Find out what your peers are saying about Fortinet, Netgate, OPNsense and others in Firewalls.
Clients are now comfortable and not wasting productive hours on IT support.
The automation part is giving us a cost benefit and speed; we can react faster.
It's a very useful tool to mitigate and protect your enterprise.
This is a time-saving measure because we don't need to deploy a cluster or a firewall each time; we just create a virtual system on the management server using the same appliance.
Incident response time has reduced significantly, and downtime due to network issues has been minimized, leading to an improved return on investment.
The fact that we've not had any breach toward the data center side is plenty enough.
The managed service aspect of Zscaler Internet Access has allowed for reduced staffing costs, resulting in a saving of approximately 20-25% compared to prior expenses.
They offer very accurate solutions.
The quick resolution of issues with Fortinet FortiGate is due to the support of the company and the fact that the equipment is easy to work with.
I would rate the technical support for Fortinet FortiGate a ten out of ten.
The support team we engaged was knowledgeable and well-versed with the application.
We have escalated issues to Check Point technical support multiple times and have received timely and very good responses.
Even challenging issues like those with VPNs have been resolved efficiently with their help.
The technical support by Sophos is amazing, especially when I pay for the enhanced support.
The technical support for Zscaler Internet Access is rated around seven out of ten due to some response time issues and the engagement model.
I find customer support to be quite adequate
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
We determine sizing based on multiple factors: number of users, available links, traffic types, server count, services in use, and whether services will be published.
If specified correctly, even the smaller boxes offer high session and bandwidth rates, making the solution highly scalable, even up to telco-level requirements.
It is easy to scale up by adding capacity through clustering or upgrading the license, and it effectively handles spikes in remote user connections or increased east-west traffic without noticeable bottlenecks.
Scalability must be carefully planned for, considering future growth and user base increases.
I find Zscaler Internet Access to be highly scalable, which was one of the reasons for choosing it.
Zscaler Internet Access is scalable and has points of presence across the globe to ensure low latency and reliable connections.
They require close to 200,000 megabits per second, and this bandwidth requirement has posed problems for both Zscaler and Netskope.
We're experiencing 99.999% availability consistently.
I would rate the stability of Fortinet FortiGate a ten out of ten.
Currently, we are experiencing a general outage of one of the main internet service providers of the Dominican Republic, and we have not been impacted in our operations because with SD-WAN, we have another internet service provider and we are working with the second WAN connection without any disruption.
While the solution is generally stable, there are complications, such as requiring SmartConsole for deployment and upgrades, which can be time-consuming.
I have worked with Check Point products for 15 years and haven't found any stability or performance issues.
The use of Check Point firewalls has helped improve our security posture without any downtime.
Zscaler Internet Access is stable and capable of building resilient architectures.
Zscaler Internet Access is very stable, and I would rate its stability as nine out of ten.
Investing in a solution that can accommodate such growth would be more cost-effective than repeatedly purchasing new hardware.
While Fortinet claims to offer a comprehensive network solution, it falls short in addressing computer application issues, particularly server security.
When considering Sophos XG, which we also use, the logging and reporting functionality is notably more efficient.
Other products, like FortiGate, are perceived as more intuitive because they are easier to configure from the start.
More granularity and control for threat prevention, especially on the OT side, would be beneficial.
It would be beneficial for Check Point NGFW to integrate more advanced AI and machine learning algorithms for better threat detection and response.
I would love to see artificial intelligence capabilities integrated into Sophos UTM.
With artificial intelligence, there is room for improvement in all antivirus and security software.
The response time and engagement model for technical support could be improved to handle complex outages more efficiently.
In future updates, I would like to see some of the features bundled into the existing product set, perhaps more AI features and a refreshed interface.
Zscaler Internet Access has introduced AI control for tools such as ChatGPT, providing options to restrict to text-only input without file or image uploads through CASB restriction controls.
Last year, I renewed the support for three years, which can sometimes be expensive but depends on the security benefits and how it helps us.
It offers cost savings as it is generally cheaper than the competition.
It is about 20% cheaper.
In comparison to Fortinet and other products, the pricing may be considered high.
Compared to other solutions, the pricing of Check Point NGFW is high.
The perception is that Check Point NGFW is expensive, especially when all software modules are included.
Pricing has become expensive recently due to the dollar hike and naira value changes in Nigeria.
The value between what I receive and what I pay is the best in the industry.
Zscaler Internet Access is recognized as an expensive solution.
Zscaler Internet Access is less expensive than competitors like Palo Alto, offering a premium service justified by security enhancements and cost-effective scalability.
In terms of security, we have not experienced any security flaws or loopholes, and it has proven to be quite stable.
FortiGate has helped reduce the risk of cyberattacks that might disrupt our client's production.
These features help reduce our downtime, manage the ISPs, and deploy SLAs for all the website traffic.
The firewall's default behavior of blocking all traffic, including a cleanup rule that blocks everything from external to internal sources, is highly valuable for protecting our network.
The most valuable features in my experience include perimeter firewalling, cloud and mobile security, application control, URL filtering, DLP, threat prevention, intrusion protection, and safeguarding against malware, botnets, and zero-day attacks.
Since implementing it, we have noticed a lot less getting through that maybe other antivirus within firewalls had failed to catch.
The zero-day protection and firewall rules are some of the most effective features for threat management.
This integration of the antivirus and the firewall works together to enhance security.
It prevents numerous web attacks through its AI/ML incorporated capability which identifies malware, threats, and viruses.
The most valuable feature for me is the ability to see how my network and traffic looks with modules like analytics and insights.
Some of the most valuable features of Zscaler Internet Access include secure web gateways, URL filtering, data loss prevention, anti-malware defense, file extension blocking, and a comprehensive categorization system.
Company Size | Count |
---|---|
Small Business | 350 |
Midsize Enterprise | 129 |
Large Enterprise | 187 |
Company Size | Count |
---|---|
Small Business | 131 |
Midsize Enterprise | 98 |
Large Enterprise | 195 |
Company Size | Count |
---|---|
Small Business | 71 |
Midsize Enterprise | 26 |
Large Enterprise | 26 |
Company Size | Count |
---|---|
Small Business | 15 |
Midsize Enterprise | 8 |
Large Enterprise | 39 |
Fortinet FortiGate excels in providing integrated VPN, firewalling, and Unified Threat Management (UTM) with centralized management and high availability. It supports remote access and comprehensive threat protection, making it a preferred choice for securing networks.
Fortinet FortiGate offers a robust security platform with features such as strong intrusion prevention, application control, and web filtering. Its integration with Active Directory and SD-WAN functionality provides scalable solutions for large networks. Users appreciate its ease of use through centralized management interfaces, ensuring robust security with flexible configurations. However, FortiGate could enhance its graphical interface and technical support responsiveness, address firmware bugs and costly licensing, improve logging, integrate better with third-party tools, and strengthen scalability and memory for log storage. Complexity in configuration and the need for intuitive features are noted challenges, and there's a demand for advanced security, zero-trust capabilities, and AI integration.
What are the key features of Fortinet FortiGate?Fortinet FortiGate is widely implemented across industries like education, finance, and government. Companies use it for firewall protection, VPN, and SD-WAN capabilities, ensuring secure perimeter and data center security. It facilitates remote access management and traffic routing optimization, offering reliable security and connectivity solutions.
Check Point Quantum Force NGFW provides centralized management with scalable security for network perimeters. As a reliable firewall, it ensures advanced threat prevention and offers seamless integration, making it suitable for various network environments.
Offering comprehensive security, Check Point Quantum Force NGFW helps control ingress and egress traffic, secures data center firewalls, and integrates seamlessly with cloud and on-premises setups. Users appreciate its application control, deep packet inspection, and identity awareness features for enhanced protection against cyber threats. Despite pricing issues and interface complexity, its IPsec VPN and robust logging provide valuable insights into network activities.
What are the key features of Check Point Quantum Force NGFW?Check Point Quantum Force NGFW is deployed across industries for securing network boundaries, supporting critical data center operations, and enabling secure VPN connections. In finance, it helps meet stringent compliance standards, while in healthcare, it's crucial for protecting sensitive patient data through robust security protocols.
Sophos UTM is a unified threat management platform designed to protect your businesses from known and emerging malware including viruses, rootkits and spyware. The solution provides a complete network security package with everything your organization needs in a single modular appliance.
Sophos UTM Features
Sophos UTM has many valuable key features. Some of the most useful ones include:
Sophos UTM Benefits
There are many benefits to implementing Sophos UTM. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Below are some reviews and helpful feedback written by PeerSpot users currently using the Sophos UTM solution.
PeerSpot user Dana B., Network Administrator at a manufacturing company, says “The web and email filtering are the two biggest and most valuable aspects of the solution for us. The solution overall has just been a good, cost-effective solution for us. The solution offers a lot of functionality. The solution scales well. We've found the technical support to be helpful. The stability and performance are quite good.”
A Technical Director at a security firm mentions, "Sophos SG UTM had all the basic functionality that you needed. It is user-friendly and easy to manage for any integrator."
Marek M., Senior Network Engineer at a computer software company, comments, “Sophos UTM is the simplest of these products to set up. If you follow the instructions using the wizard, which is just a few steps, then you will have a firewall to protect you and your customer.”
A Software Sales Manager at a tech services company explains, “The overall visibility of the console is what I find most valuable, plus it's very user-friendly. It can be integrated with other solutions such as SOAR, SIEM, etc., even when you have an existing firewall. I really like that the console can be integrated. You'll see everything on the same window, and the single window feature of the machine is so good. These are the features I really like.”
James D., IT Manager at Manual Workers Union, states, “The fact that it's on the cloud means we don't have to administer it on our network or deal with a physical machine, which saves us money. The solution has many great features. From the console, we can start different scannings on different machines. We enjoy the centralized reporting part of it. The initial setup is simple. We enjoy its general stability. The solution can scale. So far, the solution has been problem-free.”
Zscaler Internet Access is a cloud-native security service edge (SSE) platform. Its main purpose is to provide AI-powered protection for all users, all applications, and all locations. The solution replaces other legacy network security solutions to stop advanced attacks and prevent data loss by using a comprehensive zero trust approach.
Zscaler Internet Access Features
Zscaler Internet Access has many valuable key features. Some of the most useful ones include:
Zscaler Internet Access Benefits
There are several benefits to implementing Zscaler Internet Access. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Below are some reviews and helpful feedback written by Zscaler Internet Access users.
A Service Manager at a construction company says, "There are a bunch of different capabilities that are valuable within the platform. We use quite a lot of them, but not everything. The ones that are most important to us are the URL Filtering and the application control. For our needs, the cloud-native proxy architecture is a very good solution. This architecture helps with cyber threats because we inspect most of the traffic and we can see that a lot of threats are stopped directly in the secure web gateway."
Owen N., Security Architect at Claro Enterprise Solutions, explains that the solution’s most valuable features include “The integration of the gateway that inspects all ports and protocols. So, there is threat prevention; The cloud sandbox; VNS security; Access control that will protect URL filtering and the cloud firewall; Data protection that will protect your gateway, like your CASB or your cloud DLP; The capabilities of this will point your traffic to Zscaler Cloud.”
An Architecture Senior Manager at an insurance company mentions, "The data loss prevention feature is the most valuable. It stops our users from inadvertently leaking our customers' data to the Internet or anywhere else it shouldn't go." He also adds, “The solution provides quick access to cloud services, securing our data and allowing us to inspect all our traffic.”