Palo Alto Panorama Reviews

16 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>
Score 9.2 out of 101

Do you work for this company? Manage this listing

Overall Rating

Reviewer's Company Size

Last Updated

By Topic

Industry

Department

Experience

Job Type

Role

Reviews (1-4 of 4)

No photo available
Score 10 out of 10
Vetted Review
Verified User
Review Source
Panorama is used by two groups in our organization our campus networking team and our network engineering team. Each has its own instance of Panorama but each team uses the other system to troubleshoot issues and allow and deny access over the network. Panorama helps simplify things instead of trying to guess which firewall we need to look at we can query them all and save time. In the end, Panorama saves us time and money by simplifying and combining our firewalls.
  • If you need to push a setting or config to multiple firewalls Panorama can do that flawlessly.
  • Panorama has its logging centralized and this makes it easy to locate and reviews logs compared to having to get logs from each device.
  • I love how the interface matches the interface on the firewall. This makes the learning curve less steep.
  • Adding new firewalls to Panorama is super easy and not complex. Panorama can push a lot of the config and settings so you don't have to manually do it.
  • Seems like it takes a minute or two to commit changes. In my option, it should take a second or two not 2 minutes.
  • It will time out and log you out unexpectedly. This can be irritating when you come back after a few minutes and have to log back in.
We have multiple internal and external firewalls at our headquarters as well as firewalls at our remote locations. Users are always needing to access services and systems at our headquarters and when they tell us they don't have access we can use Panorama to view the traffic and see where they are getting denied. Without Panorama we would need to log into each firewall and see if they are getting denied with Panorama we get an overview of was is happening and it's amazing.
Read this authenticated review
Amit Gumber profile photo
Score 10 out of 10
Vetted Review
Verified User
Review Source
We are using PA Panorama for centralized management of firewalls and to control security policy enforcement across the network. This is used to manage firewalls installed in our whole organization where it provides us ease of administration and a holistic view of our security design over a single pane of glass. It also serves to apply updates and push policies from the central console.
  • Panorama is very useful in updating the software in bulk with a single click without any hassles.
  • It also provides us detailed reporting to check the validate the compliance status.
  • Panorama is used for logging service to collect logs from managed devices to solve your operational logging challenges.
  • Sometimes it lacks visibility for de-capsulated tunneled traffic. Here, we would like to see improvements.
  • It has few ACC customizations and collaboration improvements such as default tab, share tabs etc.
  • Granular change management for multi-admin teams is still a little confusing, it needs more simplicity and flexibility.
We can always choose Panorama for device monitoring and resource utilization on firewalls, which helps to assess the impact of substantial policy changes and operational activities, benchmark across locations with similar traffic profiles, and in proactively tracking device component health. It is less appropriate where a lesser number of firewalls is in place (between 2-5) and where the organization has a limited number of users and applications.
Read Amit Gumber's full review
No photo available
Score 10 out of 10
Vetted Review
Verified User
Review Source
Palo Alto Panorama is used by our network security team to manage all configurations for six Palo Alto firewalls on three different sites. It allows the members of our team to keep consistent configurations across these devices and to re-use certain policies rather than creating them individually on each device. This also helps us ensure that we have backups of the firewall configurations. We also use Panorama to aggregate firewall logs. Searching logs in Panorama is much faster than searching on the firewalls themselves, so it's a big time saver. The fact that we can give members of other teams, such as our SOC or networking teams limited access to view configurations without giving them direct access to the firewalls themselves is a good way to keep information available but still maintain separation of duties.
  • Quick searching and filtering of logs from all your firewalls simultaneously, which helps track down the traffic of interest on any device.
  • The interface matches the PANOS interface on the firewall, so you don't have to re-learn a whole new way of doing things (there is an additional tab for Panorama settings).
  • Supports multiple authentication methods, including SAML and RADIUS, so it's possible to secure it with multi-factor authentication.
  • Stackable templates make it easy to re-use common device configurations on multiple firewalls, and hierarchical device groups make it easy to apply policies to select or all devices at once.
  • Applied filters on various sections are persistent between administrative sessions.
  • Has a tendency to log out management sessions unexpectedly.
  • Occasionally requires multiple login attempts to load administrative session.
  • Occasionally, pushing PANOS updates to firewalls from Panorama simply fails.
Palo Alto Panorama is well suited if you have more than a couple of Palo Alto firewalls, and if you have a desire to see logs from all your firewalls simultaneously. If a user wants to easily manage configurations without jumping between so many boxes, or if you want to easily manage firewall backups, then Palo Alto Panorama is a must-have, no-brainer decision. I can't imagine managing multiple firewalls without it.
Read this authenticated review
Bruce Bennett profile photo
Score 8 out of 10
Vetted Review
Verified User
Review Source
We use Panorama to manage firewalls internally. Management of devices is only done with IT staff. OT staff have some auditing capabilities. We use Panorama's Device Grouping to be able to manage different types of firewalls in the organization, as well as common security requirements with the different types of firewalls.
  • Being able to create common rules that can be maintained on multiple firewalls is very beneficial to our management of the different functional needs of the firewalls.
  • Using templates to manage regional requirements is helpful for rolling out changes in the networking side, from user managemnet globally to SEIM/Syslog collection regionally, being able to stack templates helps deliver the necessary changes across multiple firewalls.
  • Panorama's Dashboard and ACC provides useful information that can be set to see All firewalls, or just certain groups of firewalls. Since each group of firewalls has different applications running through them, being able to isolate one group at a time helps identify if there are errant devices causing unexpected traffic, and what type of traffic it is.
  • The ability to push out OS updates could be improved in Panorama. It has the abilities, but the use is not intuitive, to the point that we generally connect directly to the firewalls to download the OS updates directly.
  • Scheduling. It would be nice to be able to schedule jobs to run at certain times. Pushing out updates, like OS updates mentioned above, can require significant bandwidth. So being able to schedule that work for hours that would not directly affect the users would be a welcome addition.
  • The list of devices in the Templates tabs should be sorted the same way that he devices are grouped in the Device Group tab, rather than just alphabetical. If there was a way to chose the order of the devices, maybe by tag, that would work as well.
Palo Alto Panorama does well in our environment, where we have specific requirements for different groups of firewalls. Whether by region and/or function, overall Panorama does a very good job of being able to leverage commonalities and push changes to multiple groups of firewalls.Panorama is not a monitoring system. It does monitor things like sync status, and whether the devices are accessible, but it cannot be confused with an active monitoring system, so it is not an all in one solution. Also, as mentioned in my cons, there is no capability for scheduling jobs, to work around bandwidth limitations.
Read Bruce Bennett's full review

Feature Scorecard Summary

Policy planning and rule management (3)
8.7
Automated Policy Orchestration (2)
9.5
Device Discovery (2)
10.0
Policy Compliance Auditing (2)
9.0
Attack Path Simulation Testing (1)
9
Anomalous Event or Behavior Deviation (3)
8.7
Vulnerability Scans (2)
9.0
Firewall Rule Cleanup (3)
7.3

About Palo Alto Panorama

Panorama™ network security management provides static rules and dynamic security updates in a constantly changing threat landscape. Reduce administrator workload and improve overall security posture with a single rule base for firewall, threat prevention, URL filtering, application awareness, user identification, file blocking, and data filtering.

Palo Alto Panorama Technical Details

Operating Systems: Unspecified
Mobile Application:No