"The dashboard is the most important thing. It provides good visibility and makes management easy. Firepower also provides us with good application visibility and control."
"It's got the capabilities of amassing a lot of throughput with remote access and VPNs."
"It is one of the fastest solutions, if not the fastest, in the security technology space. This gives us peace of mind knowing that as soon as a new attack comes online that we will be protected in short order. From that perspective, no one really comes close now to Firepower, which is hugely valuable to us from an upcoming new attack prevention perspective."
"If you compare the ASA and the FirePOWER, the best feature with FirePOWER is easy to use GUI. It has most of the same functionality in the Next-Generation FirePOWER, such as IPS, IPS policies, security intelligence, and integration and identification of all the devices or hardware you have in your network. Additionally, this solution is user-friendly."
"You do not have to do everything through a command line which makes it a lot easier to apply rules."
"One of the most valuable features of Firepower 7.0 is the "live log" type feature called Unified Event Viewer. That view has been really good in helping me get to data faster, decreasing the amount of time it takes to find information, and allowing me to fix problems faster. I've found that to be incredibly valuable because it's a lot easier to get to some points of data now."
"Another benefit has been user integration. We try to integrate our policies so that we can create policies based on active users. We can create policies based on who is accessing a resource instead of just IP addresses and ports."
"The feature set is fine and is rarely a problem."
"We like the features, but the main thing is from a commercial and cost perspective it is very good."
"The most valuable features of this solution are intrusion detection, intrusion prevention, and the advanced capture client, which provides live traffic analysis."
"This product is user-friendly and easy to configure."
"It has excellent stability."
"Compared to Cisco, SonicWall NSa is much easier to configure."
"The technical support is very good."
"The most valuable feature is the sandbox."
"It is able to fulfill my requirements. It protects our network environment. It has control over IPS, signatures, and it can also manage bandwidth and mapping. It is also stable and has good support."
"The performance has been very good. Overall, the solution is quite stable."
"The most valuable features have been content filtering, and the interface is easy to navigate and to use."
"The installation is straightforward and took approximately 30 minutes."
"User-friendly firewall solution which scales well, is stable, and has high availability."
"Ease of management and the VPN integration."
"We like the central interface and we like the security features. Additionally, we use SonicWall with VPN connectivity and we have had no problems with SonicWall all these years."
"Offers the right amount of control without being incredibly convoluted and frustrating."
"It does exactly what it says on the tin. It is good for protecting the business from being compromised. Its port protection is very good."
"Deploying configurations takes longer than it should."
"Report generation is an area that should be improved."
"I believe that the current feature set of the device is very good and the only thing that Cisco should work on is improving the user experience with the device."
"Cisco Firepower NGFW Firewall can be more secure."
"The performance should be improved."
"There is limited data storage on the appliance itself. So, you need to ship it out elsewhere in order for you to store it. The only point of consideration is around that area, basically limited storage on the machine and appliance. Consider logging it elsewhere or pushing it out to a SIEM to get better controls and manipulation over the data to generate additional metrics and visibility."
"My team tells me that other solutions such as Fortinet and Palo Alto are easier to implement."
"The visibility for VPN is one big part. The policy administration could be improved in terms of customizations and flexibility for changing it to our needs."
"It doesn't require much improvement. The only improvement area is that cloud reporting, assessment reporting, and other reporting features should be available with the subscription. They should provide reporting features with the subscription base, which is currently not there. We bought the reporting tool, but there are some complications. They have made some changes to the application, and now the reporting management is completely on the cloud."
"It would help us a lot of SonicWall sent us more information about the latest updates and things that are changing."
"Some of the configurations could be better."
"The reporting and monitoring are a bit complex and should be easier in SonicWall NSa because other firewalls I have experienced have been more simple, such as Palo Alto. We are able to receive a clear view of our network. As a general user with little experience, it would be difficult for them to handle."
"Sometimes I found the GUI and some of the features a little bit hard to navigate, as opposed to Fortigate, which is much more user-friendly."
"It would be useful to have an application firewall that prevents the outside world from seeing your private IPs. You don't need to publicize your private IPs to the outside world, and you can create a barrier, like a proxy server."
"We have security as a service, and they make recommendations about adding to the denylist and other things. That part could be more accessible and more user-friendly. I'd like to see SonicWall add a user-friendly interface where our internal team can drag and drop everything."
"The content filter needs to be improved."
"The solution should provide some additional ports."
"Although the pricing is good, it could always be lower. If we get to pay less, we're happier."
"The price could be better for us in Bolivia."
"I would like to see lower antivirus pricing."
"You need to be a certificate holder to set it up and configure it. It's really important because it looks easy, but it is complex. You need to have the knowledge and experience. But this is normal for technical products. It's not a product for regular user. It's for technical people. You need to have skills."
"Support for SonicWall TZ needs improvement, particularly the time it takes before you're able to speak to a support person, e.g. you have to wait for at least 30 minutes on the phone."
"Needs more robust self-help documentation along with examples and things to watch out for."
"I would like the solution to build in more redundancy. I"
More Cisco Firepower NGFW Firewall Pricing and Cost Advice →
SonicWall NSa is ranked 15th in Firewalls with 40 reviews while SonicWall TZ is ranked 11th in Firewalls with 39 reviews. SonicWall NSa is rated 7.8, while SonicWall TZ is rated 8.4. The top reviewer of SonicWall NSa writes "Easy to scale advanced threat protection solution with knowledgeable technical support, but has occasional bugs". On the other hand, the top reviewer of SonicWall TZ writes "Easy to implement, fairly stable, and supports SSL-DPI". SonicWall NSa is most compared with Fortinet FortiGate, Meraki MX, Cisco ASA Firewall, Sophos XG and pfSense, whereas SonicWall TZ is most compared with Fortinet FortiGate, Sophos XG, Cisco ASA Firewall and pfSense. See our SonicWall NSa vs. SonicWall TZ report.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.
Basically, the main difference is that the TZ series is intended for a Branch office since it has fewer ports and the speed is around 1 GB.
The NSA series has more processor power and more port where you can create subnets and zones (like DMZ). Also, it has ports with 10 Gb and a processor to support the demand.
I have read that an approximate number of users in the highest TZ series (TZ 670) is around 150 to 200 but that is just an estimate.
Hope this helps. You can get more details in SonicWall datasheets where you will find the speed, throughput and more technical specifications to select the one that fits your requirements.
In simple words,
TZ is for small businesses (less than 100, maximum 150 users).
TZ has fewer ports.
NSA is for medium and large enterprises: > 150 Users,
NSA has many ports to support large networks