Overview
What is Next-Generation Firewalls - PA Series?
Palo Alto next-generation firewalls classify all traffic, including encrypted and internal traffic, based on application, application function, user and content. Users can create security policies to enable only authorized users to run sanctioned applications.
Powerful and Easy Firewall - For Enterprise Companies
Palo Alto Networks Next- Generation Firewall makes a solid product
Palo Alto Networks Next-Generation Firewalls Review
Palo Alto - Networks Next-Generation Firewalls Review
Palo Alto Networks Next-Generation Firewalls - features of a ML based firewall that you need to know!
Palo Alto Next Generation Firewall: A firewall with complete protection
Palo Alto Networks Next-Generation Firewalls - PA Series Review
Most powerful firewall - Palo Alto
Palo Alto for Deep Scanning
Palo Alto Networks Next-Generation is best firewall.
Why you should go with Palo Alto
Best NGFW product I have ever worked with
Palo Alto PA Series firewalls deliver tons of features and straightforward management
Palo Alto PA Series Review
Palo Alto - Security in a box
Awards
Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards
Popular Features
- Policy-based Controls (21)10.0100%
- Content Inspection (21)9.999%
- Identification Technologies (21)9.999%
- Visualization Tools (21)9.090%
Pricing
What is Next-Generation Firewalls - PA Series?
Palo Alto next-generation firewalls classify all traffic, including encrypted and internal traffic, based on application, application function, user and content. Users can create security policies to enable only authorized users to run sanctioned applications.
Entry-level set up fee?
- No setup fee
Offerings
- Free Trial
- Free/Freemium Version
- Premium Consulting/Integration Services
Would you like us to let the vendor know that you want pricing?
47 people also want pricing
Alternatives Pricing
What is Cisco Meraki MX?
Cisco Meraki MX Firewalls is a combined UTM and Software-Defined WAN solution. Meraki is managed via the cloud, and provides core firewall services, including site-to-site VPN, plus network monitoring.
What is Cisco Firepower 9300 Series?
The Cisco Firepower 9300 series is presented by the vendor as a carrier-grade next-generation firewall (NGFW) ideal for data centers and high-performance settings that require low latency and high throughput. With it, the vendor providdes, users can deliver scalable, consistent security to…
Features
Firewall
A firewall is a filter that stands between a computer or computer network and the Internet. Each firewall can be programmed to keep specific traffic in or out
- 9.9Identification Technologies(21) Ratings
Policy-based visibility and control over applications, users and content
- 9Visualization Tools(21) Ratings
Visualization tools present administrators with data on applications traversing the network, who is using them, and the potential security impact.
- 9.9Content Inspection(21) Ratings
Inspecting permitted application traffic by means of threat prevention, URL filtering and data filtering
- 10Policy-based Controls(21) Ratings
Firewall policy controls enable administrators to create firewall policies controlling what data is allowed to traverse the firewall
- 9.9Active Directory and LDAP(20) Ratings
Integration with Active Directory and LDAP directories
- 10Firewall Management Console(21) Ratings
Either command-line or web-based interface for centralized control and management
- 7.6Reporting and Logging(21) Ratings
Custom and summary reports, and log files enabling analysis of security incidents, application usage and traffic patterns
- 8.4VPN(21) Ratings
VPN's implement encryption and anonymize IP addresses
- 10High Availability(20) Ratings
Built-in capacity to prevent exposure if primary firewall stops working
- 10Stateful Inspection(20) Ratings
Stateful inspection analyzes packet headers and contents of packets
- 8.8Proxy Server(10) Ratings
A proxy server changes your IP address and masks the origin of your network traffic
Product Details
- About
- Tech Details
- FAQs
What is Next-Generation Firewalls - PA Series?
Palo Alto Network’s Next-Generation Firewalls is a firewall option integrated with other Palo Alto security products. NGFWs classify and monitor all traffic, including encrypted and internal traffic, based on application, function, user, and content. Palo Alto emphasizes the Zero Trust policy, through which users can create security policies to enable only authorized users to run sanctioned applications, reducing the surface area of cyber attacks across the organization. Palo Alto’s NGFW provides in-firewall encryption and decryption, as well as data and application segmentation. It integrates with PA’s WildFire malware prevention service and supports easy adoption with an open-source tool for firewall migration. It encompasses on-premises and cloud environments for full-system security. |
Next-Generation Firewalls - PA Series Technical Details
Operating Systems | Unspecified |
---|---|
Mobile Application | No |
Frequently Asked Questions
Comparisons
Compare with
Reviews and Ratings
(163)Community Insights
- Business Problems Solved
- Pros
- Cons
Users have praised Palo Alto Firewall for its advanced features, such as content filtering and application filtering, which effectively prevent malicious traffic and unauthorized access. The IDS/IPS and advanced malware protection features have been commended for their deep scanning capabilities and sandboxing functionality. Palo Alto Firewall is chosen by customers with large organizations that prioritize deep security investments. It is commonly used to protect perimeter networks, provide VPN connectivity, and mitigate potential misuse of the internet and attacks from shady websites. Users have successfully achieved network security, URL filtering, application control, and prevention of known and zero-day attacks with Palo Alto NGFW. The firewall serves as a reliable perimeter defense product, providing threat assessment, web proxy, and SSL inspection. It effectively addresses the problem of external intrusions and offers both basic and advanced firewall features, including protection against application-level threats, VPN management, and dynamic block lists. Palo Alto Firewall has proven itself in securing data center resources while providing enhanced security and control. The Next-Generation Firewalls are also used to secure the organization's perimeter by providing application visibility and threat intelligence to mitigate risk. Users have reported that Palo Alto Next-Generation Firewalls and WildFire have played a crucial role in quickly identifying and isolating new security threats like WannaCry.
Intuitive User Interface: Users have consistently found the user interface of Palo Alto Networks Next-Generation Firewalls - PA Series to be intuitive, making it easy to configure the firewall and perform tasks quickly. Several reviewers have mentioned this as a standout feature.
Advanced Security Features: Many users have praised the advanced features of the firewall, such as application filtering, content filtering, and deep packet inspection. These features provide enhanced security and contribute to the effectiveness of the product in protecting against malware and ransomware.
Seamless Integration with Third-Party Tools: Reviewers have appreciated the seamless integration of Palo Alto Networks Next-Generation Firewalls - PA Series with third-party tools and systems. Specifically, they mention ClearPass from HPE Aruba for user authentication and syslog integration. This integration enhances overall functionality and allows for a more streamlined experience when working with multiple tools simultaneously.
Complicated Implementation: Implementing the product into an existing network has proven to be a challenge for many users. Several reviewers have mentioned that they found it complicated and time-consuming to integrate the product with their current network infrastructure.
Difficult Packet Flow Understanding: Beginners have struggled with understanding the packet flow in Palo Alto's product. Some users have expressed frustration at the complexity of the packet flow, finding it difficult to grasp how data is processed within the system.
Expensive Compared to Competitors: The cost of Palo Alto's product is a common concern among users. Many reviewers feel that the price is high compared to other available solutions in the market. Some users believe that similar features can be obtained from competitors at a lower cost.
Attribute Ratings
Reviews
(1-22 of 22)Powerful and Easy Firewall - For Enterprise Companies
- Easy web management interface
- Search is powerfull and easly
- Many L7 Applications recognize for policies
- SD-WAN feature is quite difficult
- Dedicated logging server missing
- Entry PA Appliance has slowly web interface
- Commit configuration is slower than other competitors
- Palo Alto Networks Next-Generation Firewalls - PA Series are excellent at utilizing URL filtering to provide us very granular access to individuals or Active directory groups as needed.
- The Palo Alto Networks Next-Generation Firewalls - PA Series adds multiple defense layers to include, Anti Spyware, Anti-Malware, File blocking, URL filtering, and we also incorporate the.
- Wildfile malware protection subscription.
- SSL Inspection was very manageable by creating decryption policies by URL category.
- The Global Protect VPN setup could be a little more intuitive.
- Creating IPSec VPN tunnels can be a little challenging. Would be nice if they grouped and forced entries in all the necessary places as a guide.
Palo Alto Networks Next-Generation Firewalls Review
- WildFire file analysis.
- Threat prevention.
- DNS security.
- Fasten policy deployment.
- Provide more threat details.
- Visibility over file analysis details.
Palo Alto Networks Next-Generation Firewalls - features of a ML based firewall that you need to know!
- Palo Alto Networks Next-Generation Firewalls - PA Series gives predictive performance, as per our sizing and requirements
- It is integrated very well with internal features it is providing, like, Wildfire Sandbox integrated with gateway AV and URL filtering engine
- Seamlessly integrates with 3rd party tools and systems, like integration with ClearPass from HPE Aruba for user auth, syslog integration, etc
- Enhanced security features like EDL, Credential theft prevention, DNS Security, ML based firewall, which we cannot find in another solutions
- Palo Alto Networks Next-Generation Firewalls - PA Series provides platform for network security but lacks features for additional features like built-in MFA, cloud based management, etc
- In file filtering and AV module, there could be a few optional features of white listing a specific file by its name or hash value or some other detail.
- Compared to other vendors, this is costly, but again, feature-rich and hence cannot be with other firewalls.
- Application Level filtering is the best feature which is known as AppID.
- Content filtering also the best function which is known as ContentID.
- Data Encryption is very strong.
- Sandboxing also very good function.
- Heavy budget small level company can't afford.
- Only pro level security engineer can handle or work on it.
- To remember CLI based command is very difficult.
Best NGFW product I have ever worked with
- Firewall performance during threat analysis
- Wildfire support to protect from zero-day threats
- Huge database of applications and behavior knowledge
- Virtual wire inline deployment mode
- In the field of GP VPN
- Cloud segment
- Third-party integration support
Palo Alto PA Series firewalls deliver tons of features and straightforward management
- It does an excellent job of securing by applications rather than relying on ports.
- With the separate management and data planes we've never experience performance issues.
- Content updates (apps, URLs, threats) are seamless and automatic.
- It is very flexible and powerful on the network configuration side.
- When web managing, you cannot sort by columns by clicking on a column.
- Palo Alto does not officially bless specific versions as recommended.
- The Global Protect client upgrade process does not provide feedback on progress.
- Logging queries sometimes take a while to complete.
Palo Alto PA Series Review
- Security Enforcement and Review - The Palo Alto firewall provides all the advanced features you would expect from a modern firewall. Zones based rules, Layer 4 and down rules, and application firewall rules.
- User Definition - The Palo Alto firewall has direct AD integration. This allows rules to be based not just on source an destination information, but also on which security group in the AD that user belong. For example you can limit access to out of band networks to only the users that need it.
- Line Rate Traffic Analysis - When doing my home work I found that Palo Alto firewalls provide high speed analysis to traffic with additional processors to allow line speed results.
- No cloud analytics - I believe industry as a whole is moving to a management suite powered by ML. Palo has a great product, but currently there is no ML backed platform.
- SD WAN - Palo has just announced the addition of SDWAN in its upcoming 9.1 release. I feel they are a bit late to the game compared to others like Fortinet.
- Web based interface can still seem slow at time when compared to more modern HTML 5 interfaces.
Palo Alto - Security in a box
- Inline rule threat assessment
- Good information dataplane and graphics
- GlobalProtect VPN needs a user launchable option from pre-logon. This has been a challenge for government customers for years. Their competitor Cisco AnyConnect has SBL.
- Quality of upgrades/updates has been getting worse throughout the years. As of recent things they supposedly fixed have been making it back into the newer updates causing more headache for administrators to roll back. Especially if the update addresses a CVE.
- Some of the lower end units do not perform to the spec on paper - 220/800.
Palo Alto NGFW
- Web filtering by category is done better than competing solutions (FortiGate, for example). There is a significantly smaller number of false negatives, at least in my experience, on Palo Alto firewalls than on competing solutions.
- Logging. Firewall logs on the Palo Alto are very comprehensive. Firewall stores a lot of information about client connections and log filtering options are incredible.
- Reliable. Palo Alto firewalls we are using were trouble-free so far both software and hardware-wise.
- Very good VPN solution. GlobalProtect VPN works very well - stable and high performance. As it is hard to troubleshoot issues with remote clients, good performance by SSL VPN client is an important point.
- Can be complicated to use. Both the Web interface and the CLI of the Palo Alto firewall are quite sophisticated. It is much harder to perform the configuration of the Palo Alto firewall than a Fortinet one.
- Subscriptions. To properly use the firewall, subscription packages are needed, and licensing can be confusing and/or expensive.
Palo Alto Networks Next-Generation Firewalls
- Security performance
- Implementation
- Managment
- Cloud features
- Value
- Support
Palo Alto Security Gateways are Simply Secure
- Simple Policy Management
- Easy-to-read Documentation
- On-Board Troubleshooting Tools
- URL-Filtering rules are complex
- Some Cryptic Error Messages
- Undocumented software bugs
A huge improvement over traditional layer 2/3 firewalls.
- Ease of use.
- Fast response to new security threats (WildFire).
- Application aware firewall (App-ID).
- Logging is fantastic and easy to see what's being blocked/allowed basically in real time.
- Durability/reliability is surprisingly good, only issue we've had is a couple issues with faulty power supplies, but all our units have redundant power supplies so it was a non-issue.
- Support is surprisingly good.
- Cost, these firewalls are awesome, but not cheap.
PAN: It costs a lot, but it's worth it!
- Easy to learn and use the web-based console. Learn the platform and be able to manage any Palo Alto device.
- No separate management for control/data plane like the checkpoint.
- VPN is VERY easy to set up, even double/twice NAT VPN, and can use VTI for route-based VPN setups.
- Units are far more expensive than competitors. It's worth it, but the price point can scare potential clients off.
- Palo Alto Networks is a leader in zone-based firewall deployments.
- Palo Alto Networks domain integration makes them a leader in restricting access based on source user/AD group.
- Palo Alto is continuously developing their Application catalog to help restrict traffic on layer 7 apps not just ports/services.
- Palo Alto threat signatures and application signatures are not available to most customers, the black box method makes it hard to determine the root cause of issues in some cases.
- Some updates - especially for new OS releases are buggy and needs to be fully tested before deployment.
Palo is about as good as it gets.
- Having two engines:
- Routing Engine—The Routing Engine provides three main functions:
- Creates the packet forwarding switch fabric for the Services Router, providing route lookup, filtering, and switching on incoming data packets, then directing outbound packets to the appropriate interface for transmission to the network.
- Maintains the routing tables used by the router and controls the routing protocols that run on the router.
- Provides control and monitoring functions for the router, including controlling power and monitoring system status.
- Packet Forwarding Engine—Processes packets; applies filters, routing policies, and other features; and forwards packets to the next hop along the route to their final destination.
- The search functions of the appliances and the OS is pretty good. Better than most firewalls.
- Engaging support was quicker, which can really make or break your day\week when it comes to an outage.
- Building an OSPF tunnel with another vendor is proving difficult. Support cant seem to fix it even in their sandbox environment.
- The Firewall is extremely granular, sometimes searching can prove tedious and frustrating if you're new to the OS.
Great Enterprise Level Networks Next-Generation Firewalls
- Very good security features including hardware-level antivirus and intrusion prevention.
- Customizable firewall rules and NAT policies that will match any network's needs.
- Great management interface.
- Different size of appliances for different purposes/environments.
- We have seen that occasionally the reporting feature can be buggy and that certain options might be missing from the menu in the report section. This seems to be a known bug and we have been working with PAN support to apply a hotfix patch to address the issue.
Palo Alto will stop the bad guys for you!
- AppID is able to see what the actual internet traffic is. For instance instead of port 443 just being "Internet traffic" we can define access to Facebook-base or all the other facets of facebook.
- UserID allows us to define policies based on group or user access and integrates with our Active Directory. This helps to configure a least access privilege and if we find misuse of the network we can tighten specific users to a stricter policy.
- GlobalProtect VPN connection helps our employee's connect from home remotely. This provides a very secure connection with minimal configuration.
- Wildfire provides very up-to-date information regarding global attack mitigations and stopping techniques.
- Our specific model is a bit slow and outdated and takes up to 10 minutes to commit a configuration change.
- Nested security rules would be helpful instead of a linear approach. But rule creation in general is very simple.
- Documentation gives a very straight forward answer to some items but is very vague in others.
- Support could be a little better. An issue we had a tech was insistent it was the "other guy" and it ended up being the very latest PAN OS upgrade.
Not Beginner-friendly, but Powerful and Comprehensive
- Web Filtering - Analysis is fast and comprehensive, with all the options one should expect from a professional Web filter. Admins can set options to audit, warn, click-through, password-protect, or block sites based on numerous criteria. Changing site categories is easy and Palo Alto do a good job of being pretty up-to-date on their site catalog.
- Packet Identification - This is an area where Palo Alto excels. Want to allow your users to use Facebook, but block IM and/or file transfers? Easy. Have an inbound file that says it's a jpeg but is really an Excel spreadsheet? Busted.
- WildFire - I hated it at first, but it's come a long way. Unknown files can be sent to WildFire for them to sandbox and analyze. The result is fairly fast return times and a process that contributes to the improvement of your firewall's function.
- Updates - They happen often and are quick to install, but new definitions with a threat level of critical should be blocked by default, not set to audit-only.
- SSL Proxy - This works great if you have very little traffic on your PA. If you turn this on, expect to cut the firewall's performance in half. Even then, no SSL Proxy is perfect, so some sites just won't work.
Palo Alto Review
- Protects against common threats such as unauthorized vulnerability scans
- Protects against malware applications and ransomware such as Cryptowall
- Allows very secure VPN connections for external users
- The web content filtering is good, but could be improved
- Wildfire can take a long time to analyze files
- Alerts and logs could contain a little more information or intelligence to help narrow down a threat.
- Monitoring and detecting unwanted application access by our users, such as streaming and torrent download sites.
- Preventing exploits and malware from hitting our network and infecting all end-user PCs and servers.
- Excellent secure VPN access for our outside staff and partners. The VPN software client is available for PC & Mac as well as mobile client options on Android and Apple stores.
- The products are a bit pricey, but feature filled. Their annual services can really add up quickly.
- The models of devices are somewhat confusing. For instance, we wanted a firewall that had the ability to use Active & Passive fault tolerance, and only the very advanced models (more expensive) do this. It might bring smaller customers in by adding more advanced features to lower-priced models.
Firewall and Wildfire? Great!
- The VPN (GlobalProtect) is easy to use.
- Logging is done well and in an easy to use situation.
- The GeoBlocking is exceptional.
- The web interface to look at real time events is very slow and clunky.
- The searching feature is hard to figure out what parameters you use.
- The GlobalProtect VPN client has a few strange features that have increased support hours. It's easy to work around but caused a few unnecessary tickets.