



Find out what your peers are saying about Fortinet, Netgate, Sophos and others in Firewalls.
| Product | Market Share (%) |
|---|---|
| Fortinet FortiGate | 18.7% |
| Cisco Secure Firewall | 7.4% |
| Untangle NG Firewall | 0.9% |
| Hillstone CloudEdge | 0.1% |
| Other | 72.9% |




| Company Size | Count |
|---|---|
| Small Business | 357 |
| Midsize Enterprise | 133 |
| Large Enterprise | 189 |
| Company Size | Count |
|---|---|
| Small Business | 180 |
| Midsize Enterprise | 126 |
| Large Enterprise | 212 |
| Company Size | Count |
|---|---|
| Small Business | 25 |
| Midsize Enterprise | 1 |
Fortinet FortiGate is a versatile network security tool offering features like VPN, firewall, web filtering, intrusion prevention, and scalability. It is known for its performance and integration with other Fortinet products, making it a preferred choice for robust cybersecurity.
Fortinet FortiGate stands out as a comprehensive cybersecurity solution with strong performance and ease of configuration. It delivers unified threat management, integrating features such as dynamic routing, SD-WAN support, and centralized management. Despite its strengths, improvements in the web interface's stability, pricing structures, and reporting capabilities are needed. Users seek better integration with third-party tools and automation advancements to enhance the experience further. These enhancements, alongside improvements in bandwidth management and the reduction of licensing costs, are points of interest for users looking to capitalize on FortiGate's extensive capabilities.
What are Fortinet FortiGate's key features?Fortinet FortiGate is widely implemented across industries as a primary firewall system for securing internet gateways and safeguarding data centers. It supports businesses in achieving SD-WAN integration and enhances cybersecurity by providing essential features like antivirus, web filtering, and application control. Enterprises utilize FortiGate for securing remote connections and ensuring compliance with security standards, making it adaptable for different network sizes and industries.
Cisco Secure Firewall provides comprehensive network security with advanced features such as application visibility, URL filtering, and malware protection. It combines a user-friendly interface with robust VPN capabilities, making it a reliable choice for varying network environments and industry applications.
Cisco Secure Firewall offers exceptional protection with its integration into Cisco's broader ecosystem, ensuring enhanced threat detection and policy unification. Despite its complexity in command-line interfaces and management, Cisco Secure Firewall remains a potent tool for safeguarding data. It is widely adopted for edge security, VPN services, perimeter defense, and traffic segmentation, especially in hybrid settings. Essential sectors like banking and telecom benefit from its stable connectivity and centralized security management. Though there are challenges with costs and support for third-party APIs, the firewall's scalability and high availability provide comprehensive support for protecting network assets.
What are the key features of Cisco Secure Firewall?Cisco Secure Firewall is widely implemented across sectors like banking, education, ISPs, and telecoms. It fortifies data centers and network edge security, delivering strong protection for client access, hybrid environments, and intrusion prevention. In these industries, firewall solutions ensure secure connectivity and manage RTU traffic effectively, leveraging centralized management and integration with Cisco's security tools.
Hillstone Virtual Next-Generation Firewall, CloudEdge, embedded with the Hillstone Networks StoneOS operation system, is deployed as a virtual machine, and provides advanced security services for applications and users in any virtualized environment. It provides comprehensive security features including granular application identification and control, VPN, intrusion prevention, anti-virus, attack defense and cloud-sandbox to fully keep a business secure and operational. It provides price- performance solutions for both public and private cloud customers, and can be rapidly provisioned and deployed at scale.
Untangle NG Firewall is an open-source firewall and gateway security platform that helps keep networks safe while accessing the internet. It offers a free core firewall platform with paid add-ons, and a cloud-based management platform with a variety of deployment options for smaller teams. The solution also has a cloud-based management console for remote management that can either be deployed on premises or as SaaS, and virtualized or cloud-based. It also has flexible deployment options, including third-party hardware, as a virtual machine, or as a turnkey appliance. Untangle NG Firewall is ideal for small IT teams with limited budgets.
Untangle NG Firewall Features
Untangle NG Firewall has many valuable key features. Some of the most useful ones include:
Untangle NG Firewall Benefits
There are many benefits to implementing Untangle NG Firewall. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Untangle NG Firewall is a solution that stands out when compared to many of its competitors. Some of its major advantages are that it is easy to use, has good features, including VPN, reporting, alerting, and filtering, and can be installed on existing hardware.
“It is very easy to use. The user interface is very straightforward. It may not be as fancy as some of the ones I've seen, but it's very straightforward. It's very easy to find what you need, and it's very easy to get things done,” says Josh E., CEO at DragonTech IT Services, Inc.
Barry A., Owner at ThinkEzIT, says, “It has good VPN features, helpful reporting and alerting, built-in content filtering, and excellent support.”
PeerSpot user Victor O., Director at Kisii County Government, explains, “What I like about this product, which is the reason that we continue to use it, is that you can install the software version on your own hardware. In case there is a problem with the hardware, we can just install the firewall in another machine and restore the configuration.”