We performed a comparison between Juniper SRX Series Firewall and Palo Alto Networks NG Firewalls based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Juniper SRX Series Firewall is highly regarded for its simplicity, intuitive interface, and exceptional customer assistance. It provides advantageous capabilities, including site-to-site VPN, effortless configuration, and a robust command line. Palo Alto Networks NG Firewalls excel in embedded machine learning, formidable security functionalities, and a cohesive platform. They present features such as application identification, DNS security, URL filtering, and GlobalProtect VPN.
Juniper SRX Series Firewall could enhance its capacity, reporting and alerts, user interface, device reliability, documentation, and feature set. Palo Alto Networks NG Firewalls would benefit from improved customization, configuration simplicity, machine learning capabilities, troubleshooting tools, documentation, user interface, VPN availability, and product stability.
Service and Support: Customers have generally found the customer service of Juniper SRX Series Firewall to be satisfactory, with helpful and knowledgeable support. Palo Alto Networks NG Firewalls have received mixed feedback, as some customers have praised the support while others have expressed dissatisfaction.
Ease of Deployment: The setup process for Juniper SRX Series Firewall is time-consuming, varying based on the environment's complexity. Palo Alto Networks NG Firewalls are known for their simplicity and ease of use. Palo Alto is considered more user-friendly and has a quicker deployment time.
Pricing: The setup cost for Juniper SRX Series Firewall is seen as simple, while Palo Alto Networks NG Firewalls are considered to be more expensive than other vendors. Juniper's pricing is fair and within budget, while Palo Alto's pricing is justified considering the level of security and features offered.
ROI: Juniper SRX Series Firewall is praised for its reliability, consistent performance, and advanced security capabilities, which ultimately lead to a favorable return on investment. Palo Alto Networks NG Firewalls excel in providing better visibility, detailed reporting, and streamlined management, resulting in decreased administrative burden.
Comparison Results: Based on the comparison between Juniper SRX Firewall and Palo Alto Networks NG Firewalls, it is evident that users prefer Palo Alto Networks NG Firewalls. This is due to its embedded machine learning for real-time attack prevention, strong security capabilities, and a unified platform that offers ease of use and maintenance. Users appreciate the advanced security features and user-friendly interface.
"Good performance, stability, and virtual domain ability."
"Fortinet FortiGate's ease of management is the most valuable feature."
"The secure web gateway module and the application control module are valuable. HA operations are very easy."
"FortiGate has a very strong unified threat management system."
"Reliability is the best feature. We faced some issues when we were setting it up, but the service, portal, and administration are good."
"User-friendly and affordable security solution that's recommended for SMB customers. This solution has good technical support."
"FortiGate firewalls are easy to manage through a user-friendly web interface. They also have advanced features like DDoS and DLP. However, I wouldn't recommend enabling all of these features on one device because it can cause performance issues."
"FortiGate SD-WAN facilitated a smooth transition for our customers between their two internet service providers, ensuring uninterrupted connectivity without any downtime."
"The main features are safeguarding their data and ensuring robust security services for organizational data."
"The features that I have found valuable are the ones for the main purpose we are using Juniper - its firewall to protect our network for our internet access."
"The command line in Juniper SRX is extremely powerful, in my opinion. It's one of the best command lines I've used in networking products."
"It is a part of the infrastructure when we're selling Juniper. That's what clients are familiar with and that's what they rely on."
"It's easily scalable."
"Juniper SRX is a very powerful firewall and sometimes can be used as a router."
"The solution is stable, inexpensive, and works well for medium size companies."
"The setup is pretty straightforward."
"The most valuable features are the power of the threat prevention and the WildFire service. Its strength comes from the huge number of sensors all over the world. The firewalls have a rich library of signatures."
"The most significant benefit is threat protection. Anti-malware uses signatures, so dynamic analyzers like WildFire are the best way to protect the company. It is a firewall based on application control, user ID, and security policy. We can use it based on user and application ID without a stateless firewall or TCPIP ports."
"The user experience is good and the configuration is very easy."
"It has a solid network security with some robust tools. We can block unexpected attacks, especially zero-day attacks. Since they use the Pan-OS engine, they can collect attacks from all over the world and analyze them. They can then protect against zero-day attacks and unexpected attacks."
"I like the navigation of the general Panorama solution. I can easily navigate around and get to the thing I need. I'm not wasting time trying to find something."
"There are many valuable features, such as wireless cloud features."
"The fact that the Next-Gen firewalls are integrated with identity is the best. It gives us the ability to track what an individual is doing and helps us provide access to only what they need in order to do their job."
"The trackability is most valuable. When a port is open for a protocol, such as port 443 for HTTPS, it can look inside the traffic and identify or verify the applications that are using the port, which was previously not possible with traditional firewalls."
"The reporting in Fortinet FortiGate could improve. Customers are having to purchase additional reporting components. When I have used the Sophos solution it is a complete solution, in Fortinet FortiGate you have to use additional tools to have the features needed."
"They have to just improve its performance when we enable all UTM features. When you enable all the features, the performance of FortiGate, as well as of Sophos and SonicWall, goes down."
"Fortinet FortiGate needs to improve to be on par with its competitors, such as Palo Alto and Sophos. They are the market leaders. Fortinet FortiGate needs to improve its capabilities. However, we are happy with Fortinet FortiGate."
"The support system could be improved."
"It would be nice if FortiGate incorporated some built-in endpoint protection features. I would also like a built-in SOC dashboard for managing multiple Fortinet firewalls."
"Fortinet should focus on enhancing the capabilities of FortiGate by consolidating its various products, such as FortiGate Cloud, FortiManager, and FortiAnalyzer."
"With the reports, you can see it, and you can get good feelings so upper management can go, "Oh, wow. That looks pretty." However, it's very basic."
"Fortinet FortiGate could improve the user interface. There should be more functionality and options through the GUI."
"The centralized management platform could be improved."
"It would be ideal if the solution could use cloud services to help update signatures or threat prevention systems."
"Both the web management and the graphical user interface are inadequate and should be improved."
"The range of devices should be expanded to include those suitable for a small implementation. Juniper does not have any lower-priced SRX models, useful perhaps for a single ATM or a single bank branch."
"To compare with Fortinet, Juniper needs to improve their security features."
"J-Web, Juniper Web, is sometimes not working great when users are increasing their internet use. Additionally, they need to improve the GUI, graphical user interface, and the firewall management needs to improve. Their CLI is good, but sometimes the GUI is very slow."
"In some cases, customers encounter issues related to network interfaces, while others prioritize security concerns."
"The pricing strategy of the vendor could improve."
"We are not happy with Palo Alto at all. It would be better if they provided more support for the firewall. We have a few pending issues with the configuration for each application. We cannot deploy them yet due to some support-related problems in the firewall. We have deployed a few policies for DNS spoofing and DNS attacks, but we could only block a few IP addresses through the policy. That's DNS security, and we have configured a few policies for DNS spoofing and more. URL categorization and URL filtering are not yet adequately maintained. For example, if you created a few rules in the rule-based configuration and made some rules downstairs, you will lose some of them if you give access upstairs. It's not giving us a proper solution for which route it is using. We need to apply the application-based policies and URL filtering-based policies. It creates more issues because we are not getting good support from the team."
"As part of our internet filtering, we integrate heavily with Active Directory, and we use security groups to separate staff into two groups: those who should have full access to the internet and those who should have limited access. It may be just the way the topology is for our domain controllers and that infrastructure, but at peak usage, there seems to be a delay in reading back against the security group to find out what group the user is in."
"Palo Alto Networks NG Firewalls do not provide a unified platform that natively integrates all security capabilities."
"There is a tradeoff between security and network performance, as security is always top-notch, but performance can sometimes lag and has room for improvement."
"The performance of the Panorama interface needs to be improved. It tends to be very sluggish at times."
"Most other VPN clients include mobile VPNs but Palo Alto does not."
"Palo Alto needs to improve their training. They do not invest in their partners. I have been a partner for seven years, and it is very expensive for me to certify my engineers."
"I like the reports, but I wish the reporting was a little better. When I set up the automatic reports to come in, they're pretty basic. I would like them to be a little more advanced at the ACC monitoring and things like that. I still enjoy all the daily alerts that I get and all the daily PDFs and reports, but I just feel that it could expand upon the visualization of the reports."
More Palo Alto Networks NG Firewalls Pricing and Cost Advice →
Juniper SRX Series Firewall is ranked 18th in Firewalls with 19 reviews while Palo Alto Networks NG Firewalls is ranked 6th in Firewalls with 76 reviews. Juniper SRX Series Firewall is rated 7.8, while Palo Alto Networks NG Firewalls is rated 8.8. The top reviewer of Juniper SRX Series Firewall writes "Useful telecom industry functionality, simple deployment, but lacking features". On the other hand, the top reviewer of Palo Alto Networks NG Firewalls writes "Provides zero trust implementation, more visibility, and eliminated security holes". Juniper SRX Series Firewall is most compared with Cisco Secure Firewall, Palo Alto Networks WildFire, Netgate pfSense, Meraki MX and Sophos XG, whereas Palo Alto Networks NG Firewalls is most compared with Azure Firewall, Check Point NGFW, Meraki MX, Sophos XG and Sophos XGS. See our Juniper SRX Series Firewall vs. Palo Alto Networks NG Firewalls report.
See our list of best Firewalls vendors and best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.