Many features are optimized for troubleshooting real-time scenarios, saving a lot of time
What is our primary use case?
Ours is an enterprise environment and some of the services are hosted in our private data centers and some of the servers are hosted on Azure. We have the IPSec tunnels from the firewalls to our own data centers and from the firewall to the cloud as well. It depends on the type of application being hosted.
We are using Panorama for centralized management of all our firewalls around the world, as well as for centralized management of security policies and network settings. We have not completely migrated to the cloud. We are in transit.
How has it helped my organization?
Palo Alto has many features for troubleshooting real-time scenarios. The troubleshooting, compared to other firewalls has been optimized in a way that saves a lot of time.
What is most valuable?
I like the UI. Most things are accessible from the user interface and it is quite user-friendly. With respect to both VM-based firewalls and physical firewalls, it's easy to create updates.
They have a centralized Palo Alto Customer Support Portal and if we require any licenses, such as a next-generation firewall license, we can easily download and integrate them with this solution. We can also schedule periodic updates. That is quite user-friendly.
In terms of functionality, we are using IPSec tunneling and Palo Alto's WildFire feature. We use the security policies, Panorama, and Prisma Cloud as well.
We use Panorama to manage our security policy model across on-prem and public cloud environments. It plays a key role with respect to centralized management, for physical enterprise firewalls and cloud-based firewalls. It gives you centralized control over all the infrastructure. Unified policies can be pushed from that centralized place with templates.
When you deploy VM-Series Firewalls, they are quite flexible. You just have to select the instances, storage, security policies, and firewall rules. Within minutes, you can deploy the firewalls.
We are also able to adjust firewall sizing on the fly, which is important. Initially, we decided on a firewall based on the throughput assumptions. But in peak hours or during a peak month for traffic, we need to scale the firewalls. That should be automatically done. AWS and Azure provide very good features and, by using them, within a second it automatically scales, based on the incoming traffic.
What needs improvement?
Palo Alto has launched different products, such as physical firewalls as well as cloud and VM-based firewalls. Recently, they introduced their Prisma Cloud solution. Compared to the previous technologies, like Panorama, which is used for centralized firewall management, or even individual firewalls, it's a bit challenging to integrate the traditional firewall policies into Prisma Cloud. And the Prisma Cloud interface isn't very user-friendly.
For how long have I used the solution?
Our organization has been using Palo Alto Networks VM-Series for more than five years, and I have worked on this solution for two years.
What do I think about the stability of the solution?
The solution is certainly stable. I have worked with many vendors' firewalls and Palo Alto's are definitely stable.
What do I think about the scalability of the solution?
Obviously, it is scalable as long as you have the licenses and support with Palo Alto. You can implement the firewalls in high-availability mode or use the cloud functionality as well. For scalability, Palo Alto is optimized.
We have 30-plus sites around the world with more than 4,000 users.
How are customer service and support?
Palo Alto has very good support. When you have a valid license, they can replace a device with a new one. They have the CSP portal and you can log in and see all the firewalls listed. You can raise TAC cases with a priority of low, medium, or high, and, based on the priority, they will send an email to you. They have live support as well. In case of an issue, you can call them directly and they will provide the required support.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
Earlier, we were using many vendors' firewalls, per their suitability for our clients. Apart from Palo Alto, we were using Cisco ASA, Check Point, and Juniper. The network grew over the years and each site had its own set of firewalls. The issue was that we had to standardize things across the network. There was also a gradual change in the technology and features available. Our security team thought we needed a better implementation, for optimization and troubleshooting, and something that was friendly for daily operations.
How was the initial setup?
We have both private cloud and hybrid. Some of the services are on the cloud and some are on-prem in our data center. Setting up Palo Alto firewalls is quite easy compared to other vendors.
Migrating our old infrastructure to Palo Alto took four to six months.
We did some pilot project testing with Palo Alto. If, for example, we want to migrate from XYZ vendor to Palo Alto, the very first thing we had to do was capture all the existing security and NAC policies and all the NGFW functionality. Palo Alto has specific features. For example, you can capture the logs in an inline environment, such as what traffic is going to the network, what security policies are there, et cetera. We deployed the Palo Alto firewalls in that way to only capture the traffic. We then analyzed the traffic, and we worked with Palo Alto TAC to understand the security policies and the exact throughput to determine the hardware we were going to use. We monitored all of that for a few months and then we started the migration from other vendors to Palo Alto.
We had 10 engineers involved in the deployment, but each on-site location had its own team as well. Three were senior network architects and the other seven were staff network engineers.
If you want to keep up to date in the network, it requires quite a bit of patching. It has many features, like Unified Threat Management and antivirus that can be auto-updated by scheduling an update for them. But the major patching has to be done manually. In our organization, we do it quarterly.
What was our ROI?
What's my experience with pricing, setup cost, and licensing?
Palo Alto Networks VM-Series is notably cheaper than other firewall vendors, except Fortigate. Fortigate is number one in terms of pricing.
Which other solutions did I evaluate?
Our security team tested various firewalls and it came down to FortiGate and Palo Alto and they found Palo Alto was quite suitable for the network.
What other advice do I have?
Everything is moving to the cloud and we need a solution that can support all the multi-vendor platforms and the new technologies as well. That is quite important for any enterprise organization or service provider nowadays. If we talk about moving existing loads from our own data centers or enterprise sites to the cloud, we need a solution that can take care of everything, such as security compliance, and that is easy to use. Palo Alto is good in those terms.
With the introduction of Prisma Cloud, Palo Alto is encouraging clients to migrate their infrastructure, such as VPN and security solutions to Prisma Cloud. It has been highly optimized compared to Panorama. Palo Alto is promoting it and asking their clients to use Prisma Cloud to improve their security infrastructure.
I would advise, when you deploy a new site, to manage it from the centralized Panorama solution. With Panorama, you have a local login, so even if the internet is down you have access to the firewall management.
We had a situation, when performing patching, where the firewall lost the remote connection via the internet and it had not been onboarded to Panorama. That mean we lost connectivity and we had to involve the onsite technicians. To avoid that scenario, all firewalls should be centrally managed by Panorama.
And for troubleshooting, each firewall should have syslog profiles activated.
Super Sonic nextgen FW
What do you like best about the product?
User friendly GUI along with fast processing of packeta
What do you dislike about the product?
So far not experienced any major issue during operation
What problems is the product solving and how is that benefiting you?
Being a nextgen FW it's eleminiating so many layered devices and providing infra security under one roof
Allows us to maintain consistent next-generation firewall protection across virtual, private, and public cloud infrastructures using a unified policy model
What is our primary use case?
We use the solution for network protection. Previously, I worked for a physical organization, but last year we moved to a Proof of Concept. Following the POC, we had to deploy the solution in three different geographical locations. We deployed all of the Palo Alto solutions in the hub environment and connected them to another node.
How has it helped my organization?
VM-Series allows us to maintain consistent next-generation firewall protection across virtual, private, and public cloud infrastructures using a unified policy model. We can use the provided templates to generate policies based on both global and local rules.
Panorama plays a vital role in allowing us to maintain a consistent security policy model across on-premises and various public cloud environments. Presently, we utilize Panorama exclusively in the cloud, spanning three different geographical locations: East Asia, Eastern U.S., and Western Europe.
Once we were able to configure Panorama's centralized management system we were able to have uninterrupted connections with no security issues.
Using Panorama helped us streamline our security policies in a cloud-based environment, saving us time. With Panorama, we no longer need to log in and manually adjust the template before transferring data, which increased our comfort level.
What is most valuable?
Palo Alto Networks VM-Series' security features are all good.
Centralized management is valuable because it allows us to configure settings in one location and apply them across all three locations.
What needs improvement?
The migration of workloads to the cloud is difficult because the cloud provider and Palo Alto Networks are different platforms. We had to research many articles online and after our research and development were completed we were able to deploy. The migration of data to the cloud can be more user-friendly and has room for improvement.
The utilization monitoring and GUI have room for improvement.
Sometimes we encounter licensing issues where our licenses are not activated, and as a result, we are required to redeploy. This problem could be related to VM-Series or the template image and how they are integrated with Azure Marketplace.
For how long have I used the solution?
I have been using the solution for one year.
What do I think about the stability of the solution?
How are customer service and support?
The technical support is good.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
Previously, we utilized Azure Firewall, but we found it to be less mature compared to Palo Alto, prompting us to switch to the latter.
How was the initial setup?
The initial setup is straightforward but the deployment portion is complex. We require 15 minutes for one VM deployment.
What other advice do I have?
I give the solution a nine out of ten.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Review of Palo Alto VM series on Azure, Azure VMware services, Equinix Edge, Equinix Metal
What do you like best about the product?
Palo Alto is leader in Firewall industry and continues to grow.
What do you dislike about the product?
Interface can be made simple and get easy.
What problems is the product solving and how is that benefiting you?
Deploying in private and Public clouds
Best virtual firewall product solution
What do you like best about the product?
It is beneficial for our cloud production environment, especially when isolating our DMZ and Core environment.
What do you dislike about the product?
None, as of now. We fully utilize our Palo Alto VM firewall on our environment, especially on our AWS Cloud infrastructure.
What problems is the product solving and how is that benefiting you?
We used Palo Alto VM-Series firewall when securing the connection between our DMZ and Core VPC.
cool
What do you like best about the product?
he Palo Alto VM-Series is a comprehensive and versatile solution for securing virtualized and cloud environments.
What do you dislike about the product?
nothing so far to dislike. if i found so definitely contact support
What problems is the product solving and how is that benefiting you?
The VM-Series can be deployed in a high-availability cluster to provide scalability and ensure that security is maintained even during periods of high traffic or attacks.
No. #1 Secured solution for VM's
What do you like best about the product?
It's the best and most secure solution for protecting my virtual environment. I, till last month, was using a different product; due to a security breach, we moved to Palo Alto.
What do you dislike about the product?
It has no flaws, so there is no dislike at all.
What problems is the product solving and how is that benefiting you?
It protects the virtual environment; in my case, I have integrated it with my Gateway load balancer on AWS. It is indeed a cost-saver and the most secured solution.
Review of Palo Alto VM-Series: Pros and Cons for Secure Virtualized Environments
What do you like best about the product?
Palo Alto VM-Series apart is its ability to provide advanced security capabilities such as threat prevention, application visibility, and user identification in virtualized environments. Its granular visibility and control over application traffic and the ability to apply security policies consistently across physical and virtual networks are particularly valuable in multi-cloud environments.
What do you dislike about the product?
Cost: The VM-Series can be more expensive than other virtualized firewall solutions, and organizations may need to invest in additional licenses and hardware resources to fully utilize the product's capabilities.
Resource-intensive: Running Palo Alto VM-Series requires significant CPU and memory resources, which may not be available on smaller virtualization hosts or cloud instances. This can result in performance issues and increased infrastructure costs.
Learning curve: As with any advanced security solution, there is a learning curve associated with deploying and managing Palo Alto VM-Series. Administrators will need to familiarize themselves with the product's user interface, policies, and configurations, which can take time and effort.
Vendor lock-in: Because Palo Alto VM-Series is a proprietary solution, organizations may be locked into using it for their virtualized firewall needs. This can limit their flexibility and ability to adopt other security solutions that may be a better fit for their needs.
Limited integrations: While Palo Alto VM-Series integrates well with other Palo Alto Networks products and a variety of third-party solutions, there may be some integrations that are not available or require custom development work
What problems is the product solving and how is that benefiting you?
Advanced Threat Prevention: One of the biggest challenges in securing virtualized environments is detecting and preventing advanced threats, such as malware and zero-day attacks. Palo Alto VM-Series offers advanced threat prevention capabilities, including network-based malware detection, behavioral analysis, and sandboxing, which can help organizations detect and prevent advanced threats before they can cause damage.
Application Visibility and Control: Another challenge in securing virtualized environments is gaining visibility and control over application traffic. Palo Alto VM-Series provides granular visibility and control over application traffic, enabling organizations to create policies that enforce application usage and protect against data exfiltration.
Palo Alto VM Review
What do you like best about the product?
It is Next Gen Firewall and is very powerful to stop the attacks and the GUI is also very user friendly.
What do you dislike about the product?
Sometimes the complexity of configuring the rules.
What problems is the product solving and how is that benefiting you?
As it is next-gen firewall, the main problem it solves is to stop the attacks by configuring the appropriate rules and lot of out of box rules.
I'm working on Palo Alto since 4 year and have great experience on Palo Alto. Palo Alto is easy to
What do you like best about the product?
Overall, Palo Alto is excellent, but I like the Zone-based policy, which is very easy to create. TAC Support is very lovely.
What do you dislike about the product?
Palo Alto is a bit expensive, but it beats the higher device available in the market regarding performance.
What problems is the product solving and how is that benefiting you?
It helps to solve all problems like expanding the ram & control the data plane and management plane separately.