Try our new research platform with insights from 80,000+ expert users

What firewalls do support identity-based rules?

EB
Director of Community at PeerSpot (formerly IT Central Station)
  • 4
  • 177
PeerSpot user

5 Answers

Last answered Aug 26, 2022
MB
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees
User
Oct 5, 2021
Search for a product comparison in Firewalls
Laurie Ellims - PeerSpot reviewer
Enterprise Architect at Fujitsu
MSP
Top 10
Aug 26, 2022
FT
IT Adviser/Manager with 51-200 employees
Real User
Aug 26, 2022
EH
Head of Sales and Business Development at Axalon GmbH
Vendor
Aug 26, 2022
CL
Senior IT Infrastructure Engineer at Tecnoage
User
Aug 26, 2022
Find out what your peers are saying about Fortinet, Netgate, Sophos and others in Firewalls. Updated: October 2025.
879,853 professionals have used our research since 2012.
Identity Management (IM)
Identity Management is crucial for organizations to safeguard user identities, manage authorization, and ensure compliance. It provides streamlined solutions for managing user access and protecting sensitive data. Effective management of identities minimizes security risks and enhances user experience.Identity Management solutions integrate technologies that automate and simplify identity, authentication, and access control. They are critical in supporting enterprise security frameworks by...
Download Identity Management (IM) ReportRead more

Related Q&As