


Splunk User Behavior Analytics and WatchGuard Firebox are products in the security analytics and network firewall categories. Splunk holds an advantage with its advanced analytics and real-time data processing, while WatchGuard excels with its versatile firewall solutions and strong user support for SMEs.
Features: Splunk User Behavior Analytics offers advanced anomaly detection, real-time data integration, and customizable dashboards. Meanwhile, WatchGuard Firebox provides an intuitive interface, comprehensive VPN and intrusion prevention services, and robust management capabilities.
Room for Improvement: Splunk could improve its correlation engine, data ingestion costs, and licensing model. WatchGuard can benefit from simplified management tools, better threat detection, and improved reporting capabilities.
Ease of Deployment and Customer Service: Splunk supports multiple deployment models, including on-premises and cloud, with responsive customer service. WatchGuard offers hybrid and on-premises deployment options and is user-friendly with supportive technical assistance.
Pricing and ROI: Splunk is expensive but provides high-level analytics with ROI in improved incident resolution for larger enterprises. WatchGuard offers competitive pricing with flexible licensing, providing cost-effective solutions and favorable ROI for SMBs.
Clients are now comfortable and not wasting productive hours on IT support.
The automation part is giving us a cost benefit and speed; we can react faster.
It's a very useful tool to mitigate and protect your enterprise.
The solution can save costs by improving incident resolution times and reducing security incident costs.
All of this has already happened after implementing Splunk User Behavior Analytics.
I do not see any return on investment after WatchGuard Firebox implementation in terms of cost reductions.
Reduced incidents and easier management helped lower operational cost.
The quick resolution of issues with Fortinet FortiGate is due to the support of the company and the fact that the equipment is easy to work with.
I would rate the technical support for Fortinet FortiGate a ten out of ten.
As a solution provider, when I encounter problems, I connect directly with Fortinet support, and they provide solutions within a very short time.
Mission-critical offering a dedicated team, proactive monitoring, and fast resolution.
From the responsiveness perspective, Splunk is very responsive with SLA-bound support for premium tiers.
I would rate their technical support as 8.5 out of 10.
On a scale of one to 10, I would rate the technical support of the WatchGuard Firebox a 10.
Finally, we connected with someone, and I would rate their support as eight or nine out of ten once we were able to speak with them.
Customer support for WatchGuard Firebox is very good and very fast.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
We determine sizing based on multiple factors: number of users, available links, traffic types, server count, services in use, and whether services will be published.
Splunk User Behavior Analytics is highly scalable, designed for enterprise scalability, allowing expansion of data ingestion, indexing, and search capabilities as log volumes grow.
The user interface and features compared to newer firewalls are not up to the mark, which includes functionalities such as filtering, web filtering, threat protection, user identity, and UTM features that need improvement.
You can choose different models based on throughput and features, which makes it easy to support growing environments.
If we're going for more concurrent users, we need to change the entire box.
We're experiencing 99.999% availability consistently.
I would rate the stability of Fortinet FortiGate a ten out of ten.
Currently, we are experiencing a general outage of one of the main internet service providers of the Dominican Republic, and we have not been impacted in our operations because with SD-WAN, we have another internet service provider and we are working with the second WAN connection without any disruption.
With built-in redundancy across zones and regions, 99.9% uptime is achievable.
Splunk User Behavior Analytics is a one hundred percent stable solution.
Splunk User Behavior Analytics is highly stable and reliable, even in large-scale enterprise environments with high log injection rates.
I have just one WatchGuard Firebox unit that is licensed, and I have no bugs on it, so I am happy with that.
There are issues with traffic hitting the firewall, which could indicate performance problems related to throughput.
We had many bottlenecks before deploying WatchGuard Firebox, but when we switched to a higher version of our firewalls, the bottlenecks were solved.
These sessions should be around five to ten minutes long, allowing users and partners to quickly grasp the information without disrupting their daily tasks.
The solution should be able to implement machine learning and analytics of all the logs for threat detection and protection.
It would be better for customers to get immediate replacements even with a standard subscription.
Global reach allows deployment of apps and services closer to users worldwide, but data sovereignty concerns exist and region selection must align with compliance requirements.
I encountered several issues while trying to create solutions for this advanced version, which seem unrelated to query or data issues.
High data ingestion costs can be an issue, especially for large enterprises, as Splunk charges based on the amount of data processed.
The cost for renewal after three years is 75% of the hardware cost, which is a significant problem.
When implementing a rule using a group of IPs, it is not possible to do that directly.
It is also difficult to diagnose issues if any devices get compromised; for example, if someone hacks our system, it becomes hard to trace who made changes or accessed the firewall.
Last year, I renewed the support for three years, which can sometimes be expensive but depends on the security benefits and how it helps us.
It offers cost savings as it is generally cheaper than the competition.
It is about 20% cheaper.
Reserved instances with one or three-year commitments offer lower rates, providing up to 70% savings.
Compared to all other products in the market, it is the most expensive one in all aspects including professional service and licenses, even the cloud version.
Comparing with the competitors, it's a bit expensive.
When we tried to renew the Palo Alto license, the cost was beyond any reasonable range.
Fortinet is more expensive than WatchGuard.
It's expensive us here.
The most valuable feature of FortiGate is FortiView which provides proactive monitoring.
We got a firewall and gave an SSL VPN to my client to connect to their servers, after which, such kind of activities involving ransomware attacks stopped.
They put in a thing called the FortiCookbook, which is very easy to read with real-life scenarios that make networking tasks like joining networks very straightforward.
I also utilize it for anomaly detection and behavior analysis, particularly using Splunk's machine learning environment.
The dashboards themselves are nice, very good, and very helpful, but the accuracy of the data or the information that will be presented on the dashboard is something that needs to be questioned.
Splunk User Behavior Analytics positively impacts my organization by providing deep visibility into user behavior, allowing us to protect our data from abnormal users and ensuring everything is monitored to secure our data.
The Firebox offers valuable features such as network security, URL filtering, UTM features, intrusion prevention and detection, and authentication.
Basically, we have received a good return on investment.
I utilize AI within the WatchGuard Firebox, as we use the interconnection with threat syncs, and AI is implemented.
| Product | Market Share (%) |
|---|---|
| Fortinet FortiGate | 13.2% |
| WatchGuard Firebox | 6.1% |
| Splunk User Behavior Analytics | 2.4% |
| Other | 78.30000000000001% |

| Company Size | Count |
|---|---|
| Small Business | 357 |
| Midsize Enterprise | 133 |
| Large Enterprise | 189 |
| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 6 |
| Large Enterprise | 12 |
| Company Size | Count |
|---|---|
| Small Business | 93 |
| Midsize Enterprise | 28 |
| Large Enterprise | 15 |
Fortinet FortiGate is a versatile network security tool offering features like VPN, firewall, web filtering, intrusion prevention, and scalability. It is known for its performance and integration with other Fortinet products, making it a preferred choice for robust cybersecurity.
Fortinet FortiGate stands out as a comprehensive cybersecurity solution with strong performance and ease of configuration. It delivers unified threat management, integrating features such as dynamic routing, SD-WAN support, and centralized management. Despite its strengths, improvements in the web interface's stability, pricing structures, and reporting capabilities are needed. Users seek better integration with third-party tools and automation advancements to enhance the experience further. These enhancements, alongside improvements in bandwidth management and the reduction of licensing costs, are points of interest for users looking to capitalize on FortiGate's extensive capabilities.
What are Fortinet FortiGate's key features?Fortinet FortiGate is widely implemented across industries as a primary firewall system for securing internet gateways and safeguarding data centers. It supports businesses in achieving SD-WAN integration and enhances cybersecurity by providing essential features like antivirus, web filtering, and application control. Enterprises utilize FortiGate for securing remote connections and ensuring compliance with security standards, making it adaptable for different network sizes and industries.
Splunk User Behavior Analytics is a behavior-based threat detection is based on machine learning methodologies that require no signatures or human analysis, enabling multi-entity behavior profiling and peer group analytics for users, devices, service accounts and applications. It detects insider threats and external attacks using out-of-the-box purpose-built that helps organizations find known, unknown and hidden threats, but extensible unsupervised machine learning (ML) algorithms, provides context around the threat via ML driven anomaly correlation and visual mapping of stitched anomalies over various phases of the attack lifecycle (Kill-Chain View). It uses a data science driven approach that produces actionable results with risk ratings and supporting evidence that increases SOC efficiency and supports bi-directional integration with Splunk Enterprise for data ingestion and correlation and with Splunk Enterprise Security for incident scoping, workflow management and automated response. The result is automated, accurate threat and anomaly detection.
WatchGuard Firebox is a high-performance firewall known for its ease of setup, offering robust security with layered protection and centralized management capabilities.
WatchGuard Firebox stands out for its intuitive management and high throughput, addressing security needs with features like VPN, web filtering, and threat detection. Its centralized control and reporting abilities, along with Active Directory integration, make it popular among varied organizations. Its user-friendly interface and ongoing updates enhance usability and reliability. However, there's a call for better cloud-based administration, scalability, and improved integration with third-party vendors.
What are the key features of WatchGuard Firebox?WatchGuard Firebox is implemented across industries to secure internet gateways and protect data in multi-site businesses. Its applications span from Unified Threat Management (UTM) and intrusion prevention to compliance support in business environments requiring secure connectivity through VPNs.
We monitor all Intrusion Detection and Prevention Software (IDPS) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.