Our corporate clients use the product to secure cloud environments.
External reviews
External reviews are not included in the AWS star rating for the product.
Stable product with a valuable feature for environment visibility
What is our primary use case?
What is most valuable?
Palo Alto Networks VM-Series's most valuable feature is the visibility of the environment.
What needs improvement?
The product's AIOps process needs improvement.
For how long have I used the solution?
We have been using Palo Alto Networks VM-Series for two years.
What do I think about the stability of the solution?
I rate the product's stability a ten out of ten.
What do I think about the scalability of the solution?
We have 5000 Palo Alto Networks VM-Series users as our clients. I rate its scalability a ten out of ten.
How was the initial setup?
I rate the initial setup process a nine. It takes a few hours to complete.
What's my experience with pricing, setup cost, and licensing?
I rate Palo Alto Networks VM-Series pricing an eight out of ten.
What other advice do I have?
I rate Palo Alto Networks VM-Series a nine out of ten.
Which deployment model are you using for this solution?
A tool with a great support team that is useful for testing purposes of VMs
What is our primary use case?
I use Palo Alto Networks VM-Series for testing purposes of VMs.
What is most valuable?
The main advantage of Palo Alto Networks VM-Series stems from the fact that you can access it with the help of cloud services.
What needs improvement?
With Palo Alto Networks VM-Series, it is hard for me to manage its network configuration part. Regarding Palo Alto Networks VM-Series, I am figuring out whether to use interzone or intrazone networks for the VMs in our company's environment, which is very confusing. The aforementioned aspects of the solution can be considered for improvement.
In the future, whenever I try to onboard Palo Alto Networks VM-Series, it should allow for easy configuration, especially in terms of network connectivity. I want an easier setup and configuration in the product's future releases.
For how long have I used the solution?
I have been using Palo Alto Networks VM-Series for around a year. My company has a partnership with Palo Alto Networks.
How are customer service and support?
The technical support of Palo Alto Networks does reply to the cases or issues I file with the support team. The support is equally good for all the products that fall under Palo Alto Networks. I rate the technical support a nine out of ten.
How would you rate customer service and support?
Positive
How was the initial setup?
I rate the implementation process a six or seven on a scale of one to ten, where one is difficult and ten is easy.
During the implementation process of the product, I faced some issues related to the networking part and connectivity of VMs. I faced issues with how an end user could connect the VMs to a firewall or connect a firewall to VMs, but the same process was easy for me on a physical device firewall.
What other advice do I have?
I am more comfortable with the physical device firewall. I am actually trying to figure out things since I am not very familiar with the VM side of Palo Alto.
I would recommend Palo Alto Networks VM-Series since it is a cheaper product compared to the other tools available in the market. Apart from Palo Alto Networks VM-Series, I usually recommend Palo Alto Networks Cortex XSOAR and Palo Alto Networks Prisma Cloud.
I rate the overall product an eight out of ten.
An easy-to-maintain product that provides security and can be smoothly installed within a couple of hours
What is our primary use case?
We use Palo Alto Networks VM-Series for our company's customers, especially those who use Azure Firewall to secure their environment but still want a third-party firewall from companies like Fortinet FortiGate and Palo Alto in their environment. Whenever our company's customers want to opt for a third-party firewall, we suggest firewall products from companies like Fortinet FortiGate and Palo Alto. There have been cases where our company's customer who already uses firewall products from Fortinet FortiGate and Palo Alto deployed on an on-premises model want to shift the same product to the cloud, going on the good experience they have had with the products. If our company's customers are not interested in purchasing a third-party firewall, my company suggests the cloud-native firewall provided by Azure, specifically for their landing zone environment.
What is most valuable?
Regarding Palo Alto, my company normally does a high availability configuration for our customers, which are active-active and active-passive. There are multiple add-on packages a customer can choose from in Palo Alto, including antivirus, web filtering, IDS, and IPS solutions.
What needs improvement?
Considering Azure, some customers may purchase Palo Alto Networks VM-300. Considering the pricing perspective, customers want multiple NIC types because they might have different spokes, and they may like to extend it with different interfaces on different spokes. Considering VM-Series on Azure Virtual Machines, since there is a limitation when it comes to Azure VM-300 as it supports only four cores, there may be some modifications made to support more cores.
For how long have I used the solution?
I have been using Palo Alto Networks VM-Series for three to four years. My company functions as a managed service provider and an integrator for Palo Alto Networks.
What do I think about the stability of the solution?
Palo Alto Networks VM-Series can be made more stable. I have seen some bugs in the solution. After deployment with an API call, you can use an HA solution in two scenarios, namely, as a load balancer and for API calls. I see that in the Palo Alto Networks VM-Series, there are some delays when it comes to an API call configuration.
What do I think about the scalability of the solution?
It is a scalable tool. Considering the licensing part of the solution, it may not seem scalable, especially when you want to move from Palo Alto Networks VM-300 to Palo Alto Networks VM-500 since, for such a procedure, the virtual machines will have to be brought down and registered again with a different license, which is challenging.
My company's customers who use the solution are mostly enterprise-sized businesses.
How are customer service and support?
The solution's technical support has been good. I rate the technical support a seven and a half to eight out of ten.
There are some delays that I have observed when my company communicates with Palo Alto's support engineers. There are also some problems related to the understanding of our company's issues with the product by Palo Alto's support team.
How would you rate customer service and support?
Positive
How was the initial setup?
Users are provided with templates to go ahead with the deployment phase of Azure. There are already prepared templates available for installation, which users can use during installation.
Suppose our company's discussions with the customers are completed, and the design has been frozen. Considering the aforementioned case, the Palo Alto Networks VM-Series installation phase can be completed in a couple of hours, while the only time-consuming task is the creation of policies.
What other advice do I have?
Palo Alto Networks VM-Series is easy to maintain.
From a security point of view, I find Palo Alto Networks VM-Series to be a better product compared to the other solutions in the market.
I rate the overall product a ten out of ten.
An enterprise solution that needs to improve order process
What is most valuable?
The tool's cloud version makes application migration easy.
What needs improvement?
Palo Alto Networks VM-Series needs to improve its order process.
For how long have I used the solution?
I have been working with the solution for two years.
What do I think about the stability of the solution?
I rate the solution's stability a nine out of ten.
What do I think about the scalability of the solution?
I rate the product's scalability a nine out of ten.
How was the initial setup?
Palo Alto Networks VM-Series' deployment is not difficult.
What's my experience with pricing, setup cost, and licensing?
The solution is expensive. I rate its pricing a three out of ten.
What other advice do I have?
Palo Alto Networks VM-Series is an enterprise product because it is costly. I rate it an eight out of ten.
Stable product with effective security features
What is our primary use case?
We use Palo Alto Networks VM-Series primarily for security purposes. It helps us with URL filtering, domain blocking, threat analysis, and detecting vulnerabilities.
How has it helped my organization?
We can monitor the traffic manually and detect threats. Additionally, we can block different IP addresses and URLs.
What needs improvement?
There could be dynamic DNS features similar to Fortinet in the product.
For how long have I used the solution?
We have been using Palo Alto Networks VM-Series for six years.
What do I think about the stability of the solution?
I rate the product's stability a nine out of ten.
What do I think about the scalability of the solution?
I rate the product's stability a seven out of ten. It could be better. We have four users for it at the moment. We plan to increase the number of devices.
How are customer service and support?
We receive technical support from a local partner rather than directly from the vendor. The support team requires more training.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have used Cisco Adaptive Security Appliance (ASA) before. Compared to Palo Alto, Cisco devices are not feasible regarding hardware. They are very slow and complicated to find the granular level of results. Sometimes, even a technical expert is unable to fetch a proper report.
How was the initial setup?
I rate the initial setup process an eight out of ten. It takes eight hours to complete and requires one security engineer to execute the process. The deployment involves setting up security policies. The on-premise installation is simple. However, VM installation is complicated in terms of the network interface.
What's my experience with pricing, setup cost, and licensing?
It is an expensive product. I rate the pricing an eight out of ten. We purchased a three-year license for it.
What other advice do I have?
I rate Palo Alto Networks VM-Series an eight out of ten.
Which deployment model are you using for this solution?
Stable product with an easy installation process
What is our primary use case?
We use the product to mitigate vulnerabilities for the applications running on particular VMs.
What is most valuable?
The product's most valuable feature is pricing.
What needs improvement?
Compared to Azure Firewall, the product could be better in terms of performance.
For how long have I used the solution?
We have been using Palo Alto Networks VM-Series for three years.
What do I think about the stability of the solution?
The product is stable.
What do I think about the scalability of the solution?
It is an easy-to-scale product and suitable for enterprises.
How are customer service and support?
Palo Alto's support is good. Whenever I raise a ticket, they immediately look into it and make a Zoom call.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have used Cisco's Next-Generation Firewall before. It works better than Palo Alto.
How was the initial setup?
Palo Alto's installation process is easy because we use Panorama tool to manage it. We can communicate and implement traffic policies, filtering, and other specific options with its help.
It requires two to three engineers and takes two days to complete the deployment. For maintenance, it requires a team of two engineers.
What other advice do I have?
It's good to work with Palo Alto Networks VM-Series. I recommend it to others and rate it an eight out of ten.
Users have full ownership of their device and offers centralized management
What is our primary use case?
The main concern is VPN. If you're using Azure Firewall, you still need a VPN gateway to terminate your VPN connection. Azure Firewall doesn't remove the need for another VPN gateway, especially for point-to-site VPN. So you have to use another VPN appliance. With Palo Alto and FortiGate, for example, you can have an all-in-one solution. The VPN gateway and all the other features are available.
What is most valuable?
Palo Alto Networks VM-Series has everything centralized. You have the VPN solution, firewall, routing, UDR, flexibility, updates, and full visibility of your traffic. You can also perform log debugging. It provides all the things that Azure's firewall doesn't offer. Plus, you have full ownership of your device.
What needs improvement?
Firstly, Palo Alto should update their documentation to make it more readable and provide easier-to-follow instructions through videos. This would help people learn and deploy the product more easily. Even if the product itself is excellent, lacking proper documentation and troubleshooting guidance renders it less useful. It won't be helpful even if it's rock solid but lacks sufficient information and tutorials.
For how long have I used the solution?
I've been using Palo Alto as a VM for about three months. I use the latest version.
What do I think about the stability of the solution?
It is a stable solution. I would rate the stability a ten out of ten.
What do I think about the scalability of the solution?
It is a scalable solution. We have more than 20 entities using this solution.
How are customer service and support?
Customer service and support are great. The response time is good. My experience with them was very good.
Which solution did I use previously and why did I switch?
I used Azure Firewall for a while, but then I removed it and installed Palo Alto.
How was the initial setup?
The setup requires professional people to work on it. It's not straightforward. Knowledge is needed to adapt it to your platform.
So, it's not an entry-level solution; it requires professional and expert-level skills.
What about the implementation team?
I deployed the solution myself. The deployment process took about three to four days. It depends on your production environment because I had to migrate production.
Only one person is required for deployment and maintenance.
What other advice do I have?
I can't make a suggestion because it depends on the specific needs they have. They can consider using the entry-level version or opt for the expert lab, depending on their workload.
Overall, I would rate the solution a nine out of ten.
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Many features are optimized for troubleshooting real-time scenarios, saving a lot of time
What is our primary use case?
Ours is an enterprise environment and some of the services are hosted in our private data centers and some of the servers are hosted on Azure. We have the IPSec tunnels from the firewalls to our own data centers and from the firewall to the cloud as well. It depends on the type of application being hosted.
We are using Panorama for centralized management of all our firewalls around the world, as well as for centralized management of security policies and network settings. We have not completely migrated to the cloud. We are in transit.
How has it helped my organization?
Palo Alto has many features for troubleshooting real-time scenarios. The troubleshooting, compared to other firewalls has been optimized in a way that saves a lot of time.
What is most valuable?
I like the UI. Most things are accessible from the user interface and it is quite user-friendly. With respect to both VM-based firewalls and physical firewalls, it's easy to create updates.
They have a centralized Palo Alto Customer Support Portal and if we require any licenses, such as a next-generation firewall license, we can easily download and integrate them with this solution. We can also schedule periodic updates. That is quite user-friendly.
In terms of functionality, we are using IPSec tunneling and Palo Alto's WildFire feature. We use the security policies, Panorama, and Prisma Cloud as well.
We use Panorama to manage our security policy model across on-prem and public cloud environments. It plays a key role with respect to centralized management, for physical enterprise firewalls and cloud-based firewalls. It gives you centralized control over all the infrastructure. Unified policies can be pushed from that centralized place with templates.
When you deploy VM-Series Firewalls, they are quite flexible. You just have to select the instances, storage, security policies, and firewall rules. Within minutes, you can deploy the firewalls.
We are also able to adjust firewall sizing on the fly, which is important. Initially, we decided on a firewall based on the throughput assumptions. But in peak hours or during a peak month for traffic, we need to scale the firewalls. That should be automatically done. AWS and Azure provide very good features and, by using them, within a second it automatically scales, based on the incoming traffic.
What needs improvement?
Palo Alto has launched different products, such as physical firewalls as well as cloud and VM-based firewalls. Recently, they introduced their Prisma Cloud solution. Compared to the previous technologies, like Panorama, which is used for centralized firewall management, or even individual firewalls, it's a bit challenging to integrate the traditional firewall policies into Prisma Cloud. And the Prisma Cloud interface isn't very user-friendly.
For how long have I used the solution?
Our organization has been using Palo Alto Networks VM-Series for more than five years, and I have worked on this solution for two years.
What do I think about the stability of the solution?
The solution is certainly stable. I have worked with many vendors' firewalls and Palo Alto's are definitely stable.
What do I think about the scalability of the solution?
Obviously, it is scalable as long as you have the licenses and support with Palo Alto. You can implement the firewalls in high-availability mode or use the cloud functionality as well. For scalability, Palo Alto is optimized.
We have 30-plus sites around the world with more than 4,000 users.
How are customer service and support?
Palo Alto has very good support. When you have a valid license, they can replace a device with a new one. They have the CSP portal and you can log in and see all the firewalls listed. You can raise TAC cases with a priority of low, medium, or high, and, based on the priority, they will send an email to you. They have live support as well. In case of an issue, you can call them directly and they will provide the required support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Earlier, we were using many vendors' firewalls, per their suitability for our clients. Apart from Palo Alto, we were using Cisco ASA, Check Point, and Juniper. The network grew over the years and each site had its own set of firewalls. The issue was that we had to standardize things across the network. There was also a gradual change in the technology and features available. Our security team thought we needed a better implementation, for optimization and troubleshooting, and something that was friendly for daily operations.
How was the initial setup?
We have both private cloud and hybrid. Some of the services are on the cloud and some are on-prem in our data center. Setting up Palo Alto firewalls is quite easy compared to other vendors.
Migrating our old infrastructure to Palo Alto took four to six months.
We did some pilot project testing with Palo Alto. If, for example, we want to migrate from XYZ vendor to Palo Alto, the very first thing we had to do was capture all the existing security and NAC policies and all the NGFW functionality. Palo Alto has specific features. For example, you can capture the logs in an inline environment, such as what traffic is going to the network, what security policies are there, et cetera. We deployed the Palo Alto firewalls in that way to only capture the traffic. We then analyzed the traffic, and we worked with Palo Alto TAC to understand the security policies and the exact throughput to determine the hardware we were going to use. We monitored all of that for a few months and then we started the migration from other vendors to Palo Alto.
We had 10 engineers involved in the deployment, but each on-site location had its own team as well. Three were senior network architects and the other seven were staff network engineers.
If you want to keep up to date in the network, it requires quite a bit of patching. It has many features, like Unified Threat Management and antivirus that can be auto-updated by scheduling an update for them. But the major patching has to be done manually. In our organization, we do it quarterly.
What was our ROI?
It is worth the cost.
What's my experience with pricing, setup cost, and licensing?
Palo Alto Networks VM-Series is notably cheaper than other firewall vendors, except Fortigate. Fortigate is number one in terms of pricing.
Which other solutions did I evaluate?
Our security team tested various firewalls and it came down to FortiGate and Palo Alto and they found Palo Alto was quite suitable for the network.
What other advice do I have?
Everything is moving to the cloud and we need a solution that can support all the multi-vendor platforms and the new technologies as well. That is quite important for any enterprise organization or service provider nowadays. If we talk about moving existing loads from our own data centers or enterprise sites to the cloud, we need a solution that can take care of everything, such as security compliance, and that is easy to use. Palo Alto is good in those terms.
With the introduction of Prisma Cloud, Palo Alto is encouraging clients to migrate their infrastructure, such as VPN and security solutions to Prisma Cloud. It has been highly optimized compared to Panorama. Palo Alto is promoting it and asking their clients to use Prisma Cloud to improve their security infrastructure.
I would advise, when you deploy a new site, to manage it from the centralized Panorama solution. With Panorama, you have a local login, so even if the internet is down you have access to the firewall management.
We had a situation, when performing patching, where the firewall lost the remote connection via the internet and it had not been onboarded to Panorama. That mean we lost connectivity and we had to involve the onsite technicians. To avoid that scenario, all firewalls should be centrally managed by Panorama.
And for troubleshooting, each firewall should have syslog profiles activated.
Allows us to maintain consistent next-generation firewall protection across virtual, private, and public cloud infrastructures using a unified policy model
What is our primary use case?
We use the solution for network protection. Previously, I worked for a physical organization, but last year we moved to a Proof of Concept. Following the POC, we had to deploy the solution in three different geographical locations. We deployed all of the Palo Alto solutions in the hub environment and connected them to another node.
How has it helped my organization?
VM-Series allows us to maintain consistent next-generation firewall protection across virtual, private, and public cloud infrastructures using a unified policy model. We can use the provided templates to generate policies based on both global and local rules.
Panorama plays a vital role in allowing us to maintain a consistent security policy model across on-premises and various public cloud environments. Presently, we utilize Panorama exclusively in the cloud, spanning three different geographical locations: East Asia, Eastern U.S., and Western Europe.
Once we were able to configure Panorama's centralized management system we were able to have uninterrupted connections with no security issues.
Using Panorama helped us streamline our security policies in a cloud-based environment, saving us time. With Panorama, we no longer need to log in and manually adjust the template before transferring data, which increased our comfort level.
What is most valuable?
Palo Alto Networks VM-Series' security features are all good.
Centralized management is valuable because it allows us to configure settings in one location and apply them across all three locations.
What needs improvement?
The migration of workloads to the cloud is difficult because the cloud provider and Palo Alto Networks are different platforms. We had to research many articles online and after our research and development were completed we were able to deploy. The migration of data to the cloud can be more user-friendly and has room for improvement.
The utilization monitoring and GUI have room for improvement.
Sometimes we encounter licensing issues where our licenses are not activated, and as a result, we are required to redeploy. This problem could be related to VM-Series or the template image and how they are integrated with Azure Marketplace.
For how long have I used the solution?
I have been using the solution for one year.
What do I think about the stability of the solution?
The solution is stable.
How are customer service and support?
The technical support is good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Previously, we utilized Azure Firewall, but we found it to be less mature compared to Palo Alto, prompting us to switch to the latter.
How was the initial setup?
The initial setup is straightforward but the deployment portion is complex. We require 15 minutes for one VM deployment.
What other advice do I have?
I give the solution a nine out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Good performance, powerful CLI, and offers zero-day signature updates
What is our primary use case?
We use this product to secure our entire network, for ZTNA structure, and for VPN purposes, allowing access to our servers behind the firewall.
How has it helped my organization?
Using this product has increased our security and has given us much better results in terms of security scans.
Palo Alto embeds machine learning into the core of the firewall to provide online real-time attack prevention, and I would rate that capability an 8 out of 10. It's definitely effective in terms of securing our network against threats that are able to evolve and morph rapidly.
This solution provides a unified platform that natively integrates all of the security capabilities, although we are not using parts of it. For example, we don't use the configuration tools like Panorama.
What is most valuable?
The most valuable feature is the CLI.
We have the firewall configured for zero-day signatures, which is very important to us. We must be HIPAA and PCI compliant, which means that we need those signatures immediately.
There is no noticeable trade-off between security and network performance. In fact, so far, we've not seen any negative network performance with it. We're very impressed in that regard.
What needs improvement?
The web interface is still slow, even after recent improvements.
For how long have I used the solution?
I have been working with the Palo Alto Networks VM-Series for three years.
What do I think about the stability of the solution?
This product is very stable. We have had zero problems with stability.
What do I think about the scalability of the solution?
The scalability is fantastic. We're using the lowest-end product right now, and I don't foresee when we'll have to upgrade. We've got a long way where we can continue to scale up.
We currently have multiple people that use it for VPN purposes, to access our servers behind the firewall. It is not used nearly as extensively as it should be. However, next year, we're going to start flowing all of our internet traffic through it.
We're all working remotely, and we're going to be connecting through the firewall. This means that our traffic is going to greatly increase, meaning that our usage will also increase. We'll also be using many more of the features.
How are customer service and support?
The technical support from Palo Alto is good, overall. However, their response times could be a little quicker.
We have not really had any big complaints with the technical support and I would rate them a seven out of ten.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
Prior to using Palo Alto, we were using an on-premises solution by Juniper. When we switched from onsite to the cloud, we changed products.
We made the switch because Juniper became unbearable regarding complexity and performance. It was getting very bad; we couldn't manage it well, and the performance was quite poor.
How was the initial setup?
The initial setup is quite complex. There is a steep learning curve and we failed at it a couple of times.
Our final deployment took between three and four hours.
What about the implementation team?
Our in-house team was responsible for the deployment.
What was our ROI?
We have absolutely seen a return on our investment. We are definitely more secure. With the features that are in Palo Alto, we do not have to worry about people busting into our network. Even just out of the box, with the base features, it's really solid. The default configurations are very secure.
Our return on investment comes from the fact that we're not having to spend hours monitoring stuff the way we did before. We've saved man hours and we've saved stress. I can't put a monetary value to that, but that would be the return.
What's my experience with pricing, setup cost, and licensing?
This is not the cheapest firewall but it's not the most expensive of the options on the market.
There's a new licensing structure coming in that we're really trying to understand, so I would suggest studying up on it. I recommend getting a partner involved for purchasing the product.
Which other solutions did I evaluate?
Beyond Palo Alto, we evaluated two or three other products. Two of them that I can recall are Fortinet and the Microsoft Azure Firewall.
We did some extensive reviews and some extensive testing and what we found is that for the price, Palo Alto gave us the best options. It had the best set of security features. It wasn't the cheapest product but it was the best solution that fit our requirements.
What other advice do I have?
We have not yet implemented the DNS security features. However, we will likely be doing so next year.
If one of my colleagues at another company were to say that they were just looking for the cheapest and fastest firewall, I would suggest that they be careful. Palo Alto has a great balance. It's not super expensive compared to other options on the market, and it's quite quick when it comes to throughput and performance.
In summary, this is a good product but I do suggest that people shop around a little bit.
I would rate this solution an eight out of ten.