


Find out what your peers are saying about AlgoSec, Tufin, Palo Alto Networks and others in Firewall Security Management.
After implementing FireMon Security Manager, policy risk reports, compliance reports, and anomalies are generated automatically, which reduces audit preparation down to 15 to 18 hours per cycle, saving about 40 to 50% of time just on audit-related efforts.
It significantly reduced the time spent on manual firewall policy review and audit preparation.
The Orchestration Suite saves time when implementing rules.
An eight signifies they are doing a good job.
The customer support for FireMon Security Manager has been outstanding in our experience.
The technical support is good, but sometimes it takes some time.
The technical support for ManageEngine is very good
The support team is effective; they connect to the network quickly and help resolve any issues that arise.
The team is eager to help in fixing issues.
In recent years, they have stopped providing specialized engineering support.
If it can see and interpret everything correctly, it would do exactly what I want, and it would be very helpful.
It offers extensive scalability options, providing more flexibility than other vendors.
As the environment grew, FireMon Security Manager continued to handle policy analysis, reporting, and change tracking reliably without performance issues.
When someone changes the configuration or running config in the network conflict manager, it sends alerts to my email.
We have not experienced any major crashes, data losses, or serious outages.
If we have many devices added or if the firewall complexity is huge, we might experience some lag in processing.
FireMon can see everything much better and provides me with a fuller report when using Meraki as a firewall system.
Simplifying some workflows and dashboards would help teams get value more quickly, especially in large environments.
A basic understanding of cloud computing and firewall principles is necessary for successful implementation.
Issues can arise in larger enterprises, particularly concerning policy-based forwarding and NAT traffic.
The analytics features of Tufin Orchestration Suite are challenging to use and require technical expertise, which is a concern as there is not much knowledge in this field in Thailand.
The design needs improvement, particularly in recognizing target devices and target files.
Comparatively, FireMon has a very good price and is below the general competition in cost.
Compared to others, it is not so expensive.
Our experience with FireMon Security Manager's pricing and licensing is that it is on the higher side, but justified for a large, regulated environment.
The pricing of Orchestration Suite is high, which is a point for improvement.
FireMon and Skybox are considered more cost-effective.
Tufin and AlgoSec are at the same level in terms of pricing.
By eliminating loopholes between policies, it simplifies review and analysis, while also automating policy changes and supporting multiple vendors.
It provides a single view across all firewalls, helps quickly identify risks and unused rules, and generates audit-ready reports, which is extremely useful in large, regulated environments.
The risk and rule analysis feature highlights risky, unused, shadow, duplicate, and overly permissive rules automatically, saving huge time on manual audits and helping reduce the attack surface.
The strong points of ManageEngine Firewall Analyzer are many, but I think my favorite feature focuses on the VPN traffic.
AlgoSec adds more value with its vulnerability control, which benefits organizations by reducing expenses associated with audits.
New employees can quickly grasp the various IPs, devices, and the network's logical and physical layout within a short period.
It offers automation capabilities that are very helpful, especially for network security orchestration and applying policies.
| Product | Market Share (%) |
|---|---|
| Tufin Orchestration Suite | 20.2% |
| FireMon Security Manager | 17.9% |
| ManageEngine Firewall Analyzer | 3.1% |
| Other | 58.800000000000004% |


| Company Size | Count |
|---|---|
| Small Business | 9 |
| Midsize Enterprise | 9 |
| Large Enterprise | 46 |
| Company Size | Count |
|---|---|
| Small Business | 3 |
| Midsize Enterprise | 1 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 29 |
| Midsize Enterprise | 13 |
| Large Enterprise | 152 |
The increasing complexity of networks, driven by the constant influx of new devices, applications, and cloud services, presents a daunting challenge for managing firewall policies and rules. A typical enterprise environment has millions of rules, and just one simple misconfiguration can lead to devastating consequences like compliance violations, outages, and data breaches.
FireMon’s Security Manager is a purpose-built network security policy management (NSPM) platform that automates the management of firewall and cloud security policies to eliminate policy-related risk, accurately and quickly change rules, and meet internal and external compliance requirements.
ManageEngine Firewall Analyzer is an agent less log analytics and configuration management software that helps network administrators to centrally collect, archive, analyze their security device logs and generate forensic reports out of it.
Real-time event response system and Integrated Compliance Management module of Firewall Analyzer automates your end point security monitoring, network bandwidth monitoring and security & compliance auditing. Firewall Analyzer eases your Device Configuration Management by providing out-of-the-box reports and alerts for configuration changes. Firewall Analyzer is vendor-agnostic and supports almost all open source and commercial network firewalls like Check Point, Cisco, Juniper, Fortinet, Snort, Squid Project, SonicWALL, Palo Alto and more, IDS/IPS, VPNs, Proxies and other related security devices.
Tufin enables organizations to automate their security policy visibility, risk management, provisioning and compliance across their multi-vendor, hybrid environment. Customers gain visibility and control across their network, ensure continuous compliance with security standards and embed security enforcement into workflows and development pipelines.