Skip to main content
TrustRadius
Palo Alto Panorama

Palo Alto Panorama

Overview

What is Palo Alto Panorama?

According to the information provided by the vendor, Palo Alto Panorama is a network security management solution that intends to simplify and enhance cybersecurity processes for businesses. The product's primary objective is to offer various features, including unified policy management, centralized visibility, automated threat…

Read more
Recent Reviews

TrustRadius Insights

Panorama by Palo Alto Networks is widely used by organizations to manage and monitor their firewalls efficiently. With Panorama, users can …
Continue reading

Panorama delivers

9 out of 10
July 26, 2021
Incentivized
We currently utilize [two virtual Palo Alto] Panorama's in an HA pair. It is an excellent tool to manage multiple Firewalls across our …
Continue reading
Read all reviews

Popular Features

View all 8 features
  • Policy planning and rule management (12)
    9.8
    98%
  • Policy Compliance Auditing (11)
    9.4
    94%
  • Anomalous Event or Behavior Deviation (11)
    9.3
    93%
  • Automated Policy Orchestration (11)
    9.0
    90%
Return to navigation

Pricing

View all pricing

25 Devices

$9,500.00

Cloud

100 Devices

$23,750.00

Cloud

1000 Devices

$71,250.00

Cloud

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Product Demos

Omnis Cyber Intelligence in der Praxis (4/4) - Demo einer log4j Analyse

YouTube

Installation and Demo of Palo Alto Panorama Management Server Version 10

YouTube
Return to navigation

Features

Firewall Security Management

Firewall Security Management Software supports monitoring and configuration of firewalls from a central dashboard

9.4
Avg 8.1
Return to navigation

Product Details

What is Palo Alto Panorama?

According to the information provided by the vendor, Palo Alto Panorama is a network security management solution that intends to simplify and enhance cybersecurity processes for businesses. The product's primary objective is to offer various features, including unified policy management, centralized visibility, automated threat response, simplified configuration, unrivaled scalability, and rapid security adoption. It claims to assist organizations in efficiently managing their firewalls and security tools while maintaining consistent firewall rules across their networks. While no specific industries or professions are mentioned as target users, Panorama has potential benefits for any organization seeking to fortify its network security measures.

Centralized Visibility

The product aims to provide users with the ability to visualize network activity, threat activity, and blocked activity in a user-friendly manner. It also offers customization options for creating personalized views of current and historical data. The product claims to manage network security efficiently by utilizing a single security rule base that covers various firewall functions such as threat prevention, URL filtering, application awareness, user identification, sandboxing, file blocking, access control, and data filtering. The vendor states that Panorama simplifies administration through dynamic updates and configuration management using device groups and other Panorama features. Additionally, it enables organizations to organize firewall management effectively through hierarchical device groups, dynamic address and user groups, role-based access control, policy tags, and preconfigured templates for new rule sets. Panorama is designed to scale easily alongside growing firewall deployment by managing up to 5,000 virtual, containerized, and physical Palo Alto Networks firewalls with a single pair of high-available appliances. Promising centralized visibility into traffic flows across the entire Palo Alto Networks platform while offering simplified configuration options and leveraging PAN-OS® security innovations are additional aspects highlighted by the product's vendor. However, it should be noted that these assertions lack independent evidence or verification.

Palo Alto Panorama Video

Panorama - Streamlined, powerful management with actionable visibility

Palo Alto Panorama Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(59)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Panorama by Palo Alto Networks is widely used by organizations to manage and monitor their firewalls efficiently. With Panorama, users can centrally manage firewalls internally, allowing IT staff to handle device management effectively. Additionally, Panorama's Device Grouping feature enables users to manage different types of firewalls and common security requirements within the organization. The ability to control access to restricted sites and the VPN service for end-users is another key use case of Panorama. It simplifies firewall management by providing a centralized tool that saves time and effort in configuration and updates. Furthermore, Panorama offers a vast set of features, including building new rules, creating address objects, and setting up User-ID, which are greatly beneficial for users. Many customers consider Panorama an indispensable tool as it serves as a one-point solution for their security needs. Overall, Panorama's ability to streamline firewall management, provide auditing capabilities, and offer extensive features makes it highly recommended for large environments with multiple Palo Alto firewalls.

Easy Management of Multiple Firewalls: Several users have praised the ability to create common rules that can be maintained on multiple firewalls, making it easier to manage different functional needs. This feature has been appreciated by many reviewers for simplifying firewall management.

Efficient Delivery of Changes: The use of templates to manage regional requirements and the ability to stack templates have been highlighted by multiple users as valuable features. These functionalities allow for easy delivery of necessary changes across multiple firewalls, making network updates more efficient.

Intuitive User Interface: Reviewers have consistently mentioned the ease of use and intuitive nature of Panorama's user interface. They appreciate how quick and easy it is to navigate through menus, find desired settings, and configure options. This positive feedback indicates a high level of satisfaction with the user experience.

Unintuitive User Interface: Many users have expressed frustration with the user interface of Panorama, describing it as difficult to navigate and not user-friendly. This has made it challenging for them to efficiently push out OS updates and schedule jobs.

Difficulty in Finding Features: Some users have reported difficulties in locating specific features and functions within Panorama. This lack of intuitiveness has resulted in usability issues and navigation struggles, causing frustration for users.

Slow Performance: Users have experienced delays in performance when using Panorama. Changes made within the system take a significant amount of time to be replicated to individual sites, leading to delays in overall system performance. Additionally, the web interface has been described as slow on certain browsers, taking longer than expected to commit changes and impacting workflow efficiency.

Attribute Ratings

Reviews

(1-13 of 13)
Companies can't remove reviews or game the system. Here's why
Score 10 out of 10
Vetted Review
Verified User
Palo Alto Panorama gives the centralized tool for managing all the Palo Alto firewall gateways across regions, DCs etc.
It gives easy way to manage firewalls, avoids duplication of works in case you need similar policy sets / configurations on multiple firewalls and also gives centralized logs across all the firewalls behind it.

In shorts, you can manage multiple Palo Alto firewalls from single console without login into the actual firewall. So it is highly recommended when you have large environments and you have multiple single or HA pairs of Palo Alto firewalls in it.
  • Centralized Console for Palo Alto Firewalls management
  • Avoids duplicate task Policy, Profiles etc. configuration on multiple firewalls
  • Easy to deploy, manage, operate and configure
  • Centralized logs management for all the firewalls
  • Palo Alto Panorama VM series requires large resources like CPU, Memory etc
  • Palo Alto Panorama v10 is quite slow due to heavy processes running behind. This causes web interface sluggish at times
  • Licensing Cost can be improve
Palo Alto Panorama is well suited when you have multiple standalone and/or HA pairs of Palo Alto firewalls in your environments. So it will very much ideal for you to have Palo Alto Panorama server to manage all those firewalls from single console. If you do not have Palo Alto Panorama server and you have multiple firewalls, then it becomes quite challenging to manage all those firewalls individually.

If you have very few Palo Alto firewalls eg. 4-5 firewalls, and those are not going to increase in future then you can avoid it. Because Palo Alto Panorama comes with minimum 25 licenses.
Score 8 out of 10
Vetted Review
Verified User
We use Palo Alto Panorama to manage multiple firewalls at multiple locations. We have approximately 25 locations and at some locations we have multiple firewalls. We are also using the firewalls to implement SDWan. We are able to use multiple internet connections to do load balancing at a branch which saves money on higher priced internet connections.
  • Manages multiple devices
  • SDWan
  • Reporting
  • Setup was somewhat difficult
  • Price is a little bit of a shock
I like the fact that I can pretty much use the same configuration on multiple sites. If I want to block a specific address I can add it to all sites at once not one at a time.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
I use Panorama every day just because of the vast set of features it has. Sometimes I will be building new rules, sometimes, I will be creating new address objects, and sometimes I will be setting up User-ID to attach user accounts to the traffic I see in the firewall. All with just a couple of clicks from the same dashboard.
  • Unified tool.
  • Quick and easy UI.
  • Intuitive menus.
  • Some things can be hard to find the first time.
  • Can run slowly on certain browsers.
  • Traffic doesn't always show up immediately.
I think Palo Alto Panorama is suited for administrators of all levels because certain things can be locked down to certain permission levels. But there are executive dashboards all the way down to the weeds for the highest of administrators. This truly is a single pane of glass tool because you never have to go into the individual firewalls for anything.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We use Palo Alto Panorama to manage our firewall access for end-users. We control access to restricted sites and the VPN service. Through the Monitor tab, I am able to view the logs for URL filtering for specific users and see if users are being blocked in VPN due to a HIP Match issue. In the Objects tab, I am able to restrict or allow specific sites and domains based on URL categories.
  • Web site access permissions
  • VPN authentication protocols
  • VMWare authentication
  • Search filtering needs to be more user friendly
  • It takes a long time for changes to be made and replicated to the individual sites
We control access to social media sites through groups. Restricted sites are easier to manage and control. I diagnose issues with VPN and VMWare authentication. When a user is unable to access the VPN due to an authentication error I can log into Palo Alto Panorama and see if they are blocked due to HIP match issues or Authentication Profile issues. If a site is being blocked on the network I can add the site to the allowed list for specific types of users, such as Internet Users or Trucking (groups set in AD). Alternatively, I can block specific sites and domains that are deemed inappropriate or not needed for work purposes.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We are using Palo Alto Panorama as the main system for any firewall changes, so all of them are sync with similar setup. We have firewalls which are managed by Palo Alto Panorama in cloud and on prem and all is working fine. We have noticed couple problems with verification while some by accident misconfigured end firewall and panorama and panorama didn't catch it up. But otherwise company is happy about using it.
  • Managing firewalls
  • Upgrades
  • Making configuration easier
  • Verification of what configuration is being pushed
  • Better information about errors if they will show up during push
Pushing configuration to firewalls in the cloud is quite easy, as you can build them and then push all configurations, if you need to add one or few or just do replacement it also easy with Palo Alto Panorama. Similar situation is with firewall onsite but you can't remove them and easy replace.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Palo Alto Panorama is being used as our main Firewalls management for over 50 clients. Panorama makes it easier to manage, configure, and monitor remotely. It saves a lot of time by allowing us to manage all firewalls from a single location.

[Palo Alto] Panorama provides efficiency and security to our business.
  • Management
  • Monitoring
  • Security
  • Configuration and Deployment
  • Troubleshooting
  • Efficiency
  • Performance
[Palo Alto] Panorama is well suited if you are managing 15+ PANs, otherwise it would not be worth it if you have few Palo Alto Firewalls.
July 26, 2021

Panorama delivers

Score 9 out of 10
Vetted Review
Verified User
Incentivized
We currently utilize [two virtual Palo Alto] Panorama's in an HA pair. It is an excellent tool to manage multiple Firewalls across our Organization.
We have over a dozen locations with multiple Palo's, so having Panorama is critical to save time having to configure\update each Firewall.
[Palo Alto] Panorama allows for ultimate management scalability from 2 to 1000's of Firewalls.
  • The wildfire threat detection utilizes the combined power of all customers that have the service greatly improving your organizations detections
  • Utilizing Device Group and creating shared rules is very helpful
  • Having the same user interface as a Palo Alto Firewall was very beneficial for quick adoption
  • Unexpected log outs outside the normal timeout window seem to happen often
  • Better reporting, really a downside to the product
  • Scheduling would be a great feature
[Palo Alto Panorama is well suited for the following:]
- Great for managing multiple firewalls
- Great for viewing any template or device group you have created from a single pane
- Central point of logging review
Score 8 out of 10
Vetted Review
ResellerIncentivized
It is used across the whole organization. Panorama can help in managing the administration of a large number of Palo Alto firewalls. It is a centralized interface for Palo alto firewalls, Global protect, cloud services, and logging service instead of logging into each device. There are device groups and templates that can ease administrative efforts.

Panorama helps to manage many Palo Alto firewalls in one interface. You will find device groups and templates that reduce administrative efforts. Policies are easily configured and deployed with a great web filtering module. Furthermore, you can have either a hardware or a software VM to choose from.
  • Very good user interface and user experience which helps apply the configuration easily.
  • The portal is helps you apply configuration easily, by applying your configuration and settings smoothly.
  • Addition of several firewalls with easy steps.
  • Great support and response from the vendor
  • The dual WAN functionality doesn't exist in it.
  • Better coding in order to make the portal faster
  • Hard to apply the templates, too many steps
  • It is very slow applying changes once you have committed the changes on its web interface. It could take a nearly 30 seconds until the change has been actually applied on the device, needs some software enhancements. It sometimes crashes for unknown reasons due to bugs.
It offers many advanced features to configure. This is a solution that we implement for our customers. It helps to manage several firewalls from a central location whether from the internet edge side , data centers, in the data centers. It can be deployed to be used either on-premise devices or on the cloud which has great scalability.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Our Information & Technology services department is using Palo Alto Panorama to manage our data center gateways, our GlobalProtect VPN deployment, our AD user identification, and our terminal server user identification.
  • It simplifies management by providing a single management point for most tasks.
  • It allows for customized layouts for every user.
  • Responsiveness sometimes bogs down even with recommended specs.
  • GlobalProtect user information is harder to get to than it should be.
I think Palo Alto Panorama is well suited for any deployment greater than one Palo Alto gateway. The more devices you manage, the greater the benefit of using Palo Alto Panorama is. We only have two gateways, along with two user ID agents and several hundred terminal server agents, but it still makes their management much more manageable. It doesn't add to the complexity or require substantial resources, so I can't think of a reason not to use it.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
PaloAlto Panorama is the firewall that we use in our organization. The firewall protects all the departments of the University for malicious actors. However, defining the rules, and managing them is done by our team. This next-gen firewall has a lot of potentials to surpass the other giants in this field like Cisco and Juniper. There are different functionalities of this firewall that include integrated Intrusion Detection System (IDS), next-gen packet filter, IP and domain filter based on reputation and threat hunt based on signatures. With time it became an indispensable tool for our team acting as a one-point solution for all our needs. Its signature-based detection system is the best I have ever seen, much better than Cisco FirePower. They keep their database updated all the time, thereby reducing false positives and false negatives. It has a feature called "Wildfire" that detects malware that has been downloaded in our network. This reduced our dependency on McAfee. Other than fulfilling our security needs at a good price, it also helped in saving money by reducing the need for Cisco's Firepower which we are about to discontinue soon.
  • First, it has a very good signature-based Intrusion Detection System (IDS) that shows malicious inbound or outbound network packets. The classification for the critical threats is flawless.
  • It has a feature called "Wildfire" which act like an anti-virus and it reports any malware or malicious attachment that have been downloaded or sent through the network.
  • It needs improvement for the threats categorized as "high" severity. There are lot of false positives. Therefore finding real ones is hard in "high" category.
  • The threat/traffic view needs improvement. It needs at least a feature to sort based on columns. Downloading and parsing using Excel takes a lot of time.
Palo Alto Panorama is well suited for any scale industry. We use it to manage several units of our organization. Some units have low data flow and some like our medicine and media departments have high data flow. Thus it is highly scalable. It has a very easy interface for regular users. It doesn't require programming skills or sound technical background to use. It has a GUI that supports all kinds of operations through the interface. It also has text-based data fields that can be used by people having networking and programming background to reduce clicks. Therefore it is suited for organizations having both technical and non-technical staff. It is hard to find scenarios where it is not well suited. But yes, since it has all the functionalities integrated into it, buying Panorama for a small organization solely for the sake of firewall (if all other defense tools are already there like IDS, screening firewall) could be an expensive and redundant purchase.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Panorama is used by two groups in our organization our campus networking team and our network engineering team. Each has its own instance of Panorama but each team uses the other system to troubleshoot issues and allow and deny access over the network. Panorama helps simplify things instead of trying to guess which firewall we need to look at we can query them all and save time. In the end, Panorama saves us time and money by simplifying and combining our firewalls.
  • If you need to push a setting or config to multiple firewalls Panorama can do that flawlessly.
  • Panorama has its logging centralized and this makes it easy to locate and reviews logs compared to having to get logs from each device.
  • I love how the interface matches the interface on the firewall. This makes the learning curve less steep.
  • Adding new firewalls to Panorama is super easy and not complex. Panorama can push a lot of the config and settings so you don't have to manually do it.
  • Seems like it takes a minute or two to commit changes. In my option, it should take a second or two not 2 minutes.
  • It will time out and log you out unexpectedly. This can be irritating when you come back after a few minutes and have to log back in.
We have multiple internal and external firewalls at our headquarters as well as firewalls at our remote locations. Users are always needing to access services and systems at our headquarters and when they tell us they don't have access we can use Panorama to view the traffic and see where they are getting denied. Without Panorama we would need to log into each firewall and see if they are getting denied with Panorama we get an overview of was is happening and it's amazing.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Palo Alto Panorama is used by our network security team to manage all configurations for six Palo Alto firewalls on three different sites. It allows the members of our team to keep consistent configurations across these devices and to re-use certain policies rather than creating them individually on each device. This also helps us ensure that we have backups of the firewall configurations. We also use Panorama to aggregate firewall logs. Searching logs in Panorama is much faster than searching on the firewalls themselves, so it's a big time saver. The fact that we can give members of other teams, such as our SOC or networking teams limited access to view configurations without giving them direct access to the firewalls themselves is a good way to keep information available but still maintain separation of duties.
  • Quick searching and filtering of logs from all your firewalls simultaneously, which helps track down the traffic of interest on any device.
  • The interface matches the PANOS interface on the firewall, so you don't have to re-learn a whole new way of doing things (there is an additional tab for Panorama settings).
  • Supports multiple authentication methods, including SAML and RADIUS, so it's possible to secure it with multi-factor authentication.
  • Stackable templates make it easy to re-use common device configurations on multiple firewalls, and hierarchical device groups make it easy to apply policies to select or all devices at once.
  • Applied filters on various sections are persistent between administrative sessions.
  • Has a tendency to log out management sessions unexpectedly.
  • Occasionally requires multiple login attempts to load administrative session.
  • Occasionally, pushing PANOS updates to firewalls from Panorama simply fails.
Palo Alto Panorama is well suited if you have more than a couple of Palo Alto firewalls, and if you have a desire to see logs from all your firewalls simultaneously. If a user wants to easily manage configurations without jumping between so many boxes, or if you want to easily manage firewall backups, then Palo Alto Panorama is a must-have, no-brainer decision. I can't imagine managing multiple firewalls without it.
Bruce Bennett | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use Panorama to manage firewalls internally. Management of devices is only done with IT staff. OT staff have some auditing capabilities. We use Panorama's Device Grouping to be able to manage different types of firewalls in the organization, as well as common security requirements with the different types of firewalls.
  • Being able to create common rules that can be maintained on multiple firewalls is very beneficial to our management of the different functional needs of the firewalls.
  • Using templates to manage regional requirements is helpful for rolling out changes in the networking side, from user managemnet globally to SEIM/Syslog collection regionally, being able to stack templates helps deliver the necessary changes across multiple firewalls.
  • Panorama's Dashboard and ACC provides useful information that can be set to see All firewalls, or just certain groups of firewalls. Since each group of firewalls has different applications running through them, being able to isolate one group at a time helps identify if there are errant devices causing unexpected traffic, and what type of traffic it is.
  • The ability to push out OS updates could be improved in Panorama. It has the abilities, but the use is not intuitive, to the point that we generally connect directly to the firewalls to download the OS updates directly.
  • Scheduling. It would be nice to be able to schedule jobs to run at certain times. Pushing out updates, like OS updates mentioned above, can require significant bandwidth. So being able to schedule that work for hours that would not directly affect the users would be a welcome addition.
  • The list of devices in the Templates tabs should be sorted the same way that he devices are grouped in the Device Group tab, rather than just alphabetical. If there was a way to chose the order of the devices, maybe by tag, that would work as well.
Palo Alto Panorama does well in our environment, where we have specific requirements for different groups of firewalls. Whether by region and/or function, overall Panorama does a very good job of being able to leverage commonalities and push changes to multiple groups of firewalls.Panorama is not a monitoring system. It does monitor things like sync status, and whether the devices are accessible, but it cannot be confused with an active monitoring system, so it is not an all in one solution. Also, as mentioned in my cons, there is no capability for scheduling jobs, to work around bandwidth limitations.
Return to navigation