Find out in this report how the two Firewalls solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
Clients are now comfortable and not wasting productive hours on IT support.
The automation part is giving us a cost benefit and speed; we can react faster.
It's a very useful tool to mitigate and protect your enterprise.
The value lies in maintaining operational integrity with zero downtime or incidents, facilitating secure, ongoing business operations.
Implementing CloudGuard has resulted in an excellent return on investment over one hundred percent ROI.
The unified policy is comprehensive and helps me to create firewall policies that are shared across all our facilities and plants.
They offer very accurate solutions.
The quick resolution of issues with Fortinet FortiGate is due to the support of the company and the fact that the equipment is easy to work with.
I would rate the technical support for Fortinet FortiGate a ten out of ten.
They usually respond quite fast, and they are very knowledgeable about what they do.
We had an endless loop of emails trying to fix this, and the suggestion was to reinstall the gateway and do it from scratch, which was not an option at that point because it would leave that specific location without access.
Available twenty-four by seven.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
We determine sizing based on multiple factors: number of users, available links, traffic types, server count, services in use, and whether services will be published.
I can deploy it everywhere I need it.
We have transitioned from 1,000 to 500 users without any issue.
We perform minor and major upgrades, and it works seamlessly.
We started with 50 users, and now we are using it for 2,000 users.
We're experiencing 99.999% availability consistently.
I would rate the stability of Fortinet FortiGate a ten out of ten.
Currently, we are experiencing a general outage of one of the main internet service providers of the Dominican Republic, and we have not been impacted in our operations because with SD-WAN, we have another internet service provider and we are working with the second WAN connection without any disruption.
I have not observed any downtime.
For instance, when we are working on a release and do an upgrade, we start experiencing unexpected issues.
The solution is stable.
Investing in a solution that can accommodate such growth would be more cost-effective than repeatedly purchasing new hardware.
The constant daily revisions necessitate meticulous identification of the relevant documents to prevent the use of outdated information that could jeopardize our environment.
While Fortinet claims to offer a comprehensive network solution, it falls short in addressing computer application issues, particularly server security.
Scalability could be improved as well; needing to purchase a new license each time I want to add a new interface is not ideal.
Better documentation would be welcome.
The user interface could be more intuitive, and the initial setup and configuration can be complex, requiring a technical team.
This solution will consume more resources for the end users, which is an area for improvement.
FortiGate is priced lower than Palo Alto.
Last year, I renewed the support for three years, which can sometimes be expensive but depends on the security benefits and how it helps us.
It is about 20% cheaper.
The pricing and licensing are expensive, costing between seven thousand to eight thousand dollars.
Check Point is expensive, however, with the features and capabilities, I can justify the cost.
It is the highest in the market.
In terms of security, we have not experienced any security flaws or loopholes, and it has proven to be quite stable.
FortiGate has helped reduce the risk of cyberattacks that might disrupt our client's production.
These features help reduce our downtime, manage the ISPs, and deploy SLAs for all the website traffic.
One of the most valuable features is the automated threat prevention, which helps us detect and block potential cyberattacks in real-time, minimizing data breaches.
Centralized management is the feature I like best, resulting in reduced workload and more continuous policy.
Network Security provides us with unified security management across hybrid and cloud as well as on-prem.
We are using Slack Intelligence, which is also from Trellix, and Threat Intelligence, which are valuable features of this solution.
Fortinet FortiGate offers comprehensive network security and firewall protection across multiple locations. It effectively manages data traffic and secures environments with features like VPN, intrusion prevention, and UTM controls.
Organizations rely on Fortinet FortiGate for its robust integration with advanced security policies, ensuring significant protection for enterprises, cloud environments, and educational sectors. It facilitates network segmentation, application-level security, and authentication management, securing communication within and between locations such as branches and data centers. Its efficient SD-WAN and UTM features enable streamlined data management and enhanced threat protection capabilities. Users appreciate its centralized management, facilitating seamless operations across diverse environments.
What are the key features of Fortinet FortiGate?
What benefits should users expect from Fortinet FortiGate?
Fortinet FortiGate is crucial in sectors like education, offering robust networks for secure data flow between campuses and facilitating remote learning. In enterprise environments, it allows efficient management of application traffic and security across multiple branches, while in the cloud, it seamlessly integrates with diverse platforms to enhance security infrastructure.
Check Point CloudGuard Network Security is designed to secure cloud assets, offering robust firewall capabilities and protection for both internal and external traffic across AWS, Azure, and on-premises environments.
Enterprises rely on Check Point CloudGuard Network Security for comprehensive network protection, threat prevention, and compliance enforcement. Supporting virtual machines and hybrid environments, it delivers advanced security measures including intrusion prevention and application control. Key functions include firewall security, network segmentation, and cloud environment protection, ensuring businesses maintain a secure and compliant IT infrastructure.
What are the most valuable features of Check Point CloudGuard Network Security?In industries such as financial services, healthcare, retail, and education, Check Point CloudGuard Network Security is implemented to safeguard sensitive data, ensure compliance, and protect critical infrastructure. Companies in these sectors benefit from its advanced threat prevention and flexible deployment options, meeting their stringent security requirements while enabling secure digital transformation.
Trellix MOVE AntiVirus manages and secures endpoints in large environments, providing virus detection, malware protection, internet security, and data security for PCs, servers, laptops, and virtual machines.
Trellix MOVE AntiVirus is deployed on-premises or centrally across organizations. It is commonly used in industries like banking to prevent threats, protect personal and business information, and reduce resource consumption in virtual environments. It integrates with security modules like DLP, offering extensive endpoint protection and low resource consumption. Users appreciate its compatibility, scalability, stable performance, and efficient protection against malware and viruses.
What are the most important features of Trellix MOVE AntiVirus?Trellix MOVE AntiVirus is widely implemented in banking and similar industries to protect against threats, enhance internet safety, and safeguard personal and business information. Organizations utilize its real-time protection and centralized management to control resources effectively while ensuring robust security in virtual environments.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.