TrustRadius Insights for Palo Alto Panorama are summaries of user sentiment data from TrustRadius reviews and, when necessary, third party data sources.
Pros
Easy Management of Multiple Firewalls: Several users have praised the ability to create common rules that can be maintained on multiple firewalls, making it easier to manage different functional needs. This feature has been appreciated by many reviewers for simplifying firewall management.
Efficient Delivery of Changes: The use of templates to manage regional requirements and the ability to stack templates have been highlighted by multiple users as valuable features. These functionalities allow for easy delivery of necessary changes across multiple firewalls, making network updates more efficient.
Intuitive User Interface: Reviewers have consistently mentioned the ease of use and intuitive nature of Panorama's user interface. They appreciate how quick and easy it is to navigate through menus, find desired settings, and configure options. This positive feedback indicates a high level of satisfaction with the user experience.
Palo Alto Panorama gives the centralized tool for managing all the Palo Alto firewall gateways across regions, DCs etc. It gives easy way to manage firewalls, avoids duplication of works in case you need similar policy sets / configurations on multiple firewalls and also gives centralized logs across all the firewalls behind it.
In shorts, you can manage multiple Palo Alto firewalls from single console without login into the actual firewall. So it is highly recommended when you have large environments and you have multiple single or HA pairs of Palo Alto firewalls in it.
Pros
Centralized Console for Palo Alto Firewalls management
Avoids duplicate task Policy, Profiles etc. configuration on multiple firewalls
Easy to deploy, manage, operate and configure
Centralized logs management for all the firewalls
Cons
Palo Alto Panorama VM series requires large resources like CPU, Memory etc
Palo Alto Panorama v10 is quite slow due to heavy processes running behind. This causes web interface sluggish at times
Licensing Cost can be improve
Likelihood to Recommend
Palo Alto Panorama is well suited when you have multiple standalone and/or HA pairs of Palo Alto firewalls in your environments. So it will very much ideal for you to have Palo Alto Panorama server to manage all those firewalls from single console. If you do not have Palo Alto Panorama server and you have multiple firewalls, then it becomes quite challenging to manage all those firewalls individually.
If you have very few Palo Alto firewalls eg. 4-5 firewalls, and those are not going to increase in future then you can avoid it. Because Palo Alto Panorama comes with minimum 25 licenses.
VU
Verified User
Professional in Information Technology (5001-10,000 employees)
We use Palo Alto Panorama to manage multiple firewalls at multiple locations. We have approximately 25 locations and at some locations we have multiple firewalls. We are also using the firewalls to implement SDWan. We are able to use multiple internet connections to do load balancing at a branch which saves money on higher priced internet connections.
Pros
Manages multiple devices
SDWan
Reporting
Cons
Setup was somewhat difficult
Price is a little bit of a shock
Likelihood to Recommend
I like the fact that I can pretty much use the same configuration on multiple sites. If I want to block a specific address I can add it to all sites at once not one at a time.
I use Panorama every day just because of the vast set of features it has. Sometimes I will be building new rules, sometimes, I will be creating new address objects, and sometimes I will be setting up User-ID to attach user accounts to the traffic I see in the firewall. All with just a couple of clicks from the same dashboard.
Pros
Unified tool.
Quick and easy UI.
Intuitive menus.
Cons
Some things can be hard to find the first time.
Can run slowly on certain browsers.
Traffic doesn't always show up immediately.
Likelihood to Recommend
I think Palo Alto Panorama is suited for administrators of all levels because certain things can be locked down to certain permission levels. But there are executive dashboards all the way down to the weeds for the highest of administrators. This truly is a single pane of glass tool because you never have to go into the individual firewalls for anything.
VU
Verified User
Engineer in Information Technology (201-500 employees)
We use Palo Alto Panorama to manage our firewall access for end-users. We control access to restricted sites and the VPN service. Through the Monitor tab, I am able to view the logs for URL filtering for specific users and see if users are being blocked in VPN due to a HIP Match issue. In the Objects tab, I am able to restrict or allow specific sites and domains based on URL categories.
Pros
Web site access permissions
VPN authentication protocols
VMWare authentication
Cons
Search filtering needs to be more user friendly
It takes a long time for changes to be made and replicated to the individual sites
Likelihood to Recommend
We control access to social media sites through groups. Restricted sites are easier to manage and control. I diagnose issues with VPN and VMWare authentication. When a user is unable to access the VPN due to an authentication error I can log into Palo Alto Panorama and see if they are blocked due to HIP match issues or Authentication Profile issues. If a site is being blocked on the network I can add the site to the allowed list for specific types of users, such as Internet Users or Trucking (groups set in AD). Alternatively, I can block specific sites and domains that are deemed inappropriate or not needed for work purposes.
We are using Palo Alto Panorama as the main system for any firewall changes, so all of them are sync with similar setup. We have firewalls which are managed by Palo Alto Panorama in cloud and on prem and all is working fine. We have noticed couple problems with verification while some by accident misconfigured end firewall and panorama and panorama didn't catch it up. But otherwise company is happy about using it.
Pros
Managing firewalls
Upgrades
Making configuration easier
Cons
Verification of what configuration is being pushed
Better information about errors if they will show up during push
Likelihood to Recommend
Pushing configuration to firewalls in the cloud is quite easy, as you can build them and then push all configurations, if you need to add one or few or just do replacement it also easy with Palo Alto Panorama. Similar situation is with firewall onsite but you can't remove them and easy replace.
Palo Alto Panorama is being used as our main Firewalls management for over 50 clients. Panorama makes it easier to manage, configure, and monitor remotely. It saves a lot of time by allowing us to manage all firewalls from a single location.
[Palo Alto] Panorama provides efficiency and security to our business.
Pros
Management
Monitoring
Security
Configuration and Deployment
Troubleshooting
Efficiency
Cons
Performance
Likelihood to Recommend
[Palo Alto] Panorama is well suited if you are managing 15+ PANs, otherwise it would not be worth it if you have few Palo Alto Firewalls.
We currently utilize [two virtual Palo Alto] Panorama's in an HA pair. It is an excellent tool to manage multiple Firewalls across our Organization. We have over a dozen locations with multiple Palo's, so having Panorama is critical to save time having to configure\update each Firewall. [Palo Alto] Panorama allows for ultimate management scalability from 2 to 1000's of Firewalls.
Pros
The wildfire threat detection utilizes the combined power of all customers that have the service greatly improving your organizations detections
Utilizing Device Group and creating shared rules is very helpful
Having the same user interface as a Palo Alto Firewall was very beneficial for quick adoption
Cons
Unexpected log outs outside the normal timeout window seem to happen often
Better reporting, really a downside to the product
Scheduling would be a great feature
Likelihood to Recommend
[Palo Alto Panorama is well suited for the following:] - Great for managing multiple firewalls - Great for viewing any template or device group you have created from a single pane - Central point of logging review
VU
Verified User
Analyst in Information Technology (1001-5000 employees)
It is used across the whole organization. Panorama can help in managing the administration of a large number of Palo Alto firewalls. It is a centralized interface for Palo alto firewalls, Global protect, cloud services, and logging service instead of logging into each device. There are device groups and templates that can ease administrative efforts.
Panorama helps to manage many Palo Alto firewalls in one interface. You will find device groups and templates that reduce administrative efforts. Policies are easily configured and deployed with a great web filtering module. Furthermore, you can have either a hardware or a software VM to choose from.
Pros
Very good user interface and user experience which helps apply the configuration easily.
The portal is helps you apply configuration easily, by applying your configuration and settings smoothly.
Addition of several firewalls with easy steps.
Great support and response from the vendor
Cons
The dual WAN functionality doesn't exist in it.
Better coding in order to make the portal faster
Hard to apply the templates, too many steps
It is very slow applying changes once you have committed the changes on its web interface. It could take a nearly 30 seconds until the change has been actually applied on the device, needs some software enhancements. It sometimes crashes for unknown reasons due to bugs.
Likelihood to Recommend
It offers many advanced features to configure. This is a solution that we implement for our customers. It helps to manage several firewalls from a central location whether from the internet edge side , data centers, in the data centers. It can be deployed to be used either on-premise devices or on the cloud which has great scalability.
VU
Verified User
Team Lead in Information Technology (10,001+ employees)
Our Information & Technology services department is using Palo Alto Panorama to manage our data center gateways, our GlobalProtect VPN deployment, our AD user identification, and our terminal server user identification.
Pros
It simplifies management by providing a single management point for most tasks.
It allows for customized layouts for every user.
Cons
Responsiveness sometimes bogs down even with recommended specs.
GlobalProtect user information is harder to get to than it should be.
Likelihood to Recommend
I think Palo Alto Panorama is well suited for any deployment greater than one Palo Alto gateway. The more devices you manage, the greater the benefit of using Palo Alto Panorama is. We only have two gateways, along with two user ID agents and several hundred terminal server agents, but it still makes their management much more manageable. It doesn't add to the complexity or require substantial resources, so I can't think of a reason not to use it.
VU
Verified User
Engineer in Information Technology (1001-5000 employees)
PaloAlto Panorama is the firewall that we use in our organization. The firewall protects all the departments of the University for malicious actors. However, defining the rules, and managing them is done by our team. This next-gen firewall has a lot of potentials to surpass the other giants in this field like Cisco and Juniper. There are different functionalities of this firewall that include integrated Intrusion Detection System (IDS), next-gen packet filter, IP and domain filter based on reputation and threat hunt based on signatures. With time it became an indispensable tool for our team acting as a one-point solution for all our needs. Its signature-based detection system is the best I have ever seen, much better than Cisco FirePower. They keep their database updated all the time, thereby reducing false positives and false negatives. It has a feature called "Wildfire" that detects malware that has been downloaded in our network. This reduced our dependency on McAfee. Other than fulfilling our security needs at a good price, it also helped in saving money by reducing the need for Cisco's Firepower which we are about to discontinue soon.
Pros
First, it has a very good signature-based Intrusion Detection System (IDS) that shows malicious inbound or outbound network packets. The classification for the critical threats is flawless.
It has a feature called "Wildfire" which act like an anti-virus and it reports any malware or malicious attachment that have been downloaded or sent through the network.
Cons
It needs improvement for the threats categorized as "high" severity. There are lot of false positives. Therefore finding real ones is hard in "high" category.
The threat/traffic view needs improvement. It needs at least a feature to sort based on columns. Downloading and parsing using Excel takes a lot of time.
Likelihood to Recommend
Palo Alto Panorama is well suited for any scale industry. We use it to manage several units of our organization. Some units have low data flow and some like our medicine and media departments have high data flow. Thus it is highly scalable. It has a very easy interface for regular users. It doesn't require programming skills or sound technical background to use. It has a GUI that supports all kinds of operations through the interface. It also has text-based data fields that can be used by people having networking and programming background to reduce clicks. Therefore it is suited for organizations having both technical and non-technical staff. It is hard to find scenarios where it is not well suited. But yes, since it has all the functionalities integrated into it, buying Panorama for a small organization solely for the sake of firewall (if all other defense tools are already there like IDS, screening firewall) could be an expensive and redundant purchase.
VU
Verified User
Analyst in Information Technology (5001-10,000 employees)