Skip to content

Security Comparison

Palo Alto GlobalProtect (PA-2020)NetBird
Hardware statusEOSL since April 2020 (6 years unsupported)Software-only, always current
Attack surfaceLogin portal on public internet (actively targeted)No exposed portal — credential spraying is architecturally impossible
EncryptionIPsec/SSL with TLS 1.0/1.1, 3DES, no PFSWireGuard (ChaCha20-Poly1305, Curve25519), formally verified
Code auditIPsec: no formal verificationWireGuard: formally verified (Tamarin, CryptoVerif, ProVerif, eCK)
Codebase sizeIPsec: ~100,000+ linesWireGuard: ~4,000 lines
AuthenticationFirewall-local credentials / LDAPMicrosoft Entra ID SSO + MFA via OIDC
Traffic routingAll traffic through PA firewall (bottleneck)Peer-to-peer mesh (no central bottleneck)
CVE historyPAN-OS 7.1: multiple unpatched CVEs, no new patches possible2 CVEs total (both server-side, non-critical)
Credential spraying riskHIGH — exposed login endpoint, active campaignNONE — no login endpoint exists
Post-quantumNoRosenpass (experimental, desktop/server)
Device compromise responseManual credential revocationInstant peer deletion + IdP-driven revocation + configurable session expiry
User offboardingManual — must revoke PA credentialsJWT session expires within configured period (recommend 24h)
Data PointSource
Self-managed VPN users are 11x more likely to experience ransomwareAt-Bay
58% of ransomware claims begin with VPN/firewall compromiseCoalition Cyber Threat Index
Running EOSL hardware may result in claim denial at time of incidentIndustry standard

Migrating from the PA-2020 to NetBird directly addresses these underwriting concerns and may reduce premiums at the next policy renewal.