We primarily use this solution as a firewall.
It's our main firewall, but we're planning to replace it with a pfSense for reasons I will discuss.
We primarily use this solution as a firewall.
It's our main firewall, but we're planning to replace it with a pfSense for reasons I will discuss.
It's super reliable. I don't think I've ever had a reliability issue with it. Within the four years that I've been using it, maybe two or three times, resetting the firewall was what solved the problem. It's been super, super solid. I never have to think twice. If I ever experience a problem, the firewall is the last thing I think about. I never need to check it because it's never the problem. It's just super solid. It's also pretty robust. I know that there are more robust solutions out there, but not by a lot.
In the enterprise proprietary world, Fortinet, in my experience, considering its cost and reliability (maybe they could bring the price down or maybe they could make more plans), I honestly don't think that there is much room for improvement. I think it's a pretty good solution for anyone who is looking for a proprietary solution. I wouldn't look anywhere else.
Cisco, for example, is probably way overpriced. Fortinet on the other hand, one of their strong sides is that they have an all-encompassing solution with a very reasonable price point. Cisco and other brands are a little bit more modular — to get everything you'd have to buy a lot of different packages.
An automated guide feature or templates that you could pick and choose would be a nice addition.
It's definitely not as easy to look at traffic as I would like. Sometimes when I'm trying to see what traffic has been blocked or what traffic has been passed, it's not as easy as I would like to filter it out or to monitor bandwidth.
The monitoring is not as good as it could be. It could be a lot easier to understand. For example, I was trying to figure out, in a given timeframe, how much was downloaded off of a certain interface and I didn't really understand how I could get that information or if it was even available. I was searching the documentation online and I couldn't even figure it out. Monitoring and reporting could be better; It's very good, but there's definitely a lot of ways to improve it.
I have been using Fortinet FortiGate for four years.
Fortinet FortiGate is super stable, one hundred percent. Just works 24/7 without any issues like you would expect from an enterprise product.
I know that it's scalable, but I don't actually have any experience regarding scalability. It's probably not as scalable as pfSense because pfSense is based on open hardware platforms. I definitely know that proprietary platforms usually tend to be less scalable because they're more constrained with licensing. The scalability in my opinion would be decent, satisfactory, but I believe pfSense is probably more scalable. I know that there are a lot of big corporations like Google and others that use pfSense. I don't know the details. I'm just giving my educated guess.
I personally prefer pfSense as it's open-source and you only have to pay a minimal fee for support. But for people who want that platform, I think it's a great solution. If I wasn't using pfSense, I would definitely go with FortiGate.
The two products are completely different. If you're using pfSense, you're basically using the entire open-source world — so you're based on FreeBSD, you're using Snorts, everything is open-source. It's very easy to make modifications and to figure out what's going on. You're not dependent on your single company's documentation, there's a huge user base. It's very easy to modify and extend. You can see what's going on — it's very transparent in that sense. It's probably a little bit more manual. With pfSense, You have to put in a little bit more effort to get things done, but, in the end (aside from the huge cost savings), you get all the features that are available in an enterprise firewall for just the price of support, which is also very minimal.
If you need to make any tweaks, you can do it all yourself. If you need to tweak ciphers for SSL for compliance (for PCI, for security compliance) it's not a difficult thing to do; it's a fairly trivial task.
I didn't set it up initially, but I did set up a lot of things from scratch. I think it could be more simple. When you're looking at a proprietary solution, usually it's aimed for end-users and they just want to do point and click. I believe in certain aspects, pfSense was simpler. I think there's maybe just a bit of a learning curve, but I guess you would experience that with any platform.
I think that the pricing is fair.
On a scale from one to ten, I would give Fortinet FortiGate a rating of nine.
Other than the price and the lack of extensibility and transparency (which is inherent in any proprietary platform); if you're going to compare it to pfSense, then I would not give it a nine. I would give it an eight, and I would give pfSense a 10. pfSense has its drawbacks, but not that many, in my opinion.
Take the time to learn the platform and you won't run into trouble later. That's my advice.
Other than that, it's super solid, super reliable. It does the job.
We have both on-premises as well as virtual firewall servers. We have quite a few FortiGate firewalls as part of our infrastructure. We are using Check Point more from the perimeter perspective. It is only there on the perimeter.
The virtual firewall feature is the most valuable. We have around 1,500 firewalls. We did not buy individual hardware, and the virtual firewalls made sense because we don't have to keep on buying the hardware.
FortiGate is easier to use as compared to Checkpoint devices. It is user friendly and has a good UI. You don't need much expertise to work on this firewall. You don't need to worry much about DCLA, commands, and things like that.
FortiGate is really good. We have been using it for quite some time. Initially, when we started off, we had around 70 plus devices of FortiGate, but then Check Point and Palo Alto took over the place. From the product perspective, there are no issues, but from the account perspective, we have had issues.
Fortinet's presence in our company is very less. I don't see any Fortinet account managers talking to us, and their presence has diluted in the last two and a half or three years. We have close to 1,500 firewalls. Out of these, 60% of firewalls are from Palo Alto, and a few firewalls are from Check Point. FortiGate firewalls are very less now. It is not because of the product; it is because of the relationship. I don't think they had a good relationship with us, and there was some kind of disconnect for a very long time. The relationship between their accounts team and my leadership team seems to be the reason for phasing out FortiGate.
I have been using FortiGate for the last four to five years.
It is stable.
I currently have about 36 to 40 devices that are being used. We use a certain number of devices from business to business.
We were not getting proper support from Fortinet. That's the reason we had to phase out FortiGate.
We implemented it on our own. It took around one hour. We have one or two engineers for its deployment and maintenance.
We installed FortiGate four or five years ago. We are just phasing out FortiGate and not doing new installations of FortiGate. Whichever model is getting end of life, we're just replacing it with a Palo Alto device. We can use it in the future, but I don't see any presence of Fortinet in my company at this time. I see a lot of push from Palo Alto, Check Point, and other vendors, but I don't see Fortinet around at all.
With the current COVID situation, I don't know how FortiGate behaves when working from home, which is an entirely different concept. In other firewalls, we create HIP profiles and similar stuff, but I am not sure how FortiGate works in such an environment.
I would definitely recommend this solution, but I think Fortinet has to first create a presence. That is more important. Nobody says anything bad about the product. The product is still widely being used.
I would rate Fortinet FortiGate an eight out of ten.
Our primary use case for this solution is to manage bandwidth for our customers. This is done by setting the appropriate firewall rules and policies.
This solution made it very easy to manage our bandwidth. It is important because we do not have to buy additional bandwidth from our ISPs. The rules and policies are set such that our users are happy, and we can maintain our current cost of bandwidth.
One of the most valuable features for us is that it is easy to configure. It is also very easy to manage. One of the things we were looking at was a product that is user friendly, and this helps us to generate and analyze the reports we need.
I recently saw the new updates that are coming, such as the ability to quarantine a user's machine. Once done, you have the ability to connect to it from the FortiManager Console and you can bring it back online, out of quarantine. This is all very good news.
One of the areas that I feel need improvement is on the DLP (Data Leak Prevention) side of things. Compared to some other products, the DLP is not at par for the moment.
Also, if in the next few years this solution can be made to support HE between models, it would be better.
I feel that improvements can be made on the security side. Sometimes the product does a good job, but sometimes not.
The scalability is good, although I see that some brands are now coming up with an important advancement. Currently, when you want to do HE (High-end), you have to have the same model or a similar model. Some competing solutions are now able to do HE between mixed models.
I hardly ever use their technical support, but when I do they are pretty good.
Previously we were using SonicWall, and we had no trouble after switching to FortiGate. One of the reasons that we switched is because we needed something that is easy to configure and manage.
One of the problems we had is that we could not get SonicWall to print out a comment. The documentation says that it should be able to, but it was not printing. The currently solution meets this requirement.
The initial setup is straightforward and it is easy to configure.
In terms of pricing, the cost of the product is important because we do not want to pay for something that is too expensive. At the same time, however, pricing is not as important as manageability and support. I would say that all things considered, the pricing is pretty good.
After switching from SonicWall, we did not evaluate options other than the current solution.
We look for a couple of things when selecting a vendor or product. First, we look at the user interface and figure out whether it is easy to manage. We also consider the price because we do not want to overpay. That said, price is not our number one priority; user manageability is.
We have been using a pretty wide range of products. We have used models such as the Fortinet FortiGate-30E, 51E, 90D, and 200D. They are all pretty good at doing the job that they are configured for. Obviously, the firewall sizing has to be done right, but if the product sizing is done correctly then they will never go wrong.
I have not yet used the cloud access capability, but we do plan on testing it.
After we purchased FortiGate we grew by forty percent, and it was able to continue to perform as it had before.
Overall it is user-friendly, easy to configure, easy to manage, the support is pretty good, they are priced low, and they do the job that you require.
I would rate this solution nine out of ten.
Customers have more time to focus on security because maintaining the firewalls is completely hassle-free.
Grouping/tabbing (not only by interface) in the policy table of the web GUI would be a great addition.
I have used it for two years.
We have not encountered any deployment issues.
We have not encountered any stability issues. Stability has dramatically improved over the previous main version branch of FortiOS; 5.2.x and 5.4.x are stable enough for critical environments.
We have not encountered any scalability issues; proven that you properly sized the FortiGate model that fits your environment.
Customer service is sufficient.
Technical Support:The tech support is not excellent; this is where Fortinet saves money compared to others... But plenty of free, clear and public documentation is available and this compensates for the most part the tech support shortcomings.
We previously used Cisco ASA. We switched because the old ASA has no next-generation features.
IMHO It is the most straightforward enterprise-level next generation firewall.
All implementations were done in-house.
ROI is very high, it has hands-down the best price/performance/features ratio in the market...
The licensing model is straightforward, easy to understand and purchase; prices are fairly low compared to other vendors.
Before choosing this product, we also evaluated Check Point and Palo Alto Networks.
In version 5.4, they added a WAF feature that is absolutely unique for this kind of product; no other NGFW product can also be a WAF and this is a great added value...
We use FortiGate to protect our company network. We have a wireless plan (WLAN) environment.
The user interface is very good.
FortiGate is very simple to manage and easy to use.
This is a secure solution.
FortiGate should have a better way of detecting and managing the system memory because otherwise if the memory is too low, a system restart is required.
I have been using FortiGate and other products in the Fortinet suite for approximately two years.
It is used on a daily basis and in general, stability is okay.
There were two instances where the memory was full and the WLAN was blocked. The system had to be restarted. This may not have been a problem directly related to FortiGate. It may be that I didn't have enough to support the product. Perhaps a larger model would solve this issue.
We have approximately 80 employees that are protected by FortiGate. We have approximately 20 that work in the office, with a total of about 50 PCs.
It has not been necessary to scale beyond that.
I have never been in touch with technical support.
Prior to FortiGate, we were using Cisco for our firewall and our switches were from HP. Every five or six years, we upgrade our devices. The last time, we decided to buy Fortinet products because of a suggestion from our vendor.
Our vendor suggested Fortinet because the security is good, it's simple to use, and the price is good.
I have an external technician that manages FortiGate for the company. This person was responsible for the initial setup.
I do simpler network changes myself, such as altering ports on the firewall or the switch.
I am very satisfied with this investment. It's a good device and works very well to protect us.
This is not a cheap solution but it isn't expensive, either. It's a good solution for the right price.
FortiGate is regularly updated and my last update was within the past couple of months.
In our company, we have not needed to use any special features, so it is difficult to consider what new features I might want to see in the future.
Overall, this is a very good solution and I personally haven't had any problems with it. I would recommend that my colleagues buy Fortinet devices because they are good.
I would rate this solution an eight out of ten.
IPS is the main use case because we want to protect our devices, users, and data from external dangers.
We most probably are using the model of the last year. If the services connected to the hardware are possible on the cloud, we always prefer the cloud. The hardware must be placed on-premises.
Its administrative panel is very intuitive and simple. It is simpler than the other solutions that we had. As an administrator, we are always looking for the easiest solution to manage network policies.
We are able to filter everything on our network and also use the VPN feature, which is important these days when people are working remotely during COVID.
They can do more tests before they release new versions because I would like to be more assured. We had some experiences where they release something new and great, but some of the old features are disabled or they don't work well, which impacts the product satisfaction. The manufacturer should be able to prove that everything works or not only that it might work. This is applicable to most of the other services, software, and hardware companies. They all should work on this. We cannot trust every new release, such as a beta release, on the first day. We wait for some comments on the forums and from other companies that we know. We always wait a few weeks before we use the updated version.
They should also extend the VPN client application, especially for Linux versions. Currently, it has an application for Linux devices, but it doesn't work the way we want to connect to the VPN. They use only the old connection, not the new one. They have VPN client applications for Windows and Mac, but they can add more useful features to better manage the devices and monitor the current health of each device. Such features would be helpful for our company.
I have been using this solution for the last two years.
It is stable, and I don't see any cons of this.
Currently, everyone who is connected with the company is using this solution. We have up to 240 people.
I have interacted with them but only through emails. There were separate tickets and stories, and I don't remember right now how it was.
It was just a product for home-usage. It was a Cisco device from the small business series. It was less advanced than the similar devices available in the market currently. It was a huge step forward for us to switch to FortiGate.
It was a huge jump for us on the administrative side to implement this kind of hardware because we previously used just a simple product for home-usage.
We hired a consultant to do this for us and to explain how the system works. After a few weeks, we did new certifications and training for this, and now, it works well for us.
I would recommend this solution. We plan to keep using this solution.
I would rate Fortinet FortiGate an eight out of ten.
Our primary use case for Fortinet FortiGate is for the center firewalls. We use the VMware server. That seems good and acceptable to the customers.
The features that I have found most valuable are that it is good to use, and most importantly, the pricing. The customer especially likes the discount when they trade up or something like that.
In terms of the product, we don't have anything to improve. But I have a concern about the FortiGate team here in Egypt, because there is an opportunity that we are working on and when we opened it and did the deal installation, it was rejected. When I talked to the FortiGate team here in Egypt, they told me they know about the deal, but they rejected it.
Additionally, they could make some modifications in the license. There are some license issues. Not every feature must have a separate license. There must be some kind of synergy between the license so we don't have to pay for every individual license that we would like to have.
I have been using Fortinet FortiGate for around one year now.
In m company there are around seven technical engineers required for deployment and maintenance.
In terms of scalability, our biggest customer using it has 500 people.
I haven't worked with the technical support. I did face some admin problem with the team here in Egypt.
We are a partner with Sophos, with Palo Alto, and with WatchGuard. So we have a lot of competitors for FortiGate.
The initial setup of Fortinet FortiGate was easy. The most important thing is the management software with the license for accounts that need an additional license. But it is also acceptable.
The initial setup takes a while. It seems to take some time longer than usual due to the customer's onsite preparation of the required information. Overall it takes around five to seven working days.
We are a partner, and a technical team qualified for implementing.
There is also an issue here. Maybe we get a massive discount on the product, but the renew cost is higher. In addition there are some admin issues. When I receive a request for a renew for a customer, the local team here only deals with the company that makes the primary deal, and refuses to give us a quotation. So we may lose the opportunity, or we may go with the vendor with their native product.
I would recommend the product. I think it's good and they're doing well on the roadmap. But again, for the team they have to take better care of the local partner.
On a scale of one to ten, I would give Fortinet FortiGate a seven.
We use this product as a perimeter firewall and also in the role of a firewall as a service for our cloud.
FortiGate is flexible and easy to use.
Fortinet currently has many products bundled with FortiGate including the basic firewall and load balancer, and I think that that they need to have separate product portfolios for each of these specialized services. When it comes to large deployments, I don't think it's a good plan to have all of these services in a single box.
I think that they should introduce in-line security at the packet level, where they can do filtering and other firewall functions. It should not comes down to the infrastructure level but rather, offer services at the ISP level.
We have been using FortiGate for the past four to five years.
This is a stable product.
This product is scalable and as a service provider, we extend our usage to external customers. There are many users on the platform.
We have premium support from Fortinet and it is quite good.
We used their Professional Services for the initial installation.
We have a large in-house team for maintenance, although I am not sure how many are dedicated to this particular product.
The price of FortiGate is average and I would say that based on the top five products available on the market, it is in the affordable range.
This is a product that I can recommend to others.
I would rate this solution a seven out of ten.