Juniper vSRX and Check Point NGFW compete in the network security category, providing robust security solutions. Juniper vSRX holds the upper hand in ease of configuration and deployment flexibility, while Check Point NGFW excels with centralized management and advanced threat prevention features.
Features: Juniper vSRX offers ease of configuration, seamless traffic management, and comprehensive threat prevention, providing flexibility in deployments. Check Point NGFW stands out with advanced threat prevention capabilities, featuring SSL inspection and application filtering, offering deep security management across platforms.
Room for Improvement: Juniper vSRX needs enhancements in GUI simplicity, automatic updates for firmware, and increased cloud support. Users also seek improved technical support and clearer documentation. Check Point NGFW users highlight the need to simplify policy management, reduce licensing complexities, and enhance support services, alongside improvements in pricing structure and third-party integration.
Ease of Deployment and Customer Service: Juniper vSRX is praised for straightforward deployment in both private and public cloud environments, although technical support experiences vary. Check Point NGFW is mainly on-premises with hybrid cloud options, recognized for effective customer support despite mixed experiences with service availability and response times.
Pricing and ROI: Juniper vSRX is seen as cost-effective, offering competitive pricing and good ROI when features are optimally used. Check Point NGFW, noted for its high cost, presents licensing complexity and expenses as concerns despite its strong security features justifying the investment.
Clients are now comfortable and not wasting productive hours on IT support.
There's definitely an ROI. Having a centralized way of managing and applying policies across the entire organization always helps.
there is a prominent ROI
This is a time-saving measure because we don't need to deploy a cluster or a firewall each time; we just create a virtual system on the management server using the same appliance.
Incident response time has reduced significantly, and downtime due to network issues has been minimized, leading to an improved return on investment.
I have seen a return on investment with Check Point NGFW in terms of time saved and fewer people needed for operations.
I would rate their support for FortiGate a nine out of ten.
They offer very accurate solutions.
The quick resolution of issues with Fortinet FortiGate is due to the support of the company and the fact that the equipment is easy to work with.
The support team we engaged was knowledgeable and well-versed with the application.
We have escalated issues to Check Point technical support multiple times and have received timely and very good responses.
Even challenging issues like those with VPNs have been resolved efficiently with their help.
I would rate their support a ten out of ten.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
You can choose a cheaper model if you only have 20-30 users, but you will need to spend more money for a FortiGate solution that covers 5,000.
If specified correctly, even the smaller boxes offer high session and bandwidth rates, making the solution highly scalable, even up to telco-level requirements.
Scalability must be carefully planned for, considering future growth and user base increases.
They offer multiple solutions from SMBs to enterprise data centers, making it an easily scalable solution with no issues in scalability.
Juniper vSRX is a highly scalable solution, and I would rate its scalability a nine out of ten.
We have not had any problems with the operating systems or maintenance of subscriptions.
The solution is very stable.
We have observed that the device is significantly more stable than before.
While the solution is generally stable, there are complications, such as requiring SmartConsole for deployment and upgrades, which can be time-consuming.
I have worked with Check Point products for 15 years and haven't found any stability or performance issues.
The use of Check Point firewalls has helped improve our security posture without any downtime.
If I have put 10 GBPS of throughput on a firewall and I enable all of these features available, such as IPS or UTM functionalities, the throughput comes down to 1 GBPS.
By providing an integrated solution, users would have access to all features and functionalities within a single window, eliminating the need to navigate through multiple windows.
Investing in a solution that can accommodate such growth would be more cost-effective than repeatedly purchasing new hardware.
Other products, like FortiGate, are perceived as more intuitive because they are easier to configure from the start.
More granularity and control for threat prevention, especially on the OT side, would be beneficial.
I believe Check Point NGFW can be improved by making its initial configuration and deployment easier in the future because the first-time setup is really hard.
I would suggest improving the pricing, particularly the licensing model.
The most expensive part is the renewal of the license subscription.
FortiGate is priced lower than Palo Alto.
Last year, I renewed the support for three years, which can sometimes be expensive but depends on the security benefits and how it helps us.
In comparison to Fortinet and other products, the pricing may be considered high.
Compared to other solutions, the pricing of Check Point NGFW is high.
The perception is that Check Point NGFW is expensive, especially when all software modules are included.
The pricing is competitive, being neither the most expensive nor the cheapest option.
The firewall, IPS, and VPN functions are the most valuable features.
FortiGate provides solid protection against viruses, malware, and other threats.
Within the same dashboard, you get to see the security profiles, the type of traffic that's passing through, the top applications that are being consumed, etc.
The firewall's default behavior of blocking all traffic, including a cleanup rule that blocks everything from external to internal sources, is highly valuable for protecting our network.
The most valuable features in my experience include perimeter firewalling, cloud and mobile security, application control, URL filtering, DLP, threat prevention, intrusion protection, and safeguarding against malware, botnets, and zero-day attacks.
Since implementing it, we have noticed a lot less getting through that maybe other antivirus within firewalls had failed to catch.
These features are crucial for our network security.
Fortinet FortiGate offers comprehensive network security and firewall protection across multiple locations. It effectively manages data traffic and secures environments with features like VPN, intrusion prevention, and UTM controls.
Organizations rely on Fortinet FortiGate for its robust integration with advanced security policies, ensuring significant protection for enterprises, cloud environments, and educational sectors. It facilitates network segmentation, application-level security, and authentication management, securing communication within and between locations such as branches and data centers. Its efficient SD-WAN and UTM features enable streamlined data management and enhanced threat protection capabilities. Users appreciate its centralized management, facilitating seamless operations across diverse environments.
What are the key features of Fortinet FortiGate?
What benefits should users expect from Fortinet FortiGate?
Fortinet FortiGate is crucial in sectors like education, offering robust networks for secure data flow between campuses and facilitating remote learning. In enterprise environments, it allows efficient management of application traffic and security across multiple branches, while in the cloud, it seamlessly integrates with diverse platforms to enhance security infrastructure.
Check Point NGFW provides comprehensive firewall protection, managing VPNs, and securing network perimeters with advanced threat prevention techniques. It's widely used to protect businesses, data centers, and ensure secure traffic management.
Check Point NGFW offers robust security for companies, delivering security features like threat prevention, URL filtering, and intrusion prevention across both layer 3 and layer 7. It supports remote access, web filtering, application control, and safeguards against malware, botnets, and zero-day attacks. With its intuitive management console, deep packet inspection, centralized management capabilities, and sophisticated threat detection, Check Point NGFW enhances network security and productivity. The system integrates seamlessly with other technologies and provides real-time monitoring, detailed reporting, and automated policy management. Additionally, its setup is straightforward, it scales well, and offers comprehensive logging.
What are the key features?
What are the benefits?
Check Point NGFW is implemented in industries like finance, healthcare, and retail, where protecting sensitive data and ensuring compliance are critical. Its advanced security features and ease of management make it suitable for large enterprises and data centers, ensuring reliable and secure network operations.
Juniper vSRX is a virtualized security platform that provides advanced threat protection for virtualized and cloud environments. It offers a comprehensive set of security features, including firewall, VPN, intrusion prevention system (IPS), and unified threat management (UTM).
With its scalable architecture, the vSRX can be easily deployed and managed across multiple virtual machines, making it ideal for organizations with dynamic and distributed networks. It also supports high-performance data processing, ensuring minimal impact on network performance.
vSRX is designed to integrate seamlessly with Juniper's broader security ecosystem, enabling centralized management and visibility across the entire network.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.