The most effective features for threat prevention are application-based prevention and WildFire. These features cover various threats, such as ransomware, malware, etc. They provide real-time visibility. By applying appropriate policies, threats can be blocked.
External reviews
External reviews are not included in the AWS star rating for the product.
The firewall which has multiple engines to filter traffic.
seems to be overly complex and expensive but mostly capable with proper staff
lots of docs and other resources online
features no one uses
overly complex
needs a staff of competant people to run it
The best next-gen firewall available in the market
Palo Alto Networks Cloud NGFW
One of the best, next-generation firewalls
Infrastructure Engineer with more than 3 years of experience
Protects from ransomware and malware but needs improvement in visibility
What is most valuable?
What needs improvement?
The solution needs to improve its visibility. It's not straightforward to use. Understanding the policies, authorizations, and initializing features requires careful review. The product needs to offer proper training.
For how long have I used the solution?
I have been working with the product for three to four months.
What do I think about the stability of the solution?
I rate Palo Alto Networks VM-Series' stability as ten out of ten.
How are customer service and support?
The main issue with the tool's support is the delayed response time, ranging from one to two hours. This delay can impact customers who are waiting for support. Additionally, partners may become busy.
How would you rate customer service and support?
Positive
What other advice do I have?
The tool's improvement in cloud security posture depends on the features used and the licenses purchased. Different suites are available, such as Professional, Core, and Enterprise, each offering various features for endpoint.
Competitors such as Fortinet and Check Point also offer similar features, but I don't know much about their offerings. However, Palo Alto Network VM-Series stands out with its application deployment capability, iOS zone protection, and features like application ID, user ID, and device ID identification. These features enable policy application and on-premises protection, which may not be available in competing solutions.
I rate the overall product a nine out of ten.
Palo Alto Network Cloud - Securing Your Digital Transformation
Effective for threat prevention in our networks,
What is our primary use case?
I've mainly worked with the VM-Series, and a few features have been really effective for threat prevention in our networks, like McAfee training, Accountant ID, and apps ID. These features integrate well with our existing environments and tools, such as Panorama.
What is most valuable?
The VM-Series scalability is fast and easy to implement, improving our security posture as our Azure network grows. The only minor issue we've faced is with the apps ID configuration, which requires specific matching for application filtering. Tools like Loopback help us identify open or denied flows between two firewalls and manage the servers effectively. The Palo Alto system easily identifies rules and objects within roles, making maintenance straightforward.
What needs improvement?
No other major concerns, just the specific issue with Apps ID configuration. Otherwise, overall stability, VPN, IPSec, VRF, and flow management with the VM-Series have been very stable and reliable.
For how long have I used the solution?
I have been using Palo Alto Networks VM-Series for 2 years.
How are customer service and support?
I've had a positive experience with Palo Alto's support. They usually respond within a few hours, which is satisfactory
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
In my experience, Palo Alto and Fortinet offer similar quality and high-level security compared to other vendors like Cisco and Forcepoint. They stand out in terms of reliability and security features. Other vendors may not match their level of performance and security.
How was the initial setup?
It is easy to maintain because we have various tools to manage and monitor the system.
What's my experience with pricing, setup cost, and licensing?
The pricing for Palo Alto is quite high compared to FortiGate, which is more affordable. I don't have the exact figures as my manager handles that, but from my research, Palo Alto's licensing costs are significantly higher.
What other advice do I have?
I would rate Palo Alto Networks VM-Series as an eight overall. My recommendation for others considering this tool would be to ensure they have the budget for it, as it can be expensive compared to alternatives like FortiGate. Also, they should be prepared to understand and document their application metrics thoroughly to implement the firewall correctly.
Offers good UI and is user-friendly
What is our primary use case?
I use the solution in my company to block threats, detect vulnerabilities, and protect the organization's internal network.
What is most valuable?
The most valuable feature of the solution stems from the fact that its UI is good since it offers options. In terms of being compliant with the firewall security standards, the product falls in the first or second place. The product can also be considered as NGFW. In general, the product is user-friendly.
What needs improvement?
The reporting part of the product is an area of concern where improvements are required. Compared to Palo Alto Networks VM-Series's reports, FortiGate NGFW provides users with reports that are easy to understand.
For how long have I used the solution?
I have been using Palo Alto Networks VM-Series for three to four years.
What do I think about the stability of the solution?
The product's stability is good. Considering the cloud availability, I can say that the product is 99.99 percent stable. The firewall functions properly on the cloud, and there has been no downtime in the last couple of years. Unless the cloud services from Microsoft Azure go down, the firewall works properly.
What do I think about the scalability of the solution?
My company has 1,000 users of the product, but not all of them are connected to the product all the time since my company has three different fire products running in the cloud. I would say there are around 600 Palo Alto Networks VM-Series users.
How are customer service and support?
The technical support for the solution is very good.
How was the initial setup?
The product's deployment phase is not complex. The tool is easy to deploy.
The solution is deployed on the cloud.
What's my experience with pricing, setup cost, and licensing?
There is a need to make payments toward a yearly subscription-based model in which you need to add modules that you want to use in your company.
What other advice do I have?
I can't elaborate on how the product was deployed in our company's existing infrastructure since the product was not deployed by our company, as the vendor handled it. The product can be deployed on the cloud platform you want to use. If you are using Azure's cloud services, then we select VM-Series, take care of the configurations, and upload the required details to get the product.
In terms of the product's ability to improve our company's network security posture, I see that the tool keeps our systems protected since all the network traffic is routed through the tool. The tool provides protection against any malicious traffic that attempts to get into the company network as such networks get blocked and quarantined by the firewall. Been blocked on the firewall network. Malicious components in the network don't enter our company's internal network, so the users are protecting the systems attached to the internal traffic.
My company has not integrated the product with any third-party software.
Speaking about the benefits of dynamic scalability, I would say that my company has not used the product's scalability features. I don't think there is anything wrong with the tool's scalability functionalities.
The tool is good for enterprise-level organizations because it has many options for users in its office. The product also comes with a lot of add-ons. If you can leverage the benefits of everything the product offers, then it can be useful. It is easy if you want to integrate the tool or connect it with other applications or third-party software, and you can do cloud monitoring and SIEM. The tool also works with XDR products. In general, the tool has its pros and is good software.
I have not encountered any issues with policy management in the product.
The product helps find vulnerabilities in the system, especially opened ports and unwanted ports that are open. If there are any issues, you can explore your system further with Nmap and with the help of a given IP address.
I rate the tool an eight out of ten.