
VM-Series Next-Generation Firewall Bundle 1 [VM-300]
Palo Alto NetworksExternal reviews
183 reviews
from
and
External reviews are not included in the AWS star rating for the product.
Reliable, Secure, and Intelligent Firewall Solution
What do you like best about the product?
The best part about Palo Alto Networks Next-Generation Firewalls is their ability to provide deep visibility and control over network traffic without compromising performance. The user interface is intuitive, and the integration with threat intelligence ensures that the firewall can detect and prevent both known and emerging threats in real time.
What do you dislike about the product?
The initial setup and configuration can be complex, especially for administrators who are new to the platform. The learning curve is somewhat steep, and fine-tuning security policies requires time and expertise. Licensing can also feel a bit confusing, as different features often require separate subscriptions.
What problems is the product solving and how is that benefiting you?
Palo Alto Networks Next-Generation Firewalls are helping us prevent advanced threats, control applications, and secure remote access for users across different locations. They provide deep visibility into traffic, which makes it easier to detect and stop malicious activity before it impacts operations. The granular policies reduce risks, improve compliance, and save time for the IT team by simplifying management through centralized monitoring. Overall, it has strengthened our security posture while keeping network performance stable.
PCNSE-certified with experience deploying, configuring, and managing Palo Alto NGFWs.
What do you like best about the product?
Palo Alto NGFWs provide exceptional visibility and control over network traffic, seamless integration with security tools, advanced threat prevention, and user-friendly management via Panorama. The App-ID and Content-ID features are incredibly effective at identifying and blocking threats in real time, enhancing overall security posture.
What do you dislike about the product?
While Palo Alto NGFWs deliver top-tier security, initial setup and policy configuration can be complex for beginners. Licensing costs and subscription renewals can also be expensive, and frequent updates may require planned downtime in high-availability environments. Additionally, some advanced features have a steep learning curve.
What problems is the product solving and how is that benefiting you?
Palo Alto NGFWs help prevent advanced threats, stop malware, and control applications with precision. Their App-ID, User-ID, and Threat Prevention features improve network visibility, reduce attack surface, and ensure compliance. This has strengthened our security posture, minimized downtime, and allowed faster, more confident incident response.
Powerfull firewall, with many features and powerfull tools to strengthen a network.
What do you like best about the product?
I enjoy using the zone based firewall system. It allows you to group interfaces into zones rather than having a single interface per zone, which helps in large networks. It also has powerfull tools to monitor and improve an existing network, such as using the ACC and policy optimiser.
The routing engine is quite good, allows you to create complex routing paths which is usually reserved for larger routing devices.
Deploying on a VM compared to physical appliances is also great.
TAC is quite quick to reespond to any issues.
The routing engine is quite good, allows you to create complex routing paths which is usually reserved for larger routing devices.
Deploying on a VM compared to physical appliances is also great.
TAC is quite quick to reespond to any issues.
What do you dislike about the product?
Not being able to select mgmt interface in a different order when deploying as a VM.
Having a limitation of 1 subnet per interface as a DHCP scope.
ACC feels outdated, it should be updated to a more easier to understand interface.
Having a limitation of 1 subnet per interface as a DHCP scope.
ACC feels outdated, it should be updated to a more easier to understand interface.
What problems is the product solving and how is that benefiting you?
Being able to create policies that use application type rather than port. Which is a game changer to traiditonal firewalls using port based policies.
Although not used a lot, using user based policies further strengthens policy access, incorporating zero trust architecture is easier.
Dynamic threat updates helps secure devices and services without manual intervention.
Although not used a lot, using user based policies further strengthens policy access, incorporating zero trust architecture is easier.
Dynamic threat updates helps secure devices and services without manual intervention.
Cybersecurity with AI Muscles | A Look at Palo Alto Networks
What do you like best about the product?
it’s just super helpful ‘cause you can actually see what’s going on in your network and stop bad stuff before it gets messy. And like, everything’s in one spot, so you’re not jumping between a million tools. Makes life easier,
What do you dislike about the product?
Tbh the setup can be a pain, especially if you’re new to it. There's kinda a learning curve, and some stuff feels more complicated than it needs to be
What problems is the product solving and how is that benefiting you?
With Palo Alto, we’ve implemented application-aware policies to control traffic more precisely, especially between sensitive services. It’s helped us enforce zero-trust principles by segmenting traffic based on user identity and device context
Reliable and feature-rich firewall solution for enterprise security needs.
What do you like best about the product?
One thing I really like is how intuitive the user interface is. The dashboard makes it easy to monitor traffic and set up policies without needing to dig through complex menus. The threat prevention and application control features are also top-notch, especially the App-ID feature that gives more granular control over traffic. The performance has been rock solid even during peak loads. Their integration with cloud-based threat intelligence helps a lot with zero-day attacks and emerging threats.
What do you dislike about the product?
The main downside is the learning curve in the beginning. If you’re new to Palo Alto, the terminology and rule management style are a bit different compared to other firewalls like Cisco or Fortinet. Also, licensing costs can add up quickly if you want all the advanced features like WildFire or Threat Prevention. Another small gripe is that some firmware upgrades have caused brief outages, so you need to plan maintenance windows carefully.
What problems is the product solving and how is that benefiting you?
Multiple security challenges - access, traffic monitoring, preventing malicious activity/programs. Also the provision of details when it comes to the specific user and apps and access records makes it easier to manage
Rock-solid perimeter security with unmatched application visibility
What do you like best about the product?
Palo Alto’s App-ID and Threat Prevention engines give us granular control over traffic we never had with our previous stateful firewall. We can write policies around business apps instead of IP/port combos, then verify exactly what was allowed/blocked in the detailed logs. WildFire zero-day analysis has already caught two pieces of unknown malware in the last quarter, and the cloud signatures hit our gateways within minutes. Centralized management in Panorama is another highlight one commit pushes our rules to three sites, so audit time dropped from hours to minutes.
What do you dislike about the product?
Licensing is pricey and can be confusing (Threat Prevention, WildFire, DNS Security, etc.). The web UI occasionally lags when committing large rule-set changes, and the learning curve for first-time admins is steep expect to spend time in the docs or take the EDU-210 course. Support is generally solid, but faster response requires the higher-tier contract.
What problems is the product solving and how is that benefiting you?
Before we moved to Palo Alto, we juggled a traditional port-based firewall, a separate IPS, and far too many manual rules. That setup left gaps: users could tunnel apps over random ports, malware sometimes slipped past signature updates, and every audit felt like a scavenger hunt through spreadsheets.
The PA NGFWs solved three big headaches at once:
1. App-based policy instead of IP/port juggling. With App-ID we now write 15 clean rules around business apps rather than dozens of port rules. Audits take minutes, not hours.
2. Built-in threat and zero-day protection. WildFire and DNS Security catch phishing callbacks and unknown executables before they land on endpoints. Since go-live we’ve seen a \~70 % drop in malware tickets and zero ransomware scares.
3. Unified visibility and management. Panorama pushes configs to HQ and branches in one commit, and the detailed logs make troubleshooting a two-minute task instead of a war-room event.
Bottom line: fewer security incidents, cleaner audits, and a lot more time for the team to focus on strategic projects instead of constant rule-tweaking.
The PA NGFWs solved three big headaches at once:
1. App-based policy instead of IP/port juggling. With App-ID we now write 15 clean rules around business apps rather than dozens of port rules. Audits take minutes, not hours.
2. Built-in threat and zero-day protection. WildFire and DNS Security catch phishing callbacks and unknown executables before they land on endpoints. Since go-live we’ve seen a \~70 % drop in malware tickets and zero ransomware scares.
3. Unified visibility and management. Panorama pushes configs to HQ and branches in one commit, and the detailed logs make troubleshooting a two-minute task instead of a war-room event.
Bottom line: fewer security incidents, cleaner audits, and a lot more time for the team to focus on strategic projects instead of constant rule-tweaking.
A Comprehensive and Reliable NGFW Solution We Trust
What do you like best about the product?
What I appreciate most about Palo Alto Networks Next-Generation Firewalls is their robust and granular control over network traffic. The ability to identify applications, users, and content (App-ID, User-ID, Content-ID) is unparalleled, allowing us to create highly specific security policies that go far beyond simple port and protocol blocking. The threat prevention capabilities, including WildFire for zero-day threat analysis, are top-notch and have significantly improved our security posture. I also find the centralized management interface (PAN-OS itself, and Panorama for larger deployments) relatively intuitive for such a powerful device, making administration and monitoring efficient. The visibility it provides into network activity is crucial for troubleshooting and incident response.
What do you dislike about the product?
The primary downside, for us and many others, is the cost. Palo Alto Networks firewalls are a premium product, and the initial investment plus ongoing subscription and support costs can be substantial, especially for smaller organizations. While powerful, the sheer number of features and configuration options can also present a steep learning curve for new administrators who aren't familiar with the PAN-OS ecosystem. We've also found that some advanced feature licensing can be a bit complex to navigate, and sometimes troubleshooting very specific or niche issues can require deep dives into documentation or support tickets, which, while generally helpful, can take time.
What problems is the product solving and how is that benefiting you?
Palo Alto Networks NGFWs are solving several critical security challenges for our organization. Firstly, they provide robust protection against a wide array of cyber threats, from common malware to sophisticated zero-day attacks, thanks to features like Threat Prevention subscriptions and WildFire. This significantly reduces our risk of breaches and data loss. Secondly, the App-ID feature gives us unparalleled visibility and control over the applications running on our network, allowing us to block unsanctioned or risky apps and enforce granular policies. This has helped us curb shadow IT and improve overall network performance. Thirdly, User-ID integration allows us to tie security policies to actual users and groups rather than just IP addresses, which is essential in our dynamic environment. This has simplified policy management and improved our security posture by ensuring appropriate access levels. The overall benefit is a much stronger, more intelligent security framework that adapts to evolving threats and business needs.
Palo alto Networks NGFW is the best firewall in performance.
What do you like best about the product?
What I love about PAN NGFW, it is resilent in performance and It enhances performance by processing traffic efficiently. Also It detect and blocks zero-day threat in real-time without affecting the firewall performance.
What do you dislike about the product?
Our customers complain about, It's very expensive and some of our customers mention that support is inconsistent, even for premium plans. Desipite those there is nothing to complain about.
What problems is the product solving and how is that benefiting you?
PAN NGFW is solving our customers in giving advanced security features like AI-driven threat prevention, deep visibility into encrypted traffic and automated security updates without affecting the performance of the firewall it self and the normal traffic flow.
Palo Alto Networks!
What do you like best about the product?
Palo Alto Networks Next-Generation Firewalls stand out for their deep visibility and granular control over network traffic, allowing precise policy enforcement. Their integration of threat intelligence with real-time updates through WildFire enhances zero-day protection. The unified management interface simplifies administration across distributed environments. Additionally, their strong application awareness and user identification features make them especially effective for securing modern, hybrid networks.
What do you dislike about the product?
One downside is the steep learning curve, especially for teams new to Palo Alto’s ecosystem. Licensing and subscriptions can also be complex and expensive, which may be a barrier for smaller organizations. Additionally, software updates occasionally introduce bugs that require careful testing before deployment.
What problems is the product solving and how is that benefiting you?
Palo Alto Networks NGFWs are solving problems related to advanced threat detection, application visibility, and secure access control. By identifying and blocking malware, ransomware, and unauthorized applications in real time, they significantly reduce our exposure to cyber risks. The ability to create granular policies based on users and apps, not just IPs and ports, enhances both security and operational efficiency. This has helped us streamline compliance efforts and reduce incident response times.
It's really good at protecting my data.
What do you like best about the product?
The thing I liked the most is the pricing and policies that is based on the user activities. So, it means your are actually protecting our data. Which is also a drawback sometimes because we don't need all the security every time but should be enabled.
What do you dislike about the product?
I didn't face any issues but, your high end security level. that is enabling everything even if we don't use it all the time leads to slowing system and delays tasks, especially for low end systems.
What problems is the product solving and how is that benefiting you?
Palo Alto Networks Next-Generation Firewalls are solving a lot of problems related to visibility and control over our network traffic. Before using them we had a tough time identifying what applications were being used and blocking unwanted traffic. With the App-ID feature we can now see and control apps no matter what port or protocol they're using. This has helped us reduce shadow IT and apply more accurate security policies. Another big issue was dealing with threats and malware, the integration with WildFire really helps by detecting and stopping threats in real time before they spread across the network. We also benefit from the User-ID feature which ties traffic to specific users not just IP addresses making auditing and policy enforcement a lot more precise. Overall it has made our network more secure and easier to manage even if the setup was a bit tricky in the beginning.
showing 1 - 10