Skip to main content
TrustRadius
Next-Generation Firewalls - PA Series

Next-Generation Firewalls - PA Series

Overview

What is Next-Generation Firewalls - PA Series?

Palo Alto next-generation firewalls classify all traffic, including encrypted and internal traffic, based on application, application function, user and content. Users can create security policies to enable only authorized users to run sanctioned applications.

Read more
Recent Reviews

TrustRadius Insights

Users have praised Palo Alto Firewall for its advanced features, such as content filtering and application filtering, which effectively …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 11 features
  • Policy-based Controls (21)
    10.0
    100%
  • Content Inspection (21)
    9.9
    99%
  • Identification Technologies (21)
    9.9
    99%
  • Visualization Tools (21)
    9.0
    90%
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Next-Generation Firewalls - PA Series?

Palo Alto next-generation firewalls classify all traffic, including encrypted and internal traffic, based on application, application function, user and content. Users can create security policies to enable only authorized users to run sanctioned applications.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

47 people also want pricing

Alternatives Pricing

What is Cisco Meraki MX?

Cisco Meraki MX Firewalls is a combined UTM and Software-Defined WAN solution. Meraki is managed via the cloud, and provides core firewall services, including site-to-site VPN, plus network monitoring.

N/A
Unavailable
What is Cisco Firepower 9300 Series?

The Cisco Firepower 9300 series is presented by the vendor as a carrier-grade next-generation firewall (NGFW) ideal for data centers and high-performance settings that require low latency and high throughput. With it, the vendor providdes, users can deliver scalable, consistent security to…

Return to navigation

Features

Firewall

A firewall is a filter that stands between a computer or computer network and the Internet. Each firewall can be programmed to keep specific traffic in or out

9.4
Avg 8.5
Return to navigation

Product Details

What is Next-Generation Firewalls - PA Series?

Palo Alto Network’s Next-Generation Firewalls is a firewall option integrated with other Palo Alto security products. NGFWs classify and monitor all traffic, including encrypted and internal traffic, based on application, function, user, and content. Palo Alto emphasizes the Zero Trust policy, through which users can create security policies to enable only authorized users to run sanctioned applications, reducing the surface area of cyber attacks across the organization.


Palo Alto’s NGFW provides in-firewall encryption and decryption, as well as data and application segmentation. It integrates with PA’s WildFire malware prevention service and supports easy adoption with an open-source tool for firewall migration. It encompasses on-premises and cloud environments for full-system security.

Next-Generation Firewalls - PA Series Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

Palo Alto next-generation firewalls classify all traffic, including encrypted and internal traffic, based on application, application function, user and content. Users can create security policies to enable only authorized users to run sanctioned applications.

Reviewers rate Policy-based Controls and Firewall Management Console and High Availability highest, with a score of 10.

The most common users of Next-Generation Firewalls - PA Series are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(163)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Users have praised Palo Alto Firewall for its advanced features, such as content filtering and application filtering, which effectively prevent malicious traffic and unauthorized access. The IDS/IPS and advanced malware protection features have been commended for their deep scanning capabilities and sandboxing functionality. Palo Alto Firewall is chosen by customers with large organizations that prioritize deep security investments. It is commonly used to protect perimeter networks, provide VPN connectivity, and mitigate potential misuse of the internet and attacks from shady websites. Users have successfully achieved network security, URL filtering, application control, and prevention of known and zero-day attacks with Palo Alto NGFW. The firewall serves as a reliable perimeter defense product, providing threat assessment, web proxy, and SSL inspection. It effectively addresses the problem of external intrusions and offers both basic and advanced firewall features, including protection against application-level threats, VPN management, and dynamic block lists. Palo Alto Firewall has proven itself in securing data center resources while providing enhanced security and control. The Next-Generation Firewalls are also used to secure the organization's perimeter by providing application visibility and threat intelligence to mitigate risk. Users have reported that Palo Alto Next-Generation Firewalls and WildFire have played a crucial role in quickly identifying and isolating new security threats like WannaCry.

Intuitive User Interface: Users have consistently found the user interface of Palo Alto Networks Next-Generation Firewalls - PA Series to be intuitive, making it easy to configure the firewall and perform tasks quickly. Several reviewers have mentioned this as a standout feature.

Advanced Security Features: Many users have praised the advanced features of the firewall, such as application filtering, content filtering, and deep packet inspection. These features provide enhanced security and contribute to the effectiveness of the product in protecting against malware and ransomware.

Seamless Integration with Third-Party Tools: Reviewers have appreciated the seamless integration of Palo Alto Networks Next-Generation Firewalls - PA Series with third-party tools and systems. Specifically, they mention ClearPass from HPE Aruba for user authentication and syslog integration. This integration enhances overall functionality and allows for a more streamlined experience when working with multiple tools simultaneously.

Complicated Implementation: Implementing the product into an existing network has proven to be a challenge for many users. Several reviewers have mentioned that they found it complicated and time-consuming to integrate the product with their current network infrastructure.

Difficult Packet Flow Understanding: Beginners have struggled with understanding the packet flow in Palo Alto's product. Some users have expressed frustration at the complexity of the packet flow, finding it difficult to grasp how data is processed within the system.

Expensive Compared to Competitors: The cost of Palo Alto's product is a common concern among users. Many reviewers feel that the price is high compared to other available solutions in the market. Some users believe that similar features can be obtained from competitors at a lower cost.

Attribute Ratings

Reviews

(1-25 of 37)
Companies can't remove reviews or game the system. Here's why
Diego Carmignani | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Watchguard is recommended in Midsize Companies. It hasn't a real L7 feature for policies pfSense is powerful and open-source but L7 feature missing so it's impossible to goal our objectives
Score 10 out of 10
Vetted Review
Verified User
Incentivized
The Palo Alto Networks Next-Generation Firewalls - PA Series are much easier to configure than both Checkpoint and Cisco, in my opinion. From Security policy management and traffic inspection standpoints, there is no comparison.
Kelvin Goh | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Palo Alto NGFW is quite stable and able to perform most of the security features. It is also have real-time updates for the latest signatures which helps to identify and prevent threats efficiently. The overall deployment is straight forward and easy to implement. User interface is simple and easy to adapt by the administrators.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Fortinet - faster than Palo Alto, but features are less.
Cisco ASA
Palo Alto Single Pass gathering all [of] the data in a series of logs is the best among other firewalls. It is very clear in inspection and providing you insight [into] data [that] is passing through the network.
Score 10 out of 10
Vetted Review
Verified User
Binita Kharbanda | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
On other firewalls creating the policy is a bit complex, but with the Palo Alto Next-Generation Firewalls, it can be done with ease as it provides the best user-friendly GUI. It provides complete protection from both signature-based and signature-less attacks both. With its sandboxing feature and Wildfire solutions, protection can be enriched.
Chirag Deol | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Cisco Firepower only has basic functionality, URL filtering always create problems also GUI is very bad that's why most organization [are] using Palo Alto rather than Cisco Firepower.
Vinit Sharma | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We are using Cisco ASA before in our environment but when it comes to deep scanning & layer 7 security it doesn't have that capability. After using Palo Alto Networks Next-Generation Firewall we are using sandboxing & advance malware protection that provides high-level end-user security. Also after implementing it we can easily monitor user-level traffic.
Basant Gupta | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
No one can say any other companies in this time is better than Palo Alto Networks Next-Generatoin Firewalls. Palo Alto offers very advanced features which protect you[r] organization. Advanced malware protection, anti spam, lots of other threats.
Chandan Singh Rathore | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Palo Alto has a user-friendly GUI and it comes with a single console from where you can manage all the policies and routing. It has advanced capabilities to prevent APT (Advanced Persistent Threat) attacks. Cisco Firepower lacks in capabilities with Palo Alto if we compare it.
Score 9 out of 10
Vetted Review
Verified User
  • Cisco ASA and Check Point 4000 Appliances
Biggest reason to select Palo Alto Networks Next-Generation Firewalls - PA Series over these products is for the performance during traffic inspection via various engines like UID, AppID, and ContentID. Another factor was both the other products were not very capable of providing such a strong URL filtering which Palo Alto Networks Next-Generation Firewalls - PA Series is providing during our POC. Also, administration can be done via GUI console completely with Palo Alto Networks Next-Generation Firewalls - PA Series, while in other two products, you have to play with CLI commands most of the time.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
At first we continued using Check Point as our port-based firewall while using Palo Alto for content/URL filtering and threat prevention. However, we soon realized the Palo Alto did everything the Check Point did, plus quite a bit more. Hence, it made sense to consolidate all functions on the Palo Alto instead of splitting them between the two. The Palo Alto was also quite a bit more advanced as far as routing and policy-based routing goes.
Adam Morrison | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
I did not originally choose Palo Alto as our core firewall appliance. It has already been purchased when I came on board. However, I did recently choose to purchase new Palo Alto firewalls to replaced our older models. I have had experience working with Cisco ASAs and SonicWall appliances in other jobs, and we have a CheckPoint stack stood up in our lab here at the resort we compared to the Palo Altos. None of the others could compare in features and management. SonicWall did not have the features we had grown accustomed to having already used the Palo Altos. And with their recent purchase and then spun back out cycle the company had been thru we were reluctant. My engineers and I have use ASA in the past. They are good products, but still very "old school". Checkpoint we did not feel treated as well as a company and we took them off the potential list.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
I've been using NGFW since 2014. When it really was the main player in the new term "Next Gen Firewall". I'm sure the bar is pretty matched across the board with Fireeye and other niche players and even Juniper/Cisco etc. Eventually there will be equilibrium. I chose Palo Alto because I am comfortable with them, I know the product fairly well from my time using them at Raytheon/(Websense/Forcepoint). I would certainly choose them over a Sophos UTM or Forcepoint Firewalls at the moment. I say this with extreme caution, if PA cannot get their update quality resolved in the future, I may be forced to look at other products that may spend more time QA'ing their updates.

A prime example is in the upgrade/iupdate stream, there are newer versions out that are not stable or recommended by support, but yet there is no indication from the "Update Software" if that release is GA, ED, or Beta/Alpha. There needs to be more visual communication to [system administrators] whether a release is GA or no from within the update options in the firewall.
October 14, 2019

Palo Alto NGFW

Score 10 out of 10
Vetted Review
Verified User
Incentivized
The main competitor I can compare Palo Alto to is the FortiGate series of devices by Fortinet. FortiGates are capable UMTs and also less expensive than Palo Altos. That being said, category filtering on FortiGates is less effective, and they are not as feature-rich as Palo Altos. My suggestion would be to use FortiGate for simpler deployments and Palo Altos for more demanding ones.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We previously used Cisco 5585 ASAs with firepower. We wanted a more holistic solution than what the Cisco ASA was providing for us. In this situation, we needed to have consistency in how rules were applied across multiple types of traffic, while also knowing what kind of traffic was being sent. The inspection capabilities alone sold us on the Palo Alto, and we have reaped significant other benefits as well.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We put Palo Alto in place over Cisco ASA as a product set. Until a few years ago, Cisco didn’t have a next-generation firewall, primarily meaning their appliances didn’t have application identification or control. Since their acquisition of Sourcefire, however, they’ve reintroduced the X series with FirePOWER, which includes these features. FirePOWER has been nothing but a pain to implement, install, maintain, and upgrade. I would highly suggest this not be your solution if you want anything other than firewalling and VPN.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
In my opinion, Palo Alto provides the most easily managed firewall on the market, with the most options for device management. Compared to other vendors it's very obvious that Palo Alto focuses on their firewall technologies and supporting them. The monitoring and visibility features are the simplest to implement and clearest to observe.
Irteza Rana | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Palo Alto has the ability to secure public cloud which none of the vendors have currently. With Palo Alto VM series you can deploy firewall VM in minutes and secure your public cloud.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
I've been really happy with our Palo Alto [solutions] and we're replacing a good chunk of our ASAs with Palo Alto. As far as firewalls go the Palo Alto firewalls are significantly better in my opinion, but we still use ASAs as VPN devices in a few scenarios and they work just fine for that, but when looking for the best firewall I'd go with Palo Alto in most cases.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Why did we choose PAN? The number of exploits written for PAN devices are much smaller than ASA. It's much simpler to manage than the checkpoint. It includes web filtering module with the product. Quite simply, it was just the best bang for the buck. Our management consistently requires that we use network devices for 5-7 years, so these units fit the bill.
Return to navigation