We use the solution for desk security.
The easiest route - we'll conduct a 15 minute phone interview and write up the review for you.
Use our online form to submit your review. It's quick and you can post anonymously.
We use the solution for desk security.
The integration primarily occurs within the ONDAP server. We focus on integration with the log server, mainly the logs. There's integration with third-party software for log collection. Integration with FortiManager and FortiAnalyzer within the FortiGate family shouldn't pose any issues.
Many protocols are not proprietary, except for H.A. It's easy to integrate.
Fortinet also supports different types of VPNs, with SSL VPN being one of the most commonly utilized options.
The solution's pricing could be improved.
I have been using Fortinet FortiGate SWG for 5 years.
You'll likely get the correct answer if you reach out to the right person or ask the right question. Sometimes, the engineer doesn't articulate their question correctly, and the answer received may not be relevant.
Positive
The initial setup is easy. It depends on the project. Complex projects are typically based on the implementation, which takes less than a week. The high-level and the low-level are correctly designed, and the stakeholders agree upon the features. FortiGate is a security and VPN device, so the implementation is pretty straightforward. The SD-WAN is pretty easy, and the routing features are solid because the firewall that we are using also acts as a router facing the Internet. You also use an IP site for that. If it's appropriately configured, the customer is pretty happy there.
The renewable is lower because the market doesn’t accept it publicly.
It's easy to use. The interface and other reports are all user-friendly. The software is a bit expensive to renew.
The FortiGate product range is diverse and suitable for different types of enterprises. It is more geared towards meeting the needs of larger enterprises. In the financial services industry in Malaysia, it's often paired with Palo Alto. Most of the projects follow a similar pattern. It's all in one box. You can use it for switching, routing, firewall, VPN - everything you need can be integrated into the FortiGate. Essentially, it's only one device for smaller setups. FortiGate has a very good range, from small businesses to even larger ones.
Overall, I rate the solution an eight out of ten.
We use the solution for client-based VPN remote access.
The solution's most valuable features were the model's reduced complexity on the client side and its capability to provide security.
The tools' scalability is subject to some limitations when done on-premise due to the need for additional licenses. However, in other scenarios, increasing scalability involves expanding infrastructure to accommodate more third-party VPN access. It is scalable as long as you pay the money. Also, it needs to improve security.
I have been using the product for seven years.
I rate the tool's stability an eight out of ten.
Prisma Access by Palo Alto Networks' deployment was straightforward. It was a big project and we were required to migrate the whole infrastructure. It took around six months to complete. It was a network migration project where we transitioned to the solution. The migration involved changing our network supplier from one provider to another. The IT team handled the technical aspects of the project.
We prepared the infrastructure, including the servers and firewalls. We focused on the repair of the firewalls, ensuring connectivity, and replacing the main infrastructure. After these preparations, we proceeded to deploy the clients, conducting a pilot for the clients as part of the overall process.
The product is worth the money.
The solution is expensive.
I rate the overall product an eight out of ten. It reduces the attacks by providing an additional layer of security that inspects all traffic going to the internet. In terms of handling traffic spikes or network demands, the product performs well, but occasional tuning and adjustments may be required, such as changing the connection node.
It enhances security protection beyond endpoint and computer security, which is effective when accessing the internet, and it also ensures secure VPN access to your company.