Palo Alto Networks is a global cybersecurity organization shaping the future of cloud-centric technology. The main business objective is to provide effective cybersecurity solutions, maintaining and valuing the digital way of life. It addresses the significant issue of maintaining digital security in an increasingly online-centric world. The company utilizes innovative approaches leveraging advancements in artificial intelligence, analytics, automation, and orchestration. Offering an integrated platform and bolstering a burgeoning ecosystem of collaborators, it assures protection across various platforms including clouds, networks, and mobile devices. The organization envisions a progressively safe and secure digital world each day.
Do You Manage Peer Insights at Palo Alto Networks?
Access Vendor Portal to update and manage your profile.
I like the following features most for Palo Alto Firewalls: Application ID - This feature works very well and helps create more secure firewall rules rather than relying solely on ports. Vulnerability/Antivirus/Antispyware/Wildfire capabilities - The various different vulnerability profiles can be combined into a security profile group and assigned to rules. This is simple to manage and assign and helps improve our security posture. URL Filtering - The Palo Alto firewalls provide great URL filtering capabilities and it helps limit what websites users can or cannot access. High Availability - The Palo Alto firewalls allow for active-passive HA. This is a great feature for reliability/redundancy and works very well when configured correctly.
The product works great and the platform is robust. It does real well at detecting and preventing threats. It is also very reliable.
As mentioned above, we are still processing the alignment of the PA series and SASE cloud firewalls policies. The project migration to SASE went overall smoothly and I got the necessary support from Palo Alto to get the decisions/issues out of the way to have the PA series on the same policy. Overall, the PA series delivered as expected.
I think Palo Alto could improve on the following: 1. Certain models of Palo Alto firewalls are more limited when it comes to certain types of objects such as external dynamic lists, number of objects in address groups, etc. 2. Less expensive models of Palo Alto firewalls have much slower management CPUs and take much longer to perform initial setup and to commit new configuration. 3. When managing firewalls with Panorama Shared objects can be set to only push to firewalls when they are used in configuration. However, other shared objects (such as URL Filtering Profiles) push to all firewalls regardless if they are used in configuration. I think Palo needs to re-engineer the way all shared objects are applied rather than having different configurations for different types.
The sales and support teams have declined drastically over the last couple of years.
Although we get support from Palo Alto throughout the whole project, setup and BAU assistance, I feel there is a complexity of the ongoing policy alignment within the team. I suppose some manual work could be more automated.