We performed a comparison between Juniper SRX Series Firewall and Palo Alto Networks NG Firewalls based on our users’ reviews in five categories. After reading all of the collected data, you can find our conclusion below.
Features: Juniper SRX Series Firewall is highly regarded for its simplicity, intuitive interface, and exceptional customer assistance. It provides advantageous capabilities, including site-to-site VPN, effortless configuration, and a robust command line. Palo Alto Networks NG Firewalls excel in embedded machine learning, formidable security functionalities, and a cohesive platform. They present features such as application identification, DNS security, URL filtering, and GlobalProtect VPN.
Juniper SRX Series Firewall could enhance its capacity, reporting and alerts, user interface, device reliability, documentation, and feature set. Palo Alto Networks NG Firewalls would benefit from improved customization, configuration simplicity, machine learning capabilities, troubleshooting tools, documentation, user interface, VPN availability, and product stability.
Service and Support: Customers have generally found the customer service of Juniper SRX Series Firewall to be satisfactory, with helpful and knowledgeable support. Palo Alto Networks NG Firewalls have received mixed feedback, as some customers have praised the support while others have expressed dissatisfaction.
Ease of Deployment: The setup process for Juniper SRX Series Firewall is time-consuming, varying based on the environment's complexity. Palo Alto Networks NG Firewalls are known for their simplicity and ease of use. Palo Alto is considered more user-friendly and has a quicker deployment time.
Pricing: The setup cost for Juniper SRX Series Firewall is seen as simple, while Palo Alto Networks NG Firewalls are considered to be more expensive than other vendors. Juniper's pricing is fair and within budget, while Palo Alto's pricing is justified considering the level of security and features offered.
ROI: Juniper SRX Series Firewall is praised for its reliability, consistent performance, and advanced security capabilities, which ultimately lead to a favorable return on investment. Palo Alto Networks NG Firewalls excel in providing better visibility, detailed reporting, and streamlined management, resulting in decreased administrative burden.
Comparison Results: Based on the comparison between Juniper SRX Firewall and Palo Alto Networks NG Firewalls, it is evident that users prefer Palo Alto Networks NG Firewalls. This is due to its embedded machine learning for real-time attack prevention, strong security capabilities, and a unified platform that offers ease of use and maintenance. Users appreciate the advanced security features and user-friendly interface.
"We are very happy with the general bandwidth agility we have seen from one website to another website."
"Its administrative panel is very intuitive and simple. It is simpler than the other solutions that we had. As an administrator, we are always looking for the easiest solution to manage network policies. We are able to filter everything on our network and also use the VPN feature, which is important these days when people are working remotely during COVID."
"The most valuable feature is the SSL VPN, as it allows us to connect and it separates this product from other firewalls."
"We have been able to offer several services to customers in a single box."
"Good load balancing feature."
"FortiGate is very simple to manage and easy to use."
"Customers want to load balance more than eight lines or six internet lines. FortiGate is the only solution that can accomplish this."
"Its performance in fulfilling our requirements has been satisfactory."
"Juniper supports their products very well."
"One of Juniper SRX's most valuable features is the site-to-site VPN."
"The solution has been good for fulfilling our basic needs."
"I have used technical support quite a bit, and they are really good."
"We did not have problems with scaling, as we have less than 500 users in our organization."
"The command line in Juniper SRX is extremely powerful, in my opinion. It's one of the best command lines I've used in networking products."
"It is a part of the infrastructure when we're selling Juniper. That's what clients are familiar with and that's what they rely on."
"Technical support is good. They quickly respond, and they even have local help here. They can actually give you an answer very quickly."
"The strengths of Palo Alto Networks NG Firewalls are application visibility and application awareness. Their strong point is identifying applications for traffic. So all of the policies that are configured are related to the application and not to a port."
"Security is the biggest thing nowadays, including threat response, incident response, and root cause. We found that a lot of the logging and dashboard capabilities offered by Palo Alto fill the missing skill gap that you run up against. It makes it easier for our tier-two staff to get involved in some of the deeper root cause analysis. The dashboards, logs, and reports make it easier for our staff to dive right in and not get lost in what tools they should use. It's easy because they're all right there."
"We like the fact that this product can provide multiple layers of protection depending on our clients requirements, and can be configured to whatever level of protection and the specific protocols that they want."
"The most valuable aspect of this solution is pre-sales and post-sales because of the support and relationship building."
"The initial setup was very easy."
"One of the things I really like about it is that we have the same features and functions available on the entry-level device (PA-220), as do large corporations with much more costly appliances."
"The most valuable features include the different security zones and the ability to identify applications not only by port numbers but by the applications themselves... And with the single-pass architecture, it provides a good trade-off between security and network performance. It provides good security and good network throughput."
"The GUI is simple and the solution is straightforward."
"The cloud management and automation capability could be improved."
"The performance could be a bit better. Right now, I find it to be lacking. Having good performance is very important for our work."
"My only complaint about FortiGate is a lack of QinQ VLAN tunneling. I haven't found this feature in any Fortinet product. You can do this on all Cisco routers, including the smaller models. However, QinQ isn't available on the biggest, most expensive Fortinet units. They still don't have that. I think now we're on software version 6.0, and they still haven't found a solution for QinQ. It isn't a dealbreaker, but that's my main complaint."
"I would like to see improvements made to the dashboard and UI, as well as to the reporting."
"NGN, reporting and controls."
"Fortinet needs to overhaul its documentation."
"There are some license issues. Not every feature must have a separate license. There must be some of kind synergy between the license so we don't have to pay for every individual license that we would like to have."
"The UTM filtering needs improvement."
"The GUI needs improvement."
"While the GUI is pretty good on the Juniper side, there can still be tweaks made to it that will make it even better."
"In some cases, customers encounter issues related to network interfaces, while others prioritize security concerns."
"The reporting is lacking."
"The solution's configurations and syntax are specific and more complicated than other platforms."
"I would like to see endpoint control and endpoint testing security."
"The range of devices should be expanded to include those suitable for a small implementation. Juniper does not have any lower-priced SRX models, useful perhaps for a single ATM or a single bank branch."
"It did not improve our safety because the IDS does not detect some attacks, but our anti-virus software did."
"Its reporting can definitely be improved. I would like to have better graphical dashboards and more widgets for more clarity in the reporting area. In a third-generation firewall, you can generate some dashboards. It provides the information that we need, but from the C-level or a higher-level perspective, it is kind of rough and incomplete. Its data loss prevention (DLP) feature is not good enough. Currently, this feature is very basic and not suitable for enterprises. It would be nice if they can include a better DLP feature like Fortinet. We would like to have a local depot of Palo Alto in Latin America. Competitors such as Cisco and Check Point have a local depot here. If there is an issue with their hardware, you can go to the depot, and in about four hours, you can get a replacement device, but that's not the case with Palo Alto Networks because we need to import from Miami. It takes about two to three weeks."
"The VPN has room for improvement."
"Palo Alto keeps coming out with antivirus and malware updates. When we have to integrate those updates we face some problems with the cloud platform, not the on-prem setup. The device works fine, but sometimes the sync doesn't happen on time."
"As part of our internet filtering, we integrate heavily with Active Directory, and we use security groups to separate staff into two groups: those who should have full access to the internet and those who should have limited access. It may be just the way the topology is for our domain controllers and that infrastructure, but at peak usage, there seems to be a delay in reading back against the security group to find out what group the user is in."
"I wish that the Palos had better system logging for the hardware itself."
"Need improvement with their logs, especially the command line interface."
"Palo Alto should improve their support. It's sometimes difficult to get the right technician or engineer to fix the problem as soon as possible."
"The solution needs some management tool enhancements. It could also use more reporting tools."
More Palo Alto Networks NG Firewalls Pricing and Cost Advice →
Juniper SRX Series Firewall is ranked 19th in Firewalls with 86 reviews while Palo Alto Networks NG Firewalls is ranked 6th in Firewalls with 161 reviews. Juniper SRX Series Firewall is rated 7.8, while Palo Alto Networks NG Firewalls is rated 8.6. The top reviewer of Juniper SRX Series Firewall writes "Highly scalable, user-friendly UI, and easy to maintain". On the other hand, the top reviewer of Palo Alto Networks NG Firewalls writes "We get reports back from WildFire on a minute-by-minute basis". Juniper SRX Series Firewall is most compared with Cisco Secure Firewall, Palo Alto Networks WildFire, Netgate pfSense, Check Point NGFW and Meraki MX, whereas Palo Alto Networks NG Firewalls is most compared with Check Point NGFW, Azure Firewall, Meraki MX, Sophos XG and Sophos XGS. See our Juniper SRX Series Firewall vs. Palo Alto Networks NG Firewalls report.
See our list of best Firewalls vendors and best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.