Find out what your peers are saying about Fortinet, Netgate, OPNsense and others in Firewalls.
The biggest return on investment when using Cisco Secure Firewall is that there's no waste in any infrastructure cost and licensing costs for us.
From my point of view, the biggest return on investment when using Cisco Secure Firewall is the single pane of glass, which is a huge plus for us.
The biggest return on investment for me when using Cisco Secure Firewall is reliability and robust network design.
Clients are now comfortable and not wasting productive hours on IT support.
The automation part is giving us a cost benefit and speed; we can react faster.
It's a very useful tool to mitigate and protect your enterprise.
Customers can see data within a week, indicating a quick return on investment.
I have to provide many logs, yet problems remain unresolved, often requiring workarounds rather than solutions.
I have been working with them on firewalls, wireless, switching, and routing, and the support is the best.
They have expertise and provide solutions for the most difficult problems.
They offer very accurate solutions.
The quick resolution of issues with Fortinet FortiGate is due to the support of the company and the fact that the equipment is easy to work with.
I would rate the technical support for Fortinet FortiGate a ten out of ten.
The support quality could be improved.
Resolving issues promptly.
They are responsive and provide high-quality assistance.
Scalability presents a challenge.
Compared to FortiGate and Palo Alto, it lags in configuration and other aspects.
Even with the highest one, the 4600, we still face issues, particularly when transitioning between screens; it becomes very slow.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
We determine sizing based on multiple factors: number of users, available links, traffic types, server count, services in use, and whether services will be published.
They are easy to upgrade, and with credit licensing, they scale effectively according to demand.
The solution is scalable and can easily handle an increase in the number of users.
It is easy to use with an excellent graphical user interface and extensive documentation, which contributes to its high scalability.
We have often encountered split-brain scenarios during failover processes and code upgrades, which have been persistent problems for us.
We work with a cluster with high availability, so if something goes wrong, we have it functioning.
Cisco Secure Firewall offers exceptional performance and stability.
We're experiencing 99.999% availability consistently.
I would rate the stability of Fortinet FortiGate a ten out of ten.
Currently, we are experiencing a general outage of one of the main internet service providers of the Dominican Republic, and we have not been impacted in our operations because with SD-WAN, we have another internet service provider and we are working with the second WAN connection without any disruption.
Hardware is generally very stable.
I have not experienced any major problems or downtime.
Perfection is unlikely as the dynamic nature of traffic and constant changes can result in occasional bugs despite regular updates.
My ongoing complaint for the last six years has been the lack of CLI functionality, which hinders my ability to work on the firewall, alongside concerns regarding deployment time.
Firepower Management Center is quite out of date compared to other vendors.
The integration between Cisco products themselves presents difficulties, such as SD-WAN configuration.
Investing in a solution that can accommodate such growth would be more cost-effective than repeatedly purchasing new hardware.
While Fortinet claims to offer a comprehensive network solution, it falls short in addressing computer application issues, particularly server security.
When considering Sophos XG, which we also use, the logging and reporting functionality is notably more efficient.
Integration with CSIRT across all use levels would make it easier for administrators to stay updated on the blocked entities without manual intervention.
Most customers go for partner-enabled support, which involves multiple layers, leading to delays.
When managing the firewall, it involves a Strata Cloud web browser that requires improvement to enhance deployment ease and call center efficiency.
It's good to have them, however, it costs us a lot.
It's considered a premium, but people pay that price for Cisco.
There are a lot of in-place contracts for us that provide the benefit of discounts.
Last year, I renewed the support for three years, which can sometimes be expensive but depends on the security benefits and how it helps us.
It offers cost savings as it is generally cheaper than the competition.
It is about 20% cheaper.
Palo Alto is expensive in terms of pricing, particularly when comparing features to cost.
The cost involves purchasing through a vendor, which might mark up due to the supply chain.
Pricing for Palo Alto Networks is higher than other OEMs, but considering the robustness and features, it gains customer trust.
What stands out positively about Cisco is their training and support, which has effectively prepared engineers to work with their products.
This is very important to my organization, as we work extensively with security because we are a bank, so we can keep the data safe.
Cisco Secure Firewall allows me to safeguard Layer 7 or Layer 3 and manage the security rules with the business needs of my organization.
In terms of security, we have not experienced any security flaws or loopholes, and it has proven to be quite stable.
FortiGate has helped reduce the risk of cyberattacks that might disrupt our client's production.
These features help reduce our downtime, manage the ISPs, and deploy SLAs for all the website traffic.
We use these tools to prevent all known and unknown threats using Palo Alto Networks' Wildfire and other data filtering tools to gather information, analyze traffic, manage malicious traffic, and offer visibility, control, and attack prevention.
Palo Alto's robust threat intelligence supports new updates, and I can open cases directly with their Threat Intelligence team.
The DNS security significantly enhances security through visibility and detection, allowing control over crucial traffic like DNS, which is often exploited by ransomware.
Product | Market Share (%) |
---|---|
Fortinet FortiGate | 20.4% |
Cisco Secure Firewall | 6.2% |
Palo Alto Networks VM-Series | 1.1% |
Other | 72.3% |
Company Size | Count |
---|---|
Small Business | 180 |
Midsize Enterprise | 126 |
Large Enterprise | 212 |
Company Size | Count |
---|---|
Small Business | 350 |
Midsize Enterprise | 129 |
Large Enterprise | 187 |
Company Size | Count |
---|---|
Small Business | 27 |
Midsize Enterprise | 17 |
Large Enterprise | 25 |
Cisco Secure Firewall provides comprehensive network security with advanced features such as application visibility, URL filtering, and malware protection. It combines a user-friendly interface with robust VPN capabilities, making it a reliable choice for varying network environments and industry applications.
Cisco Secure Firewall offers exceptional protection with its integration into Cisco's broader ecosystem, ensuring enhanced threat detection and policy unification. Despite its complexity in command-line interfaces and management, Cisco Secure Firewall remains a potent tool for safeguarding data. It is widely adopted for edge security, VPN services, perimeter defense, and traffic segmentation, especially in hybrid settings. Essential sectors like banking and telecom benefit from its stable connectivity and centralized security management. Though there are challenges with costs and support for third-party APIs, the firewall's scalability and high availability provide comprehensive support for protecting network assets.
What are the key features of Cisco Secure Firewall?Cisco Secure Firewall is widely implemented across sectors like banking, education, ISPs, and telecoms. It fortifies data centers and network edge security, delivering strong protection for client access, hybrid environments, and intrusion prevention. In these industries, firewall solutions ensure secure connectivity and manage RTU traffic effectively, leveraging centralized management and integration with Cisco's security tools.
Fortinet FortiGate excels in providing integrated VPN, firewalling, and Unified Threat Management (UTM) with centralized management and high availability. It supports remote access and comprehensive threat protection, making it a preferred choice for securing networks.
Fortinet FortiGate offers a robust security platform with features such as strong intrusion prevention, application control, and web filtering. Its integration with Active Directory and SD-WAN functionality provides scalable solutions for large networks. Users appreciate its ease of use through centralized management interfaces, ensuring robust security with flexible configurations. However, FortiGate could enhance its graphical interface and technical support responsiveness, address firmware bugs and costly licensing, improve logging, integrate better with third-party tools, and strengthen scalability and memory for log storage. Complexity in configuration and the need for intuitive features are noted challenges, and there's a demand for advanced security, zero-trust capabilities, and AI integration.
What are the key features of Fortinet FortiGate?Fortinet FortiGate is widely implemented across industries like education, finance, and government. Companies use it for firewall protection, VPN, and SD-WAN capabilities, ensuring secure perimeter and data center security. It facilitates remote access management and traffic routing optimization, offering reliable security and connectivity solutions.
Palo Alto Networks VM-Series is a highly effective advanced threat protection (ATP) solution and firewall that can be hosted on cloud computing technologies designed by many different companies. It decreases the amount of time that it will take administrators to respond to threats. Users that deploy VM-series have 70% less downtime than those who use similar firewalls. Neither protection nor efficiency are concerns when this next-generation firewall is in play.
VM-Series is being deployed to protect both public and private cloud environments. This level of flexibility empowers organizations to run the environment or environments that best meet their needs without worrying that they are going to be exposed to digital threats due to the environment that they choose.
In the public cloud, users of Palo Alto Networks VM-Series can automate their deployment and dynamically scale up their environment while experiencing a consistent level of protection. This dynamic scalability means that they also integrate their security into their DevOps workflows so that their security can keep up with their activities and requirements. Users of private cloud environments can set up security policies that can be automated to be provisioned as the need arises. Organizations don’t need to slow down when they deploy VM-Series because it makes the task of defending them so simple that they can set their defenses and forget that they are even there.
Users gain a deep level of visibility when they deploy Palo Alto Networks VM-Series. App-ID technology enables organizations to see their network traffic on the application level and spot threats that might be trying to sneak in through vulnerable points in their defenses. It also leverages Palo Alto Networks WildFire and advanced threat protection to block the threats before they can escalate.
Palo Alto Networks VM-Series Features:
Reviews from Real Users:
Palo Alto Networks VM-Series is a solution that stands out when compared to other similar solutions. Two major advantages that it offers are its ability to protect users without degrading the efficiency with which their networks perform and its centralized management system.
Jason H., the director of information technology at Tavoca Inc, writes, “There is no noticeable trade-off between security and network performance. In fact, so far, we've not seen any negative network performance with it. We're very impressed in that regard.”
An information technology manager at a tech services company says, “We use Palo Alto’s Panorama centralized management system. We have an on-prem firewall where Panorama is very good for pulling logs in from the cloud so we can see what is going on. It gives us visibility into that as well as shows us what attacks are coming in. Palo Alto’s Panorama centralized management system simplifies our security posture based on our requirements. Instead of manually pulling logs, then generating them into readable formats, it gives us the console in a readable format to view.”