


Find out in this report how the two Firewalls solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
Clients are now comfortable and not wasting productive hours on IT support.
The automation part is giving us a cost benefit and speed; we can react faster.
It's a very useful tool to mitigate and protect your enterprise.
I have seen a return on investment with Cisco Meraki MX because of the time saved through cloud management.
At Amazon, we knew exactly how much it would cost if a fulfillment center was down for an hour.
The AI features further contribute by expediting threat detection and incident response, ensuring tangible returns through operational savings.
It is one of those tools that needs to work right out of the box, and thankfully, it does; it is reliable, and the setup time was quick and straightforward.
The quick resolution of issues with Fortinet FortiGate is due to the support of the company and the fact that the equipment is easy to work with.
I would rate the technical support for Fortinet FortiGate a ten out of ten.
As a solution provider, when I encounter problems, I connect directly with Fortinet support, and they provide solutions within a very short time.
When we raise a ticket with Meraki MX, they instantly become available to support us for configurations or troubleshooting.
Cisco's TAC support for Cisco Meraki MX is excellent because no other OEM provides support at this level.
Cisco is one of the best vendors in the market.
Cisco TAC is very competent.
With our established point of contact within Cisco, our experience has greatly improved; we no longer log all issues through technical cases, as we can go directly to our account managers or customer service team, which expedites resolution.
This stems from their original business in networking, integrating router and switch operations, as well as security devices.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
We determine sizing based on multiple factors: number of users, available links, traffic types, server count, services in use, and whether services will be published.
When you have hundreds of thousands of people it is very difficult to scale in Meraki.
The scalability of Cisco Meraki MX is rated 10 out of 10; you can scale up and scale down with no effort.
We have Juniper solutions, and I would say the Juniper solutions can scale better, however, this solution is still very scalable.
We turn the traffic to the Cisco Secure Access cloud, and we can manage and apply the policies that are necessary, making it very easy to scale the solution.
I would rate scalability at eight to nine out of ten.
Cisco Secure Access scales with the growing needs of our company.
We're experiencing 99.999% availability consistently.
I would rate the stability of Fortinet FortiGate a ten out of ten.
Currently, we are experiencing a general outage of one of the main internet service providers of the Dominican Republic, and we have not been impacted in our operations because with SD-WAN, we have another internet service provider and we are working with the second WAN connection without any disruption.
There have been no outages, no stability issues, and we have not found any vulnerabilities during security audits.
Cisco is renowned for their reliability, and their products perform well under high data usage.
I rate the stability of Cisco Secure Access as ten out of ten.
The solution is stable enough, and I did not experience any latency or performance issues.
These sessions should be around five to ten minutes long, allowing users and partners to quickly grasp the information without disrupting their daily tasks.
The solution should be able to implement machine learning and analytics of all the logs for threat detection and protection.
It would be better for customers to get immediate replacements even with a standard subscription.
It should automatically remediate and find out the issue and then resolve it on its own without interrupting the work of the employees.
Data is the only path, so optimization is essential.
An improvement would be to use Cisco Meraki MX as a software solution as well, which might reduce the cost.
Modernization is needed, specifically in the enhancement of security features and functionality.
It was challenging to learn because it has a significant learning curve and requires considerable training to become proficient.
The granular access issue is coming from the product limitation at the moment, as it does not offer us the option to tell it that a particular role can only manage websites, allowed sites, and blocked sites.
Last year, I renewed the support for three years, which can sometimes be expensive but depends on the security benefits and how it helps us.
It offers cost savings as it is generally cheaper than the competition.
It is about 20% cheaper.
I get it for $25,000, a device that can connect up to 75-100 users, whereas in Meraki MX, it goes to 75,000-80,000 per access point.
The price could be reduced by around 30% to make it more comfortable.
If Cisco can make the pricing less, customers can purchase more licenses.
The solution is cheaper than premium options such as Palo Alto, existing Cisco licenses facilitate replacing previous solutions with Cisco Secure Access smoothly and affordably.
It is good because you want to push Cisco Secure Access, and regarding the price, it is very much below other products.
Renewal prices have been surprisingly high.
We got a firewall and gave an SSL VPN to my client to connect to their servers, after which, such kind of activities involving ransomware attacks stopped.
They put in a thing called the FortiCookbook, which is very easy to read with real-life scenarios that make networking tasks like joining networks very straightforward.
The firewall and VPN features are the most valuable in protecting our customers' networks.
Meraki MX is among those top solutions in their exceptional approach towards VPN-less, Zero Trust client access to office private networks.
Advanced security is the second tier of Cisco Meraki MX. It brings you the main next-generation firewalling features such as URL filtering, advanced malware protection, and threat protection.
We understand that Cisco solutions are very reliable, and we really like the simple management.
It eliminates the hassle of switching on VPNs and provides a direct connection to resources via Cisco Secure Access.
They are sending the traffic encrypted and categorizing the traffic based on the type, whether web traffic or internet traffic, and doing the security mechanism that is needed for the traffic type.
Using ZTNA in Cisco Secure Access has positively affected my transition and my clients' transition to Zero Trust and least privilege principles, reinforcing the security posture.
| Product | Mindshare (%) |
|---|---|
| Fortinet FortiGate | 18.3% |
| Cisco Secure Access | 0.2% |
| Cisco Meraki MX | 3.2% |
| Other | 78.3% |



| Company Size | Count |
|---|---|
| Small Business | 364 |
| Midsize Enterprise | 135 |
| Large Enterprise | 190 |
| Company Size | Count |
|---|---|
| Small Business | 42 |
| Midsize Enterprise | 20 |
| Large Enterprise | 16 |
| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 8 |
| Large Enterprise | 27 |
Fortinet FortiGate is a versatile network security tool offering features like VPN, firewall, web filtering, intrusion prevention, and scalability. It is known for its performance and integration with other Fortinet products, making it a preferred choice for robust cybersecurity.
Fortinet FortiGate stands out as a comprehensive cybersecurity solution with strong performance and ease of configuration. It delivers unified threat management, integrating features such as dynamic routing, SD-WAN support, and centralized management. Despite its strengths, improvements in the web interface's stability, pricing structures, and reporting capabilities are needed. Users seek better integration with third-party tools and automation advancements to enhance the experience further. These enhancements, alongside improvements in bandwidth management and the reduction of licensing costs, are points of interest for users looking to capitalize on FortiGate's extensive capabilities.
What are Fortinet FortiGate's key features?Fortinet FortiGate is widely implemented across industries as a primary firewall system for securing internet gateways and safeguarding data centers. It supports businesses in achieving SD-WAN integration and enhances cybersecurity by providing essential features like antivirus, web filtering, and application control. Enterprises utilize FortiGate for securing remote connections and ensuring compliance with security standards, making it adaptable for different network sizes and industries.
Cisco Meraki MX offers cloud-managed security with user-friendly setup and efficient management, enhancing VPN and firewall functionalities for businesses.
Cisco Meraki MX is known for its robust cloud-based network management, featuring AutoVPN, SD-WAN, and advanced security. Its centralized control over firewall, traffic shaping, and monitoring ensures excellent connectivity and security. The interface allows easy management by non-technical staff, offering remote access and seamless network performance through real-time alerts and troubleshooting. It supports global connectivity with minimal effort, addressing needs across small to enterprise environments. Despite its strengths, users point out areas needing improvement like load balancing, VPN features, more flexible logging, and session capabilities. Pricing, integration limits, and licensing need enhancement.
What are the key features of Cisco Meraki MX?In industries like retail, finance, and education, Cisco Meraki MX provides enhanced security and connectivity. Retail chains benefit from easy VPN setups for secure multi-site networking, while educational institutions find value in its ability to manage large campuses efficiently. Financial services leverage its robust security features to protect sensitive data, ensuring compliance and trust.
Cisco Secure Access is a comprehensive Security Service Edge (SSE) solution (a key component of a SASE solution) that addresses the complexities of securing a hybrid enterprise. Cloud-delivered and grounded in zero trust, it delivers a unique blend of user simplicity and IT efficiency for frictionless, secure access to all applications—SaaS (with gen AI), private apps, and the internet—regardless of user location or device. Secure Access protects users, data, and devices against relentless, sophisticated, and constantly evolving threats including AI-driven attacks and identity breaches.
Provides all core SSE components (ZTNA, SWG, CASB, and FWaaS) plus extended capabilities.
Includes VPN-as-a-Service (VPNaaS), data loss prevention (DLP), AI Assistant, visibility/control/guardrails for generative AI use, digital experience monitoring (DEM), reserved IP, remote browser isolation (RBI), DNS-layer security, flexible security enforcement (in cloud or on-premises), policy verification, and more.
Protects users as they seamlessly access resources and apps with no extra steps needed, regardless of protocol, port, or level of customization
Simplifies IT operations through a single client, single dashboard, single license, and unified policies.
Lowers risk with least privilege, granular controls backed with unmatched threat intelligence of Cisco Talos.
Eases interoperability with other products from Cisco and third-party vendors with common administrative controls, data structures, and policy management.
Robust integrations
Integrates with Cisco Identity Intelligence to protect against the startling increase in identity-based attacks.
Integrates with many SAML Identity Providers (IDPs) such as AD, Azure AD, Okta, Ping, etc.
Integrates with Cisco offerings including SD-WAN, Splunk, XDR, Thousand Eyes, third party technologies such as Menlo RBI, Chrome Enterprise Browser, and AppOmni for SSPM.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.