Find out what your peers are saying about Netgate, Fortinet, OPNsense and others in Firewalls.
Clients are now comfortable and not wasting productive hours on IT support.
The automation part is giving us a cost benefit and speed; we can react faster.
It's a very useful tool to mitigate and protect your enterprise.
At Amazon, we knew exactly how much it would cost if a fulfillment center was down for an hour.
From my point of view, the biggest return on investment when using Cisco Secure Access is the security it provides, and I believe the best word to describe it is best security, ensuring our protection.
There was a significant cost reduction.
Once it is deployed, I do not have to revisit or replace the hardware.
The pricing of FortiOS is competitive and reasonable compared to other leading products such as Palo Alto and Check Point.
Fortinet is strong in terms of cost and compatibility with other vendors.
They offer very accurate solutions.
The quick resolution of issues with Fortinet FortiGate is due to the support of the company and the fact that the equipment is easy to work with.
I would rate the technical support for Fortinet FortiGate a ten out of ten.
This stems from their original business in networking, integrating router and switch operations, as well as security devices.
Although Cisco is reliable, the process to raise a support ticket has become more complex, requiring specific user accounts and access to specialized platforms.
Our engineers are very satisfied with the features, technical assistance, and documentation provided by Cisco.
I would rate them nine or ten out of ten.
Fortinet technical support is very responsive and helpful.
Support engineers sometimes lack eagerness to assist with issues such as the memory problem.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
We determine sizing based on multiple factors: number of users, available links, traffic types, server count, services in use, and whether services will be published.
We turn the traffic to the Cisco Secure Access cloud, and we can manage and apply the policies that are necessary, making it very easy to scale the solution.
I would rate scalability at eight to nine out of ten.
Cisco Secure Access scales with the growing needs of our company.
When customers' networks grow and needs expand, we can easily switch between models to trade up devices.
It allows for the expansion of users and devices without additional licensing costs.
Fortinet FortiOS is scalable, allowing the addition of users and firewalls as required.
We're experiencing 99.999% availability consistently.
I would rate the stability of Fortinet FortiGate a ten out of ten.
Currently, we are experiencing a general outage of one of the main internet service providers of the Dominican Republic, and we have not been impacted in our operations because with SD-WAN, we have another internet service provider and we are working with the second WAN connection without any disruption.
I rate the stability of Cisco Secure Access as ten out of ten.
The solution is stable enough, and I did not experience any latency or performance issues.
I have not experienced any downtime, crashes, or performance issues.
While the product is largely stable, it sometimes faces memory issues in specific versions like 11 OE, which can be disruptive.
Stability is a seven out of ten because during version migrations, and sometimes with new versions, Fortinet is not as good.
I would rate the stability of FortiOS as an eight out of ten.
Investing in a solution that can accommodate such growth would be more cost-effective than repeatedly purchasing new hardware.
The constant daily revisions necessitate meticulous identification of the relevant documents to prevent the use of outdated information that could jeopardize our environment.
While Fortinet claims to offer a comprehensive network solution, it falls short in addressing computer application issues, particularly server security.
Modernization is needed, specifically in the enhancement of security features and functionality.
Previously, sending an email would automatically create a ticket, but now it requires accessing specific portals, making the process complicated.
Prices are high when compared to competitors, which makes it challenging to position the product with customers.
Fortinet FortiOS faces memory issues, which can lead to unexpected downtimes.
There should be more documentation on how to use the CLI or how to perform CLI versions of tasks that can be done through the GUI.
Compared to other market leaders like Palo Alto and Check Point, FortiOS has many bugs in its initial releases.
FortiGate is priced lower than Palo Alto.
Last year, I renewed the support for three years, which can sometimes be expensive but depends on the security benefits and how it helps us.
It is about 20% cheaper.
Renewal prices have been surprisingly high.
Cisco is known for being a premium product, and its pricing reflects this.
The main issue with pricing is that it is higher compared to other competitors.
It is an affordable solution for us.
Fortinet products are somewhat pricey, similar to Cisco equivalents, however, they have justified their price point.
I am satisfied with the pricing, licensing, and setup costs of FortiOS, rating it nine out of ten compared to other familiar leading firewalls.
In terms of security, we have not experienced any security flaws or loopholes, and it has proven to be quite stable.
FortiGate has helped reduce the risk of cyberattacks that might disrupt our client's production.
These features help reduce our downtime, manage the ISPs, and deploy SLAs for all the website traffic.
It eliminates the hassle of switching on VPNs and provides a direct connection to resources via Cisco Secure Access.
The main feature of interest to me and the customers is DNS security and Integrated Secure Web Control (ISWC).
The most valuable feature of Cisco Secure Access is the level of security it provides.
It is user-friendly when it comes to turning on features, and it has been reliable and effective.
The threat intelligence in FortiOS is very high, and the system is scalable without additional licensing costs.
The solution offers good threat intelligence, which is crucial for our customers' security purposes.
Company Size | Count |
---|---|
Small Business | 256 |
Midsize Enterprise | 100 |
Large Enterprise | 143 |
Company Size | Count |
---|---|
Small Business | 5 |
Large Enterprise | 7 |
Company Size | Count |
---|---|
Small Business | 42 |
Midsize Enterprise | 12 |
Large Enterprise | 23 |
Fortinet FortiGate offers comprehensive network security and firewall protection across multiple locations. It effectively manages data traffic and secures environments with features like VPN, intrusion prevention, and UTM controls.
Organizations rely on Fortinet FortiGate for its robust integration with advanced security policies, ensuring significant protection for enterprises, cloud environments, and educational sectors. It facilitates network segmentation, application-level security, and authentication management, securing communication within and between locations such as branches and data centers. Its efficient SD-WAN and UTM features enable streamlined data management and enhanced threat protection capabilities. Users appreciate its centralized management, facilitating seamless operations across diverse environments.
What are the key features of Fortinet FortiGate?
What benefits should users expect from Fortinet FortiGate?
Fortinet FortiGate is crucial in sectors like education, offering robust networks for secure data flow between campuses and facilitating remote learning. In enterprise environments, it allows efficient management of application traffic and security across multiple branches, while in the cloud, it seamlessly integrates with diverse platforms to enhance security infrastructure.
Cisco Secure Access is a comprehensive solution that ensures secure access to networks and protects against unauthorized access. It is used for network authentication, enforcing access policies, managing user identities, securing remote access, and providing secure connectivity for devices. Users have praised its robust security measures, seamless integration with existing systems, user-friendly interface, and reliable network performance.
Fortinet FortiOS is a comprehensive security operating system that powers Fortinet's network security solutions. It provides advanced threat protection, network visibility, and centralized management for organizations of all sizes. With its robust features and intuitive interface, FortiOS enables businesses to secure their networks, applications, and data from cyber threats.
One of the key features of FortiOS is its advanced threat protection capabilities. It incorporates multiple security technologies, including firewall, antivirus, intrusion prevention system (IPS), and web filtering, to detect and block a wide range of threats. This ensures that organizations are protected against malware, ransomware, and other malicious activities. FortiOS also offers extensive network visibility, allowing organizations to monitor and analyze network traffic in real-time. This visibility enables businesses to identify potential security risks, detect anomalies, and take proactive measures to mitigate threats.
Additionally, FortiOS provides detailed reports and analytics, helping organizations gain insights into their network security posture. Centralized management is another crucial aspect of FortiOS. It allows businesses to manage and configure their security policies, devices, and users from a single console. This simplifies the management process and ensures consistent security across the entire network infrastructure.
Moreover, FortiOS supports integration with other Fortinet products, enabling seamless security orchestration and automation. FortiOS is designed to be scalable and flexible, making it suitable for organizations of all sizes. It offers a range of deployment options, including physical appliances, virtual machines, and cloud-based solutions. This flexibility allows businesses to choose the deployment model that best fits their requirements and easily scale their security infrastructure as their needs evolve.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.