web security purposes.
How has it helped my organization?
The Palo Alto solution has improved our organization by providing threat protection across a variety of internet connections. Our company also gets valuable insights regarding threat analysis.
What needs improvement?
One way Palo Alto can improve is by offering sandboxing. I don't know if they currently offer a sandboxing feature together with the firewall or not. They should provide secure sandboxing with the firewalls.
For how long have I used the solution?
Three to five years.
What do I think about the stability of the solution?
The stability of the solution is good.
How was the initial setup?
The initial setup and configuration was straight-forward.
The solution was deployed by a small team of about five people in our facility. Their roles included end users, application developers, and system administrators, etc.
What was our ROI?
I would say it will take another three to four years to realize any significant returns on our investment.
What other advice do I have?
I would recommend using this solution as an enterprise-class security, including a firewall and protection for Microsoft Edge. This solution can also be used as a data center or file storage tool for workloads (small or large).
I would rate this tool as a 7 out of 10.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Consultant at a tech services company with 501-1,000 employees
Easy to set up, scales well, and provides excellent URL filtering
Pros and Cons
- "The initial setup is easy."
- "The solution is a bit expensive."
What is our primary use case?
We require a firewall to deploy URL filtering or to enforce this URL filtering solution to our users. It is actually cloud-based, deployed on a cloud, and is URL Filtering as a service, which requires a firewall. The firewall, therefore, will then enforce the URL filtering options on my users' traffic.
We are using this for preventing the user's access to malicious websites, or access to inappropriate adult websites or porn websites or even the P2P tunnels or tunnels or domains they should not access. This is our main priority and main use case.
What is most valuable?
The URL filtering is excellent. It ensures our users can't access certain sites.
The multiple categorizations of URLs are quite helpful. For example, if a URL is, a social media website, such as facebook.com, it can be classified at a certain risk level - from high to low.
The solution offers credential phishing, which is a helpful feature.
The initial setup is easy.
The solution scales well, according to the firewall.
The stability is very good.
Everything that is available with the firewall is provided to the user.
What needs improvement?
It would be ideal if this solution could be a separate product rather than have to have it deploy through a firewall. If it was a separate product, many of our customers would be happier as most just require a URL filtering option. They do not require a firewall. They do not require any threat prevention or anything.
If it was a separate product, we could deploy it to branch offices or any of our customer locations in which different firewalls are being used.
The solution is a bit expensive.
For how long have I used the solution?
We've been using the solution for more than three years at this point.
What do I think about the stability of the solution?
The stability is excellent. We've never had to raise any technical issues. There have been no bugs or glitches. It doesn't crash or freeze.
What do I think about the scalability of the solution?
The scalability depends on the firewall. The URL Filtering does not have any limitations. For example, any number of firewalls is supported. It is not dependent on that. It is just dependent on the firewall. Therefore, if a firewall supports 1,000 users, then it will provide support for protection for 1,000 users as well.
We have 700 users on the solution currently.
We do not plan to increase usage at this time.
How are customer service and technical support?
We have never had a technical call raised to customer care or the tech team or anyone to resolve the URL Filtering issues. It's been so reliable we haven't really dealt so much with technical support. Any local issues have been small and have been handled by our internal team.
How was the initial setup?
The initial setup is not complex. It's easy and pretty straightforward. There are no configuration options. You use it as it is. A company shouldn't have any issues with it.
What's my experience with pricing, setup cost, and licensing?
We pay a yearly licensing fee.
It's a bit expensive if I were to rate it from one to five, with one being the cheapest, I'd rate it at a four. That said, I would argue that it is worth the price.
What other advice do I have?
We're Palo Alto partners.
There isn't an exact version number associated with the product. It's a SaaS.
I'd recommend the solution to other users and companies.
I'd rate the product at a ten out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Information Security Manager at a financial services firm with 501-1,000 employees
Enables us to have better visibility and protection from threats and is incredibly stable
Pros and Cons
- "It's allowed us to have better visibility and protection from threats."
- "Performance monitoring could use improvement."
What is our primary use case?
Our primary use case of this solution is for both internal and external firewalls.
How has it helped my organization?
It's allowed us to have better visibility and protection from threats.
What is most valuable?
- Next generation rule set
- Much more granular
What needs improvement?
Performance monitoring could use improvement.
For how long have I used the solution?
Less than one year.
What do I think about the stability of the solution?
It's incredibly stable.
How are customer service and technical support?
Their technical support is very good.
Which solution did I use previously and why did I switch?
We were previously using Fortinet Fortigate.
How was the initial setup?
The initial setup was very straightforward. The deployment took five minutes. Our implementation strategy was to build everything out using existing data.
What about the implementation team?
We implemented with ANM. They were good.
What's my experience with pricing, setup cost, and licensing?
Pricing and licensing are excellent.
Which other solutions did I evaluate?
We also looked at Cisco Firepower.
What other advice do I have?
Demo this first and then other competitors and you'll quickly see what's the right fit and which is the superior product.
I would rate this solution a ten out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Palo Alto Networks URL Filtering with PAN-DB Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2025
Product Categories
Intrusion Detection and Prevention Software (IDPS)Popular Comparisons
Splunk User Behavior Analytics
Palo Alto Networks Advanced Threat Prevention
Trend Micro Deep Discovery
Fortinet FortiGate IPS
Cisco Sourcefire SNORT
Cisco IOS Security
Zscaler Cloud IPS
Buyer's Guide
Download our free Palo Alto Networks URL Filtering with PAN-DB Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What are the threats associated with using ‘bogus’ cybersecurity tools?
- When evaluating Intrusion Detection, what aspect do you think is the most important to look for?
- What is your recommended cost-effective solution to detect and prevent APT attacks?
- What product do you recommend for a Campus IPS appliance implementation?
- How do you use the MITRE ATT&CK framework for improving enterprise security?
- What are the pros and cons of Darktrace vs CrowdStrike Falcon vs alternative EPP solutions?
- Which alternative solutions (other than Darktrace) do you recommend for an SMB?
- Which is the best intrusion detection and prevention solution?
- What is the best IDPS security tool and why?
- What is Cognitive Cybersecurity and what is it used for?
To add on... Palo Alto just released 9.0, which adds a huge amount of even better functionality. Their Endpoint Security - TRAPS just also released a new version (6.0) and they are incorporating XDR functionality soon, as well as correlation for anomaly detection across the combined data stream from both firewall and endpoint platforms. We have already started testing SSL decrypt months ahead of schedule and incorporated multiple threat feeds. It just keeps getting better with their forward-thinking vision of a modern security platform and ecosystem.