We primarily use the solution for basic access, filtering, and more.
We have set up the IPsec VPN through that. It's a UTM device.
We primarily use the solution for basic access, filtering, and more.
We have set up the IPsec VPN through that. It's a UTM device.
It's easy to manage, actually. It's a UTM device rather than a normal firewall as compared to Cisco PIX, or Juniper.
The web filtering is a key feature of almost every firewall. However, this appliance is more secure, reliable, and stable. We haven't had any problems, so far.
For ten to 12 years it has been quite secure.
It's scalable.
Policy management is very easy, and configuration is very easy as well.
The support is also good.
Real-time threat monitoring is not there. The traffic hitting the firewall needs to be improved to have real-time monitoring. Traffic should be more visible and should be available on the dashboard. Even if something is blocked, we should be able to see the traffic. We need a security posture showing the organization's security posture to see the traffic hitting the firewall, the user or entity behavior, et cetera. If there's an abnormality, it should be reported. We need to be able to generate multiple reports and see everything in the logs. Logs are only available for a week; we should have them visible for up to three or six months or even a year.
It can be a bit expensive.
If you have an emergency and need support immediately, it can be hard to reach them as they don't have a direct number to call.
I've been working with the solution since 2007.
This is reliable, stable, and problem-free. There are no bugs or glitches. It doesn't crash or freeze. I'd rate the product five out of five in terms of stability.
It is a scalable solution. It's easy to expand. That said, appliance to appliance, there is a limitation. However, I would rate it four out of five in terms of scaling capability.
Our organization has 400 to 500 people on the solution right now. There's another organization as well that has 300 people using it. Overall, 10,000 or more people are likely using it across 2,000 locations. Every location has one or two firewalls to make it redundant in a failover mode. If one fails or one stops working, the other will take over. That never happens, however, it ensures we're safe and covered.
Technical support is great. They are helpful and responsive.
We have to send emails to get assistance. The response time is good, however, if something is an emergency, then it is difficult to reach people. There is no number to call to get help right away.
Positive
I have previous experience with Palo Alto and Juniper. We also have used Cisco.
I didn't choose Fortinet. It was already being used when I came along. It was a standard practice to use Fortinet across locations worldwide.
The initial setup is not complex. It's very straightforward and quite simple.
It has an easy initial setup process. Three people we involved in the setup process.
We first set up the basic policy, and then we did an IPsec VPN, and then, based on the access requirement of each business vertical, we manage the setup. We define the access website URLs that will be restricted or allowed, including port blocking, et cetera.
The time it takes to set up varies. Sometimes it's a night or a few hours, sometimes it's up to ten days. A basic setup will not take one or two hours.
We handled the process of implementation in-house. We did not need outside assistance.
We have not done an ROI calculation to see if there is anything there to note.
We pay a yearly licensing fee, however, in India, you can get licensing for up to two years. It is a bit expensive. That said, I haven't done a comparative analysis with other options on the market.
I'd rate it a four out of five in terms of affordability.
We're Fortinet clients.
We are using the latest version of the solution.
We are using Fortinet 60D, 80E, and 100 also.
I'd rate this solution nine out of ten.
Fortinet is used for security. FortiOS is the operating system. FortiAnalyzer, for example, can be used on it and it is used for log management, et cetera.
The solution is very easy to use. It's a solution that has a powerful CLI and a very powerful graphical user interface.
The solution scales well.
In terms of stability, the solution is reliable.
It's not too hard to implement the solution.
Technical support is helpful and responsive.
The pricing of the product is too high. They should work to lower it.
I've been using this solution for three years. It's been a while.
The solution is stable. There are no bugs or glitches. It doesn't crash or freeze. The performance is reliable
We have found the product to be scalable. It's not a problem if you want to expand it.
There are 1,000 users on the solution at this time.
While there may be plans to increase usage in the future, I'm not sure if that's the case just yet.
The technical support on offer has always been quite good. We are satisfied with the level of service they provide.
Previously, we were mainly using Cisco firewalls and products.
We enlisted some assistance with the implementation process. The setup was pretty easy. It wasn't overly difficult.
We have three people who are able to maintain the solution. They include me and two team members who are both engineers.
We used an integrator to help us deploy the solution.
The solution is fairly expensive. The cost is around $40,000.
It would be ideal if they offered more licensing options.
We were presented with some other solutions such as Palo Alto and Check Point. We prefer Fortinet due to the features on offer.
I'm an end-user and customer.
We are using a few versions of the solution, some with 6.2, which is not the most updated version, and some others with almost legacy versions such as 5.6.
I would advise users to not stick with the last version if a new release comes out.
I would rate the solution at a nine out of ten. We have been largely pleased with its capabilities.
We use the solution for automated solutions.
Fortinet FortiOS's valuable features include intuitive policy creation and deployment, precise parameter settings to determine thresholds, and security profiles such as web filtering and remote application filtering, among others. These features greatly enhance the platform. It includes every available application in terms of features. For example, in RDP, we must control the application. It’s already there whenever we want to apply their role or policy to that application.
Fortinet FortiOS's integration could be improved. It has extensive integration features, such as collectors for other services and third-party intelligence feeds.
I have been using Fortinet FortiOS for six months. We are using the latest version of the solution.
The product is stable.
The solution is scalable. We have around 300 users using this solution.
We initiated support from our servers because the other part of the company was not working. They helped us adjust the tuning, and it is working now.
The initial setup is not complex. It will take around two or three days to deploy. Product cleaning, readjustment, and screening are continuous tasks, as the nature of the work requires tuning and adjustments. To connect the PC to the console, we assign the networking settings, including data capabilities, and then reconfigure them on the web interface (UI). Some settings are also presented in a web-based format in the CLI because they are easier to navigate.
The reserve utilization is very low. Based on my learning, my expectation is for every product to have a good intelligence system and frequently updated threat intelligence. Overall, I rate the solution a nine out of ten.
We primarily use the solution as a firewall operating system.
The built-in SD-WAN is the most valuable aspect of the product.
It is simple to set up.
The solution has been stable so far.
It's easy to scale.
The pricing is excellent.
SD-WAN configuration could be easier.
The support could be better.
We'd like to see bandwidth optimization and traffic prioritization capabilities. These are the two things that I'm looking for, especially in SD-WAN.
I've been using the solution for three years.
It's stable as a product. However, SD-WAN has some issues. The route policies and how you prioritize traffic are the areas of concern for us.
I'd rate the solution seven out of ten in terms of how stable it is.
The scalability is great.
We have 1,500 users using the solution.
We are not very pleased with the support. It could be better.
Neutral
We are using Fortinet, however, we are exploring Palo Alto.
While the initial setup is not an issue, the SD-WAN configuration is a little complex.
There are three people here who are maintaining the firewalls.
The solution is the cheapest on the market. I'd rate it five out of five in terms of affordability.
I've compared this solution to other vendors. Palo Alto is number one in the world. Then I would go with Check Point. Then my third preference would be Fortinet.
We are end-users.
I'd rate the solution five out of ten.
FortiOS is the operating system of the FortiGate firewall. So whether it's an actual device or virtual machine, FortiOS is the actual software running.
FortiOS is dedicated to the next-generation firewalls. You can't really use it for anything else.
Essentially, their IPS and DNS filtering databases are the most useful for us. The industrial protocol database, which is the main one that we use, is great. They do extensive research to make sure that all the CVEs that they include in the IPS database are up to date and they keep it up to date. And that they don't miss any threats.
Their classification inside of that database of the various threats is typically very, very good. It's, for that matter, one of the best we've seen.
The IPS, IDS database with the DNS and industrial database are the three core main features that are the best for us.
We don't really find a lot of issues on it.
If I really have to complain about something, and there's not much, is the free VPN solution is a bit limited. Then again, it is a free solution. That's essentially it. Nothing else on the FortiGate or on the Fortinet OS side is really an issue. That's one of the main reasons why we use them: everything works and works well.
For what we use, there isn't really any missing feature. In fact, we actually want to get rid of some of the features that they have due to the fact that, for the security model that we need to implement, having more features actually opens up potential risk. We actually would like to have a device that is more focused specifically on OT environments the operational technologies.
We would prefer a device that's stripped down, that doesn't have all the other fluff in the more enterprise system. We actually want a feature where we can remove features that are there that we don't use. That is actually a thing that we find. We use it now in an operational technology environment. We use normal IT equipment. However, it's not a normal IT network. It differs significantly from a normal corporate IT environment. In a normal corporate IT environment, you like the fluff, and the additional features, and you can click, click, click, and you're done.
However, all of those features you add to a device open up risk for us. And that is something we do differently in the OT environment in operational technology. We prefer to not have the fluff. We prefer to have only what is needed for the device to do what it needs to do.
For example, imagine an additional feature for some sort of additional VPN technology has been added. However, it's not really needed for the OT environment, and it's not configured on the device, yet there's some sort of security threat in there. Now, all of a sudden, somebody can hack your system, and he's in there, and he's switching the lights on and off the entire city. And you don't know about it due to the fact that the additional fluff that we added to the system, we weren't aware of that issue was on there.
You can enable and disable certain modules in it. However, with disabling, nobody can really tell us if that module is disabled. Is it really disabled? Is it actually unloaded? Is it uninstalling Word from your laptop, or is it just not running Word?
I've been using the solution since 2009, give or take. That's almost 13 years.
We don't have any instability issues.
The solution can scale reasonably well, within the means, of course, of the device itself. You buy the device based on the current network requirements. We typically build in a bit of extra expandability into there to ensure that the device can cope with the additional load on it.
It greatly depends on the unit itself and what the limitations are. However, typically, expanding past that limit it's not complicated. Still, you'll have to procure a new unit. It's very crucial for us at the beginning phase to make sure that we know exactly what the customer's networking requirements are in terms of bandwidth, IPS, IDS, and throughput.
If a VPN needs to come in, we’ll need to consider what is done with the requirements of the VPN. And then, based on that, we'll specify the unit with additional capacity. However, if you go outside of the unit's capacity, you'll have to get a new or bigger unit.
It's actually an OT environment, not an IT environment. The actual user base is relatively small as not many people are allowed to use the operational side of things.
It's not like a normal enterprise network where you have thousands of people connected to it. It's very small. And when I say very small, it's typically ten or maybe 20 users.
If you log a support call, they have support engineers that jump on that support call very quickly to try and sort out your issue. There are absolutely no complaints that we have on their support side.
Positive
If you are a novice person that has never worked with any firewall and don't really understand the concepts, you may find it challenging to set up. However, there are help files, online tutorials, and videos that guide you on any of the topics you have in it.
It really helps you a lot to get to it in order to do the configuration. So it varies. It depends on how you install it. It may be fairly easy for your average user at home or for an average enterprise guy. However, for a process environment, it may be a bit more challenging since there are different approaches that we follow in order to install it. That said, Fortinet itself is not very difficult to use and its knowledge base and help are very extensive.
We only need one person to deploy the solution.
How long deployment takes depends on the customer requirements and what they require for their network that we need to implement. For the actual deployment of the FortiOS and the initial testing, you're looking anything from a day to about four days' worth of work.
That said, your pre-prep, in other words, all your pre-definition of your firewall rules and what security model you need to run and what security level in your Purdue model that you need to implement, can take a good couple of months to do since it's purely based on how you apply the IEC 62442.
It also greatly depends on what the customer needs are. The pre-prep work is actually the most important. The actual configuration is quick. However, the pre-prep work takes quite a while.
It's probably one of the best devices you have for ROI, especially regarding the current security landscape that we are in with the current kinds of security threats and stuff flying around. FortiGate is one of the best solutions regarding your return on investment.
If you look at the way that you'll typically have to try and clean systems, let's say, if you were infected with very bad ransomware, the amount of cost and effort and money that you'll have to spend in order to clean all your systems and get all your IT equipment and everything running in top form condition.
If you don't have a FortiGate unit protecting you, and you compare that to installing a proper FortiGate unit with all the correct modules and stuff like that, your ROI on it is much better than trying to clean everything after an attack. It's definitely well worth your investment.
There are different types of licensing. It depends on what kind of licensing you decide to take, if it's on an annual basis or if it's a three-year basis. It also depends on what modules you have selected in your firewall.
If you have the next business day on-site warranty, and if you have the actual hardware replacement, the normal RMA on devices like Cisco and those devices where the device fails, the company comes out and swaps the device out for you free of charge, that comes at a price.
It greatly depends on what options you take with their warranties and guarantees and stuff. It's very difficult to say what the licensing is until you break down which module you will take.
You need to buy the modules or the add-ons based on your needs. Licensing then will be directly connected to that. It’s like purchasing Windows. You can just buy Windows. However, you won't get Office working necessarily. It's the same with the FortiOS licensing. You buy the OS; then you buy everything you want to run on it.
You can just buy the operating system, the FortiOS. However, it won't give you IPS or any other advanced firewall rules. That will be an additional cost on your licensing.
They are slightly on the pricey side. They are affordable. However, they are not cheap. I’d rate them a two out of five in terms of affordability.
All of the infrastructure is hosted locally on-prem. We can't host it in the cloud due to security reasons.
We’re resellers more than partners. We provide the solution to customers. It's an industrial process environment.
Whether we use the latest deployment or not depends on the customer. However, we prefer to not install the latest version. We typically install two or three versions backward. The reason is, that your latest versions typically have a lot of bugs that are not necessarily known yet. Since this is a process plant, which is not directly connected to the internet, effectively, you go through a Purdue model, which connects to layer three or layer four before they get to the corporate network.
That then will break them out to the internet. The risk model for that is okay to have them not on the latest version. Also, since it is a process environment, literally, it's a process plant; it's an industrial process plant. The performance and uptime is king, not so much anything else. In a normal corporate environment, uptime and security is king. However, in a process environment, you need to keep the plant running 24/7 in order to pay the bills. The way that you look at how you install the product is quite a bit different than normal enterprise IT.
I’d rate the solution ten out of ten.
It is the best solution for users if they start out in a secure environment. They just need to make sure that they partner up with the correct partner that can guide them through the processes of obtaining the correct device and obtaining the correct training for themselves in order to use the device. That said, it's a highly recommended device to use from a perspective of security, usability, and installability.
We're using the solution for firewall segmentation, including segmentation of the network, authentication purposes, logins, et cetera.
Compared to other firewalls, segmentation is much easier in FortiGate.
The initial setup is straightforward.
The support could be better. Their first-level support is often poorly trained.
We don't have any other requirements in terms of needing new features.
I've used the solution for ten years.
The solution is stable. There are no bugs or glitches. It doesn't crash or freeze.
It's scalable. The model we bought is highly scalable. However, if you buy a device on the low end, it may not be scalable. You need to consider what you need in advance and buy more than you need if you believe you will need to scale.
Technical support is okay. Compared to Palo Alto, they need to improve a bit. Palo Alto is better. The first-level team isn't very knowledgeable.
Neutral
I work with Palo Alto, Cisco, Fortinet, et cetera.
The initial setup is very simple and straightforward. It's not overly complex or difficult. You only need one person to implement the solution.
The deployment will take only one hour, however, the policy web creation based on the user requirements may take time. That is the nature of every firewall. Usually, the deployment takes only one to two hours.
We handled the setup in-house. We didn't need any outside assistance.
I don't directly deal with licensing. I can't speak to the exact costs.
I'm an end-user. I used to be a partner.
We're using the latest version of the solution and update regularly.
I'd rate the solution seven out of ten.
We use Fortinet FortiOS to protect our office, and we have another deployment in production. We have the PCI DSS environment on which we have deployed the Fortinet Firewall.
I am satisfied with Fortinet FortiOS. It's a cool product and has a lot of UTM features. It has application control, web filtering, antivirus, IPS/IDS, DNS filtering, and many things in that firewall. It also has a web application firewall WAF feature. On the feature side, it's a good firewall.
It would be better if AWS instances were available. If I want to upgrade from T2.small to T2.medium, it should be available rather than having a big instance and paying a lot of money for that.
The issue is that we had deployed in AWS Cloud, and we were using a very small instance. Recently we wanted to move in-house and deploy it on the big instance because it was struggling with the RAM. If we use T2.small, we cannot upgrade it to the T2.medium. It has predefined instances in the marketplace with a lot of cost differences.
If I can increase the RAM, I have to choose the T3.large instance. If I'm paying $270 for the small instance, I have to pay more than double the cost for T3.large. It is about $850, and this is not good. So, it would be better if it was cheaper.
I think both AWS and Fortinet should think about that. They should provide it on lower instances as well. If I want to upgrade it from T2.small to T2.medium, it should be available, but it's a problem.
I have been using Fortinet FortiOS since 2019, so more than three years.
Fortinet FortiOS is a stable product.
Fortinet FortiOS is scalable.
Technical support is good. When I create the ticket, they respond to me, engage the engineer, and support is good. No issue at all.
The initial setup is not too complex; it's simple.
It would be better if it were cheaper. We have the firewall in our office, and the license is expiring in 20 to 25 days. We got a quote for almost 80,000 Pakistani Rupees, which is a little costly.
If I compare Fortinet FortiOS with Cisco Adaptive Security Appliance (ASA), it's a cool product. The deployment of ASA is a little bit complex because it's GUI-based, and ASA also has a graphical user interface. But I still think Fortinet is a good firewall compared to ASA because if you want to use the IPS/IDS feature in the ASA, you have to deploy the management center and integrate it with the firewall, which is a little complex.
I recommend this solution to potential users because it has many features, and it's a stable product.
On a scale from one to ten, I would give Fortinet FortiOS an eight.
We use it for end-point gateway protection and also use the FortiOS for external user connection and server VPN. We love that clear synchronization as it's almost invisible with the fabric for the guests, externally to connect. The zero-choice engine that they use is pretty good. It is perfect for setting up one-to-one channels for different services that have to pass through the firewall. So it does that seamlessly.
The most valuable features of Fortinet FortiOS are its constant updates and definitions. The new definitions and the content information coming out to the threat labs keeps you updated on your signatures so that you know what's happening out there. And also doing well, for my system, we have, like, what is called, active scans.
It's constantly accessing Sophos into your gateway, even Sophos that you authorized.
I want to see a better integration or a better integration with the endpoint protection or with EDR with the security life cycle. I want to see if that enhances a bit more so I have granular datasets and the user level through to the gateway because that's where most of our threats come from. It's from user activities on the Internet and passes into your files over that gateway. That's where most of our threats would appear and where our exposure to vulnerabilities lies.
So if we can tighten that up, we can harden our infrastructure much better.
I have been using the solution for quite some time.
The customer support team is good and responsive.
We did the initial setup ourselves, so it was easy. The learning curve was that great once you have any experience with any firewall or any experience with any security appliance, you can pull around it. We did get some help from our providers. But that was basic.
The EMS setup was all in-house. Our service provider assisted with the firewall setup. The implementations were very smooth. And the transition of our current from our current security device to that when we did it a couple of years ago, it's seamless.
The pricing is competitive for the medium and high markets but for the small markets it can be expensive.
You have to see what works best for your environment. Each environment is different depending on the applications and different services you are running in that environment. Suppose it's a full Windows environment versus a mixture if you have a hybrid environment. It all depends on the type of environment you're running and finding the right tools that meet your domain.
But for the regular Windows environment, it's perfect.
I rate it eight out of ten.
