We performed a comparison between Huawei NGFW and Palo Alto Networks NG Firewalls based on real PeerSpot user reviews.
Find out in this report how the two Firewalls solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It can expand easily."
"The product is very stable, easy to troubleshoot, and configure, so it has reduced the time it takes for support."
"The reporting you receive out of this appliance is excellent. You will not need an external management system."
"We use the FortiGate Sandbox to detect zero-day vulnerabilities, such as anomalies or malware, that are unknown and have not yet been discovered."
"Fortinet FortiGate is scalable for our users. Right now, we have almost 70 users. We do not have any plan to increase our usage of FortiGate. For maintaining the firewall solution, one staff member is enough."
"It has improved our organization with control data."
"The solution is very easy to understand. It's not overly complex."
"FortiGate is very simple to manage and easy to use."
"The setup is quite easy."
"The solution's implementation is pretty easy."
"The UI is quite good."
"The mapping features and traffic logging are good."
"The solution's initial setup process is easy."
"I like that the initial setup is straighforward. It's also a scalable solution."
"I am impressed with the product's antivirus features, strong encryption, policy implementation and easier installation."
"One of the best things about Huawei NGFW is its ability to integrate Azure solutions. Every year, we can add new features to the firewall. The key advantage is the integration across the entire network, so it doesn't work in isolation. For example, we can manage everything with features like the secret manager or analytic IDs. The solution is straightforward. It can also detect intrusions."
"Security is the biggest thing nowadays, including threat response, incident response, and root cause. We found that a lot of the logging and dashboard capabilities offered by Palo Alto fill the missing skill gap that you run up against. It makes it easier for our tier-two staff to get involved in some of the deeper root cause analysis. The dashboards, logs, and reports make it easier for our staff to dive right in and not get lost in what tools they should use. It's easy because they're all right there."
"The graphical interface is easy to troubleshoot because it has a drill-down sequence. It is easy to monitor traffic."
"You just need a web browser to manage it, unlike Cisco, which requires another management system."
"The most important feature is the firewall. We can make rules to filter the application layer of traffic. It's a very helpful feature."
"It has a solid network security with some robust tools. We can block unexpected attacks, especially zero-day attacks. Since they use the Pan-OS engine, they can collect attacks from all over the world and analyze them. They can then protect against zero-day attacks and unexpected attacks."
"It helps the organization function better by virtue of cleaner and more predictive Internet access and usage being conducted by the employees and constituents of the company. It helps ensure that they have a stronger security posture. It is preventive medicine If you have DNS Security in place. You will be happy you had it. If you don't have it, you may never need it. However, if you did need it, and didn't have it, you will wish that you did. It is one of those things, like insurance."
"URL filtering and WildFire features are most valuable. It is very user-friendly. It is a very solid product, and it definitely works."
"The structure is much faster and more sophisticated than Cisco."
"The feedback that I have received is that the performance could be better, and the user experience is not as good compared to a previous solution we used. It could be more user-friendly. Of course, it still works fine for our operations."
"Fortinet FortiGate could improve the user interface. There should be more functionality and options through the GUI."
"Its reporting capabilities can be improved. It should have some out-of-the-box reporting capabilities and some degree of customization. The basic reporting that it currently has is not sufficient to create more usable reports. It needs some sort of out-of-the-box reporting. They try to make customers purchase FortiAnalyzer for this kind of reporting, which is an additional cost. Other firewall vendors, such as SonicWall and Sophos, provide this sort of reporting without any additional cost."
"The room for improvement is about the global delivery time period. Usually I need to wait for almost one month to deliver it overseas. So if you can shorten the deliver time it'd be great."
"The central management for the FortiGate Fortinet Firewall needs improvement. They have the manager to do the essential management for both SD-WAN and for the security policy. They should also improve the SD-WAN function."
"I need user-behavior analytics, to find threat scenarios from inside the organization, insider attacks. That would be very helpful for us. In addition, I would like next-generation features for small and medium businesses. These businesses require UTM, all in one product. Fortinet must include it."
"It would be good if they had fewer updates."
"The support system could be improved."
"Wi-Fi scanning and Wi-Fi analysis would be useful features to include in the future."
"One issue we've encountered with Huawei NGFW is that after using a firewall for two or three years, we need to replace it. The new firewalls often have more features and better memory or throughput. However, sometimes, they lack some features that the old ones had."
"Huawei NGFW should have better reporting and a dashboard for the visibility of traffic."
"The user interface could be more user-friendly."
"One issue is integration. Huawei can't detect Indicators of Compromise (IoC). I can get a lot of information about security, but can't automatically input the EP, domain URL, and file hashes I get from Hackersworld into my blocklist."
"The solution requires a more interactive dashboard. That would make it easier than playing with configurations the way we have to now."
"The solution doesn't seem to be very mature. Our networking team says they are experiencing a lot of issues in the firewalls and some routers."
"The tool lacks features."
"Lacks mobility between on-prem and cloud based."
"The level of control and granularity in terms of rule customization could be enhanced. However, compared to our previous solution, Palo Alto provides much better drill-down capabilities."
"Palo Alto Networks NG Firewalls need better training modules. You have to do a lot of reading prior to watching the training videos, and it's good for people who are really into it. However, often you want to use a video for a TID. You want to see how to do something rather than spend 30 minutes reading and then another 30 minutes watching the class. As a result, I take third-party training classes rather than Palo Alto's training because they are a lot better."
"It would be better to have more tools to control Palo Alto Networks NG Firewalls. We don't have too many tools to access Palo Alto. For example, the IT team doesn't have access to it. We can see it physically and see if it's running or not. We need to contact a special team to receive that information. I would also like to see more reporting in the next release."
"The solution doesn't support routing in virtual firewall creation, and we want that to be enabled."
"As things are evolving, we want to make sure that Palo Alto is able to keep up with what is going on outside. They should continue to do more intelligence-related enhancements and integrate with some of the other security tools. We want to have a more intelligent toolset down the road."
"I would like to see some Machine Learning because I have observed new types of attacks that are able to bypass existing security rules."
"I would like them to bring in some features that would encourage traffic shaping or bandwidth routing, like other UTM firewalls, because the solution should be capable of limiting the bandwidth for rules."
More Palo Alto Networks NG Firewalls Pricing and Cost Advice →
Huawei NGFW is ranked 31st in Firewalls with 20 reviews while Palo Alto Networks NG Firewalls is ranked 6th in Firewalls with 164 reviews. Huawei NGFW is rated 7.2, while Palo Alto Networks NG Firewalls is rated 8.6. The top reviewer of Huawei NGFW writes "A scalable and easy-to-setup product that can be used to configure different policies for specific users". On the other hand, the top reviewer of Palo Alto Networks NG Firewalls writes "We get reports back from WildFire on a minute-by-minute basis". Huawei NGFW is most compared with Cisco Secure Firewall, Netgate pfSense, Meraki MX, Fortinet FortiOS and Palo Alto Networks VM-Series, whereas Palo Alto Networks NG Firewalls is most compared with Check Point NGFW, Azure Firewall, Meraki MX, Sophos XG and Netgate pfSense. See our Huawei NGFW vs. Palo Alto Networks NG Firewalls report.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.