Latvian company MikroTik offers routers and switches.
N/A
Palo Alto Networks Next-Generation Firewalls - PA Series
Score 9.0 out of 10
N/A
Palo Alto Network’s Next-Generation Firewalls is a firewall option integrated with other Palo Alto security products. Released in late 2023, the PA-7500 ML-Powered NextGeneration Firewall (NGFW) enables enterprise-scale organizations and service providers to deploy security in high-performance environments.
$1.50
per hour per available zone
Pricing
MikroTik Routers and Switches
Palo Alto Networks Next-Generation Firewalls - PA Series
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
MikroTik Routers and Switches
Palo Alto Networks Next-Generation Firewalls - PA Series
Free Trial
No
Yes
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
—
Users may also choose to pay per gigabyte of data used starting at .065/GB. Note that prices listed here reflect installations via Amazon Web Services. Pricing may differ if other service providers are used.
More Pricing Information
Community Pulse
MikroTik Routers and Switches
Palo Alto Networks Next-Generation Firewalls - PA Series
Features
MikroTik Routers and Switches
Palo Alto Networks Next-Generation Firewalls - PA Series
Firewall
Comparison of Firewall features of Product A and Product B
MikroTik Routers and Switches
-
Ratings
Palo Alto Networks Next-Generation Firewalls - PA Series
8.7
27 Ratings
1% above category average
Identification Technologies
00 Ratings
9.227 Ratings
Visualization Tools
00 Ratings
7.626 Ratings
Content Inspection
00 Ratings
9.527 Ratings
Policy-based Controls
00 Ratings
9.727 Ratings
Active Directory and LDAP
00 Ratings
9.026 Ratings
Firewall Management Console
00 Ratings
8.827 Ratings
Reporting and Logging
00 Ratings
8.327 Ratings
VPN
00 Ratings
8.727 Ratings
High Availability
00 Ratings
8.826 Ratings
Stateful Inspection
00 Ratings
9.026 Ratings
Proxy Server
00 Ratings
7.313 Ratings
Best Alternatives
MikroTik Routers and Switches
Palo Alto Networks Next-Generation Firewalls - PA Series
Small Businesses
No answers on this topic
pfSense
Score 9.0 out of 10
Medium-sized Companies
Cisco Routers
Score 9.2 out of 10
Quantum Firewalls and Security Gateways
Score 9.3 out of 10
Enterprises
Cisco Routers
Score 9.2 out of 10
Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series
Palo Alto Networks Next-Generation Firewalls - PA Series
Likelihood to Recommend
Mikrotik
MikroTik is suited for large companies that require advanced distributions in terms of contracted bandwidth, and in the same way, allows a single device to specify filtering and firewall rules without acquiring an additional device. There is a range for small companies which is more economical and less robust, but in case it's not necessary, such a strict control over the data consumption of the company is not a feasible solution.
It is well-suited for a company needing strong edge security with ease of administration. It comes standard with many features such as VPN, Application ID and "Day-1 Config" that make the networks it protects secure from the very start. Palo is definitely a premium product and is much more expensive than other firewalls, but the value is realized immediately. The robust options for firewall rules/policies allow the administrator to apply security in new and creative ways to hit the sweet spot between security and usability.
The PA handles VPN connectivity without missing a beat. We have multiple VPN tunnels in use for redundancy to cloud-based services.
The PA has great functionality in supporting failover internet connections, again with the ability to have multiple paths out to our cloud-based services.
The PA is updated on the regular with various security updates, we are not concerned with the firewall's ability to see what packets are really flowing across the network. Being able to see beyond just IP and port requests lets you know things are locked down better than traditional firewalls.
It is a great overall kit, with URL filtering and other services that fill in the gaps between other solutions without breaking the bank.
Some of the wiki articles have not been updated or are not accurate enough. We spent a couple of days trying to find an example of implementing a mobile IPSec client solution. But once this has been implemented, it has been solid (always worked). A bigger community would help, and I am finding it hard to find the time to contribute to these articles.
The PA5220s have far exceeded what we have expected out of them. It was a bit of a learning curve coming from another vendor, but everything falls into place now with ease. The capabilities of the solution still surprise us, allowing us to remove other costly hardware and providing a single point of management needed
It can be a little tricky at first if you have never used the product or a firewall before. If you have experience with firewalls in general, it does not take long to learn the Palo Alto Networks Next-Generation Firewalls - PA Series interface. They offer great training resources and knowledge base articles to help get up to speed.
There is no SOC, NOC, where you can contact to try to resolve any difficulties. The problems that these devices have are solved largely through the community, with workaround alternatives, or if the support team responds to a request, the response times are too high for the current needs of technological communications.
We've run into a couple undocumented bugs, but that seems to happen with every brand and technology. Any time we've had to engage Palo Alto support they've always been professional, knowledgeable and prompt. In almost all cases we've been able to resolve our issues without having to escalate our tickets.
Cisco Routers are one of the best in the market, however they are also very expensive and not suitable for a small deployment or any deployment which requires just a couple of routers. MikroTik on the other hand are less expensive and provides many features that you require for a small scale deployment. they fit in with the budget and do what you need them to.
We are using Cisco ASA before in our environment but when it comes to deep scanning & layer 7 security it doesn't have that capability. After using Palo Alto Networks Next-Generation Firewall we are using sandboxing & advance malware protection that provides high-level end-user security. Also after implementing it we can easily monitor user-level traffic.
We used to outsource our Firewall and it's management. Not only did we find their SLA's to be lacking, in general, but communication between us was horrible. Many times we could not understand them and that resulted in less than desirable rule creation or troubleshooting.
Since we no longer have to pay a company for 24/7 management (and SLOW SLA's) we are saving a ton of money each year. Also our fellow employee's are much happier that things can be resolved in a timely manner.