Palo Alto Networks Prisma Access is the Gorilla in the Room
Use Cases and Deployment Scope
We use Palo Alto Networks Prisma Access for Remote Networks (SDWAN) and Mobile Users (GlobalProtect VPN). This allowed us to decommission on-prem firewalls and allow secure remote access from any office and any sanctioned device around the world.
Pros
- GlobalProtect VPN works amazing. I can set a single policy set in my MU policies that apply to all of my end-users no matter where their home office or location is. I have offices in America, UK and Asia.
- The Remote Networks policies were amazing to have a single policy set for all of my 11 offices instead of having to manage an on-oprem firewall in each office and having to make sure all changes are the same across all 11 firewalls (minus the passive HA devices).
- ADEM allowed us to get proactive information about a GP client's networking/internet position to see if there was going to be a problem with them working based on the last mile and local internet routing information.
Cons
- We were an early adopter (Q4 2019) so there was some growing pains with the CloudGenix acquisition and Palo rebranding it and shoe-horning it into the Palo Alto Networks Prisma Access ecosystem
- Support was a huge problem recently. If you had an SDWAN (remote networks) you had to get transitioned to a different team. If you had aPalo Alto Networks Prisma Access problem with ADEM or Mobile Users, you got transitioned to a different team. If you had no idea if the problem was SDWAN related or GP related, then it got bounced around
Likelihood to Recommend
I still think Palo Alto Networks Prisma Access is the best SASE/SSE product out there. It just has such good granular controls and up to date security definitions that you can feel absolutely secure in your purchase. GlobalProtect was a lifesaver for me when COVID hit so yes I had to work my butt off to get it up and running quickly and as secure as I possibly could but it worked amazing and had excellent performance after we got it running and tied to MFA, certificates and security policies.