VM-Series Next-Generation Firewall Bundle 1 [VM-300]
Palo Alto Networks | PAN-OS 8.1.25-h1Linux/Unix, Other PAN-OS 8.1.25-h1 - 64-bit Amazon Machine Image (AMI)
External reviews
External reviews are not included in the AWS star rating for the product.
very secure and robust, but also easy to use.
What do you like best about the product?
The UI makes it very easy to what you want to do with the configurations, easy to toggle and understand. The amount of different security features are way more than the competition.
What do you dislike about the product?
At times, the configartions can ask to many parameter's. So for a non technical person, it can get difficult to understand.
What problems is the product solving and how is that benefiting you?
security policies in the palo alto firewalls help me to block all the applications that are not neccessory to the company or that department.
- Leave a Comment |
- Mark review as helpful
Network administrator
What do you like best about the product?
Paloalto have alot of security features that help me to manage and organize my network
What do you dislike about the product?
Some time its block traffic and hard to monitor or teace the root cose and why its drop or blocked
What problems is the product solving and how is that benefiting you?
Manage the traffic in more detail
short application that was simple to fill out
What do you like best about the product?
I love the GUI compared to other firewalls
What do you dislike about the product?
Not a fan of the user side of things. Just is not as reliable as others
What problems is the product solving and how is that benefiting you?
It helps protect our business
A pretty efficient with Panorama.
What do you like best about the product?
Pretty impressed by by the Panorama feature. Its easy to navigate around and monitor using its reporting functionalities. The App-ID works pretty well in tamdem with other features.
What do you dislike about the product?
Browsing through documentation is not hard but an LLM designed to answer specific questions can help.
What problems is the product solving and how is that benefiting you?
Centralized control is something that eases administration of multiple firewalls, basically acting as a single point of management. App ID also offers a good control over network traffic. The best thing it does is sort by priority level of applications.
good training and support for NGFW
What do you like best about the product?
Easy to use interface, comprehensive documentation & support teams. Best practice assessment makes implementation quick.
What do you dislike about the product?
If you have too many vsys on a single firewall the config size can get too big and cause the slow down of the user interface.
What problems is the product solving and how is that benefiting you?
Intrusion prevention & secure access service edge
Best firewall brand I've used so far
What do you like best about the product?
I've used Sonicwall, Fortigate and Palo Alto. Palo by far has the best interface. Things are in locations that make sense. Also the documentation is great. Specifically the monitoring logs of all type of by FAR the best of any brand I've used.
What do you dislike about the product?
SD-Wan solution is a bit lacking. It works for basics, but that's it
What problems is the product solving and how is that benefiting you?
Securely moving and inspecting traffic. Ability to distribute traffic based on AD users and groups.
Robust well dependable solution
What do you like best about the product?
As a salesperson who had sales enablement for several vendors, I find the Palo Alto frame more reliable for big enterprises, The features and the technology that comes with the firewall are truly outstanding ( Global protect)
What do you dislike about the product?
Maybe the only downside would be the prices of the solution and not having a "lite"version like other vendors
What problems is the product solving and how is that benefiting you?
As new busniess expand and the rely on IT services shines all business reuqer a protection of their high valuable assets ( data)
Reliable Security with Advanced Features
What do you like best about the product?
1. Advanced Threat Prevention
2. User Friendly UI
3. High performance capabilities even under heavy workloads
2. User Friendly UI
3. High performance capabilities even under heavy workloads
What do you dislike about the product?
1. Cost is one of the issues, since it has high upfront costs compared tp other firewalls.
2. When I was a beginner, it was a very steep learning curve as I never had experience working on it.
2. When I was a beginner, it was a very steep learning curve as I never had experience working on it.
What problems is the product solving and how is that benefiting you?
The problem that we had was dealing with zero day attacks and APT's, and PA NGFW really helped us to reduce risk of breaches and minimize the downtome through its proactive threat prevention.
Using Palo Alto NGFW
What do you like best about the product?
Palo Alto Networks’ NGFWs are a powerful security solution for enterprises that need robust protection and granular control over their network traffic. They excel in security features, scalability, and integration with broader security ecosystems. While the upfront cost and complexity of setup may be a challenge for smaller businesses, larger organizations will find the performance, security, and visibility offered by these firewalls invaluable in defending against advanced cyber threats.
What do you dislike about the product?
All things is fine with Palo tools but need to update the admin interface to be more likley
What problems is the product solving and how is that benefiting you?
Solving many issue related the cyber security , and enhance our security in our org
Managing the Attack Surface
What do you like best about the product?
Best thing about Palo Alto Networks Next-Generation Firewalls is Transparency and AppID.
Often times you'll find other vendors referencing max throughput which is measured in really strict conditions and/or without utilizing full security features on firewall. This is often times really missleading. When you look at PANW firewall throughput, it's measured while having all the beneficial services running.
AppID is really mind blowing part of the Firewall. From Reducing the attack surface by approving exactly what is the bare minimum of necessary apps. (Firewall it self offloads this for you, using the Policy Optimizer) all the way to knowing the impact of using such appliactions.
Generaly, features by themselves are something that you expect from firewall to have, however the approach that was taken, Reducing the Attack surface, is really what makes the ZTNA possible. All the way from segmentation, continuously inspecting the traffic, only from specific users/groups, and only allowed applications is a unbeatable combination.
Often times you'll find other vendors referencing max throughput which is measured in really strict conditions and/or without utilizing full security features on firewall. This is often times really missleading. When you look at PANW firewall throughput, it's measured while having all the beneficial services running.
AppID is really mind blowing part of the Firewall. From Reducing the attack surface by approving exactly what is the bare minimum of necessary apps. (Firewall it self offloads this for you, using the Policy Optimizer) all the way to knowing the impact of using such appliactions.
Generaly, features by themselves are something that you expect from firewall to have, however the approach that was taken, Reducing the Attack surface, is really what makes the ZTNA possible. All the way from segmentation, continuously inspecting the traffic, only from specific users/groups, and only allowed applications is a unbeatable combination.
What do you dislike about the product?
I only dislike commit time, when you want to make a fast change and see result quickly, you must pass through commit that takes around 45 sec to complete.
What problems is the product solving and how is that benefiting you?
PANW Firewall is providing a complete platform for enabling ZTNA.
From creating a security zones (aka Segments), and only allowing traffic within explicitly defined zones,
Implementing user identification (either transparent or explicit) which has endless posibilities.
Using Security Profiles to inspect allowed traffic.
Using Decryption that is not intrusive by default. (Firewall bypasses decryption on certain errors, so users are not escalating to support)
From creating a security zones (aka Segments), and only allowing traffic within explicitly defined zones,
Implementing user identification (either transparent or explicit) which has endless posibilities.
Using Security Profiles to inspect allowed traffic.
Using Decryption that is not intrusive by default. (Firewall bypasses decryption on certain errors, so users are not escalating to support)
showing 1 - 10