Skip to main content
TrustRadius
Palo Alto Panorama

Palo Alto Panorama

Overview

What is Palo Alto Panorama?

According to the information provided by the vendor, Palo Alto Panorama is a network security management solution that intends to simplify and enhance cybersecurity processes for businesses. The product's primary objective is to offer various features, including unified policy management, centralized visibility, automated threat…

Read more
Recent Reviews

TrustRadius Insights

Panorama by Palo Alto Networks is widely used by organizations to manage and monitor their firewalls efficiently. With Panorama, users can …
Continue reading

Panorama delivers

9 out of 10
July 26, 2021
Incentivized
We currently utilize [two virtual Palo Alto] Panorama's in an HA pair. It is an excellent tool to manage multiple Firewalls across our …
Continue reading
Read all reviews

Popular Features

View all 8 features
  • Policy planning and rule management (12)
    9.8
    98%
  • Policy Compliance Auditing (11)
    9.4
    94%
  • Anomalous Event or Behavior Deviation (11)
    9.3
    93%
  • Automated Policy Orchestration (11)
    9.0
    90%
Return to navigation

Pricing

View all pricing

25 Devices

$9,500.00

Cloud

100 Devices

$23,750.00

Cloud

1000 Devices

$71,250.00

Cloud

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Product Demos

Omnis Cyber Intelligence in der Praxis (4/4) - Demo einer log4j Analyse

YouTube

Installation and Demo of Palo Alto Panorama Management Server Version 10

YouTube
Return to navigation

Features

Firewall Security Management

Firewall Security Management Software supports monitoring and configuration of firewalls from a central dashboard

9.4
Avg 8.1
Return to navigation

Product Details

What is Palo Alto Panorama?

According to the information provided by the vendor, Palo Alto Panorama is a network security management solution that intends to simplify and enhance cybersecurity processes for businesses. The product's primary objective is to offer various features, including unified policy management, centralized visibility, automated threat response, simplified configuration, unrivaled scalability, and rapid security adoption. It claims to assist organizations in efficiently managing their firewalls and security tools while maintaining consistent firewall rules across their networks. While no specific industries or professions are mentioned as target users, Panorama has potential benefits for any organization seeking to fortify its network security measures.

Centralized Visibility

The product aims to provide users with the ability to visualize network activity, threat activity, and blocked activity in a user-friendly manner. It also offers customization options for creating personalized views of current and historical data. The product claims to manage network security efficiently by utilizing a single security rule base that covers various firewall functions such as threat prevention, URL filtering, application awareness, user identification, sandboxing, file blocking, access control, and data filtering. The vendor states that Panorama simplifies administration through dynamic updates and configuration management using device groups and other Panorama features. Additionally, it enables organizations to organize firewall management effectively through hierarchical device groups, dynamic address and user groups, role-based access control, policy tags, and preconfigured templates for new rule sets. Panorama is designed to scale easily alongside growing firewall deployment by managing up to 5,000 virtual, containerized, and physical Palo Alto Networks firewalls with a single pair of high-available appliances. Promising centralized visibility into traffic flows across the entire Palo Alto Networks platform while offering simplified configuration options and leveraging PAN-OS® security innovations are additional aspects highlighted by the product's vendor. However, it should be noted that these assertions lack independent evidence or verification.

Palo Alto Panorama Video

Panorama - Streamlined, powerful management with actionable visibility

Palo Alto Panorama Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(59)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Panorama by Palo Alto Networks is widely used by organizations to manage and monitor their firewalls efficiently. With Panorama, users can centrally manage firewalls internally, allowing IT staff to handle device management effectively. Additionally, Panorama's Device Grouping feature enables users to manage different types of firewalls and common security requirements within the organization. The ability to control access to restricted sites and the VPN service for end-users is another key use case of Panorama. It simplifies firewall management by providing a centralized tool that saves time and effort in configuration and updates. Furthermore, Panorama offers a vast set of features, including building new rules, creating address objects, and setting up User-ID, which are greatly beneficial for users. Many customers consider Panorama an indispensable tool as it serves as a one-point solution for their security needs. Overall, Panorama's ability to streamline firewall management, provide auditing capabilities, and offer extensive features makes it highly recommended for large environments with multiple Palo Alto firewalls.

Easy Management of Multiple Firewalls: Several users have praised the ability to create common rules that can be maintained on multiple firewalls, making it easier to manage different functional needs. This feature has been appreciated by many reviewers for simplifying firewall management.

Efficient Delivery of Changes: The use of templates to manage regional requirements and the ability to stack templates have been highlighted by multiple users as valuable features. These functionalities allow for easy delivery of necessary changes across multiple firewalls, making network updates more efficient.

Intuitive User Interface: Reviewers have consistently mentioned the ease of use and intuitive nature of Panorama's user interface. They appreciate how quick and easy it is to navigate through menus, find desired settings, and configure options. This positive feedback indicates a high level of satisfaction with the user experience.

Unintuitive User Interface: Many users have expressed frustration with the user interface of Panorama, describing it as difficult to navigate and not user-friendly. This has made it challenging for them to efficiently push out OS updates and schedule jobs.

Difficulty in Finding Features: Some users have reported difficulties in locating specific features and functions within Panorama. This lack of intuitiveness has resulted in usability issues and navigation struggles, causing frustration for users.

Slow Performance: Users have experienced delays in performance when using Panorama. Changes made within the system take a significant amount of time to be replicated to individual sites, leading to delays in overall system performance. Additionally, the web interface has been described as slow on certain browsers, taking longer than expected to commit changes and impacting workflow efficiency.

Attribute Ratings

Reviews

(1-5 of 5)
Companies can't remove reviews or game the system. Here's why
Score 8 out of 10
Vetted Review
ResellerIncentivized
It is used across the whole organization. Panorama can help in managing the administration of a large number of Palo Alto firewalls. It is a centralized interface for Palo alto firewalls, Global protect, cloud services, and logging service instead of logging into each device. There are device groups and templates that can ease administrative efforts.

Panorama helps to manage many Palo Alto firewalls in one interface. You will find device groups and templates that reduce administrative efforts. Policies are easily configured and deployed with a great web filtering module. Furthermore, you can have either a hardware or a software VM to choose from.
  • Very good user interface and user experience which helps apply the configuration easily.
  • The portal is helps you apply configuration easily, by applying your configuration and settings smoothly.
  • Addition of several firewalls with easy steps.
  • Great support and response from the vendor
  • The dual WAN functionality doesn't exist in it.
  • Better coding in order to make the portal faster
  • Hard to apply the templates, too many steps
  • It is very slow applying changes once you have committed the changes on its web interface. It could take a nearly 30 seconds until the change has been actually applied on the device, needs some software enhancements. It sometimes crashes for unknown reasons due to bugs.
It offers many advanced features to configure. This is a solution that we implement for our customers. It helps to manage several firewalls from a central location whether from the internet edge side , data centers, in the data centers. It can be deployed to be used either on-premise devices or on the cloud which has great scalability.
Firewall Security Management (8)
81.25%
8.1
Policy planning and rule management
80%
8.0
Automated Policy Orchestration
80%
8.0
Device Discovery
70%
7.0
Policy Compliance Auditing
70%
7.0
Attack Path Simulation Testing
80%
8.0
Anomalous Event or Behavior Deviation
80%
8.0
Vulnerability Scans
90%
9.0
Firewall Rule Cleanup
100%
10.0
  • According to its high performance with all security features enabled, its price is the best in the market, so it is a good bargain for the customer
  • Best pricing for all security features to be enabled on it.
  • Support and Account Managers are very responsive to critical issues that could lead customer losses
  • I don't see any negative impacts on this solution, but there is always room for improvement
Compared to other vendors, this is the most accurate next-generation firewall. Their sizing values in their data sheets is very accurate compared to other vendors, so little re-testing and validation is done on our side.

With all their security features enabled, the performance is great.
You can do anything via the GUI without going to the CLI. High real time security as every five minutes, it updates the list of phishing websites. High protection as the firewall communicates with the cloud, a machine running artificial intelligence helps to detect malware or other threats.
The support team has great communication skills. They respond to your request with courtesy and they never break their promises in their next update. They also follow up with you on a timely basis.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
PaloAlto Panorama is the firewall that we use in our organization. The firewall protects all the departments of the University for malicious actors. However, defining the rules, and managing them is done by our team. This next-gen firewall has a lot of potentials to surpass the other giants in this field like Cisco and Juniper. There are different functionalities of this firewall that include integrated Intrusion Detection System (IDS), next-gen packet filter, IP and domain filter based on reputation and threat hunt based on signatures. With time it became an indispensable tool for our team acting as a one-point solution for all our needs. Its signature-based detection system is the best I have ever seen, much better than Cisco FirePower. They keep their database updated all the time, thereby reducing false positives and false negatives. It has a feature called "Wildfire" that detects malware that has been downloaded in our network. This reduced our dependency on McAfee. Other than fulfilling our security needs at a good price, it also helped in saving money by reducing the need for Cisco's Firepower which we are about to discontinue soon.
  • First, it has a very good signature-based Intrusion Detection System (IDS) that shows malicious inbound or outbound network packets. The classification for the critical threats is flawless.
  • It has a feature called "Wildfire" which act like an anti-virus and it reports any malware or malicious attachment that have been downloaded or sent through the network.
  • It needs improvement for the threats categorized as "high" severity. There are lot of false positives. Therefore finding real ones is hard in "high" category.
  • The threat/traffic view needs improvement. It needs at least a feature to sort based on columns. Downloading and parsing using Excel takes a lot of time.
Palo Alto Panorama is well suited for any scale industry. We use it to manage several units of our organization. Some units have low data flow and some like our medicine and media departments have high data flow. Thus it is highly scalable. It has a very easy interface for regular users. It doesn't require programming skills or sound technical background to use. It has a GUI that supports all kinds of operations through the interface. It also has text-based data fields that can be used by people having networking and programming background to reduce clicks. Therefore it is suited for organizations having both technical and non-technical staff. It is hard to find scenarios where it is not well suited. But yes, since it has all the functionalities integrated into it, buying Panorama for a small organization solely for the sake of firewall (if all other defense tools are already there like IDS, screening firewall) could be an expensive and redundant purchase.
Firewall Security Management (6)
78.33333333333333%
7.8
Policy planning and rule management
100%
10.0
Automated Policy Orchestration
100%
10.0
Device Discovery
80%
8.0
Policy Compliance Auditing
90%
9.0
Anomalous Event or Behavior Deviation
100%
10.0
Firewall Rule Cleanup
N/A
N/A
  • Reduced a lot of threats by blocking poorly reputed domains automatically, saving us a lot of time, which we would have otherwise spent on putting it on the manual blacklist.
  • Helped us in almost discontinuing with the Cisco Firepower, saving a lot of money, with its powerful IDS feature.
  • Cisco Firepower NGFW (formerly Sourcefire)
Palo Alto Networks Panorama is far superior to Cisco FirePower in terms of threat detection. Other than that it is very fast and easy to use. When it comes to deep packet inspection, Panorama shows all the relevant details needed, while Sourcefire pulls up a lot of details that are often not useful. In addition, the Wildfire feature helps us in detecting malicious files very easily and I have never seen any false positive in it. It also has the manual blacklist tool over Sourcefire which gives us the flexibility to add custom domains and IPs.
Palo Alto has a very nice customer support. People are very nice and were quick to reply, whenever we had an issue with the subscription or the blacklist tool. There is also a great deal of information on their website that covers each and every detail about the uses and the threat signatures. The community keeps on updating their information very frequently. Small issues are easily solved from the documentation, and for other issues, the customer support service is always present. However, on Fridays it becomes a little delayed as per my observation.
Cisco IronPort Web Security Appliance, McAfee Endpoint Security, Tenable.sc (formerly SecurityCenter), Atlassian Confluence, Cisco Firepower NGFW (formerly Sourcefire)
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Panorama is used by two groups in our organization our campus networking team and our network engineering team. Each has its own instance of Panorama but each team uses the other system to troubleshoot issues and allow and deny access over the network. Panorama helps simplify things instead of trying to guess which firewall we need to look at we can query them all and save time. In the end, Panorama saves us time and money by simplifying and combining our firewalls.
  • If you need to push a setting or config to multiple firewalls Panorama can do that flawlessly.
  • Panorama has its logging centralized and this makes it easy to locate and reviews logs compared to having to get logs from each device.
  • I love how the interface matches the interface on the firewall. This makes the learning curve less steep.
  • Adding new firewalls to Panorama is super easy and not complex. Panorama can push a lot of the config and settings so you don't have to manually do it.
  • Seems like it takes a minute or two to commit changes. In my option, it should take a second or two not 2 minutes.
  • It will time out and log you out unexpectedly. This can be irritating when you come back after a few minutes and have to log back in.
We have multiple internal and external firewalls at our headquarters as well as firewalls at our remote locations. Users are always needing to access services and systems at our headquarters and when they tell us they don't have access we can use Panorama to view the traffic and see where they are getting denied. Without Panorama we would need to log into each firewall and see if they are getting denied with Panorama we get an overview of was is happening and it's amazing.
Firewall Security Management (8)
76.25%
7.6
Policy planning and rule management
90%
9.0
Automated Policy Orchestration
90%
9.0
Device Discovery
100%
10.0
Policy Compliance Auditing
80%
8.0
Attack Path Simulation Testing
N/A
N/A
Anomalous Event or Behavior Deviation
90%
9.0
Vulnerability Scans
90%
9.0
Firewall Rule Cleanup
70%
7.0
  • Panorama seems expensive but when you compare it to other software it really isn't and the features make it worth every dollar.
  • Have panorama allow us to have entry-level team members help out even if they don't understand our whole network they can just go to panorama and know that find the info they need and what device the issue is happening on.
  • It has brought peace of mind to our security knowing that all policies can be managed through a central system and patches and updated can be centralized.
When you get help it is great. they have different service plans you need to know what plan you have and what kind of turn around you can expect. We have even had a local engineer to help us with questions and solutions. I feel the support team they have is very knowledgable and can help you out. Most of the time there is no need to escalate the issue.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Palo Alto Panorama is used by our network security team to manage all configurations for six Palo Alto firewalls on three different sites. It allows the members of our team to keep consistent configurations across these devices and to re-use certain policies rather than creating them individually on each device. This also helps us ensure that we have backups of the firewall configurations. We also use Panorama to aggregate firewall logs. Searching logs in Panorama is much faster than searching on the firewalls themselves, so it's a big time saver. The fact that we can give members of other teams, such as our SOC or networking teams limited access to view configurations without giving them direct access to the firewalls themselves is a good way to keep information available but still maintain separation of duties.
  • Quick searching and filtering of logs from all your firewalls simultaneously, which helps track down the traffic of interest on any device.
  • The interface matches the PANOS interface on the firewall, so you don't have to re-learn a whole new way of doing things (there is an additional tab for Panorama settings).
  • Supports multiple authentication methods, including SAML and RADIUS, so it's possible to secure it with multi-factor authentication.
  • Stackable templates make it easy to re-use common device configurations on multiple firewalls, and hierarchical device groups make it easy to apply policies to select or all devices at once.
  • Applied filters on various sections are persistent between administrative sessions.
  • Has a tendency to log out management sessions unexpectedly.
  • Occasionally requires multiple login attempts to load administrative session.
  • Occasionally, pushing PANOS updates to firewalls from Panorama simply fails.
Palo Alto Panorama is well suited if you have more than a couple of Palo Alto firewalls, and if you have a desire to see logs from all your firewalls simultaneously. If a user wants to easily manage configurations without jumping between so many boxes, or if you want to easily manage firewall backups, then Palo Alto Panorama is a must-have, no-brainer decision. I can't imagine managing multiple firewalls without it.
Firewall Security Management (4)
50%
5.0
Policy planning and rule management
80%
8.0
Policy Compliance Auditing
N/A
N/A
Anomalous Event or Behavior Deviation
70%
7.0
Firewall Rule Cleanup
50%
5.0
  • At a previous company, I deployed Palo Alto firewalls to a data center, and 12 branch locations. This allowed us to replace MPLS links with IPSec tunnels between the sites. This resulted in significantly more throughput and soft savings of increased productivity. However, the estimated net of $220,000 in hard savings over five years is what is most impressive. I could not have effectively managed all those devices without Palo Alto Panorama.
Bruce Bennett | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We use Panorama to manage firewalls internally. Management of devices is only done with IT staff. OT staff have some auditing capabilities. We use Panorama's Device Grouping to be able to manage different types of firewalls in the organization, as well as common security requirements with the different types of firewalls.
  • Being able to create common rules that can be maintained on multiple firewalls is very beneficial to our management of the different functional needs of the firewalls.
  • Using templates to manage regional requirements is helpful for rolling out changes in the networking side, from user managemnet globally to SEIM/Syslog collection regionally, being able to stack templates helps deliver the necessary changes across multiple firewalls.
  • Panorama's Dashboard and ACC provides useful information that can be set to see All firewalls, or just certain groups of firewalls. Since each group of firewalls has different applications running through them, being able to isolate one group at a time helps identify if there are errant devices causing unexpected traffic, and what type of traffic it is.
  • The ability to push out OS updates could be improved in Panorama. It has the abilities, but the use is not intuitive, to the point that we generally connect directly to the firewalls to download the OS updates directly.
  • Scheduling. It would be nice to be able to schedule jobs to run at certain times. Pushing out updates, like OS updates mentioned above, can require significant bandwidth. So being able to schedule that work for hours that would not directly affect the users would be a welcome addition.
  • The list of devices in the Templates tabs should be sorted the same way that he devices are grouped in the Device Group tab, rather than just alphabetical. If there was a way to chose the order of the devices, maybe by tag, that would work as well.
Palo Alto Panorama does well in our environment, where we have specific requirements for different groups of firewalls. Whether by region and/or function, overall Panorama does a very good job of being able to leverage commonalities and push changes to multiple groups of firewalls.Panorama is not a monitoring system. It does monitor things like sync status, and whether the devices are accessible, but it cannot be confused with an active monitoring system, so it is not an all in one solution. Also, as mentioned in my cons, there is no capability for scheduling jobs, to work around bandwidth limitations.
  • Overall, it has reduced the time that our administrators have had to spend managing firewall configurations. While we used Cisco CSM previous to migrating to Palo Alto Panorama, it was not as robust with its capabilities to manage groups of devices.
  • One big advantage that we have seen is the reduction in the amount of time it takes to roll out a new firewall installation. With the grouping of firewalls, the majority of the configuration is in place and only new objects and site specific requirements need to be added. This significantly decreased time to go live for new sites.
Prior to the installation of Palo Alto firewalls, we were using Cisco CSM to manage Cisco ASA firewalls. In my review I mention some limitaitons that we saw with CSM compared to Panorama. The biggest things were the management of common requirements; network, policy, objects, etc. Things that need to go to a groups of, or all of, the firewalls were not handled well in CSM. So each change of groups of servers, like Active Directory servers would require changes on the firewalls individually, with Panorama, we can make one change and push it out to as many firewalls as that change affects and it will not push to those firewalls not using the object, policy or other that was changed.
8

IT Firewall Team - Manage the devices with Panorama

IT Strategy Team - Read only view of devices for base when testing in lab

IT Security Team - Read only audit of all firewalls

OT Management Team - Read only audit of firewalls in the OT group


3
All support is privided by the IT Firewall Team. The team manages the devices and coaches the other teams on how to get the information they need out of Panorama.
  • Manage the devices by the IT Firewall Team
  • Audit policies for accuracy by the IT Security Team
  • Audit policy changes on the OT related devices by the OT Management Team
  • Common policies and network settings. It is not really innovative, but it is a huge timesaver without affecting the security of the devices.
  • Backing up the running configurations on all of the firewalls into one repository. Again, not innovative, but has been very useful.
  • The use of the Managed Devices view to make sure that all of the firewalls are getting the updates sent, rather than having to review every set of responses, you can use this view to pinpoint the devices that had issues and then look at the responce information to make corrections as necessary.
  • We are not currently using the VPN (Global Connect) capabilities, but do see that in the future. Panorama should give us the ability to manage regional VPN gateways with common rules and requirements.
  • Enhance our threat protection. That is on the devices and not Panorama, but is managed by Panorama.
Panorama has given us much more than we expected and the support for the product, by Palo Alto Networks has been great. We would like to see some improvements that I mentioned in another review, like scheduling changes, but overall Panorama has provided a very capable product and we are very happy with it.
  • Common rule changes on a group of firewalls using shared objects.
  • Generating the initial template for configuring a new firewall.
  • Looking for common traffic from multiple firewalls in a common place.
  • Pushing out upgrades to OS.
  • Common certificate management.
Yes
I do not believe that Panorama has a mobile interface, but I have run Panorama on my phone browser successfully many times.
My biggest issue is not being able to schedule changes or software pushes, other than that the software is very easy to use after using it for a short period of time.
Return to navigation