We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"I like the firewall features, Snort, and the Intrusion Prevention System (IPS)."
"We have not had to deal with stability issues."
"I have experience with URL filtering, and it is very good for URL filtering. You can filter URLs based on the categories, and it does a good job. It can also do deep packet inspection."
"The Firepower+ISE+AMP for endpoint integration is something that really stands it out with other vendor solutions. They have something called pxGrid and i think it is already endorsed by IETF. This allows all devices on the network to communicate."
"The dashboard is the most important thing. It provides good visibility and makes management easy. Firepower also provides us with good application visibility and control."
"It is one of the fastest solutions, if not the fastest, in the security technology space. This gives us peace of mind knowing that as soon as a new attack comes online that we will be protected in short order. From that perspective, no one really comes close now to Firepower, which is hugely valuable to us from an upcoming new attack prevention perspective."
"I have access to the web version of Cisco Talos to see the reputation of IP addresses. I find this very helpful. It provides important information for my company to obtain the reputation of IP addresses. The information in Talos is quite complete."
"The most valuable feature that Cisco Firepower NGFW provides for us is the Intrusion policy."
"The most valuable feature is the web filter."
"The next-gen features, the unified threat management capabilities are something that just about everybody is interested in at this point."
"The product offers very good security."
"It is a safe product."
"The solution can scale well."
"The most valuable feature is the ease of use."
"The notable features that I have found most valuable are that it includes the antivirus, and also IPS, and even SD-WAN."
"The features that I have found most valuable are that it is good to use, and most importantly, the pricing. The customer especially likes the discount when they trade up or something like that."
"The feature with SonicWall that I have found most valuable is that all the models have the same interface. We don't need to learn different interfaces in the smaller or bigger models."
"We like their interface very much. It's pretty easy to use."
"It lets me monitor in live time if someone is 'hogging' bandwidth."
"With the main firewall routing there, we can do connectivity point-to-point. On the low bandwidth we can connect in all the branches with my corporate office."
"Most of the features are useful. It is easy to configure and easy to troubleshoot. I can see the utilization of different networks, and there are also App control features."
"Technical support is good."
"The best thing about the product is the very good threat prevention output."
"We are able to block whatever we want to block by using this product. It provides all required security features, such as content filtering, VPN, in one box. Before switching to SonicWall, we had specified all required features."
"The initial setup was a bit complex. It wasn't a major challenge, but due to our requirements and network, it was not very straightforward but still easy enough."
"The initial setup could be simplified, as it can be complex for new users."
"This product is managed using the Firepower Management Center (FMC), but it would be better if it also supported the command-line interface (CLI)."
"The initial setup can be a bit complex for those unfamiliar with the solution."
"I would like it to have faster deployment times. A typical deployment could take two to three minutes. Sometimes, it depends on the situation. It is better than it was in the past, but it could always use improvement."
"Report generation is an area that should be improved."
"Implementations require the use of a console. It would help if the console was embedded."
"The intelligence has room for improvement. There are some hackers that we haven't seen before and its ability to detect those types of attacks needs to be improved."
"We were not able to build a full-mesh VPN; however, I am not sure if this was the fault of Fortinet FortiGate."
"There are a lot of bugs I have found in the solution and it is difficult to upgrade. These areas need improvement."
"In the next release, I would like to see the interface simplified to be more user-friendly."
"The performance and speed are aspects of the solution that could always be improved upon."
"It should be more stable. There should be full integration within Fortinet products themselves as well as with other third-party products. Especially when you're not dealing with SIEM and the correlation of the security box, we want Fortinet to be able to share that information with as many other products as it can."
"The support structure needs to be improved because every time we contact them, there is a delay in the response."
"The feedback that I have received is that the performance could be better, and the user experience is not as good compared to a previous solution we used. It could be more user-friendly. Of course, it still works fine for our operations."
"The sniffing packets or packet captures, can be simplified and improved because it's a little confusing."
"The price could be better for us in Bolivia."
"The technology in this particular version is very old."
"Its reporting can be improved. Currently, we cannot directly get the user names. It only shows the IP, which makes it a bit confusing because we need to use the IP to find the user. If we could directly get the name of the user, it would be better."
"The monitoring is a little bit confusing."
"The areas we would like to see improvement include more features available similar to the equivalent FortiGate appliance, e.g. SSL encryption and inspection. Two-factor authentication capability would be another additional feature that could be included in the next release."
"In general, the company needs to think contingently and integrate more security options."
"GUI interface could be improved."
"Sonic Analyzer could be improved. It's difficult to manage and not very intuitive."
"The price of Firepower is not bad compared to other products."
"Cisco pricing is premium. However, they gave us a 50 to 60 percent discount."
"Pricing is the same as other competitors. It is comparable. The licensing has gotten better. It has been easier with Smart Licensing."
"There are additional implementation and validation costs."
"The solution was chosen because of its price compared to other similar solutions."
"Its price is in the middle range. Both Firepower and FortiGate are not cheap. Palo Alto and Check Point are the cheapest ones. I don't remember any costs in addition to the standard licensing fees."
"Its pricing is good and competitive. There is a maintenance cost. It includes SecureX that makes it cost-effective as compared to the other solutions where you have to pay for XDR and SOAR capabilities."
"When we are fighting against other competitors for customers, whether it is a small or big business, we feel very comfortable with the price that Firepower has today."
"The licensing costs are very low."
"Setup cost may be not so low, as you expect, because it depends on different factors, but TCO for 5 years may pleasantly surprise you."
"The price of the license and warranty can be better because it is very expensive."
"It's expensive, but compared to the competition it's okay."
"The pricing is fair."
"It is too expensive for us. My organization is very small, and we have a total of ten users. We have three internal users and seven external users. The FortiGate 100D series is too expensive for renewing the licenses."
"For our organization, the licensing costs are approximately $7,000 per year."
"The price of FortiGate is average and I would say that based on the top five products available on the market, it is in the affordable range."
"It is a bit expensive. We have to purchase the license and the reporting part separately, which makes it a bit pricey. This is the main reason why we have thought of moving to another firewall. It would be good if they combine both of these."
"The price could be better for us in Bolivia."
"Customers are required to pay for a yearly subscription."
"The price is fair."
"Its pricing is okay as compared to other solutions."
"The license that we purchased is good for three years."
"The price is fair for the solution for the quality you receive."
"Its price is very high, which makes it difficult to convince the clients to buy this solution."
Cisco NGFW firewalls deliver advanced threat defense capabilities to meet diverse needs, from
small/branch offices to high performance data centers and service providers. Available in a wide
range of models, Cisco NGFW can be deployed as a physical or virtual appliance. Advanced threat
defense capabilities include Next-generation IPS (NGIPS), Security Intelligence (SI), Advanced
Malware Protection (AMP), URL filtering, Application Visibility and Control (AVC), and flexible VPN
features. Inspect encrypted traffic and enjoy automated risk ranking and impact flags to reduce event
volume so you can quickly prioritize threats. Cisco NGFW firewalls are also available with clustering
for increased performance, high availability configurations, and more.
Cisco Firepower NGFWv is the virtualized version of Cisco's Firepower NGFW firewall. Widely
deployed in leading private and public clouds, Cisco NGFWv automatically scales up/down to meet
the needs of dynamic cloud environments and high availability provides resilience. Also, Cisco NGFWv
can deliver micro-segmentation to protect east-west network traffic.
Cisco firewalls provide consistent security policies, enforcement, and protection across all your
environments. Unified management for Cisco ASA and FTD/NGFW physical and virtual firewalls is
delivered by Cisco Defense Orchestrator (CDO), with cloud logging also available. And with Cisco
SecureX included with every Cisco firewall, you gain a cloud-native platform experience that enables
greater simplicity, visibility, and efficiency.
Learn more about Cisco’s firewall solutions, including virtual appliances for public and private cloud.
The FortiGate family of NG firewalls provides proven protection with unmatched performance across the network, from internal segments, to data centers, to cloud environments. FortiGates are available in a large range of sizes and form factors and are key components of the Fortinet Security Fabric, which enables immediate, intelligent defense against known and new threats throughout the entire network.
Fortinet FortiGate is ranked 1st in Firewalls with 96 reviews while SonicWall TZ is ranked 10th in Firewalls with 31 reviews. Fortinet FortiGate is rated 8.4, while SonicWall TZ is rated 8.4. The top reviewer of Fortinet FortiGate writes "Stable, easy to set up, and offers good ROI". On the other hand, the top reviewer of SonicWall TZ writes "Easy to implement, fairly stable, and supports SSL-DPI". Fortinet FortiGate is most compared with Cisco ASA Firewall, pfSense, Meraki MX, Check Point NGFW and Sophos UTM, whereas SonicWall TZ is most compared with Cisco ASA Firewall, Sophos XG, Meraki MX and pfSense. See our Fortinet FortiGate vs. SonicWall TZ report.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.