List of Palo Alto Networks PA-Series Customers
Santa Clara, 95054, CA,
United States
Since 2010, our global team of researchers has been studying Palo Alto Networks PA-Series customers around the world, aggregating massive amounts of data points that form the basis of our forecast assumptions and perhaps the rise and fall of certain vendors and their products on a quarterly basis.
Each quarter our research team identifies companies that have purchased Palo Alto Networks PA-Series for Next Generation Firewall from public (Press Releases, Customer References, Testimonials, Case Studies and Success Stories) and proprietary sources, including the customer size, industry, location, implementation status, partner involvement, LOB Key Stakeholders and related IT decision-makers contact details.
Companies using Palo Alto Networks PA-Series for Next Generation Firewall include: Bank of America, a United States based Banking and Financial Services organisation with 213000 employees and revenues of $101.89 billion, Wells Fargo, a United States based Banking and Financial Services organisation with 205198 employees and revenues of $83.70 billion, Southwest Airlines, a United States based Transportation organisation with 73463 employees and revenues of $26.09 billion, Banner Health, a United States based Healthcare organisation with 55000 employees and revenues of $15.60 billion, University of Michigan, a United States based Education organisation with 31987 employees and revenues of $11.60 billion and many others.
Contact us if you need a completed and verified list of companies using Palo Alto Networks PA-Series, including the breakdown by industry (21 Verticals), Geography (Region, Country, State, City), Company Size (Revenue, Employees, Asset) and related IT Decision Makers, Key Stakeholders, business and technology executives responsible for the IaaS software purchases.
The Palo Alto Networks PA-Series customer wins are being incorporated in our Enterprise Applications Buyer Insight and Technographics Customer Database which has over 100 data fields that detail company usage of IaaS software systems and their digital transformation initiatives. Apps Run The World wants to become your No. 1 technographic data source!
Apply Filters For Customers
| Logo | Customer | Industry | Empl. | Revenue | Country | Vendor | Application | Category | When | SI | Insight |
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
Ada County | Government | 2100 | $231M | United States | Palo Alto Networks | Palo Alto Networks PA-Series | Next Generation Firewall | 2018 | n/a |
In 2018, Ada County deployed the Palo Alto Networks PA-Series as its Next Generation Firewall. The Palo Alto Networks PA-Series was implemented as part of a Next Generation Security Platform to provide perimeter protection and internal segmentation across the county network and connected endpoint devices.
Implementation focused on granular application and user based policy management and comprehensive cyberthreat prevention, aligning firewall rule sets to application context and authenticated user identities. Configuration encompassed stateful traffic inspection, application awareness, and threat prevention controls with centralized policy orchestration and logging to support security operations within the Next Generation Firewall category.
Operational coverage included network and endpoint device protection for Ada County IT infrastructure, supporting county security and network operations teams. Governance introduced centralized policy administration and change control processes to standardize application aware policies across departments, and the deployment is described as delivering comprehensive cyberthreat prevention as part of the Palo Alto Networks PA-Series solution.
|
|
|
Anchor Hospital | Healthcare | 200 | $20M | United States | Palo Alto Networks | Palo Alto Networks PA-Series | Next Generation Firewall | 2017 | n/a |
In 2017, Anchor Hospital implemented Palo Alto Networks PA-Series as a Next Generation Firewall to secure and centralize internet egress for the organization. The deployment positioned Palo Alto Networks PA-Series appliances at the network edge and configured Source Nat to translate IP addresses for internet bound traffic on the Palo Alto NGFW, establishing address translation as a primary control for outbound sessions.
Configuration work emphasized NAT policy creation, security policy alignment, and zone-based routing consistent with Next Generation Firewall operational patterns, with the hospital network operations team owning rule sets and device configuration. Operational scope covered clinical and administrative network segments, centralizing internet-bound traffic through the PA-Series appliance, and governance was enforced via change control and network configuration management to manage Source Nat rule changes and maintain auditability.
|
|
|
Bank OCBC NISP | Banking and Financial Services | 6000 | $698M | Indonesia | Palo Alto Networks | Palo Alto Networks PA-Series | Next Generation Firewall | 2017 | n/a |
In 2017, Bank OCBC NISP deployed Palo Alto Networks PA-Series as its Next Generation Firewall to strengthen corporate security while pursuing a digital-first, mobile strategy. The implementation targeted internet gateways across two data centers and addressed an expanding mobile user base of roughly 3,000 users who required secure access to corporate data and email.
The deployment centered on Palo Alto Networks PA-5060 appliances supplemented by Threat Intelligence Cloud capabilities and Advanced Endpoint Protection. Functional modules and subscriptions implemented included URL Filtering PAN-DB, Threat Prevention, WildFire threat analysis, antivirus, anti-spyware, and VPN, with WildFire provided as an on-premise private cloud via a WF-500 appliance to analyze suspicious files without sending them outside the bank network.
Operational coverage included the bank internet gateways across two data centers and the mobile workforce, enabling application layer visibility and control down to individual applications, users, and content. The solution instrumented application command center workflows and threat identification to surface threat names and IP addresses, and it supported sandbox analysis for unknown files through WildFire within the bank perimeter.
Governance and operational processes were adjusted to leverage the Palo Alto management console features, including shadow policy warning during commits, the Application Command Center for policy use history, and Highlight Unused Rules to reduce rule bloat. Reported outcomes from the engagement included safe enablement of applications, improved management reporting, halving of time spent managing network security, securing the mobile workforce, and enabling the rollout of several new digital services.
|
|
|
Bank of America | Banking and Financial Services | 213000 | $101.9B | United States | Palo Alto Networks | Palo Alto Networks PA-Series | Next Generation Firewall | 2021 | n/a |
In 2021, Bank of America deployed Palo Alto Networks PA-Series as its Next Generation Firewall to strengthen perimeter and multi-tenant inspection across data center and branch footprints. The deployment used Palo Alto Networks PA-Series hardware models including PA-7050, PA-5410 and PA-3220 in Active/Passive HA pairs, with centralized management and policy orchestration through Panorama VM-500 and Panorama M-500 appliances.
The implementation leveraged Panorama template and template stack features on Panorama VM-500 to centralize configuration and policy lifecycle management, and used Panorama M-500 to build custom dashboards and reports for executives and compliance teams. Palo Alto Networks PA-Series was instrumented for Zone Protection logging and integrated with Panorama for SOC monitoring, and service insertion was applied to inspect VXLAN overlay traffic to provide stateful inspection between tenants.
Integrations were broad and explicit, reflecting a network security fabric approach. The deployment integrated Akamai Application Load Balancer for traffic distribution and Akamai Prolexic Routed for volumetric DDoS mitigation, tied into vBond to enable secure device control for critical SD-WAN VIPTELA components, and worked alongside Cisco Meraki MX security appliances for branch and enterprise edge connectivity. Additional integrations included F5 BIG-IP rSeries GTM DNS services, INFOBLOX DNS and DHCP services, NetScaler AppFlow and HDX Insight feeding Citrix Director and Splunk, and automation links to Cisco ACI APIC via REST API and Ansible for application network profile deployments.
Operational and governance changes accompanied the technical work, with close collaboration between network engineers and the SOC for logging and monitoring workflows. The team developed enforcement profiles and policy controls aligned with Cisco ISE, conducted Active Directory and Group Policy audits, and automated policy and ANP provisioning to reduce manual configuration steps and standardize deployments across sites including a secondary data center.
Explicit deliverables included centralized Panorama dashboards and compliance reporting, Zone Protection logging integration for SOC visibility, and automated ANP deployment workflows using Cisco ACI APIC and Ansible. These outcomes reflect an implementation that combined Palo Alto Networks PA-Series Next Generation Firewall capabilities with broader network, SD-WAN and DDoS mitigation technologies to provide consolidated policy enforcement and monitoring for security and compliance functions.
|
|
|
Banner Health | Healthcare | 55000 | $15.6B | United States | Palo Alto Networks | Palo Alto Networks PA-Series | Next Generation Firewall | 2017 | n/a |
In 2017, Banner Health deployed the Palo Alto Networks PA-Series as its Next Generation Firewall to centralize policy enforcement and application level inspection across clinical and corporate networks. The Palo Alto Networks PA-Series was positioned as a primary enforcement point within Banner Health security operations to deliver application visibility, intrusion prevention, and stateful inspection consistent with Next Generation Firewall capabilities.
The implementation emphasized Threat and Vulnerability Management, Security Operations, and Penetration Testing as core functional workflows. Banner Health used the Palo Alto Networks PA-Series alongside formal processes to manage vulnerabilities by remediation, mitigation, compensating controls, or risk acceptance, and provided tier 2 and tier 3 SOC escalation support tied to NGFW alerts. The rollout included configuration input for security baselines and targeted configuration hardening of the Palo Alto Networks PA-Series to align firewall policies with organizational risk acceptance and compliance requirements.
Operational integration tied the Palo Alto Networks PA-Series into existing tooling, using ServiceNow for incident and change workflows, Tenable.io and Nexpose for vulnerability scanning correlation, and Splunk for log aggregation and SOC analytics. The NGFW platform worked in concert with FireEye suites, MacAfee Web Gateway, IronPort, Infoblox DNS and IPAM, and F5 WAF to provide layered detection and enforcement across email, web, DNS, and application tiers. Security testing and validation leveraged Redline, Kali Linux, and Core Impact to exercise controls and validate rule sets on the Palo Alto Networks PA-Series.
Governance and process work accompanied the technical deployment, with procedures and workflows developed in accordance with established policies to support incident response and Cyber Kill Chain activities. The implementation included training and mentoring of less experienced analysts, partnership with Threat Intelligence team members to analyze environment specific vulnerabilities, and coordinated response protocols with business, infrastructure, and development teams. Ongoing security assessments were performed for new technologies and purchased software, feeding configuration changes and operational playbooks for the Palo Alto Networks PA-Series.
Banner Health Palo Alto Networks PA-Series Next Generation Firewall supported Security Operations, Threat and Vulnerability Management, and penetration testing functions as part of an enterprise security architecture. The program included continuous evaluation of new and emerging technologies and procedures to address security gaps and to inform future configuration updates for the PA-Series.
|
|
|
|
Professional Services | 168 | $10M | United States | Palo Alto Networks | Palo Alto Networks PA-Series | Next Generation Firewall | 2013 | n/a |
|
|
|
|
Manufacturing | 1500 | $200M | Italy | Palo Alto Networks | Palo Alto Networks PA-Series | Next Generation Firewall | 2013 | n/a |
|
|
|
|
Healthcare | 10500 | $5.0B | United States | Palo Alto Networks | Palo Alto Networks PA-Series | Next Generation Firewall | 2015 | n/a |
|
|
|
|
Manufacturing | 4500 | $9.5B | United States | Palo Alto Networks | Palo Alto Networks PA-Series | Next Generation Firewall | 2015 | n/a |
|
|
|
|
Education | 3500 | $340M | United Kingdom | Palo Alto Networks | Palo Alto Networks PA-Series | Next Generation Firewall | 2010 | n/a |
|
Buyer Intent: Companies Evaluating Palo Alto Networks PA-Series
- Naval Postgraduate School, a United States based Education organization with 890 Employees
- Kbite Automatisering Netherlands, a Netherlands based Professional Services company with 10 Employees
- Salida School District R-32-J United States, a United States based Education organization with 195 Employees
Discover Software Buyers actively Evaluating Enterprise Applications
| Logo | Company | Industry | Employees | Revenue | Country | Evaluated | ||
|---|---|---|---|---|---|---|---|---|
| No data found | ||||||||