I use Palo Alto Networks VM-Series for testing purposes of VMs.
VM-Series Virtual Next-Generation Firewall (BYOL)
Palo Alto Networks | PAN-OS 11.1.6-h7Linux/Unix, Other 11.1.6-h7 - 64-bit Amazon Machine Image (AMI)
External reviews
External reviews are not included in the AWS star rating for the product.
A tool with a great support team that is useful for testing purposes of VMs
What is our primary use case?
What is most valuable?
The main advantage of Palo Alto Networks VM-Series stems from the fact that you can access it with the help of cloud services.
What needs improvement?
With Palo Alto Networks VM-Series, it is hard for me to manage its network configuration part. Regarding Palo Alto Networks VM-Series, I am figuring out whether to use interzone or intrazone networks for the VMs in our company's environment, which is very confusing. The aforementioned aspects of the solution can be considered for improvement.
In the future, whenever I try to onboard Palo Alto Networks VM-Series, it should allow for easy configuration, especially in terms of network connectivity. I want an easier setup and configuration in the product's future releases.
For how long have I used the solution?
I have been using Palo Alto Networks VM-Series for around a year. My company has a partnership with Palo Alto Networks.
How are customer service and support?
The technical support of Palo Alto Networks does reply to the cases or issues I file with the support team. The support is equally good for all the products that fall under Palo Alto Networks. I rate the technical support a nine out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
I rate the implementation process a six or seven on a scale of one to ten, where one is difficult and ten is easy.
During the implementation process of the product, I faced some issues related to the networking part and connectivity of VMs. I faced issues with how an end user could connect the VMs to a firewall or connect a firewall to VMs, but the same process was easy for me on a physical device firewall.
What other advice do I have?
I am more comfortable with the physical device firewall. I am actually trying to figure out things since I am not very familiar with the VM side of Palo Alto.
I would recommend Palo Alto Networks VM-Series since it is a cheaper product compared to the other tools available in the market. Apart from Palo Alto Networks VM-Series, I usually recommend Palo Alto Networks Cortex XSOAR and Palo Alto Networks Prisma Cloud.
I rate the overall product an eight out of ten.
An enterprise solution that needs to improve order process
What is most valuable?
The tool's cloud version makes application migration easy.
What needs improvement?
Palo Alto Networks VM-Series needs to improve its order process.
For how long have I used the solution?
I have been working with the solution for two years.
What do I think about the stability of the solution?
I rate the solution's stability a nine out of ten.
What do I think about the scalability of the solution?
I rate the product's scalability a nine out of ten.
How was the initial setup?
Palo Alto Networks VM-Series' deployment is not difficult.
What's my experience with pricing, setup cost, and licensing?
The solution is expensive. I rate its pricing a three out of ten.
What other advice do I have?
Palo Alto Networks VM-Series is an enterprise product because it is costly. I rate it an eight out of ten.
Stable product with effective security features
What is our primary use case?
We use Palo Alto Networks VM-Series primarily for security purposes. It helps us with URL filtering, domain blocking, threat analysis, and detecting vulnerabilities.
How has it helped my organization?
We can monitor the traffic manually and detect threats. Additionally, we can block different IP addresses and URLs.
What needs improvement?
There could be dynamic DNS features similar to Fortinet in the product.
For how long have I used the solution?
We have been using Palo Alto Networks VM-Series for six years.
What do I think about the stability of the solution?
I rate the product's stability a nine out of ten.
What do I think about the scalability of the solution?
I rate the product's stability a seven out of ten. It could be better. We have four users for it at the moment. We plan to increase the number of devices.
How are customer service and support?
We receive technical support from a local partner rather than directly from the vendor. The support team requires more training.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have used Cisco Adaptive Security Appliance (ASA) before. Compared to Palo Alto, Cisco devices are not feasible regarding hardware. They are very slow and complicated to find the granular level of results. Sometimes, even a technical expert is unable to fetch a proper report.
How was the initial setup?
I rate the initial setup process an eight out of ten. It takes eight hours to complete and requires one security engineer to execute the process. The deployment involves setting up security policies. The on-premise installation is simple. However, VM installation is complicated in terms of the network interface.
What's my experience with pricing, setup cost, and licensing?
It is an expensive product. I rate the pricing an eight out of ten. We purchased a three-year license for it.
What other advice do I have?
I rate Palo Alto Networks VM-Series an eight out of ten.
Which deployment model are you using for this solution?
Stable product with an easy installation process
What is our primary use case?
We use the product to mitigate vulnerabilities for the applications running on particular VMs.
What is most valuable?
The product's most valuable feature is pricing.
What needs improvement?
Compared to Azure Firewall, the product could be better in terms of performance.
For how long have I used the solution?
We have been using Palo Alto Networks VM-Series for three years.
What do I think about the stability of the solution?
The product is stable.
What do I think about the scalability of the solution?
It is an easy-to-scale product and suitable for enterprises.
How are customer service and support?
Palo Alto's support is good. Whenever I raise a ticket, they immediately look into it and make a Zoom call.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have used Cisco's Next-Generation Firewall before. It works better than Palo Alto.
How was the initial setup?
Palo Alto's installation process is easy because we use Panorama tool to manage it. We can communicate and implement traffic policies, filtering, and other specific options with its help.
It requires two to three engineers and takes two days to complete the deployment. For maintenance, it requires a team of two engineers.
What other advice do I have?
It's good to work with Palo Alto Networks VM-Series. I recommend it to others and rate it an eight out of ten.
Many features are optimized for troubleshooting real-time scenarios, saving a lot of time
What is our primary use case?
Ours is an enterprise environment and some of the services are hosted in our private data centers and some of the servers are hosted on Azure. We have the IPSec tunnels from the firewalls to our own data centers and from the firewall to the cloud as well. It depends on the type of application being hosted.
We are using Panorama for centralized management of all our firewalls around the world, as well as for centralized management of security policies and network settings. We have not completely migrated to the cloud. We are in transit.
How has it helped my organization?
Palo Alto has many features for troubleshooting real-time scenarios. The troubleshooting, compared to other firewalls has been optimized in a way that saves a lot of time.
What is most valuable?
I like the UI. Most things are accessible from the user interface and it is quite user-friendly. With respect to both VM-based firewalls and physical firewalls, it's easy to create updates.
They have a centralized Palo Alto Customer Support Portal and if we require any licenses, such as a next-generation firewall license, we can easily download and integrate them with this solution. We can also schedule periodic updates. That is quite user-friendly.
In terms of functionality, we are using IPSec tunneling and Palo Alto's WildFire feature. We use the security policies, Panorama, and Prisma Cloud as well.
We use Panorama to manage our security policy model across on-prem and public cloud environments. It plays a key role with respect to centralized management, for physical enterprise firewalls and cloud-based firewalls. It gives you centralized control over all the infrastructure. Unified policies can be pushed from that centralized place with templates.
When you deploy VM-Series Firewalls, they are quite flexible. You just have to select the instances, storage, security policies, and firewall rules. Within minutes, you can deploy the firewalls.
We are also able to adjust firewall sizing on the fly, which is important. Initially, we decided on a firewall based on the throughput assumptions. But in peak hours or during a peak month for traffic, we need to scale the firewalls. That should be automatically done. AWS and Azure provide very good features and, by using them, within a second it automatically scales, based on the incoming traffic.
What needs improvement?
Palo Alto has launched different products, such as physical firewalls as well as cloud and VM-based firewalls. Recently, they introduced their Prisma Cloud solution. Compared to the previous technologies, like Panorama, which is used for centralized firewall management, or even individual firewalls, it's a bit challenging to integrate the traditional firewall policies into Prisma Cloud. And the Prisma Cloud interface isn't very user-friendly.
For how long have I used the solution?
Our organization has been using Palo Alto Networks VM-Series for more than five years, and I have worked on this solution for two years.
What do I think about the stability of the solution?
The solution is certainly stable. I have worked with many vendors' firewalls and Palo Alto's are definitely stable.
What do I think about the scalability of the solution?
Obviously, it is scalable as long as you have the licenses and support with Palo Alto. You can implement the firewalls in high-availability mode or use the cloud functionality as well. For scalability, Palo Alto is optimized.
We have 30-plus sites around the world with more than 4,000 users.
How are customer service and support?
Palo Alto has very good support. When you have a valid license, they can replace a device with a new one. They have the CSP portal and you can log in and see all the firewalls listed. You can raise TAC cases with a priority of low, medium, or high, and, based on the priority, they will send an email to you. They have live support as well. In case of an issue, you can call them directly and they will provide the required support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Earlier, we were using many vendors' firewalls, per their suitability for our clients. Apart from Palo Alto, we were using Cisco ASA, Check Point, and Juniper. The network grew over the years and each site had its own set of firewalls. The issue was that we had to standardize things across the network. There was also a gradual change in the technology and features available. Our security team thought we needed a better implementation, for optimization and troubleshooting, and something that was friendly for daily operations.
How was the initial setup?
We have both private cloud and hybrid. Some of the services are on the cloud and some are on-prem in our data center. Setting up Palo Alto firewalls is quite easy compared to other vendors.
Migrating our old infrastructure to Palo Alto took four to six months.
We did some pilot project testing with Palo Alto. If, for example, we want to migrate from XYZ vendor to Palo Alto, the very first thing we had to do was capture all the existing security and NAC policies and all the NGFW functionality. Palo Alto has specific features. For example, you can capture the logs in an inline environment, such as what traffic is going to the network, what security policies are there, et cetera. We deployed the Palo Alto firewalls in that way to only capture the traffic. We then analyzed the traffic, and we worked with Palo Alto TAC to understand the security policies and the exact throughput to determine the hardware we were going to use. We monitored all of that for a few months and then we started the migration from other vendors to Palo Alto.
We had 10 engineers involved in the deployment, but each on-site location had its own team as well. Three were senior network architects and the other seven were staff network engineers.
If you want to keep up to date in the network, it requires quite a bit of patching. It has many features, like Unified Threat Management and antivirus that can be auto-updated by scheduling an update for them. But the major patching has to be done manually. In our organization, we do it quarterly.
What was our ROI?
It is worth the cost.
What's my experience with pricing, setup cost, and licensing?
Palo Alto Networks VM-Series is notably cheaper than other firewall vendors, except Fortigate. Fortigate is number one in terms of pricing.
Which other solutions did I evaluate?
Our security team tested various firewalls and it came down to FortiGate and Palo Alto and they found Palo Alto was quite suitable for the network.
What other advice do I have?
Everything is moving to the cloud and we need a solution that can support all the multi-vendor platforms and the new technologies as well. That is quite important for any enterprise organization or service provider nowadays. If we talk about moving existing loads from our own data centers or enterprise sites to the cloud, we need a solution that can take care of everything, such as security compliance, and that is easy to use. Palo Alto is good in those terms.
With the introduction of Prisma Cloud, Palo Alto is encouraging clients to migrate their infrastructure, such as VPN and security solutions to Prisma Cloud. It has been highly optimized compared to Panorama. Palo Alto is promoting it and asking their clients to use Prisma Cloud to improve their security infrastructure.
I would advise, when you deploy a new site, to manage it from the centralized Panorama solution. With Panorama, you have a local login, so even if the internet is down you have access to the firewall management.
We had a situation, when performing patching, where the firewall lost the remote connection via the internet and it had not been onboarded to Panorama. That mean we lost connectivity and we had to involve the onsite technicians. To avoid that scenario, all firewalls should be centrally managed by Panorama.
And for troubleshooting, each firewall should have syslog profiles activated.
Review of Palo Alto VM series on Azure, Azure VMware services, Equinix Edge, Equinix Metal
I have share my experiance about this and also describe issues which i have face on daily basis.
If you don't remember the serial number of the firewall then you can not reterive the license directly from the firewall so either you find the serial number or check from the Palo Alto support portal.
Also, VM-Series firewalls are cheaper than hardware base and easy to take care.
I've been using Palo Alto VM version and it is fast and easy to backup since it is on cloud.
Good performance, powerful CLI, and offers zero-day signature updates
What is our primary use case?
We use this product to secure our entire network, for ZTNA structure, and for VPN purposes, allowing access to our servers behind the firewall.
How has it helped my organization?
Using this product has increased our security and has given us much better results in terms of security scans.
Palo Alto embeds machine learning into the core of the firewall to provide online real-time attack prevention, and I would rate that capability an 8 out of 10. It's definitely effective in terms of securing our network against threats that are able to evolve and morph rapidly.
This solution provides a unified platform that natively integrates all of the security capabilities, although we are not using parts of it. For example, we don't use the configuration tools like Panorama.
What is most valuable?
The most valuable feature is the CLI.
We have the firewall configured for zero-day signatures, which is very important to us. We must be HIPAA and PCI compliant, which means that we need those signatures immediately.
There is no noticeable trade-off between security and network performance. In fact, so far, we've not seen any negative network performance with it. We're very impressed in that regard.
What needs improvement?
The web interface is still slow, even after recent improvements.
For how long have I used the solution?
I have been working with the Palo Alto Networks VM-Series for three years.
What do I think about the stability of the solution?
This product is very stable. We have had zero problems with stability.
What do I think about the scalability of the solution?
The scalability is fantastic. We're using the lowest-end product right now, and I don't foresee when we'll have to upgrade. We've got a long way where we can continue to scale up.
We currently have multiple people that use it for VPN purposes, to access our servers behind the firewall. It is not used nearly as extensively as it should be. However, next year, we're going to start flowing all of our internet traffic through it.
We're all working remotely, and we're going to be connecting through the firewall. This means that our traffic is going to greatly increase, meaning that our usage will also increase. We'll also be using many more of the features.
How are customer service and support?
The technical support from Palo Alto is good, overall. However, their response times could be a little quicker.
We have not really had any big complaints with the technical support and I would rate them a seven out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
Prior to using Palo Alto, we were using an on-premises solution by Juniper. When we switched from onsite to the cloud, we changed products.
We made the switch because Juniper became unbearable regarding complexity and performance. It was getting very bad; we couldn't manage it well, and the performance was quite poor.
How was the initial setup?
The initial setup is quite complex. There is a steep learning curve and we failed at it a couple of times.
Our final deployment took between three and four hours.
What about the implementation team?
Our in-house team was responsible for the deployment.
What was our ROI?
We have absolutely seen a return on our investment. We are definitely more secure. With the features that are in Palo Alto, we do not have to worry about people busting into our network. Even just out of the box, with the base features, it's really solid. The default configurations are very secure.
Our return on investment comes from the fact that we're not having to spend hours monitoring stuff the way we did before. We've saved man hours and we've saved stress. I can't put a monetary value to that, but that would be the return.
What's my experience with pricing, setup cost, and licensing?
This is not the cheapest firewall but it's not the most expensive of the options on the market.
There's a new licensing structure coming in that we're really trying to understand, so I would suggest studying up on it. I recommend getting a partner involved for purchasing the product.
Which other solutions did I evaluate?
Beyond Palo Alto, we evaluated two or three other products. Two of them that I can recall are Fortinet and the Microsoft Azure Firewall.
We did some extensive reviews and some extensive testing and what we found is that for the price, Palo Alto gave us the best options. It had the best set of security features. It wasn't the cheapest product but it was the best solution that fit our requirements.
What other advice do I have?
We have not yet implemented the DNS security features. However, we will likely be doing so next year.
If one of my colleagues at another company were to say that they were just looking for the cheapest and fastest firewall, I would suggest that they be careful. Palo Alto has a great balance. It's not super expensive compared to other options on the market, and it's quite quick when it comes to throughput and performance.
In summary, this is a good product but I do suggest that people shop around a little bit.
I would rate this solution an eight out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Best secure firewall in VM series
2. Initial configuration is simple via management interface in VM.
3. Lot of security features and anti-spam profiles are available.
4. High availability (HA) works perfectly as same as physical firewalls.
2. Saving the configuration changes takes time.
3. Configuration of some security profiles is a long process.
1. Configuring appropriate security policies to protect internal servers.
2. Configuring VPN profiles to access the servers from the internet.
3. Configuring the Antivirus and Antispoof profile to protect servers from brute force and exploitation attacks.