It is used as a defense mechanism for securing the internal network from the external network. We also use it to have VPN tunnels between us and our partners and the support organizations we work with.
We are using FortiGate 200F.
It is used as a defense mechanism for securing the internal network from the external network. We also use it to have VPN tunnels between us and our partners and the support organizations we work with.
We are using FortiGate 200F.
We are mostly using it as a defense mechanism. It has many more possibilities, but at this moment, it is only used for defense against attacks. It is doing what it should do with the FortiGuard subscription on it, which is an advanced security subscription.
It is easy to use. We chose this product for the possibility to have virtual domains (VDOMs). We are building another company in the group, and we would like to split the firewalling rules and policies between these two companies. Each company would be able to manage its own policies and security rules, which is an advantage of Fortinet FortiGate. We can define VDOMs, and every company can manage its own VDOM as if it has its own physical firewall, but in fact, we would be using the same physical appliance because we are also using the same internet lines. So, it allows us to reuse the existing resources without the disadvantage of having to compromise on policies and security. Each company can choose its own way of working.
I don't see any area of improvement at this moment. I'm responsible for the IT infrastructure. I'm not a security specialist. The IT security is being managed by the CSO in our company.
We had some issues in the beginning while setting it up, but after doing the firmware update, it is working fine.
It has been a little over a year since we have the firewall cluster in place.
It is a stable product. We had some issues in the beginning while setting it up, but we received an update of the firmware, and since then, it has been stable.
It is being implemented for everybody. It is our security layer.
Their support is good. We had some issues in the beginning, and they were resolved within a couple of days after we explained what we were trying to do. They confirmed that it is a bug, and they would give us a fix. A couple of days later, we had the fix.
We were using SonicWall firewalls. We found FortiGate better, and we switched everything. We decommissioned all SonicWall firewalls. One of the reasons why we changed from SonicWall was that its licensing was user-based and function-based. So, every time we did something, we had to add another license or subscription. The licensing of FortiGate is clear. We know what is the price.
We migrated last year from a typical MPLS network to a complete and only one network between the sites. For firewalls, we now have a few solutions in place in our headquarters. We have Fortinet Firewall Cluster, and on the remote sites, we are using Meraki firewalls that are being used as a router at the same time.
It is easy to use.
Its price is reasonable. They have a clear pricing policy. It is not complicated by the number of VPN users at a time. We know what the price is. The yearly subscription for the security license is rather high, but it is all included for whatever number of users you have and the kind of functions you need.
I would rate it a nine out of ten.
We are using FortiGate as a perimeter firewall.
It is our perimeter firewall. URL filtering, IPS, and antivirus features are most valuable.
It is easy to manage, and it doesn't need much knowledge from the team. It is a stable device, and there are many features that are included out of the box.
Their support can be improved in terms of the response time and the quality of support.
There are some tiny bugs that sometimes affect the operations. In the past revision of it, there was a bug. Because of the bug, we had to downgrade the version. It happened only with the last revision.
I have been using this solution for two years.
It has been very stable over the past two years.
I have no problem with scalability. When I need to add any device, I just find and add it to the network. I have no issue with the count of devices. I can buy a license and add whatever devices I need to add. Currently, I have no issue with the scalability of this firewall, but if I reach the maximum limit, I need to exchange the box or just add licenses. We currently have about 1,000 users.
I have contacted them many times. My experience with them was good, but their support can be improved overall. I would rate them a three out of five.
It was very simple.
There was a partner supporting us. Our experience with them was very good. I would rate its setup experience a four out of five.
For maintenance, we currently have a team of two people, but it may be extended to three or four.
It has been two years. I don't remember the actual price, but it was affordable.
We buy the boxes and then use the license for three years.
I would recommend this product. It is a very good product to be used as a perimeter firewall.
I would rate it an eight out of 10.
Fortinet FortiGate is user-friendly. When it comes to firewall enterprise security and email security, this solution is at the top. It's better and it's affordable. If you compare it with some other email security like Mimecast and similar solutions, those products are better than Fortinet, but here in the Fiji region, Fortinet FortiGate has better service. In some other regions, this solution may not be doing well, but in Fiji, it's working out well. Fortinet has so many customers in Fiji.
What I'd like to be improved in Fortinet FortiGate is for it to have advanced WAF functionality. Even in FortiADC, WAF functionality is not supported for advanced attacks, e.g. mobile bot attacks. Fortinet FortiGate needs to improve its WAF function.
SD-WAN is also good in this product, but it still needs improvement, particularly in security. We saw some attacks last year, so they need to improve on that.
I've been dealing with Fortinet FortiGate for eight years.
There are some issues with the scalability of Fortinet FortiGate. Certain products and models need to be scalable, but they're not. For example, if you go with 400F, they only have two SFP+ ports, while the F5 has four ports.
When you're expanding the number of users for this solution, they'll ask you to replace the model, and this can be a big cost to customers, which could affect scalability.
We are happy with the technical support for this product, because the Fiji region is supported by New Zealand, where support for Fortinet FortiGate is better.
Fortinet FortiGate is an affordable solution, but when expanding the number of users, they'll ask you to replace the model, so that's an added cost.
Pricing for this product is comparatively lower than other products. If you compare it with Forcepoint, Cisco, and other products, Fortinet FortiGate pricing is reasonable, and that includes all the service and support we need. Whenever we need support as a partner, they're able to deliver that support to us, unlike with F5 where there's premium support and standard support, which means you'll have to pay F5 extra.
I evaluated Cisco and Forcepoint solutions.
We are an IT infrastructure company, and we are dealing with one of the banks here. They need a solution which they'll use for application delivery, load balancing, and as their web application firewall.
We are a reseller and partner of Fortinet, but only for their firewall product, e.g. FortiCloud WAF, not FortiADC. We've also been working with Fortinet FortiGate.
The solution we're looking for which will be implemented for our customer, e.g. a bank, is a solution with basic functionality, e.g. FortiGate. It will only be used for two or so web applications. If our customer needs a bigger functionality, then I would propose a different solution: F5. For the government, we always propose F5.
My advice to people who want to implement this solution is simple: It's an affordable product for the SMB customer, but for customers with bigger environments, I would recommend that they go for other products with premium support.
My rating for Fortinet FortiGate is seven out of ten, if you consider the Fiji market.
We saw that Fortinet is working towards the ZTNA model, e.g. SASE, and also working towards zero trust products, which is good. They're also improving slowly in privileged access management, e.g. they don't have one, but they're trying to introduce it by the end of the year.
The purpose of this solution is to provide intrusion protection and more robust endpoint security for small offices. We are providing an enterprise solution for a small business by adding endpoint protection coupled with Intrusion Detection and Protection. For small offices needing HIPAA compliance, we need to make sure we are providing robust protection instead of the default modem gateway provided by the ISP.
The Fortinet product provides enterprise capabilities in a small footprint at a price point that is more attainable for a small business. The product meets the IPS/IDS/Endpoint protection that small organizations need for their HIPAA and PCI compliance. While the end user may not understand the true capabilities, the managed service provider can more easily deploy and maintain this small footprint product.
The main reason why I purchased the particular unit was based on other reviews and leadership in this space. Being able to have a VPN solution as well as integrated access points is a plus. For me, it's all about simplicity. When you look at my particular model for a managed service provider, it's basically to help simplify, protect, and remain compliant. When you're trying to implement something, it's about making sure it is simplified. This seems to fit the bill.
The product has enterprise capabilities, which means there are a ton of configurations possible. What I'd like to see in the product is more of a branch in the box wizard deployment for those that are not as well versed in firewall and routing. For a small business, the firewall should be able to self-configure for a Unified Threat Management configuration with 2 SSIDs for protected wireless network for internal gear and a guest wireless network for employee cell phones and guests. I'd like to open the box, plug in the router behind the cable modem, and check a few boxes, and the rest is done automatically. I don't want to have to build a configure VLANs, SSIDs, security protocols for each port, and try to figure out and understand all the layers in an effort to deploy a solution. It's great to have those capabilities in case you need them, but for most of the offices I am trying to deploy these into--it should be a branch in a box.
I've only been using the solution for a few weeks. It's very new for us.
Stability has been fine. I've had no questions about the stability of it. It seems so far it is staying up. I haven't had any issues to speak of.
I haven't really pushed this product from a scalability perspective. Certainly, if you look at the performance metrics, the F series appears to have really expanded the capacity and capabilities beyond past models. If you look at 40E versus 40F, there's a fairly substantial difference. For a small office, it's going to be just fine.
I haven't reached out to technical support and therefore can't speak to their level of responsiveness.
N/A
The initial setup is complex for me due to my lack of experience with the Fortinet FortiGate product. The complexity can be a good thing, however, as there's a lot of really good features associated with it. Where it could be simplified is in having that easy deployment option, and then you can start going down and trying to get into the nitty-gritty and figure out when do you need the extra features.
Right now, I'm just in a test environment getting all the firmware up and tested. Then, once I have it tested, I'll take it to the client location and yank out their WiFi mechanism, their WiFi router, and put this in.
I'm currently handling the implementation for a client.
ROI is somewhat difficult to measure when you are mostly talking about deploying a product for endpoint security. If your environment stays protected, then it was a good return on investment.
When you look at these endpoint security systems and firewalls, these products a few years were way too expensive for a small business. Now we have enterprise level security in a footprint that is less than $1,000. For offices that have 10-25 computers needing protection, this is a better solution.
The good news is that Fortinet does have a good support network as well as their education academy to help someone get up to speed on their product.
My customers use Fortinet FortiGate for various purposes. The security services provided by Fortinet FortiGate are quite strong.
I have had use cases where FortiGate helped to protect the mission-critical data for my customers.
FortiGate is effective at protecting the data at the edge.
What I appreciate about Fortinet FortiGate is its effectiveness. The feature that I find the most effective is threat prevention.
The mean time to respond and the remediation process is sped up. FortiGate has also helped to consolidate tools and applications for my customers.
The firewall has indeed helped customers to consolidate tools and applications. Once everything is set and done, maintaining FortiGate can have its challenges.
Fortinet FortiGate brings numerous benefits to my company.
The good things aside, there are improvements needed in the Fortinet FortiGate. My customers requested specific features to be included in the Fortinet FortiGate.
My experience with the Fortinet FortiGate is recent, as I worked with it less than a year ago.
My impression of the stability of FortiGate is that it is quite stable.
When it comes to scalability, I find it scalable.
I have escalated questions to Fortinet's tech support.
Positive
We need to compare different firewalls, including Fortinet FortiGate and Hillstone, and then suggest the better one to our clients.
The initial implementation part is straightforward, but it has some complexities. My implementation strategy involves several steps that I take when deploying it.
I do have hands-on experience working with the products, and I do the POCs and implementation part.
When it comes to the ROI, the return on investment of FortiGate can be a bit hard to estimate, but based on my experience, I find it to be quite favorable. Overall, Fortinet FortiGate has indeed helped to reduce the total cost of ownership for my customers.
My impression of the firewall's ability to provide network and security coverage is positive.
When it comes to sustainability, my impressions of the firewall are favorable.
The size of the environment with Fortinet FortiGate was significant, including many endpoints and users, and it involved enterprise-level business.
Based on my experience, I would say to someone considering purchasing Fortinet FortiGate's data center firewall is that it's a good choice. I would give Fortinet a solid score.
We use Fortinet FortiGate for VPN. We connect the branches together for the HQ. That's why we are using the VPN, and we publish some of the websites in the HQ, and the users can access that website from outside with the two-factor authenticator and a token key. We are using FortiGate to control the connection between the branches. But, for the software, we are using this to collect the data to extract reports.
I like FortiManager.
Improvements depend on your specific needs. Currently, it meets my requirements. Whenever I need something, Fortinet improves and updates the software for me.
I have been working with Fortinet FortiGate for about ten years.
Fortinet FortiGate is a stable solution.
On a scale from one to five, I would give its stability a five.
Fortinet FortiGate is scalable. If you are familiar with it, you can work from anywhere and do whatever you want. It is very easy to scale. We have about 500 users in our organization. It is not only engineering and not IT because we publish many websites from HQ to other branches. End-users use the Fortinet username and password to log in with two-factor authentication and the token.
Technical support is good.
On a scale from one to five, I would give technical support a five.
Positive
The initial setup was very easy. We had two third-party members and four of my team members implement this solution. It took us five to six days to install and deploy both the software and hardware. For the software alone, it took us about two days to implement. You need two people to manage and maintain this solution.
We had a third-party company help us with this implementation. They came and did the first setup, and after that, I followed the technical support from Fortinet.
Licensing costs are acceptable. I think it's cheaper than Cisco. We pay for the license on a yearly basis.
On a scale from one to ten, I would give Fortinet FortiGate a ten.
We have created a virtual cloud on-prem, providing services to our different IT domains in terms of software, database and ERP. We've also created a virtual firewall handling the security and protecting servers in the network. No unwanted or unauthorized user can access the servers. That's a good sign of security and the handling of the network. It provides us with oversight. I'm a senior network engineer and we are customers of Fortinet.
With the Covid pandemic, the VPN has become the most valuable feature. With the majority of traffic connecting from remote locations, the VPN provides stability and reliability. The antivirus and its IPS, intrusion prevention system, also helps with stability.
In our environment, we need multiple virtual firewalls to facilitate end users and customers. Fortinet doesn't provide that but they really should include that feature.
I've been using this solution for three years.
Overall stability of the solution is good. I am totally dependent on this device. Basically, it's deployed on the edge of our network. All the software and HR, admin, every department is behind this network. And every user connects their internet services via the VPN.
Scalability of this solution is good, we can add devices whenever we like.
Whenever there's an issue and we contact support, the response is positive. The support is impressive.
We previously used Cisco ASA but that model didn't support the latest technology, and was also very expensive. The main issue that caused us to switch solutions was the throughput of the interface. Cisco was providing us with one gig interface. Because of our gradually increasing bandwidth and network requirements, we had to move to more bandwidth and a 10 gig interface, which Fortinet provides. Although Cisco provides the same on a different model, that model was very expensive. That's why we chose to switch to Fortinet Firewall.
The initial setup is simple. It's only complex if the design hasn't been sorted or tested. If we're deploying, we study the network, traffic patterns, and traffic path, which is, I think, the most important thing about deploying any network device. We can easily create or delete, modify or customize and optimize the feature, the network, the routing, the policy, and the different features of this device. Most of the time we carry out the implementation ourselves, deploying in different phases; firstly connecting the network, and then partially shifting the traffic phase by phase. When we removed ASA and shifted all the traffic to Fortinet, the overall performance and overall working was very impressive. Downtime probably came to a total of 15 to 20 hours. We have multiple groups using this product - I would estimate somewhere between 12,000 to 13,000 users and the solution is used continuously.
I think the licensing of Fortinet is in the middle range. We also had a demonstration from the vendor that gave us the confidence to work with these devices. We purchased the solution on a bundle basis which the vendor offered us. There are additional costs if we enable a new feature not included in the bundle.
I think Fortinet is a cheaper, stable, scalable, and reliable device.
From my experience, I would rate this solution a nine out of 10.
We are selling FortiGate 60E and 200E. I mostly look after imports and finance, and my sales team and my corporate manager look after the business. Currently, we are buying renewals for our customers from a local distributor.
Customers are more inclined towards FortiGate because of application control, web filtering, and anti-spam features. The support from the FortiGate team is good, and price-wise, it is affordable.
They are doing good, but they can improve the distributor assignment. The availability of the product and the timeline of delivery are the main things. The distribution should be swift, and the distributor should not reach out to end customers directly. They should work as a distributor. There should also be one more local distributor. Currently, there is only one distributor in Pakistan, and the rest of them are in UAE. It is difficult to work with only one distributor. Sometimes, you don't get along with the same distributor, and that's why they should have one more distributor.
Their licensing should also be improved. The activation or renewal of the product should be done from the date of renewal, not from the date on which the license expired.
I have been using this solution for almost two years.
It is 100% stable.
It is scalable. We have more than a thousand users.
The support from the FortiGate team is good. My engineers never complained that they are facing any problem with Fortinet in terms of support.
It is very easy to install. It is way easier than Cisco.
The deployment duration varies from customer to customer. It depends on what features they want to utilize, what is their scenario for IP addressing, and what security level they want to implement. It also depends on the policy and the planning of the technical teams. My engineers and the customer's engineers sit together, and they plan the activity and take care of everything. After that, they decide what to implement and how long it will take. Sometimes there are physical, logical, or IP addressing problems, so it all depends on the customer and our implementation planning. I have three guys for deployment.
Its price is affordable and lesser than Cisco. Cisco is expensive.
In terms of licensing, there is only one issue. If a customer's license has expired a month ago and they do the renewal after one month, Fortinet renews the license from the start of the previous month. The activation of the product is done from the previous month, not from the date of renewal. The customers usually shout and complain that because they are paying today, the renewal should start from today. The support contract renewals or licensing should be renewed from the date of renewal, but Fortinet starts from the day it had expired. It is a loss for customers. They might have had some problems because of which they did not take the license one month before. Fortinet should work on this. Cisco doesn't do this. Cisco always starts from the day they apply for the license.
We plan to keep selling this solution. Fortinet has launched new partnership levels. They have removed the silver partnership. We were a silver partner previously, and we have now become a premier partner or something like that. So, we have to improve our partnership on new levels.
I would definitely recommend this solution. We always support customers and recommend buying Fortinet. It is a better, more stable, and relatively cheaper product than Cisco. We supply Cisco only when a customer forces us to go for Cisco.
I would rate Fortinet FortiGate a nine out of ten.