Overview
What is Palo Alto Panorama?
According to the information provided by the vendor, Palo Alto Panorama is a network security management solution that intends to simplify and enhance cybersecurity processes for businesses. The product's primary objective is to offer various features, including unified policy management, centralized visibility, automated threat…
Palo Alto Panorama Product Pros & Cons !!
It gives easy way …
Multiple sites managed by Panorama
A truly unified firewall management console.
Palo Alto Panorama Review
Panorama for over 40 firewalls
PANORAMA IS AWESOME!
Panorama delivers
Palo Alto Panorama, the GUI that is easy to use, and the solution that is easy to deploy.
Palo Alto's Panorama does what it's name implies, which is a good thing!
Get a panoromic view of the cyberspace: Palo Alto Panorama
The best and only way to manage your firewalls.
Palo Alto Panorama - A Must-have Tool for Administrators of Multiple Palo Alto Firewalls
Panorama fills some gaps for us
Popular Features
- Policy planning and rule management (12)9.898%
- Policy Compliance Auditing (11)9.494%
- Anomalous Event or Behavior Deviation (11)9.393%
- Automated Policy Orchestration (11)9.090%
Pricing
25 Devices
$9,500.00
100 Devices
$23,750.00
1000 Devices
$71,250.00
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Product Demos
Omnis Cyber Intelligence in der Praxis (4/4) - Demo einer log4j Analyse
Installation and Demo of Palo Alto Panorama Management Server Version 10
Features
Firewall Security Management
Firewall Security Management Software supports monitoring and configuration of firewalls from a central dashboard
- 9.8Policy planning and rule management(12) Ratings
Monitor the effectiveness of network security infrastructure
- 9Automated Policy Orchestration(11) Ratings
Automatically brings together all security controls in one place, automates changes and collapses risks
- 9.4Device Discovery(9) Ratings
Ability to automatically find all devices connected to the network
- 9.4Policy Compliance Auditing(11) Ratings
Automatic identification of gaps in compliance, remediation, and generation of compliance reports for auditors
- 8.8Attack Path Simulation Testing(6) Ratings
Simulation of potential attack paths to expose network exposure
- 9.3Anomalous Event or Behavior Deviation(11) Ratings
Ability to pinpoint unusual events or trends
- 9.6Vulnerability Scans(5) Ratings
Network scans to pinpoint vulnerable locations for remediation
- 9.8Firewall Rule Cleanup(11) Ratings
Ability to detect and cleanup rules that are either partially or completely unused, expired or shadowed
Product Details
- About
- Tech Details
What is Palo Alto Panorama?
According to the information provided by the vendor, Palo Alto Panorama is a network security management solution that intends to simplify and enhance cybersecurity processes for businesses. The product's primary objective is to offer various features, including unified policy management, centralized visibility, automated threat response, simplified configuration, unrivaled scalability, and rapid security adoption. It claims to assist organizations in efficiently managing their firewalls and security tools while maintaining consistent firewall rules across their networks. While no specific industries or professions are mentioned as target users, Panorama has potential benefits for any organization seeking to fortify its network security measures.
Centralized Visibility
The product aims to provide users with the ability to visualize network activity, threat activity, and blocked activity in a user-friendly manner. It also offers customization options for creating personalized views of current and historical data. The product claims to manage network security efficiently by utilizing a single security rule base that covers various firewall functions such as threat prevention, URL filtering, application awareness, user identification, sandboxing, file blocking, access control, and data filtering. The vendor states that Panorama simplifies administration through dynamic updates and configuration management using device groups and other Panorama features. Additionally, it enables organizations to organize firewall management effectively through hierarchical device groups, dynamic address and user groups, role-based access control, policy tags, and preconfigured templates for new rule sets. Panorama is designed to scale easily alongside growing firewall deployment by managing up to 5,000 virtual, containerized, and physical Palo Alto Networks firewalls with a single pair of high-available appliances. Promising centralized visibility into traffic flows across the entire Palo Alto Networks platform while offering simplified configuration options and leveraging PAN-OS® security innovations are additional aspects highlighted by the product's vendor. However, it should be noted that these assertions lack independent evidence or verification.
Palo Alto Panorama Video
Palo Alto Panorama Technical Details
Deployment Types | Software as a Service (SaaS), Cloud, or Web-Based |
---|---|
Operating Systems | Unspecified |
Mobile Application | No |
Comparisons
Compare with
Reviews and Ratings
(59)Community Insights
- Business Problems Solved
- Pros
- Cons
Panorama by Palo Alto Networks is widely used by organizations to manage and monitor their firewalls efficiently. With Panorama, users can centrally manage firewalls internally, allowing IT staff to handle device management effectively. Additionally, Panorama's Device Grouping feature enables users to manage different types of firewalls and common security requirements within the organization. The ability to control access to restricted sites and the VPN service for end-users is another key use case of Panorama. It simplifies firewall management by providing a centralized tool that saves time and effort in configuration and updates. Furthermore, Panorama offers a vast set of features, including building new rules, creating address objects, and setting up User-ID, which are greatly beneficial for users. Many customers consider Panorama an indispensable tool as it serves as a one-point solution for their security needs. Overall, Panorama's ability to streamline firewall management, provide auditing capabilities, and offer extensive features makes it highly recommended for large environments with multiple Palo Alto firewalls.
Easy Management of Multiple Firewalls: Several users have praised the ability to create common rules that can be maintained on multiple firewalls, making it easier to manage different functional needs. This feature has been appreciated by many reviewers for simplifying firewall management.
Efficient Delivery of Changes: The use of templates to manage regional requirements and the ability to stack templates have been highlighted by multiple users as valuable features. These functionalities allow for easy delivery of necessary changes across multiple firewalls, making network updates more efficient.
Intuitive User Interface: Reviewers have consistently mentioned the ease of use and intuitive nature of Panorama's user interface. They appreciate how quick and easy it is to navigate through menus, find desired settings, and configure options. This positive feedback indicates a high level of satisfaction with the user experience.
Unintuitive User Interface: Many users have expressed frustration with the user interface of Panorama, describing it as difficult to navigate and not user-friendly. This has made it challenging for them to efficiently push out OS updates and schedule jobs.
Difficulty in Finding Features: Some users have reported difficulties in locating specific features and functions within Panorama. This lack of intuitiveness has resulted in usability issues and navigation struggles, causing frustration for users.
Slow Performance: Users have experienced delays in performance when using Panorama. Changes made within the system take a significant amount of time to be replicated to individual sites, leading to delays in overall system performance. Additionally, the web interface has been described as slow on certain browsers, taking longer than expected to commit changes and impacting workflow efficiency.
Attribute Ratings
Reviews
(1-5 of 5)Palo Alto Panorama, the GUI that is easy to use, and the solution that is easy to deploy.
Panorama helps to manage many Palo Alto firewalls in one interface. You will find device groups and templates that reduce administrative efforts. Policies are easily configured and deployed with a great web filtering module. Furthermore, you can have either a hardware or a software VM to choose from.
- Very good user interface and user experience which helps apply the configuration easily.
- The portal is helps you apply configuration easily, by applying your configuration and settings smoothly.
- Addition of several firewalls with easy steps.
- Great support and response from the vendor
- The dual WAN functionality doesn't exist in it.
- Better coding in order to make the portal faster
- Hard to apply the templates, too many steps
- It is very slow applying changes once you have committed the changes on its web interface. It could take a nearly 30 seconds until the change has been actually applied on the device, needs some software enhancements. It sometimes crashes for unknown reasons due to bugs.
- Policy planning and rule management
- 80%8.0
- Automated Policy Orchestration
- 80%8.0
- Device Discovery
- 70%7.0
- Policy Compliance Auditing
- 70%7.0
- Attack Path Simulation Testing
- 80%8.0
- Anomalous Event or Behavior Deviation
- 80%8.0
- Vulnerability Scans
- 90%9.0
- Firewall Rule Cleanup
- 100%10.0
- According to its high performance with all security features enabled, its price is the best in the market, so it is a good bargain for the customer
- Best pricing for all security features to be enabled on it.
- Support and Account Managers are very responsive to critical issues that could lead customer losses
- I don't see any negative impacts on this solution, but there is always room for improvement
Get a panoromic view of the cyberspace: Palo Alto Panorama
- First, it has a very good signature-based Intrusion Detection System (IDS) that shows malicious inbound or outbound network packets. The classification for the critical threats is flawless.
- It has a feature called "Wildfire" which act like an anti-virus and it reports any malware or malicious attachment that have been downloaded or sent through the network.
- It needs improvement for the threats categorized as "high" severity. There are lot of false positives. Therefore finding real ones is hard in "high" category.
- The threat/traffic view needs improvement. It needs at least a feature to sort based on columns. Downloading and parsing using Excel takes a lot of time.
- Policy planning and rule management
- 100%10.0
- Automated Policy Orchestration
- 100%10.0
- Device Discovery
- 80%8.0
- Policy Compliance Auditing
- 90%9.0
- Anomalous Event or Behavior Deviation
- 100%10.0
- Firewall Rule Cleanup
- N/AN/A
- Reduced a lot of threats by blocking poorly reputed domains automatically, saving us a lot of time, which we would have otherwise spent on putting it on the manual blacklist.
- Helped us in almost discontinuing with the Cisco Firepower, saving a lot of money, with its powerful IDS feature.
- Cisco Firepower NGFW (formerly Sourcefire)
The best and only way to manage your firewalls.
- If you need to push a setting or config to multiple firewalls Panorama can do that flawlessly.
- Panorama has its logging centralized and this makes it easy to locate and reviews logs compared to having to get logs from each device.
- I love how the interface matches the interface on the firewall. This makes the learning curve less steep.
- Adding new firewalls to Panorama is super easy and not complex. Panorama can push a lot of the config and settings so you don't have to manually do it.
- Seems like it takes a minute or two to commit changes. In my option, it should take a second or two not 2 minutes.
- It will time out and log you out unexpectedly. This can be irritating when you come back after a few minutes and have to log back in.
- Policy planning and rule management
- 90%9.0
- Automated Policy Orchestration
- 90%9.0
- Device Discovery
- 100%10.0
- Policy Compliance Auditing
- 80%8.0
- Attack Path Simulation Testing
- N/AN/A
- Anomalous Event or Behavior Deviation
- 90%9.0
- Vulnerability Scans
- 90%9.0
- Firewall Rule Cleanup
- 70%7.0
- Panorama seems expensive but when you compare it to other software it really isn't and the features make it worth every dollar.
- Have panorama allow us to have entry-level team members help out even if they don't understand our whole network they can just go to panorama and know that find the info they need and what device the issue is happening on.
- It has brought peace of mind to our security knowing that all policies can be managed through a central system and patches and updated can be centralized.
Palo Alto Panorama - A Must-have Tool for Administrators of Multiple Palo Alto Firewalls
- Quick searching and filtering of logs from all your firewalls simultaneously, which helps track down the traffic of interest on any device.
- The interface matches the PANOS interface on the firewall, so you don't have to re-learn a whole new way of doing things (there is an additional tab for Panorama settings).
- Supports multiple authentication methods, including SAML and RADIUS, so it's possible to secure it with multi-factor authentication.
- Stackable templates make it easy to re-use common device configurations on multiple firewalls, and hierarchical device groups make it easy to apply policies to select or all devices at once.
- Applied filters on various sections are persistent between administrative sessions.
- Has a tendency to log out management sessions unexpectedly.
- Occasionally requires multiple login attempts to load administrative session.
- Occasionally, pushing PANOS updates to firewalls from Panorama simply fails.
- Policy planning and rule management
- 80%8.0
- Policy Compliance Auditing
- N/AN/A
- Anomalous Event or Behavior Deviation
- 70%7.0
- Firewall Rule Cleanup
- 50%5.0
- At a previous company, I deployed Palo Alto firewalls to a data center, and 12 branch locations. This allowed us to replace MPLS links with IPSec tunnels between the sites. This resulted in significantly more throughput and soft savings of increased productivity. However, the estimated net of $220,000 in hard savings over five years is what is most impressive. I could not have effectively managed all those devices without Palo Alto Panorama.
Panorama fills some gaps for us
- Being able to create common rules that can be maintained on multiple firewalls is very beneficial to our management of the different functional needs of the firewalls.
- Using templates to manage regional requirements is helpful for rolling out changes in the networking side, from user managemnet globally to SEIM/Syslog collection regionally, being able to stack templates helps deliver the necessary changes across multiple firewalls.
- Panorama's Dashboard and ACC provides useful information that can be set to see All firewalls, or just certain groups of firewalls. Since each group of firewalls has different applications running through them, being able to isolate one group at a time helps identify if there are errant devices causing unexpected traffic, and what type of traffic it is.
- The ability to push out OS updates could be improved in Panorama. It has the abilities, but the use is not intuitive, to the point that we generally connect directly to the firewalls to download the OS updates directly.
- Scheduling. It would be nice to be able to schedule jobs to run at certain times. Pushing out updates, like OS updates mentioned above, can require significant bandwidth. So being able to schedule that work for hours that would not directly affect the users would be a welcome addition.
- The list of devices in the Templates tabs should be sorted the same way that he devices are grouped in the Device Group tab, rather than just alphabetical. If there was a way to chose the order of the devices, maybe by tag, that would work as well.
- Overall, it has reduced the time that our administrators have had to spend managing firewall configurations. While we used Cisco CSM previous to migrating to Palo Alto Panorama, it was not as robust with its capabilities to manage groups of devices.
- One big advantage that we have seen is the reduction in the amount of time it takes to roll out a new firewall installation. With the grouping of firewalls, the majority of the configuration is in place and only new objects and site specific requirements need to be added. This significantly decreased time to go live for new sites.
IT Firewall Team - Manage the devices with Panorama
IT Strategy Team - Read only view of devices for base when testing in lab
IT Security Team - Read only audit of all firewalls
OT Management Team - Read only audit of firewalls in the OT group
- Manage the devices by the IT Firewall Team
- Audit policies for accuracy by the IT Security Team
- Audit policy changes on the OT related devices by the OT Management Team
- Common policies and network settings. It is not really innovative, but it is a huge timesaver without affecting the security of the devices.
- Backing up the running configurations on all of the firewalls into one repository. Again, not innovative, but has been very useful.
- The use of the Managed Devices view to make sure that all of the firewalls are getting the updates sent, rather than having to review every set of responses, you can use this view to pinpoint the devices that had issues and then look at the responce information to make corrections as necessary.
- We are not currently using the VPN (Global Connect) capabilities, but do see that in the future. Panorama should give us the ability to manage regional VPN gateways with common rules and requirements.
- Enhance our threat protection. That is on the devices and not Panorama, but is managed by Panorama.
- Common rule changes on a group of firewalls using shared objects.
- Generating the initial template for configuring a new firewall.
- Looking for common traffic from multiple firewalls in a common place.
- Pushing out upgrades to OS.
- Common certificate management.