Cisco Secure Firewall and Check Point NGFW are key players in the network security category. Cisco Secure Firewall holds an advantage in pricing and support, making it the preferred choice for those focused on cost, while Check Point NGFW excels in features, justifying its higher price with superior offerings for certain users.
Features: Cisco Secure Firewall offers customizable security policies, advanced threat intelligence, and efficient traffic controls. Check Point NGFW features robust threat prevention, SSL inspection, and an intuitive dashboard, noted for its comprehensive threat detection capabilities.
Room for Improvement: Cisco Secure Firewall can enhance feature depth to match the comprehensive offerings of Check Point. Their customer service could expand documentation for troubleshooting. Check Point NGFW can work on reducing its complexity in deployment and provide greater cost-efficiency in its pricing structure.
Ease of Deployment and Customer Service: Cisco Secure Firewall provides an easier deployment model, emphasizing seamless integration with existing networks and efficient customer service. Check Point NGFW offers reliable support but involves a more complex deployment process, supported by detailed documentation.
Pricing and ROI: Cisco Secure Firewall is recognized for its competitive setup cost and solid ROI for budget-conscious organizations. While Check Point NGFW requires a higher initial investment, it offers notable long-term ROI through its advanced security features.
Clients are now comfortable and not wasting productive hours on IT support.
We have experienced a positive return on investment by utilizing Fortinet's products.
There's definitely an ROI. Having a centralized way of managing and applying policies across the entire organization always helps.
This is a time-saving measure because we don't need to deploy a cluster or a firewall each time; we just create a virtual system on the management server using the same appliance.
He explained that it required a command line configuration, as it couldn't be done through the graphical user interface.
I would rate their support for FortiGate a nine out of ten.
They offer very accurate solutions.
The support team we engaged was knowledgeable and well-versed with the application.
We have escalated issues to Check Point technical support multiple times and have received timely and very good responses.
Even challenging issues like those with VPNs have been resolved efficiently with their help.
I have to provide many logs, yet problems remain unresolved, often requiring workarounds rather than solutions.
I have been working with them on firewalls, wireless, switching, and routing, and the support is the best.
If I have a priority one case, I am able to call the manager to raise the severity.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
You can choose a cheaper model if you only have 20-30 users, but you will need to spend more money for a FortiGate solution that covers 5,000.
If specified correctly, even the smaller boxes offer high session and bandwidth rates, making the solution highly scalable, even up to telco-level requirements.
Scalability must be carefully planned for, considering future growth and user base increases.
They offer multiple solutions from SMBs to enterprise data centers, making it an easily scalable solution with no issues in scalability.
Scalability presents a challenge.
Compared to FortiGate and Palo Alto, it lags in configuration and other aspects.
Improper handling of these can lead to a memory surge, a well-known bug that can cause the entire system to freeze.
It is less stable than Palo Alto Networks and Check Point firewalls because there are lots of bugs in the latest firmware.
We have not had any problems with the operating systems or maintenance of subscriptions.
While the solution is generally stable, there are complications, such as requiring SmartConsole for deployment and upgrades, which can be time-consuming.
I have worked with Check Point products for 15 years and haven't found any stability or performance issues.
I have encountered stability issues primarily with VPN, which required a code upgrade.
Cisco Secure Firewall offers exceptional performance and stability.
If I have put 10 GBPS of throughput on a firewall and I enable all of these features available, such as IPS or UTM functionalities, the throughput comes down to 1 GBPS.
By providing an integrated solution, users would have access to all features and functionalities within a single window, eliminating the need to navigate through multiple windows.
Investing in a solution that can accommodate such growth would be more cost-effective than repeatedly purchasing new hardware.
Other products, like FortiGate, are perceived as more intuitive because they are easier to configure from the start.
Check Point would benefit from having a single console for both basic and policy configurations.
The graphical user interface (GUI) could benefit from some updates.
Firepower Management Center is quite out of date compared to other vendors.
The integration between Cisco products themselves presents difficulties, such as SD-WAN configuration.
Cisco Firewalls require FMC for management.
Secure SD-WAN is free of charge.
The most expensive part is the renewal of the license subscription.
FortiGate is priced lower than Palo Alto.
In comparison to Fortinet and other products, the pricing may be considered high.
Compared to other solutions, the pricing of Check Point NGFW is high.
The perception is that Check Point NGFW is expensive, especially when all software modules are included.
It's considered a premium, but people pay that price for Cisco.
The licensing process for Cisco Secure Firewall is convoluted, involving many steps to request and enter a license key.
The firewall, IPS, and VPN functions are the most valuable features.
FortiGate provides solid protection against viruses, malware, and other threats.
Within the same dashboard, you get to see the security profiles, the type of traffic that's passing through, the top applications that are being consumed, etc.
The firewall's default behavior of blocking all traffic, including a cleanup rule that blocks everything from external to internal sources, is highly valuable for protecting our network.
The most valuable features in my experience include perimeter firewalling, cloud and mobile security, application control, URL filtering, DLP, threat prevention, intrusion protection, and safeguarding against malware, botnets, and zero-day attacks.
Since implementing it, we have noticed a lot less getting through that maybe other antivirus within firewalls had failed to catch.
It includes features like IPS, malware protection, and other security features.
Cisco Firewall has very good features, like trusted applications and restricted access for users based on keywords.
The most valuable features of Cisco Secure Firewall include the next-generation firewall and its strong anti-malware capabilities.
Fortinet FortiGate offers comprehensive network security and firewall protection across multiple locations. It effectively manages data traffic and secures environments with features like VPN, intrusion prevention, and UTM controls.
Organizations rely on Fortinet FortiGate for its robust integration with advanced security policies, ensuring significant protection for enterprises, cloud environments, and educational sectors. It facilitates network segmentation, application-level security, and authentication management, securing communication within and between locations such as branches and data centers. Its efficient SD-WAN and UTM features enable streamlined data management and enhanced threat protection capabilities. Users appreciate its centralized management, facilitating seamless operations across diverse environments.
What are the key features of Fortinet FortiGate?
What benefits should users expect from Fortinet FortiGate?
Fortinet FortiGate is crucial in sectors like education, offering robust networks for secure data flow between campuses and facilitating remote learning. In enterprise environments, it allows efficient management of application traffic and security across multiple branches, while in the cloud, it seamlessly integrates with diverse platforms to enhance security infrastructure.
Check Point NGFW provides comprehensive firewall protection, managing VPNs, and securing network perimeters with advanced threat prevention techniques. It's widely used to protect businesses, data centers, and ensure secure traffic management.
Check Point NGFW offers robust security for companies, delivering security features like threat prevention, URL filtering, and intrusion prevention across both layer 3 and layer 7. It supports remote access, web filtering, application control, and safeguards against malware, botnets, and zero-day attacks. With its intuitive management console, deep packet inspection, centralized management capabilities, and sophisticated threat detection, Check Point NGFW enhances network security and productivity. The system integrates seamlessly with other technologies and provides real-time monitoring, detailed reporting, and automated policy management. Additionally, its setup is straightforward, it scales well, and offers comprehensive logging.
What are the key features?Check Point NGFW is implemented in industries like finance, healthcare, and retail, where protecting sensitive data and ensuring compliance are critical. Its advanced security features and ease of management make it suitable for large enterprises and data centers, ensuring reliable and secure network operations.
Cisco Secure Firewall stands as a robust and adaptable security solution, catering to organizations of all sizes. It's designed to shield networks from a diverse array of cyber threats, such as ransomware, malware, and phishing attacks. Beyond mere protection, it also offers secure access to corporate resources, beneficial for employees, partners, and customers alike. One of its key functions includes network segmentation, which serves to isolate critical assets and minimize the risk of lateral movement within the network.
The core features of Cisco Secure Firewall are multifaceted:
The benefits of deploying Cisco Secure Firewall are substantial. It significantly reduces the risk of cyberattacks, thereby enhancing the security posture of an organization. This security also translates into increased productivity, as secure access means uninterrupted work. Compliance with industry regulations is another advantage, as secure access and network segmentation align with many regulatory standards. Additionally, it helps in reducing IT costs by automating security tasks and simplifying management processes.
In practical scenarios, Cisco Secure Firewall finds diverse applications. It's instrumental in protecting branch offices from cyberattacks, securing remote access for various stakeholders, safeguarding cloud workloads, and segmenting networks to isolate sensitive areas.
User reviews from PeerSpot reflect an overall positive experience with the Cisco Secure Firewall. Users appreciate its ease of configuration, good management capabilities, robust protection, user-friendly interface, and scalability. However, some areas for improvement include better integration capabilities with other vendors, maturity, control over bandwidth for end-users, and addressing software bugs.
In summary, Cisco Secure Firewall is a comprehensive, versatile, and reliable security solution that effectively meets the security needs of various organizations. It offers a balance of advanced protection, user-friendly management, and scalability, making it a valuable asset in the realm of network security.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.