AI Buyer Insights:

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Michelin, an e2open customer evaluated Oracle Transportation Management

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Michelin, an e2open customer evaluated Oracle Transportation Management

List of Palo Alto Networks PA-Series Customers

loading spinner icon



Apply Filters For Customers

Logo Customer Industry Empl. Revenue Country Vendor Application Category When SI Insight
Ada County Government 2100 $231M United States Palo Alto Networks Palo Alto Networks PA-Series Next Generation Firewall 2018 n/a
In 2018, Ada County deployed the Palo Alto Networks PA-Series as its Next Generation Firewall. The Palo Alto Networks PA-Series was implemented as part of a Next Generation Security Platform to provide perimeter protection and internal segmentation across the county network and connected endpoint devices. Implementation focused on granular application and user based policy management and comprehensive cyberthreat prevention, aligning firewall rule sets to application context and authenticated user identities. Configuration encompassed stateful traffic inspection, application awareness, and threat prevention controls with centralized policy orchestration and logging to support security operations within the Next Generation Firewall category. Operational coverage included network and endpoint device protection for Ada County IT infrastructure, supporting county security and network operations teams. Governance introduced centralized policy administration and change control processes to standardize application aware policies across departments, and the deployment is described as delivering comprehensive cyberthreat prevention as part of the Palo Alto Networks PA-Series solution.
Anchor Hospital Healthcare 200 $20M United States Palo Alto Networks Palo Alto Networks PA-Series Next Generation Firewall 2017 n/a
In 2017, Anchor Hospital implemented Palo Alto Networks PA-Series as a Next Generation Firewall to secure and centralize internet egress for the organization. The deployment positioned Palo Alto Networks PA-Series appliances at the network edge and configured Source Nat to translate IP addresses for internet bound traffic on the Palo Alto NGFW, establishing address translation as a primary control for outbound sessions. Configuration work emphasized NAT policy creation, security policy alignment, and zone-based routing consistent with Next Generation Firewall operational patterns, with the hospital network operations team owning rule sets and device configuration. Operational scope covered clinical and administrative network segments, centralizing internet-bound traffic through the PA-Series appliance, and governance was enforced via change control and network configuration management to manage Source Nat rule changes and maintain auditability.
Bank OCBC NISP Banking and Financial Services 6000 $698M Indonesia Palo Alto Networks Palo Alto Networks PA-Series Next Generation Firewall 2017 n/a
In 2017, Bank OCBC NISP deployed Palo Alto Networks PA-Series as its Next Generation Firewall to strengthen corporate security while pursuing a digital-first, mobile strategy. The implementation targeted internet gateways across two data centers and addressed an expanding mobile user base of roughly 3,000 users who required secure access to corporate data and email. The deployment centered on Palo Alto Networks PA-5060 appliances supplemented by Threat Intelligence Cloud capabilities and Advanced Endpoint Protection. Functional modules and subscriptions implemented included URL Filtering PAN-DB, Threat Prevention, WildFire threat analysis, antivirus, anti-spyware, and VPN, with WildFire provided as an on-premise private cloud via a WF-500 appliance to analyze suspicious files without sending them outside the bank network. Operational coverage included the bank internet gateways across two data centers and the mobile workforce, enabling application layer visibility and control down to individual applications, users, and content. The solution instrumented application command center workflows and threat identification to surface threat names and IP addresses, and it supported sandbox analysis for unknown files through WildFire within the bank perimeter. Governance and operational processes were adjusted to leverage the Palo Alto management console features, including shadow policy warning during commits, the Application Command Center for policy use history, and Highlight Unused Rules to reduce rule bloat. Reported outcomes from the engagement included safe enablement of applications, improved management reporting, halving of time spent managing network security, securing the mobile workforce, and enabling the rollout of several new digital services.
Bank of America Banking and Financial Services 213000 $101.9B United States Palo Alto Networks Palo Alto Networks PA-Series Next Generation Firewall 2021 n/a
In 2021, Bank of America deployed Palo Alto Networks PA-Series as its Next Generation Firewall to strengthen perimeter and multi-tenant inspection across data center and branch footprints. The deployment used Palo Alto Networks PA-Series hardware models including PA-7050, PA-5410 and PA-3220 in Active/Passive HA pairs, with centralized management and policy orchestration through Panorama VM-500 and Panorama M-500 appliances. The implementation leveraged Panorama template and template stack features on Panorama VM-500 to centralize configuration and policy lifecycle management, and used Panorama M-500 to build custom dashboards and reports for executives and compliance teams. Palo Alto Networks PA-Series was instrumented for Zone Protection logging and integrated with Panorama for SOC monitoring, and service insertion was applied to inspect VXLAN overlay traffic to provide stateful inspection between tenants. Integrations were broad and explicit, reflecting a network security fabric approach. The deployment integrated Akamai Application Load Balancer for traffic distribution and Akamai Prolexic Routed for volumetric DDoS mitigation, tied into vBond to enable secure device control for critical SD-WAN VIPTELA components, and worked alongside Cisco Meraki MX security appliances for branch and enterprise edge connectivity. Additional integrations included F5 BIG-IP rSeries GTM DNS services, INFOBLOX DNS and DHCP services, NetScaler AppFlow and HDX Insight feeding Citrix Director and Splunk, and automation links to Cisco ACI APIC via REST API and Ansible for application network profile deployments. Operational and governance changes accompanied the technical work, with close collaboration between network engineers and the SOC for logging and monitoring workflows. The team developed enforcement profiles and policy controls aligned with Cisco ISE, conducted Active Directory and Group Policy audits, and automated policy and ANP provisioning to reduce manual configuration steps and standardize deployments across sites including a secondary data center. Explicit deliverables included centralized Panorama dashboards and compliance reporting, Zone Protection logging integration for SOC visibility, and automated ANP deployment workflows using Cisco ACI APIC and Ansible. These outcomes reflect an implementation that combined Palo Alto Networks PA-Series Next Generation Firewall capabilities with broader network, SD-WAN and DDoS mitigation technologies to provide consolidated policy enforcement and monitoring for security and compliance functions.
Banner Health Healthcare 55000 $15.6B United States Palo Alto Networks Palo Alto Networks PA-Series Next Generation Firewall 2017 n/a
In 2017, Banner Health deployed the Palo Alto Networks PA-Series as its Next Generation Firewall to centralize policy enforcement and application level inspection across clinical and corporate networks. The Palo Alto Networks PA-Series was positioned as a primary enforcement point within Banner Health security operations to deliver application visibility, intrusion prevention, and stateful inspection consistent with Next Generation Firewall capabilities. The implementation emphasized Threat and Vulnerability Management, Security Operations, and Penetration Testing as core functional workflows. Banner Health used the Palo Alto Networks PA-Series alongside formal processes to manage vulnerabilities by remediation, mitigation, compensating controls, or risk acceptance, and provided tier 2 and tier 3 SOC escalation support tied to NGFW alerts. The rollout included configuration input for security baselines and targeted configuration hardening of the Palo Alto Networks PA-Series to align firewall policies with organizational risk acceptance and compliance requirements. Operational integration tied the Palo Alto Networks PA-Series into existing tooling, using ServiceNow for incident and change workflows, Tenable.io and Nexpose for vulnerability scanning correlation, and Splunk for log aggregation and SOC analytics. The NGFW platform worked in concert with FireEye suites, MacAfee Web Gateway, IronPort, Infoblox DNS and IPAM, and F5 WAF to provide layered detection and enforcement across email, web, DNS, and application tiers. Security testing and validation leveraged Redline, Kali Linux, and Core Impact to exercise controls and validate rule sets on the Palo Alto Networks PA-Series. Governance and process work accompanied the technical deployment, with procedures and workflows developed in accordance with established policies to support incident response and Cyber Kill Chain activities. The implementation included training and mentoring of less experienced analysts, partnership with Threat Intelligence team members to analyze environment specific vulnerabilities, and coordinated response protocols with business, infrastructure, and development teams. Ongoing security assessments were performed for new technologies and purchased software, feeding configuration changes and operational playbooks for the Palo Alto Networks PA-Series. Banner Health Palo Alto Networks PA-Series Next Generation Firewall supported Security Operations, Threat and Vulnerability Management, and penetration testing functions as part of an enterprise security architecture. The program included continuous evaluation of new and emerging technologies and procedures to address security gaps and to inform future configuration updates for the PA-Series.
Professional Services 168 $10M United States Palo Alto Networks Palo Alto Networks PA-Series Next Generation Firewall 2013 n/a
Manufacturing 1500 $200M Italy Palo Alto Networks Palo Alto Networks PA-Series Next Generation Firewall 2013 n/a
Healthcare 10500 $5.0B United States Palo Alto Networks Palo Alto Networks PA-Series Next Generation Firewall 2015 n/a
Manufacturing 4500 $9.5B United States Palo Alto Networks Palo Alto Networks PA-Series Next Generation Firewall 2015 n/a
Education 3500 $340M United Kingdom Palo Alto Networks Palo Alto Networks PA-Series Next Generation Firewall 2010 n/a
Showing 1 to 10 of 20 entries

Buyer Intent: Companies Evaluating Palo Alto Networks PA-Series

ARTW Buyer Intent uncovers actionable customer signals, identifying software buyers actively evaluating Palo Alto Networks PA-Series. Gain ongoing access to real-time prospects and uncover hidden opportunities. Companies Actively Evaluating Palo Alto Networks PA-Series for Next Generation Firewall include:

  1. Naval Postgraduate School, a United States based Education organization with 890 Employees
  2. Kbite Automatisering Netherlands, a Netherlands based Professional Services company with 10 Employees
  3. Salida School District R-32-J United States, a United States based Education organization with 195 Employees

Discover Software Buyers actively Evaluating Enterprise Applications

Logo Company Industry Employees Revenue Country Evaluated
No data found
FAQ - APPS RUN THE WORLD Palo Alto Networks PA-Series Coverage

Palo Alto Networks PA-Series is a Next Generation Firewall solution from Palo Alto Networks.

Companies worldwide use Palo Alto Networks PA-Series, from small firms to large enterprises across 21+ industries.

Organizations such as Bank of America, Wells Fargo, Southwest Airlines, Banner Health and University of Michigan are recorded users of Palo Alto Networks PA-Series for Next Generation Firewall.

Companies using Palo Alto Networks PA-Series are most concentrated in Banking and Financial Services, Transportation and Healthcare, with adoption spanning over 21 industries.

Companies using Palo Alto Networks PA-Series are most concentrated in United States, with adoption tracked across 195 countries worldwide. This global distribution highlights the popularity of Palo Alto Networks PA-Series across Americas, EMEA, and APAC.

Companies using Palo Alto Networks PA-Series range from small businesses with 0-100 employees - 0%, to mid-sized firms with 101-1,000 employees - 15%, large organizations with 1,001-10,000 employees - 50%, and global enterprises with 10,000+ employees - 35%.

Customers of Palo Alto Networks PA-Series include firms across all revenue levels — from $0-100M, to $101M-$1B, $1B-$10B, and $10B+ global corporations.

Contact APPS RUN THE WORLD to access the full verified Palo Alto Networks PA-Series customer database with detailed Firmographics such as industry, geography, revenue, and employee breakdowns as well as key decision makers in charge of Next Generation Firewall.