Skip to main content
TrustRadius
Next-Generation Firewalls - PA Series

Next-Generation Firewalls - PA Series

Overview

What is Next-Generation Firewalls - PA Series?

Palo Alto next-generation firewalls classify all traffic, including encrypted and internal traffic, based on application, application function, user and content. Users can create security policies to enable only authorized users to run sanctioned applications.

Read more
Recent Reviews

TrustRadius Insights

Users have praised Palo Alto Firewall for its advanced features, such as content filtering and application filtering, which effectively …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 11 features
  • Policy-based Controls (21)
    10.0
    100%
  • Content Inspection (21)
    9.9
    99%
  • Identification Technologies (21)
    9.9
    99%
  • Visualization Tools (21)
    9.0
    90%
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Next-Generation Firewalls - PA Series?

Palo Alto next-generation firewalls classify all traffic, including encrypted and internal traffic, based on application, application function, user and content. Users can create security policies to enable only authorized users to run sanctioned applications.

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

47 people also want pricing

Alternatives Pricing

What is Cisco Meraki MX?

Cisco Meraki MX Firewalls is a combined UTM and Software-Defined WAN solution. Meraki is managed via the cloud, and provides core firewall services, including site-to-site VPN, plus network monitoring.

N/A
Unavailable
What is Cisco Firepower 9300 Series?

The Cisco Firepower 9300 series is presented by the vendor as a carrier-grade next-generation firewall (NGFW) ideal for data centers and high-performance settings that require low latency and high throughput. With it, the vendor providdes, users can deliver scalable, consistent security to…

Return to navigation

Features

Firewall

A firewall is a filter that stands between a computer or computer network and the Internet. Each firewall can be programmed to keep specific traffic in or out

9.4
Avg 8.5
Return to navigation

Product Details

What is Next-Generation Firewalls - PA Series?

Palo Alto Network’s Next-Generation Firewalls is a firewall option integrated with other Palo Alto security products. NGFWs classify and monitor all traffic, including encrypted and internal traffic, based on application, function, user, and content. Palo Alto emphasizes the Zero Trust policy, through which users can create security policies to enable only authorized users to run sanctioned applications, reducing the surface area of cyber attacks across the organization.


Palo Alto’s NGFW provides in-firewall encryption and decryption, as well as data and application segmentation. It integrates with PA’s WildFire malware prevention service and supports easy adoption with an open-source tool for firewall migration. It encompasses on-premises and cloud environments for full-system security.

Next-Generation Firewalls - PA Series Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

Palo Alto next-generation firewalls classify all traffic, including encrypted and internal traffic, based on application, application function, user and content. Users can create security policies to enable only authorized users to run sanctioned applications.

Reviewers rate Policy-based Controls and Firewall Management Console and High Availability highest, with a score of 10.

The most common users of Next-Generation Firewalls - PA Series are from Enterprises (1,001+ employees).
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(163)

Community Insights

TrustRadius Insights are summaries of user sentiment data from TrustRadius reviews and, when necessary, 3rd-party data sources. Have feedback on this content? Let us know!

Users have praised Palo Alto Firewall for its advanced features, such as content filtering and application filtering, which effectively prevent malicious traffic and unauthorized access. The IDS/IPS and advanced malware protection features have been commended for their deep scanning capabilities and sandboxing functionality. Palo Alto Firewall is chosen by customers with large organizations that prioritize deep security investments. It is commonly used to protect perimeter networks, provide VPN connectivity, and mitigate potential misuse of the internet and attacks from shady websites. Users have successfully achieved network security, URL filtering, application control, and prevention of known and zero-day attacks with Palo Alto NGFW. The firewall serves as a reliable perimeter defense product, providing threat assessment, web proxy, and SSL inspection. It effectively addresses the problem of external intrusions and offers both basic and advanced firewall features, including protection against application-level threats, VPN management, and dynamic block lists. Palo Alto Firewall has proven itself in securing data center resources while providing enhanced security and control. The Next-Generation Firewalls are also used to secure the organization's perimeter by providing application visibility and threat intelligence to mitigate risk. Users have reported that Palo Alto Next-Generation Firewalls and WildFire have played a crucial role in quickly identifying and isolating new security threats like WannaCry.

Intuitive User Interface: Users have consistently found the user interface of Palo Alto Networks Next-Generation Firewalls - PA Series to be intuitive, making it easy to configure the firewall and perform tasks quickly. Several reviewers have mentioned this as a standout feature.

Advanced Security Features: Many users have praised the advanced features of the firewall, such as application filtering, content filtering, and deep packet inspection. These features provide enhanced security and contribute to the effectiveness of the product in protecting against malware and ransomware.

Seamless Integration with Third-Party Tools: Reviewers have appreciated the seamless integration of Palo Alto Networks Next-Generation Firewalls - PA Series with third-party tools and systems. Specifically, they mention ClearPass from HPE Aruba for user authentication and syslog integration. This integration enhances overall functionality and allows for a more streamlined experience when working with multiple tools simultaneously.

Complicated Implementation: Implementing the product into an existing network has proven to be a challenge for many users. Several reviewers have mentioned that they found it complicated and time-consuming to integrate the product with their current network infrastructure.

Difficult Packet Flow Understanding: Beginners have struggled with understanding the packet flow in Palo Alto's product. Some users have expressed frustration at the complexity of the packet flow, finding it difficult to grasp how data is processed within the system.

Expensive Compared to Competitors: The cost of Palo Alto's product is a common concern among users. Many reviewers feel that the price is high compared to other available solutions in the market. Some users believe that similar features can be obtained from competitors at a lower cost.

Attribute Ratings

Reviews

(1-21 of 21)
Companies can't remove reviews or game the system. Here's why
Diego Carmignani | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Firewall (10)
94%
9.4
Identification Technologies
100%
10.0
Visualization Tools
90%
9.0
Content Inspection
100%
10.0
Policy-based Controls
100%
10.0
Active Directory and LDAP
100%
10.0
Firewall Management Console
100%
10.0
Reporting and Logging
70%
7.0
VPN
80%
8.0
High Availability
100%
10.0
Stateful Inspection
100%
10.0
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Firewall (11)
80%
8.0
Identification Technologies
80%
8.0
Visualization Tools
70%
7.0
Content Inspection
90%
9.0
Policy-based Controls
90%
9.0
Active Directory and LDAP
90%
9.0
Firewall Management Console
90%
9.0
Reporting and Logging
70%
7.0
VPN
60%
6.0
High Availability
90%
9.0
Stateful Inspection
90%
9.0
Proxy Server
60%
6.0
Kelvin Goh | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Firewall (11)
84.54545454545455%
8.5
Identification Technologies
80%
8.0
Visualization Tools
70%
7.0
Content Inspection
90%
9.0
Policy-based Controls
80%
8.0
Active Directory and LDAP
80%
8.0
Firewall Management Console
90%
9.0
Reporting and Logging
90%
9.0
VPN
80%
8.0
High Availability
100%
10.0
Stateful Inspection
90%
9.0
Proxy Server
80%
8.0
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Firewall (11)
88.18181818181819%
8.8
Identification Technologies
100%
10.0
Visualization Tools
80%
8.0
Content Inspection
90%
9.0
Policy-based Controls
100%
10.0
Active Directory and LDAP
80%
8.0
Firewall Management Console
90%
9.0
Reporting and Logging
100%
10.0
VPN
90%
9.0
High Availability
80%
8.0
Stateful Inspection
100%
10.0
Proxy Server
60%
6.0
Score 10 out of 10
Vetted Review
Verified User
Firewall (10)
97%
9.7
Identification Technologies
90%
9.0
Visualization Tools
90%
9.0
Content Inspection
90%
9.0
Policy-based Controls
100%
10.0
Active Directory and LDAP
100%
10.0
Firewall Management Console
100%
10.0
Reporting and Logging
100%
10.0
VPN
100%
10.0
High Availability
100%
10.0
Stateful Inspection
100%
10.0
Binita Kharbanda | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Firewall (10)
97%
9.7
Identification Technologies
100%
10.0
Visualization Tools
90%
9.0
Content Inspection
100%
10.0
Policy-based Controls
100%
10.0
Active Directory and LDAP
90%
9.0
Firewall Management Console
90%
9.0
Reporting and Logging
100%
10.0
VPN
100%
10.0
High Availability
100%
10.0
Stateful Inspection
100%
10.0
Chirag Deol | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Firewall (11)
99.09090909090908%
9.9
Identification Technologies
100%
10.0
Visualization Tools
100%
10.0
Content Inspection
100%
10.0
Policy-based Controls
100%
10.0
Active Directory and LDAP
100%
10.0
Firewall Management Console
100%
10.0
Reporting and Logging
100%
10.0
VPN
100%
10.0
High Availability
100%
10.0
Stateful Inspection
100%
10.0
Proxy Server
90%
9.0
rahul Verma | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Firewall (11)
90%
9.0
Identification Technologies
100%
10.0
Visualization Tools
90%
9.0
Content Inspection
100%
10.0
Policy-based Controls
100%
10.0
Active Directory and LDAP
100%
10.0
Firewall Management Console
100%
10.0
Reporting and Logging
100%
10.0
VPN
100%
10.0
High Availability
100%
10.0
Stateful Inspection
100%
10.0
Proxy Server
N/A
N/A
Vinit Sharma | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Firewall (10)
99%
9.9
Identification Technologies
100%
10.0
Visualization Tools
90%
9.0
Content Inspection
100%
10.0
Policy-based Controls
100%
10.0
Active Directory and LDAP
100%
10.0
Firewall Management Console
100%
10.0
Reporting and Logging
100%
10.0
VPN
100%
10.0
High Availability
100%
10.0
Stateful Inspection
100%
10.0
Basant Gupta | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Firewall (10)
100%
10.0
Identification Technologies
100%
10.0
Visualization Tools
100%
10.0
Content Inspection
100%
10.0
Policy-based Controls
100%
10.0
Active Directory and LDAP
100%
10.0
Firewall Management Console
100%
10.0
Reporting and Logging
100%
10.0
VPN
100%
10.0
High Availability
100%
10.0
Stateful Inspection
100%
10.0
Chandan Singh Rathore | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Firewall (10)
96%
9.6
Identification Technologies
100%
10.0
Visualization Tools
90%
9.0
Content Inspection
100%
10.0
Policy-based Controls
100%
10.0
Active Directory and LDAP
90%
9.0
Firewall Management Console
100%
10.0
Reporting and Logging
90%
9.0
VPN
90%
9.0
High Availability
100%
10.0
Stateful Inspection
100%
10.0
Score 9 out of 10
Vetted Review
Verified User
Firewall (11)
96.36363636363637%
9.6
Identification Technologies
100%
10.0
Visualization Tools
90%
9.0
Content Inspection
100%
10.0
Policy-based Controls
100%
10.0
Active Directory and LDAP
100%
10.0
Firewall Management Console
100%
10.0
Reporting and Logging
90%
9.0
VPN
80%
8.0
High Availability
100%
10.0
Stateful Inspection
100%
10.0
Proxy Server
100%
10.0
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Firewall (11)
91.81818181818181%
9.2
Identification Technologies
100%
10.0
Visualization Tools
80%
8.0
Content Inspection
100%
10.0
Policy-based Controls
90%
9.0
Active Directory and LDAP
90%
9.0
Firewall Management Console
80%
8.0
Reporting and Logging
80%
8.0
VPN
90%
9.0
High Availability
100%
10.0
Stateful Inspection
100%
10.0
Proxy Server
100%
10.0
Adam Morrison | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Firewall (11)
72.72727272727272%
7.3
Identification Technologies
80%
8.0
Visualization Tools
60%
6.0
Content Inspection
90%
9.0
Policy-based Controls
90%
9.0
Active Directory and LDAP
90%
9.0
Firewall Management Console
60%
6.0
Reporting and Logging
70%
7.0
VPN
80%
8.0
High Availability
90%
9.0
Stateful Inspection
90%
9.0
Proxy Server
N/A
N/A
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Firewall (8)
76.25%
7.6
Identification Technologies
80%
8.0
Visualization Tools
80%
8.0
Content Inspection
80%
8.0
Policy-based Controls
80%
8.0
Active Directory and LDAP
70%
7.0
Firewall Management Console
80%
8.0
Reporting and Logging
90%
9.0
VPN
50%
5.0
October 14, 2019

Palo Alto NGFW

Score 10 out of 10
Vetted Review
Verified User
Incentivized
Firewall (11)
85.45454545454545%
8.5
Identification Technologies
100%
10.0
Visualization Tools
80%
8.0
Content Inspection
100%
10.0
Policy-based Controls
100%
10.0
Active Directory and LDAP
100%
10.0
Firewall Management Console
80%
8.0
Reporting and Logging
100%
10.0
VPN
90%
9.0
High Availability
100%
10.0
Stateful Inspection
90%
9.0
Proxy Server
N/A
N/A
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Firewall (11)
81.81818181818181%
8.2
Identification Technologies
60%
6.0
Visualization Tools
80%
8.0
Content Inspection
80%
8.0
Policy-based Controls
90%
9.0
Active Directory and LDAP
60%
6.0
Firewall Management Console
100%
10.0
Reporting and Logging
90%
9.0
VPN
100%
10.0
High Availability
90%
9.0
Stateful Inspection
80%
8.0
Proxy Server
70%
7.0
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Firewall (11)
95.45454545454545%
9.5
Identification Technologies
100%
10.0
Visualization Tools
90%
9.0
Content Inspection
90%
9.0
Policy-based Controls
90%
9.0
Active Directory and LDAP
100%
10.0
Firewall Management Console
100%
10.0
Reporting and Logging
80%
8.0
VPN
100%
10.0
High Availability
100%
10.0
Stateful Inspection
100%
10.0
Proxy Server
100%
10.0
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Firewall (11)
80.90909090909092%
8.1
Identification Technologies
90%
9.0
Visualization Tools
90%
9.0
Content Inspection
80%
8.0
Policy-based Controls
80%
8.0
Active Directory and LDAP
90%
9.0
Firewall Management Console
50%
5.0
Reporting and Logging
90%
9.0
VPN
90%
9.0
High Availability
70%
7.0
Stateful Inspection
90%
9.0
Proxy Server
70%
7.0
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Firewall (11)
78.18181818181819%
7.8
Identification Technologies
80%
8.0
Visualization Tools
80%
8.0
Content Inspection
70%
7.0
Policy-based Controls
100%
10.0
Active Directory and LDAP
80%
8.0
Firewall Management Console
90%
9.0
Reporting and Logging
90%
9.0
VPN
70%
7.0
High Availability
100%
10.0
Stateful Inspection
100%
10.0
Proxy Server
N/A
N/A
Score 7 out of 10
Vetted Review
Verified User
Firewall (10)
75%
7.5
Identification Technologies
70%
7.0
Visualization Tools
70%
7.0
Content Inspection
80%
8.0
Policy-based Controls
70%
7.0
Firewall Management Console
70%
7.0
Reporting and Logging
70%
7.0
VPN
80%
8.0
High Availability
80%
8.0
Stateful Inspection
80%
8.0
Proxy Server
80%
8.0
Return to navigation