Palo Alto Panorama Features and Benefits
Amit Gumber profile photo
March 14, 2019

Palo Alto Panorama Features and Benefits

Score 10 out of 10
Vetted Review
Verified User
Review Source

Overall Satisfaction with Palo Alto Panorama

We are using PA Panorama for centralized management of firewalls and to control security policy enforcement across the network. This is used to manage firewalls installed in our whole organization where it provides us ease of administration and a holistic view of our security design over a single pane of glass. It also serves to apply updates and push policies from the central console.
  • Panorama is very useful in updating the software in bulk with a single click without any hassles.
  • It also provides us detailed reporting to check the validate the compliance status.
  • Panorama is used for logging service to collect logs from managed devices to solve your operational logging challenges.
  • Sometimes it lacks visibility for de-capsulated tunneled traffic. Here, we would like to see improvements.
  • It has few ACC customizations and collaboration improvements such as default tab, share tabs etc.
  • Granular change management for multi-admin teams is still a little confusing, it needs more simplicity and flexibility.
  • Centralized firewall software upgrade/downgrade considerations are the most points which can be considered and have an impact on business operations.
  • Centralized logs collection and evaluation is another point which could be important to business goals.
  • During technical support issues and support from the vendor, it plays a very important role by providing detailed reports including health checks and performance metrics.
We have selected Panorama because it is the one which could only provide us management and control of PA firewalls. It would be very difficult to replace this with another solution due to the features provided and benefits no other vendor can provide under one console with complete satisfaction and stability.
We can always choose Panorama for device monitoring and resource utilization on firewalls, which helps to assess the impact of substantial policy changes and operational activities, benchmark across locations with similar traffic profiles, and in proactively tracking device component health. It is less appropriate where a lesser number of firewalls is in place (between 2-5) and where the organization has a limited number of users and applications.

Palo Alto Panorama Feature Ratings

Policy planning and rule management
Automated Policy Orchestration
Device Discovery
Policy Compliance Auditing
Attack Path Simulation Testing
Anomalous Event or Behavior Deviation
Vulnerability Scans
Firewall Rule Cleanup