Senior Network Engineer at a government with 201-500 employees
Real User
Top 10
Great routing, layer three throughput, and firewall management capabilities
Pros and Cons
  • "It can expand easily."
  • "With the reports, you can see it, and you can get good feelings so upper management can go, "Oh, wow. That looks pretty." However, it's very basic."

What is our primary use case?

I use it for a VPN. I use it as a gateway between locations. That's what I use it for.

They're Point-to-Point Networks, Metro Ethernet Networks, and over across the internet. We set it up with an AD VPN tunnel in between the various connections.

We use it for interconnectivity between the various sites to provide VPN tunnels. In contrast, service providers, even on Metro Ethernet and Point-to-Point Networks, cannot provide a secure connection between two points.

How has it helped my organization?

We've actually replaced 30 or more Cisco routers that were doing these VPN connections, and we replaced them with the FortiGates in order to provide Point-to-Point connectivity. It increased throughput on the various links, and it increased security.

What is most valuable?

Their VPN connection, their routing capabilities, their layer three throughput, and their firewall management capabilities that limit access from one VLAN to another are all the most valuable aspects for us. 

The solution is stable.

It can expand easily.

Support is helpful.

The product is significantly cheaper than, for example, Cisco. 

The user productivity has been good as they can, for example, transfer files easier. There is no slowdown. 

What needs improvement?

In their IPS Web Security Gateway, the reporting functions need to be a little bit more user-friendly for how to get the reports from it. That's one of the reasons why we don't use that function.

With the reports, you can see it, and you can get good feelings so upper management can go, "Oh, wow. That looks pretty." However, it's very basic.

Buyer's Guide
Fortinet FortiGate
April 2024
Learn what your peers think about Fortinet FortiGate. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.

For how long have I used the solution?

I've been using the solution for two years. 

What do I think about the stability of the solution?

The stability is very good. There are no bugs or glitches, and it doesn't crash or freeze. 

What do I think about the scalability of the solution?

We've been able to scale pretty well. It's not a problem of you need to expand. 

End users will be passing through it. Most of the accounting passes through it to various other locations. We have about 1,500 people on the product, technically.

We do have plans to increase usage. We have not completed the entire County yet. We've done 80% and still need to action the last 20%.

How are customer service and support?

Technical support is very helpful. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used to use Cisco. We switched to FortiGate due to its throughput, ease of use, and cost.

How was the initial setup?

Our needs are a little bit more complex than others. That said, overall, I would say it's about average in terms of the ease of setup. We got to do a VPN tunnel across, and it was AD VPN, it was something brand new. 

When I set things up now, it's pretty straightforward. When I first started, it was different as I'd never seen the technology before. When I first started, I'd never seen this technology, I didn't have a clue. Others may be in the same boat. 

Now that we're familiar with technology, this is very easy to set up. We've deployed 30 of them. I've got junior engineers that can follow my instructions and set up the FortiGate, and we're up and running. It gets easier over time. We've been doing this over the last two years.

We have up to two people needed for deployment and maintenance tasks. 

What about the implementation team?

The deployment is completely done in-house. We didn't have any outside assistance. 

We did use Fortinet's tech support when we came into some problems. However, we didn't use any extra vendor.

What's my experience with pricing, setup cost, and licensing?

Licensing is renewed every three to five years. They are less expensive e than Cisco. It has reduced the overall cost of maintaining a Cisco environment.

It's a package deal. There are no extra costs. 

Which other solutions did I evaluate?

We did not look into other solutions. 

What other advice do I have?

I'd advise potential users to just implement the right size for you and what your needs are.

I'd rate the product nine out of ten. 

We are just a customer and end-user.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Network Manager at a tech company with 1-10 employees
Real User
Offers a unified view, and is user-friendly, but the support has room for improvement
Pros and Cons
  • "FortiGate SD-WAN facilitated a smooth transition for our customers between their two internet service providers, ensuring uninterrupted connectivity without any downtime."
  • "The support we receive when we need to upgrade is not satisfactory and has room for improvement."

What is our primary use case?

We implemented Fortinet FortiGate SD-WAN for a small company that had two internet service providers. The goal was to configure the two links to operate independently, ensuring that they don't share the load. This way, when one link reaches a certain threshold, we can seamlessly switch to the other without any issues. 

How has it helped my organization?

We have FortiManager, which enables us to have a unified view for monitoring and managing our devices centrally, as well as dispatching policies.

The solution enables us to consolidate tools and applications and manage them all through FortiManager. You can configure your SD-WAN from Forti Manager, which gives you management functionality. 

The interoperability of the solutions is good because it allows for compatibility with brands other than Fortinet, and we don't encounter issues with it.

FortiGate SD-WAN facilitated a smooth transition for our customers between their two internet service providers, ensuring uninterrupted connectivity without any downtime.

The solution has helped us remediate threats more quickly by enabling real-time monitoring of both links, providing complete visibility into our end links. You can monitor both links on one platform. It's just one single pane of glass where you watch in real-time what is happening. It's easy to manage that way. It helps you to easily remediate issues. 

As long as our policies are granular we are able to use the solution to reduce our MTTD. 

The solution has helped to reduce our MTTR from what used to be five minutes down to 45 seconds.

The solution has helped to reduce the number of help desk tickets because it is now extremely rare for both links to be down simultaneously.

SD-WAN, regardless of the OEM being used, is a beneficial technology that is increasingly adopted by businesses due to its positive impact on business security. It allows us to maintain uninterrupted operations without concerns about past issues.

What is most valuable?

Fortinet FortiGate is user-friendly.

What needs improvement?

The support we receive when we need to upgrade is not satisfactory and has room for improvement.

For how long have I used the solution?

I have been using Fortinet FortiGate for two years.

What do I think about the stability of the solution?

The solution is stable and we have not had any issues.

What do I think about the scalability of the solution?

The solution is highly scalable.

How are customer service and support?

The technical support is good, but they take a long time to respond and resolve the issues.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I have also used Cisco, whose systems are robust and rarely experience downtime. However, with Fortinet, their licensing is highly competitive in terms of pricing. Cisco is primarily geared towards enterprise-level companies, but the learning curve for Cisco is higher compared to Fortinet.

Fortinet's price is very competitive compared to when you look at other brands of equal functionality. The hardware and licensing are compared to the others. It's also simple to use. 

How was the initial setup?

The initial setup is straightforward. I did the deployment and didn't have any issues with it. It took one day to complete. 

What was our ROI?

The solution provides value and, therefore, offers a return on investment.

What's my experience with pricing, setup cost, and licensing?

The price is highly competitive when compared to other brands that offer similar functionality. Fortinet FortiGate is more affordable both in terms of hardware and licensing, in comparison to its competitors.

What other advice do I have?

I give Fortinet FortiGate a seven out of ten.

I recommend FortiGate SD-WAN because it is easy to implement and simple to use.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Fortinet FortiGate
April 2024
Learn what your peers think about Fortinet FortiGate. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.
Heson Ko - PeerSpot reviewer
Software Development Specialist at Unicomp Information Co. Ltd.
Reseller
Top 10
Simple and efficient security solution for end-users
Pros and Cons
  • "Security, SD-WAN, and Streetscape are valuable features."
  • "The solution can have more features in a single box that can be multi-applied to integrate everything."

What is our primary use case?

We use SD-WAN to connect the checking role between our branch offices, like Yap installation or fire shooting. We use Fortinet FortiGate to control the different segmentation.

How has it helped my organization?

The IT manager could monitor every security device and increase SD-WAN. Still, the SD-WAN function had to be integrated into our older device. So now our IT manager can see all the end user information about the network information and security event in the single panel base. SD-WAN has helped the organization to remediate threats.

We provided great information to our end users, and our guys could quickly interact with the tool for information.

What is most valuable?

Security, SD-WAN, and Streetscape are valuable features. It is a straightforward solution for our partners. The solution is more efficient for user applications.

What needs improvement?

In the next release, the tool can have more features in a single box that can be multi-applied to integrate everything.

For how long have I used the solution?

I have been using the solution for twenty-thirty years.

What do I think about the stability of the solution?

It is a stable solution.

What do I think about the scalability of the solution?

It is a scalable solution.

How are customer service and support?

The customer service and support team is good. 

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We used CheckPoint previously. We switched because it was high-priced.

How was the initial setup?

The initial setup was easy.

What about the implementation team?

It was deployed through a vendor team of one-two person.

What's my experience with pricing, setup cost, and licensing?

We think the price is lower, and suitable for most end users.

What other advice do I have?

I would rate the solution an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer:
PeerSpot user
HEST manager at ALTT CONTROL PLUS
Real User
An easy to handle product that has good user interface
Pros and Cons
  • "The tool is a nice product and easy to handle. The software's user interface is also good. You can easily implement remote access in the solution."
  • "I would like to see improvements in the product's application rules."

What is most valuable?

The tool is a nice product and easy to handle. The software's user interface is also good. You can easily implement remote access in the solution. 

What needs improvement?

I would like to see improvements in the product's application rules. 

For how long have I used the solution?

I have been working with the tool since 2015. 

What do I think about the stability of the solution?

The tool is stable. 

What do I think about the scalability of the solution?

The tool is scalable. 

How are customer service and support?

I did not contact the tool's technical support team because it is very strong and stable. 

How was the initial setup?

The tool is easy to deploy. 

What other advice do I have?

I would rate the product an eight out of ten. 

Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
PeerSpot user
FirasHamdan - PeerSpot reviewer
Information Technology Manager at Petra
Real User
Top 10
Reliable with lots of features and good security
Pros and Cons
  • "The wireless control is helpful."
  • "The pricing could always be better."

What is our primary use case?

We primarily use the solution for security purposes and for UTM web profile applications.

What is most valuable?

There are a variety of features on offer. 

It helps protect endpoints. 

The wireless control is helpful.

It is scalable and extends well.

The solution is stable and reliable.

Technical support is helpful and responsive.

What needs improvement?

The pricing could always be better. It is very expensive. 

We'd like to see Fortgate include WAF services.

The maintenance of the product can be a bit difficult. 

For how long have I used the solution?

I've been working with the solution for ten years. 

What do I think about the stability of the solution?

The solution is pretty stable and reliable. There are no bugs or glitches, and it doesn't crash or freeze. 

What do I think about the scalability of the solution?

This is a scalable product. 

How are customer service and support?

Technical support is very good. They are easy to work with. We've been satisfied with the level of support.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I've also used Sophos and CyberArk. Sophos has a few more services, such as WAF services.

How was the initial setup?

The initial setup is moderate. It depends on the client's requirements.

We typically can deploy the solution within two or three days. We have a security engineer that handles the initial setup.

It does require some maintenance, and that can be a bit difficult. 

What about the implementation team?

We implement the solution for our clients. 

What was our ROI?

We have witnessed a bit of an ROI, even though it is an expensive solution. 

What's my experience with pricing, setup cost, and licensing?

The solution is quite pricey.

What other advice do I have?

I am an end-user and work in configuration and support for a partner.

I'm working with the latest version of the solution.

Overall, I would rate the solution ten out of ten. I am very satisfied with the product as a whole. I'd recommend the solution to others. It's easy to start working with it. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
PeerSpot user
Solutions Engineer/Consultant at a tech services company with 11-50 employees
Real User
A reliable and consistent solution that allows us to manage the entire network from one interface and supports on-premises and cloud deployments
Pros and Cons
  • "One of the nice things about FortiGate is that it can be deployed on the cloud or on-premises. You can actually do both. That's the biggest reason why I stick with this solution as opposed to something like Cisco Meraki. Another nice thing is that I can log directly into a FortiGate or get to it through their FortiCloud access products. They're pretty reliable and consistent. One of the reasons why I started using the product was their single pane of management. I can deploy their line of firewalls in conjunction with their switching and access points, and I can manage the entire network from one interface. I don't have to log into one interface for the firewall, another one for the access points, and another one for the switches. These firewalls have access point controller functionality built right into the system, so I don't even have to purchase additional devices to manage them."
  • "FortiLink is the interface on the firewall that allows you to extend switch management across all of your switches in the network. The problem with it is that you can't use multiple interfaces unless you set them up in a lag. Only then you can run them. So, it forces you to use a core type of switch to propagate that management out to the rest of the switches, and then it is running the case at 200. It leaves you with 18 ports on the firewall because it is also a layer-three router that could also be used as a switch, but as soon as you do that, you can't really use them. They could do a little bit more clean up in the way the stacking interface works. Some use cases and the documentation on the FortiLink checking interface are a little outdated. I can find stuff on version 5 or more, but it is hard to find information on some of the newer firmware. The biggest thing I would like to see is some improvement in the switch management feature. I would like to be able to relegate some of the ports, which are on the firewall itself, to act as a switch to take advantage of those ports. Some of these firewalls have clarity ports on them. If I can use those, it would mean that I need to buy two less switches, which saves time. I get why they don't, but I would still like to see it because it would save a little bit of space in the server rack."

What is our primary use case?

We are a managed services company, and we are also a partner with Fortinet and Cisco Meraki. The firmware that I just started using is 6.4.4. Most of the FortiGates that I sell are 60E and 60F. For some of our larger customers, I have got a handful of FortiGate 80, 100, and 200.

Fundamentally, its primary purpose is security at the edge of the network. I have got some clients who are starting to use the SD-WAN feature for a multi-location setup. I have got other clients who are using a lot of IPSec tunnels. I also have some clients who, with the increase in remote workers, are taking advantage of the FortiClient product that ties in. They are using that for remote VPN connections. 

How has it helped my organization?

We are a managed services provider, and I would say that it has improved the way our client's organization functions. I would also hope that it is seamless for them. They don't even know it. The biggest improvement for us is that it allows us to do more with a smaller staff.

What is most valuable?

One of the nice things about FortiGate is that it can be deployed on the cloud or on-premises. You can actually do both. That's the biggest reason why I stick with this solution as opposed to something like Cisco Meraki. Another nice thing is that I can log directly into a FortiGate or get to it through their FortiCloud access products. They're pretty reliable and consistent.

One of the reasons why I started using the product was their single pane of management. I can deploy their line of firewalls in conjunction with their switching and access points, and I can manage the entire network from one interface. I don't have to log into one interface for the firewall, another one for the access points, and another one for the switches. These firewalls have access point controller functionality built right into the system, so I don't even have to purchase additional devices to manage them.

What needs improvement?

FortiLink is the interface on the firewall that allows you to extend switch management across all of your switches in the network. The problem with it is that you can't use multiple interfaces unless you set them up in a lag. Only then you can run them. So, it forces you to use a core type of switch to propagate that management out to the rest of the switches, and then it is running the case at 200. It leaves you with 18 ports on the firewall because it is also a layer-three router that could also be used as a switch, but as soon as you do that, you can't really use them. They could do a little bit more clean up in the way the stacking interface works.

Some use cases and the documentation on the FortiLink checking interface are a little outdated. I can find stuff on version 5 or more, but it is hard to find information on some of the newer firmware.

The biggest thing I would like to see is some improvement in the switch management feature. I would like to be able to relegate some of the ports, which are on the firewall itself, to act as a switch to take advantage of those ports. Some of these firewalls have clarity ports on them. If I can use those, it would mean that I need to buy two less switches, which saves time. I get why they don't, but I would still like to see it because it would save a little bit of space in the server rack.

For how long have I used the solution?

I have been using this solution since 2007.

What do I think about the stability of the solution?

If you have the firmware version 6.4.3 and are using FortiLink in VLAN, it has trouble with tunneling networks for a wireless network. It won't give it a route to the internet. I found it just last week. There was a version back in 6.2 where it required 12 characters for the password of a wireless network on Web 2.0 as opposed to the traditional eight characters. The problem came when you wanted to edit it. If you upgraded to that firmware from a previous version, it wouldn't let you save any changes without changing the password, making it a requirement. That was kind of problematic for a while, but for the most part, it has been pretty stable and responsive.

What do I think about the scalability of the solution?

It is easy to scale as long as you start with the right firewall. Our clients are of different sizes. We have clients with the home office with two or three employees. One of the clients has about 26 locations in all four time zones and about 400 employees.

How are customer service and technical support?

I haven't used their official tech support, which is actually a good thing. The reason I haven't used their official tech support is that they have a support mechanism in place. I have direct access to a local sales engineer, and when I have problems, I call him up on the cell phone. Based on that, they definitely support their partners 100%. They are definitely channel driven, and it shows.

Which solution did I use previously and why did I switch?

I have deployed SonicWall, WatchGuard, Cisco ASA, Rockies, and Palo Alto. The biggest reason I went with Fortinet is that it felt like it has got Palo Alto type of functionality at a much more reasonable price point.

I spent seven years working at the state level education, and budgets were tough. We had SonicWall subscription services. I could replace them with the brand new FortiGate with a three-year subscription for the same cost. That really changed things. The single pane of management that they have was just the frosting on the cake.

How was the initial setup?

It is pretty simple. For example, I just set up a new network with a 100E, and I have got four stackable switches. It will run a network with 23 access points. I set up all the VLANs, routing, rules, and other things. It won't take more than four hours of work. I am getting ready to box up and ship it out. It will be plug and play once it gets to the site.

What other advice do I have?

Take the training. They've got free training that is available online, and there are different levels for technical training. It is crucial. If you sign up as a partner, which doesn't cost you anything, the training is free. If you want to go for the test and get certified, you got to pay for the test, but the actual training materials are available to every partner for free. I would say that definitely take advantage of those. When you have new employees as network engineers, make this training a part of the routine.

I would rate Fortinet FortiGate an eight out of ten. I have been using it for years, and I do try to evaluate it on a regular basis and continue to stick with them. I just don't have a lot of bad things to say about them. Aside from their product, I'm a also fan of their company and how they do business, which makes it easier to do business with them. I don't necessarily appreciate the business practices of some of their competitors. It is nice not to have to worry about that.

Which deployment model are you using for this solution?

Private Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
PeerSpot user
Cybersecurity & IT Operations Professional (VirtualCxO) at BrainWave Consulting Company, LLC
Consultant
The IPsec tunnels are very easily created, and quite interoperable with devices from other vendors
Pros and Cons
  • "The CLI is robust and powerful, enabling rapid, consistent changes via SSH."
  • "The IPsec tunnels are very easily created, and quite interoperable with devices from other vendors."
  • "WAN load-balancing could be a lot better at detecting when a link is poor or inconsistent, and not just flat out dead."
  • "Some configuration elements cannot be easily altered once created."

What is our primary use case?

I have deployed several of the following models for customers: 200D, 60E, 60D. This review focuses on the FortiGate 200D.

How has it helped my organization?

The first implementation I performed of a FortiGate 200D was to replace a Juniper SSG-140 in a main corporate office.  This implementation provided improved network administration and network performance.

We also received more timely security updates, and it became easier to connect all of the other offices together (via an IPsec VPN mesh).

As additional FortiOS releases have come out, we have obtained more flexibility in device identification and WAN load-balancing, among other things.

What is most valuable?

  • The CLI is robust and powerful, enabling rapid, consistent changes via SSH. 

    The device identification is very flexible, facilitating the creation of rules to regulate all sorts of devices that might spring up on a network, especially via WiFi.
  • The IPsec tunnels are very easily created, and quite interoperable with devices from other vendors.
  • WAN load-balancing has improved, but needs some refinement.

    You can set up a different DDNS config for each WAN link.

    It is great to be able largely use the same OS features across the family of devices.

What needs improvement?

WAN load-balancing could be a lot better at detecting when a link is poor or inconsistent, and not just flat out dead. There are lots of options for routing traffic over a specific path when you have WAN load-balancing enabled, but they are not as clear and consistent as they could be, and most can only be set at the CLI.

Some configuration elements cannot be easily altered once created.  For instance, there is no way to rename an interface (say, for a VPN tunnel), unless you create an entirely new one and perform a little gymnastics to switch from one to the other. Or, you export the config, rename the elements in question, then re-import the entire config.

Creating a meshed VPN connection (Office A with two WAN links connecting to Office B with two WAN links) requires a massive bundle of four IPsec interfaces, with two policies. It would be nice to have a cleaner, simpler config for that functionality, something not very uncommon today.

I have found that if you have a console cable in the device when you reboot it for a disk check, it will boot to the device firmware. This will not happen for a regular reboot.

If you have more than a very basic environment, you quickly have to escalate past the first level of support. The initial level is so-so.  The next level up has been stellar for me, and quick to figure out issues and resolve them.

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

I've only experienced stability issues a few times.  One was with the v5.4.0 and .1 releases. Also, there was an issue during the v5.2.x series where there was an SSD issue that was fixed with later firmware. Overall, the devices have been very stable.

What do I think about the scalability of the solution?

No. Scalability is good, and performance increases are great as you move to higher products.

How are customer service and technical support?

Customer support is okay. They are fairly responsive for level three and higher (one and two) issues, but if your issue is a little complex, you will want to ask them to escalate to a second level tech. They don't always read all the info you provide in the first pass, but overall, they are helpful.

Which solution did I use previously and why did I switch?

I previously favored NetScreen/Juniper SSG solutions, but Juniper stopped supporting the SSG line, and FortiGate provides more value and performance for the dollar.

I've also tested the Sophos solutions, but found them not compelling enough to switch from the FortiGate devices.

How was the initial setup?

The devices are very easy to setup, even if you need to configure VPNs. You could have an HA config up and running within 60-90 minutes, with the latest firmware installed, and a couple of policies and tunnels.

If you do not regularly work with enterprise-class firewalls, you might need to add an hour to the above scenario, but the provided wizards make it pretty easy to address the basic functions.

What about the implementation team?

In-house deployment all the time.

What was our ROI?

In almost every case, I've experienced (or had customers experience) an ROI within 12 months, based on better performance for the same price or increased functionality for the same (or less) price.

What's my experience with pricing, setup cost, and licensing?

Licensing and setup costs are generally pretty clear with Fortinet. If you go with centralized management or their Log Analyzer tool, these carry some additional pricing that you need to look at.

Check out the price matrix, and go with a value-added reseller that understands how to help you size out the equipment. Remember to always look at the performance with the assumption that you will have many of the unified threat management (UTM) features on, not off.

Which other solutions did I evaluate?

Yes, I tested and evaluated solutions from pfSense, Sophos, and Palo Alto.

What other advice do I have?

I highly recommend, and often try to deploy Fortinet solutions for my office network and for my customers. They run for a long time, they are supported for many OS updates, and they are pretty solid.

Don't upgrade the OS right away when it is released, if a major new version has come out.  v5.0 was problematic early, but v5.2 was great. v5.4 was a problem child, but v5.6 had only a minor issue. v6.0 was surprisingly smooth and had only a minor issue. I could have avoided most of these problems if I waited an additional month or so before updating, but I updated because I need to advise customers on what they should be doing.

I've had to interact with support a lot, and overall they've been good (with the caveat mentioned earlier).

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Irshad Ali - PeerSpot reviewer
Presales Manager at a tech services company with 201-500 employees
Real User
Top 10
Good licensing, saves costs, and provides good security and visibility
Pros and Cons
  • "The security features that they have are quite good. On top of that, their licensing model is quite nice where they don't charge you anything for the SD-WAN functionality for the firewall."
  • "Tunnel flapping was one of the major things I had seen wherein your internet link remains but your VPN tunnel is down. However, since I got a fix from the TAC team, I have not noticed it, but the customer complained a few times that they couldn't access the internet because of this problem."

What is our primary use case?

I used this solution while working with my last organization. I handled plain firewall deployment as well as SD-WAN deployment. 

How has it helped my organization?

I was providing consulting services to various Telco customers. It helped customers save on the cost of highly expensive MPLS links. With the help of Secure SD-WAN, they were able to utilize broadband or even LTE connectivity, which saves costs. That's the flexibility that Secure SD-WAN gives to various customers. In addition to saving costs, they are also able to utilize active-active load balancing, where you can have two parallel links: primary and secondary. The secondary one used to sit idle in traditional scenarios, whereas now, the solution gives you the flexibility to configure both links as active-active, so you can prioritize critical traffic from link one and other traffic from link two. At the same time, you also have the option to maintain redundancy.

Secure SD-WAN is a great way to manage your entire organization network, especially the WAN network. Customers don't have to hop to multiple places. Fortinet has a solution called FortiManager. With the help of that, you can monitor, configure, and maintain your entire organization's network. It's a very convenient option. It's a single pane of glass from a customer's point of view. They don't have to log in to individual devices, and they can see the real traffic. They can see what's coming into the network, what sort of alerts or logs are there, and what sort of applications are being consumed.

Secure SD-WAN doesn't help with tool consolidation, but it's a secure way or mechanism they provide so that if branch users are accessing the internet, they can directly break out from the branch location rather than coming back to the data center. In that way, it improves the user experience while also giving security at the highest level.

I have not interacted much with Secure SD-WAN in terms of API integration or third-party integrations. However, they have pretty good integration with the RADIUS, LDAP, and AD servers. In that way, they have everything in-built. You can make the firewall a DNS server or some sort of DHCP server. Such features are included there. From a security standpoint, they have open API integration with their own SIEM or SOAR solutions. Third-party API integration is also possible, but the API details that are exposed are very limited.

The integrated application protection provided by Secure SD-WAN is a cool feature. They have real-time scanning of the application with the help of SSL inspection. You get to see the real-time traffic of applications, and you can protect your network from harmful websites. They have a signature database for that. This data also gets refreshed. It's a direct feed that the device takes from the central intelligence.

When you have Secure SD-WAN in place, you are more secure from the outside internet. They have a flavor of SASE, but I have not worked on it.

When you have a granular view of your entire network including users and security features being enabled, you get more visibility into your network. You get to know what's coming in and going out. If an administrator sees that some traffic is being hit repetitively from a particular location, functionality is available to block a region, country, or even an IP or domain.

In terms of Secure SD-WAN reducing our mean time to resolve, in the case of issues specific to SD-WAN, I've seen instances where customers can look into the dashboard and inform the support team that this is the issue they are facing. This helps them to have some visibility into these firewalls and isolate the entire issue from the technology perspective; for example, when a wireless client is facing some sort of challenge accessing the internet, whereas some of the wired users are able to access the internet. The testing tools given in the FortiGate GUI dashboard come in handy during troubleshooting. With the very user-friendly interface, it becomes very obvious and easy for any IT guy to simply follow the workflow to resolve any day-to-day operational issues.

What is most valuable?

The security features that they have are quite good. On top of that, their licensing model is quite nice where they don't charge you anything for the SD-WAN functionality for the firewall. The routing and firewall features are also good.

The unified view that they have built into this firewall is good. Within the same dashboard, you get to see the security profiles, the type of traffic that's passing through, the top applications that are being consumed, etc.

It's also very easy to use.

What needs improvement?

I was not looking after the operations part, but sometimes, I did get engaged in some critical activities related to operations. There are some caveats in every product. Tunnel flapping was one of the major things I had seen wherein your internet link remains but your VPN tunnel is down. However, since I got a fix from the TAC team, I have not noticed it, but the customer complained a few times that they couldn't access the internet because of this problem. There were tunnel issues where there was already established connectivity, but at the kernel level, there were some issues. For example, there's a feature for auto-site connectivity wherein whenever it automatically creates a new tunnel, at the kernel level, it also creates an interface. Sometimes, that interface crashes and a new interface could not be created, which results in connectivity loss. 

Fortinet has established itself in the SMB market segment. It's doing pretty well in that space, but when it comes to the enterprise segment, they are lagging a little bit. It all boils down to the performance of the hardware. If I enable all of the security features available on my device, the throughput degrades quite a lot. If I have put 10 GBPS of throughput on a firewall and I enable all of these features available, such as IPS or UTM functionalities, the throughput comes down to 1 GBPS.

For how long have I used the solution?

I used Fortinet FortiGate for seven months. I last used it in February of this year.

What do I think about the stability of the solution?

I'd rate it a seven out of ten in terms of stability.

What do I think about the scalability of the solution?

The solution offers the option of deploying VMs or virtual machines to any public cloud, such as AWS or Azure. It provides such flexibility. If you have any application hosted in the cloud space, you can have a VM spin of the FortiGate over there and have a site-to-site tunnel established, so the scalability is there. Otherwise, at the site level, it's mostly hardware-based work. If you size it properly, then you have the option to expand. You might have chosen a low-end model because of the tight budget. In that case, it's not scalable on a specific site. However, if you have a certain number of sites, for example, if you have 400 of them and you want to expand to 500 or 1,000, there is simply a license that goes at the FortiManager level to support additional devices. FortiManager provides a single pane of management. 

I'd rate it a seven out of ten in terms of scalability.

How are customer service and support?

My experience was not that rewarding. It took me around three hours in total to get a simple issue identified and fixed. I escalated it to their L3 engineer, and after that, I was able to resolve the issue. The entire process took around three hours. First, their initial level person was troubleshooting, then it went to the next level, and then it went to the highest level.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

From the security perspective, I have not used any other solution, but I did have a glance at Cisco's portfolio. Cisco Meraki is one of the solutions that you can compare it with. Others were more specific to the routing and switching domain. I know the concepts and theory of Cisco SD-WAN, but I have not used it in a real environment for any customer.

How was the initial setup?

For one of the clients, it was deployed on the Azure public cloud. Initially, it was not easy. It was complex. Every product and technology requires a certain type of prerequisite, and when you have anything hosted on a public cloud, it becomes a tedious job to get things done quickly because multiple stakeholders are involved in that.

I have deployed Secure SD-WAN specifically for many customers. I find it easy, but you need one person to be at the site for remote connectivity. That person just needs to do the basic configuration. Once the device has IP reachability, you can easily discover it from FortiManager, which is the central controller. So, once you have the device on FortiManager, it takes a few clicks to onboard the device because you already would have a template in place.

The deployment duration depends on the number of sites. For a customer with ten sites, it would take a week's time because there are a lot of dependencies. It also depends on the customer's readiness and availability, but a week's time would be enough for the deployment of ten sites. If there is proper planning in place, you can also deploy 50 sites in a week, but that's something you cannot control from your side because there are a lot of dependencies on the customer and the service provider. If you have to integrate it into a customer's existing network, it becomes quite challenging to make them understand your prerequisites. There are instances where nobody is available from the customer side from the technical standpoint to help you. Those are the roadblocks, but from the solution perspective, it's quite easy to onboard devices.

What about the implementation team?

The deployment can be done by one person if that person is dedicated to a single project, but if more projects are running in parallel, you would require a few more people.

It does require maintenance, which includes upgrading the operating system and installing patches. Two to three people would be enough for around 500 site maintenance but not in the 24/7 case. If it's 24/7, then nine people would be required for that.

What's my experience with pricing, setup cost, and licensing?

By default, they give SD-WAN along with the firewall. They don't have separate licensing for the SD-WAN functionality. However, they have security licenses that are sold separately on a subscription basis. Customers can consume these security features to protect their users from internet traffic.

What other advice do I have?

To those evaluating this solution, I'd advise doing a PoC of different vendors who are meeting their requirements. They can then decide for themselves after seeing the demo.

Overall, I'd rate it an eight out of ten. It's user-friendly. It's also good features-wise, but their support is weak, and on the architecture front, it's not true SD-WAN. It's not decoupling the control chain functionality from the device to the controller. 

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Microsoft Azure
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
Buyer's Guide
Download our free Fortinet FortiGate Report and get advice and tips from experienced pros sharing their opinions.
Updated: April 2024
Buyer's Guide
Download our free Fortinet FortiGate Report and get advice and tips from experienced pros sharing their opinions.