Fortinet FortiGate and Palo Alto Networks URL Filtering with PAN-DB are network security solutions, each excelling in different areas. Fortinet reportedly offers better pricing and support, while Palo Alto is favored for its advanced features.
Features: Fortinet FortiGate is known for its comprehensive security suite, built-in firewall integration, and powerful threat protection. It offers consolidated management and policy control that is user-friendly. On the other hand, Palo Alto Networks stands out with its dynamic categorization and real-time threat intelligence, delivering advanced threat detection capabilities with its PAN-DB.
Room for Improvement: Fortinet FortiGate could enhance its user interface for greater flexibility and improve some of the advanced threat detection features. It might also benefit from streamlining integration with third-party applications. Meanwhile, Palo Alto Networks could improve on pricing to be more competitive and make deployment easier for smaller setups. Additionally, it could focus on offering a more intuitive configuration and management experience.
Ease of Deployment and Customer Service: Fortinet FortiGate is praised for simple deployment and offers comprehensive support documentation. It provides a user-friendly experience with substantial assistance from its customer service. Palo Alto Networks, by contrast, offers a cloud-based deployment model, recognized for its flexibility and access to expert technical support. Customers appreciate the higher level of technical expertise available from Palo Alto's service team.
Pricing and ROI: Fortinet FortiGate is noted for its cost-effectiveness, offering lower initial setup costs and a quicker return on investment due to its all-in-one capabilities. Palo Alto Networks, although involving higher upfront costs, justifies this with superior long-term value through an extensive feature set that is unmatched. While Fortinet is optimal for businesses prioritizing initial investment, Palo Alto represents a solid long-term investment for those needing advanced security features.
Product | Market Share (%) |
---|---|
Fortinet FortiGate | 16.6% |
Palo Alto Networks URL Filtering with PAN-DB | 1.9% |
Other | 81.5% |
Company Size | Count |
---|---|
Small Business | 350 |
Midsize Enterprise | 130 |
Large Enterprise | 187 |
Company Size | Count |
---|---|
Small Business | 5 |
Midsize Enterprise | 4 |
Large Enterprise | 4 |
Fortinet FortiGate excels in providing integrated VPN, firewalling, and Unified Threat Management (UTM) with centralized management and high availability. It supports remote access and comprehensive threat protection, making it a preferred choice for securing networks.
Fortinet FortiGate offers a robust security platform with features such as strong intrusion prevention, application control, and web filtering. Its integration with Active Directory and SD-WAN functionality provides scalable solutions for large networks. Users appreciate its ease of use through centralized management interfaces, ensuring robust security with flexible configurations. However, FortiGate could enhance its graphical interface and technical support responsiveness, address firmware bugs and costly licensing, improve logging, integrate better with third-party tools, and strengthen scalability and memory for log storage. Complexity in configuration and the need for intuitive features are noted challenges, and there's a demand for advanced security, zero-trust capabilities, and AI integration.
What are the key features of Fortinet FortiGate?Fortinet FortiGate is widely implemented across industries like education, finance, and government. Companies use it for firewall protection, VPN, and SD-WAN capabilities, ensuring secure perimeter and data center security. It facilitates remote access management and traffic routing optimization, offering reliable security and connectivity solutions.
Palo Alto Networks URL Filtering with PAN-DB is an advanced URL filtering solution that provides a way to control web access, as well as how users interact with online content. With this solution, your organization can prevent credential phishing theft by assuming strict control over which sites users can enter their corporate credentials into. Palo Alto Networks Advanced URL Filtering with PAN-DB provides web protection by using URL database capabilities to help you automatically detect and prevent new malicious and targeted web-based threats instantly.
Palo Alto Networks URL Filtering with PAN-DB Features
Palo Alto Networks URL Filtering with PAN-DB has many valuable key features. Some of the most useful ones include:
Palo Alto Networks URL Filtering with PAN-DB Benefits
There are many benefits to implementing Palo Alto Networks URL Filtering with PAN-DB. Some of the biggest advantages the solution offers include:
Reviews from Real Users
Below are some reviews and helpful feedback written by PeerSpot users currently using the Palo Alto Networks URL Filtering with PAN-DB solution.
Consultant Michael V. says, “What I really like about PAN and what makes it a worthwhile solution is that rather than having an administrator constantly updating a list of prohibited URLs, you can do it by categories. Every one of these URLs gets meta-tagged as hate speech or antisemitic or pornography, or whatever it is, and when you set up the filter everything that's prohibited by HR policy is there. I don't have to maintain anything, it catches everything.”
PeerSpot user Darshil S., Consultant at a tech services company, mentions, “The multiple categorizations of URLs are quite helpful. For example, if a URL is a social media website, such as facebook.com, it can be classified at a certain risk level - from high to low.”
Karthikeyan S., Sr. Cloud Data Architect at Sun Cloud LLC, explains, "Palo Alto Networks URL Filtering with PAN-DB is easy to use, easy to operate, and easy to edit."
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.