Skip to main content
TrustRadius
Palo Alto Panorama

Palo Alto Panorama

Overview

What is Palo Alto Panorama?

According to the information provided by the vendor, Palo Alto Panorama is a network security management solution that intends to simplify and enhance cybersecurity processes for businesses. The product's primary objective is to offer various features, including unified policy management, centralized visibility, automated threat…

Read more
Recent Reviews

TrustRadius Insights

Panorama by Palo Alto Networks is widely used by organizations to manage and monitor their firewalls efficiently. With Panorama, users can …
Continue reading

Panorama delivers

9 out of 10
July 26, 2021
Incentivized
We currently utilize [two virtual Palo Alto] Panorama's in an HA pair. It is an excellent tool to manage multiple Firewalls across our …
Continue reading
Read all reviews

Popular Features

View all 8 features
  • Policy planning and rule management (12)
    9.8
    98%
  • Policy Compliance Auditing (11)
    9.4
    94%
  • Anomalous Event or Behavior Deviation (11)
    9.3
    93%
  • Automated Policy Orchestration (11)
    9.0
    90%
Return to navigation

Pricing

View all pricing

25 Devices

$9,500.00

Cloud

100 Devices

$23,750.00

Cloud

1000 Devices

$71,250.00

Cloud

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services
Return to navigation

Product Demos

Omnis Cyber Intelligence in der Praxis (4/4) - Demo einer log4j Analyse

YouTube

Installation and Demo of Palo Alto Panorama Management Server Version 10

YouTube
Return to navigation

Features

Firewall Security Management

Firewall Security Management Software supports monitoring and configuration of firewalls from a central dashboard

9.4
Avg 8.1
Return to navigation

Product Details

What is Palo Alto Panorama?

According to the information provided by the vendor, Palo Alto Panorama is a network security management solution that intends to simplify and enhance cybersecurity processes for businesses. The product's primary objective is to offer various features, including unified policy management, centralized visibility, automated threat response, simplified configuration, unrivaled scalability, and rapid security adoption. It claims to assist organizations in efficiently managing their firewalls and security tools while maintaining consistent firewall rules across their networks. While no specific industries or professions are mentioned as target users, Panorama has potential benefits for any organization seeking to fortify its network security measures.

Centralized Visibility

The product aims to provide users with the ability to visualize network activity, threat activity, and blocked activity in a user-friendly manner. It also offers customization options for creating personalized views of current and historical data. The product claims to manage network security efficiently by utilizing a single security rule base that covers various firewall functions such as threat prevention, URL filtering, application awareness, user identification, sandboxing, file blocking, access control, and data filtering. The vendor states that Panorama simplifies administration through dynamic updates and configuration management using device groups and other Panorama features. Additionally, it enables organizations to organize firewall management effectively through hierarchical device groups, dynamic address and user groups, role-based access control, policy tags, and preconfigured templates for new rule sets. Panorama is designed to scale easily alongside growing firewall deployment by managing up to 5,000 virtual, containerized, and physical Palo Alto Networks firewalls with a single pair of high-available appliances. Promising centralized visibility into traffic flows across the entire Palo Alto Networks platform while offering simplified configuration options and leveraging PAN-OS® security innovations are additional aspects highlighted by the product's vendor. However, it should be noted that these assertions lack independent evidence or verification.

Palo Alto Panorama Video

Panorama - Streamlined, powerful management with actionable visibility

Palo Alto Panorama Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(59)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Panorama by Palo Alto Networks is widely used by organizations to manage and monitor their firewalls efficiently. With Panorama, users can centrally manage firewalls internally, allowing IT staff to handle device management effectively. Additionally, Panorama's Device Grouping feature enables users to manage different types of firewalls and common security requirements within the organization. The ability to control access to restricted sites and the VPN service for end-users is another key use case of Panorama. It simplifies firewall management by providing a centralized tool that saves time and effort in configuration and updates. Furthermore, Panorama offers a vast set of features, including building new rules, creating address objects, and setting up User-ID, which are greatly beneficial for users. Many customers consider Panorama an indispensable tool as it serves as a one-point solution for their security needs. Overall, Panorama's ability to streamline firewall management, provide auditing capabilities, and offer extensive features makes it highly recommended for large environments with multiple Palo Alto firewalls.

Easy Management of Multiple Firewalls: Several users have praised the ability to create common rules that can be maintained on multiple firewalls, making it easier to manage different functional needs. This feature has been appreciated by many reviewers for simplifying firewall management.

Efficient Delivery of Changes: The use of templates to manage regional requirements and the ability to stack templates have been highlighted by multiple users as valuable features. These functionalities allow for easy delivery of necessary changes across multiple firewalls, making network updates more efficient.

Intuitive User Interface: Reviewers have consistently mentioned the ease of use and intuitive nature of Panorama's user interface. They appreciate how quick and easy it is to navigate through menus, find desired settings, and configure options. This positive feedback indicates a high level of satisfaction with the user experience.

Unintuitive User Interface: Many users have expressed frustration with the user interface of Panorama, describing it as difficult to navigate and not user-friendly. This has made it challenging for them to efficiently push out OS updates and schedule jobs.

Difficulty in Finding Features: Some users have reported difficulties in locating specific features and functions within Panorama. This lack of intuitiveness has resulted in usability issues and navigation struggles, causing frustration for users.

Slow Performance: Users have experienced delays in performance when using Panorama. Changes made within the system take a significant amount of time to be replicated to individual sites, leading to delays in overall system performance. Additionally, the web interface has been described as slow on certain browsers, taking longer than expected to commit changes and impacting workflow efficiency.

Attribute Ratings

Reviews

(1-4 of 4)
Companies can't remove reviews or game the system. Here's why
Score 8 out of 10
Vetted Review
ResellerIncentivized
It is used across the whole organization. Panorama can help in managing the administration of a large number of Palo Alto firewalls. It is a centralized interface for Palo alto firewalls, Global protect, cloud services, and logging service instead of logging into each device. There are device groups and templates that can ease administrative efforts.

Panorama helps to manage many Palo Alto firewalls in one interface. You will find device groups and templates that reduce administrative efforts. Policies are easily configured and deployed with a great web filtering module. Furthermore, you can have either a hardware or a software VM to choose from.
  • Very good user interface and user experience which helps apply the configuration easily.
  • The portal is helps you apply configuration easily, by applying your configuration and settings smoothly.
  • Addition of several firewalls with easy steps.
  • Great support and response from the vendor
  • The dual WAN functionality doesn't exist in it.
  • Better coding in order to make the portal faster
  • Hard to apply the templates, too many steps
  • It is very slow applying changes once you have committed the changes on its web interface. It could take a nearly 30 seconds until the change has been actually applied on the device, needs some software enhancements. It sometimes crashes for unknown reasons due to bugs.
It offers many advanced features to configure. This is a solution that we implement for our customers. It helps to manage several firewalls from a central location whether from the internet edge side , data centers, in the data centers. It can be deployed to be used either on-premise devices or on the cloud which has great scalability.
Firewall Security Management (8)
81.25%
8.1
Policy planning and rule management
80%
8.0
Automated Policy Orchestration
80%
8.0
Device Discovery
70%
7.0
Policy Compliance Auditing
70%
7.0
Attack Path Simulation Testing
80%
8.0
Anomalous Event or Behavior Deviation
80%
8.0
Vulnerability Scans
90%
9.0
Firewall Rule Cleanup
100%
10.0
  • According to its high performance with all security features enabled, its price is the best in the market, so it is a good bargain for the customer
  • Best pricing for all security features to be enabled on it.
  • Support and Account Managers are very responsive to critical issues that could lead customer losses
  • I don't see any negative impacts on this solution, but there is always room for improvement
Compared to other vendors, this is the most accurate next-generation firewall. Their sizing values in their data sheets is very accurate compared to other vendors, so little re-testing and validation is done on our side.

With all their security features enabled, the performance is great.
You can do anything via the GUI without going to the CLI. High real time security as every five minutes, it updates the list of phishing websites. High protection as the firewall communicates with the cloud, a machine running artificial intelligence helps to detect malware or other threats.
The support team has great communication skills. They respond to your request with courtesy and they never break their promises in their next update. They also follow up with you on a timely basis.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Our Information & Technology services department is using Palo Alto Panorama to manage our data center gateways, our GlobalProtect VPN deployment, our AD user identification, and our terminal server user identification.
  • It simplifies management by providing a single management point for most tasks.
  • It allows for customized layouts for every user.
  • Responsiveness sometimes bogs down even with recommended specs.
  • GlobalProtect user information is harder to get to than it should be.
I think Palo Alto Panorama is well suited for any deployment greater than one Palo Alto gateway. The more devices you manage, the greater the benefit of using Palo Alto Panorama is. We only have two gateways, along with two user ID agents and several hundred terminal server agents, but it still makes their management much more manageable. It doesn't add to the complexity or require substantial resources, so I can't think of a reason not to use it.
Firewall Security Management (8)
62.5%
6.3
Policy planning and rule management
90%
9.0
Automated Policy Orchestration
70%
7.0
Device Discovery
N/A
N/A
Policy Compliance Auditing
80%
8.0
Attack Path Simulation Testing
80%
8.0
Anomalous Event or Behavior Deviation
90%
9.0
Vulnerability Scans
N/A
N/A
Firewall Rule Cleanup
90%
9.0
  • It has substantially decrease the amount of time required for management.
  • It has slightly increased the time required for updates since there's an additional device to update.
Palo Alto Panorama offered much more advanced features when we made the switch from Check Point. Panorama takes an application-based approach, while still supporting older port-based methods. For Check Point, at least at the time, we switched from them, application-based security was more of a tacked-on approach. Also, Panorama's interface is web-based, while the Check Point interface was an installed application.
They have always been able to resolve our issues promptly. We have only had one critical issue, and it was handled expediently.
F5 BIG-IP, Cisco Nexus, Cisco Unified Communications Manager (Call Manager)
Score 10 out of 10
Vetted Review
Verified User
Incentivized
PaloAlto Panorama is the firewall that we use in our organization. The firewall protects all the departments of the University for malicious actors. However, defining the rules, and managing them is done by our team. This next-gen firewall has a lot of potentials to surpass the other giants in this field like Cisco and Juniper. There are different functionalities of this firewall that include integrated Intrusion Detection System (IDS), next-gen packet filter, IP and domain filter based on reputation and threat hunt based on signatures. With time it became an indispensable tool for our team acting as a one-point solution for all our needs. Its signature-based detection system is the best I have ever seen, much better than Cisco FirePower. They keep their database updated all the time, thereby reducing false positives and false negatives. It has a feature called "Wildfire" that detects malware that has been downloaded in our network. This reduced our dependency on McAfee. Other than fulfilling our security needs at a good price, it also helped in saving money by reducing the need for Cisco's Firepower which we are about to discontinue soon.
  • First, it has a very good signature-based Intrusion Detection System (IDS) that shows malicious inbound or outbound network packets. The classification for the critical threats is flawless.
  • It has a feature called "Wildfire" which act like an anti-virus and it reports any malware or malicious attachment that have been downloaded or sent through the network.
  • It needs improvement for the threats categorized as "high" severity. There are lot of false positives. Therefore finding real ones is hard in "high" category.
  • The threat/traffic view needs improvement. It needs at least a feature to sort based on columns. Downloading and parsing using Excel takes a lot of time.
Palo Alto Panorama is well suited for any scale industry. We use it to manage several units of our organization. Some units have low data flow and some like our medicine and media departments have high data flow. Thus it is highly scalable. It has a very easy interface for regular users. It doesn't require programming skills or sound technical background to use. It has a GUI that supports all kinds of operations through the interface. It also has text-based data fields that can be used by people having networking and programming background to reduce clicks. Therefore it is suited for organizations having both technical and non-technical staff. It is hard to find scenarios where it is not well suited. But yes, since it has all the functionalities integrated into it, buying Panorama for a small organization solely for the sake of firewall (if all other defense tools are already there like IDS, screening firewall) could be an expensive and redundant purchase.
Firewall Security Management (6)
78.33333333333333%
7.8
Policy planning and rule management
100%
10.0
Automated Policy Orchestration
100%
10.0
Device Discovery
80%
8.0
Policy Compliance Auditing
90%
9.0
Anomalous Event or Behavior Deviation
100%
10.0
Firewall Rule Cleanup
N/A
N/A
  • Reduced a lot of threats by blocking poorly reputed domains automatically, saving us a lot of time, which we would have otherwise spent on putting it on the manual blacklist.
  • Helped us in almost discontinuing with the Cisco Firepower, saving a lot of money, with its powerful IDS feature.
  • Cisco Firepower NGFW (formerly Sourcefire)
Palo Alto Networks Panorama is far superior to Cisco FirePower in terms of threat detection. Other than that it is very fast and easy to use. When it comes to deep packet inspection, Panorama shows all the relevant details needed, while Sourcefire pulls up a lot of details that are often not useful. In addition, the Wildfire feature helps us in detecting malicious files very easily and I have never seen any false positive in it. It also has the manual blacklist tool over Sourcefire which gives us the flexibility to add custom domains and IPs.
Palo Alto has a very nice customer support. People are very nice and were quick to reply, whenever we had an issue with the subscription or the blacklist tool. There is also a great deal of information on their website that covers each and every detail about the uses and the threat signatures. The community keeps on updating their information very frequently. Small issues are easily solved from the documentation, and for other issues, the customer support service is always present. However, on Fridays it becomes a little delayed as per my observation.
Cisco IronPort Web Security Appliance, McAfee Endpoint Security, Tenable.sc (formerly SecurityCenter), Atlassian Confluence, Cisco Firepower NGFW (formerly Sourcefire)
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Panorama is used by two groups in our organization our campus networking team and our network engineering team. Each has its own instance of Panorama but each team uses the other system to troubleshoot issues and allow and deny access over the network. Panorama helps simplify things instead of trying to guess which firewall we need to look at we can query them all and save time. In the end, Panorama saves us time and money by simplifying and combining our firewalls.
  • If you need to push a setting or config to multiple firewalls Panorama can do that flawlessly.
  • Panorama has its logging centralized and this makes it easy to locate and reviews logs compared to having to get logs from each device.
  • I love how the interface matches the interface on the firewall. This makes the learning curve less steep.
  • Adding new firewalls to Panorama is super easy and not complex. Panorama can push a lot of the config and settings so you don't have to manually do it.
  • Seems like it takes a minute or two to commit changes. In my option, it should take a second or two not 2 minutes.
  • It will time out and log you out unexpectedly. This can be irritating when you come back after a few minutes and have to log back in.
We have multiple internal and external firewalls at our headquarters as well as firewalls at our remote locations. Users are always needing to access services and systems at our headquarters and when they tell us they don't have access we can use Panorama to view the traffic and see where they are getting denied. Without Panorama we would need to log into each firewall and see if they are getting denied with Panorama we get an overview of was is happening and it's amazing.
Firewall Security Management (8)
76.25%
7.6
Policy planning and rule management
90%
9.0
Automated Policy Orchestration
90%
9.0
Device Discovery
100%
10.0
Policy Compliance Auditing
80%
8.0
Attack Path Simulation Testing
N/A
N/A
Anomalous Event or Behavior Deviation
90%
9.0
Vulnerability Scans
90%
9.0
Firewall Rule Cleanup
70%
7.0
  • Panorama seems expensive but when you compare it to other software it really isn't and the features make it worth every dollar.
  • Have panorama allow us to have entry-level team members help out even if they don't understand our whole network they can just go to panorama and know that find the info they need and what device the issue is happening on.
  • It has brought peace of mind to our security knowing that all policies can be managed through a central system and patches and updated can be centralized.
When you get help it is great. they have different service plans you need to know what plan you have and what kind of turn around you can expect. We have even had a local engineer to help us with questions and solutions. I feel the support team they have is very knowledgable and can help you out. Most of the time there is no need to escalate the issue.
Return to navigation