Meraki MX and Check Point NGFW both compete in the network security and firewall category. Meraki MX is often preferred for its ease of use and rapid deployment capabilities, while Check Point NGFW is favored for its extensive security features.
Features: Meraki MX is known for its cloud-based management which allows simple deployment and automatic setup of VPNs. It supports advanced SD-WAN capabilities, easy configuration, and remote management. Check Point NGFW is recognized for its strong security attributes, including intrusion detection, threat prevention, application control, and the ability to enforce fine-grained security policies across the network.
Room for Improvement: Users of Meraki MX express a desire for better load balancing, enhanced VPN client features, improved reporting, and greater integration options. There's also feedback on its pricing model and advanced security feature limitations, such as SSL inspection. Check Point NGFW users highlight difficulties with technical support, setup complexity, pricing, and interface user-friendliness. Suggestions include improving integration capabilities and simplifying certain features to strengthen market competitiveness.
Ease of Deployment and Customer Service: Meraki MX stands out for its straightforward cloud-based deployment and highly rated technical support, noted for its accessibility and expertise. In contrast, Check Point NGFW provides reliable deployments in hybrid environments but often requires specialized setup knowledge. Its customer support is generally competent but has areas that need faster response and higher quality standards.
Pricing and ROI: Meraki MX is often seen as costly but delivers significant ROI due to time saved in management and deployment. The price includes cloud features and support, which some users find acceptable. Conversely, Check Point NGFW is considered expensive with a complex licensing structure. It offers high security value, though the high initial costs can be challenging for smaller businesses, despite the comprehensive security features justifying the pricing.
Clients are now comfortable and not wasting productive hours on IT support.
We have experienced a positive return on investment by utilizing Fortinet's products.
There's definitely an ROI. Having a centralized way of managing and applying policies across the entire organization always helps.
He explained that it required a command line configuration, as it couldn't be done through the graphical user interface.
I would rate their support for FortiGate a nine out of ten.
They offer very accurate solutions.
The support team we engaged was knowledgeable and well-versed with the application.
I rate technical support from Check Point at ten out of ten.
When I can't resolve an issue technically, I consult with a senior engineer.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The processor, the microprocessor and the security processors are very intelligent so they can scale significantly and manage that well.
There are many options available, and we can choose the size of the box based on our requirements.
Scalability must be carefully planned for, considering future growth and user base increases.
It enhances performance with high availability, shifting to a secondary firewall if one fails.
There are no bugs or glitches, and it doesn't crash or freeze.
Improper handling of these can lead to a memory surge, a well-known bug that can cause the entire system to freeze.
It is less stable than Palo Alto Networks and Check Point firewalls because there are lots of bugs in the latest firmware.
While the solution is generally stable, there are complications, such as requiring SmartConsole for deployment and upgrades, which can be time-consuming.
If I have put 10 GBPS of throughput on a firewall and I enable all of these features available, such as IPS or UTM functionalities, the throughput comes down to 1 GBPS.
By providing an integrated solution, users would have access to all features and functionalities within a single window, eliminating the need to navigate through multiple windows.
Investing in a solution that can accommodate such growth would be more cost-effective than repeatedly purchasing new hardware.
Check Point would benefit from having a single console for both basic and policy configurations.
The graphical user interface (GUI) could benefit from some updates.
In the rule creation process, we need to decide on the source address, destination address, and services.
Secure SD-WAN is free of charge.
The most expensive part is the renewal of the license subscription.
FortiGate is priced lower than Palo Alto.
In comparison to Fortinet and other products, the pricing may be considered high.
We found the pricing reasonable, ensuring the product was not overpriced.
Fortigate blocks unusual traffic and therefore secures our network.
It's easy to monitor the end-to-end network through the firewall.
The firewall, IPS, and VPN functions are the most valuable features.
The firewall's default behavior of blocking all traffic, including a cleanup rule that blocks everything from external to internal sources, is highly valuable for protecting our network.
In the normal GA login, I can create interfaces and configure interface IPs, while in the SmartConsole, I manage the NAT quality and firewall access.
One of the most valuable features is the ability to whitelist and blacklist sources to control access to our ecosystem, ensuring secured SaaS application access.
Fortinet FortiGate offers comprehensive network security and firewall protection across multiple locations. It effectively manages data traffic and secures environments with features like VPN, intrusion prevention, and UTM controls.
Organizations rely on Fortinet FortiGate for its robust integration with advanced security policies, ensuring significant protection for enterprises, cloud environments, and educational sectors. It facilitates network segmentation, application-level security, and authentication management, securing communication within and between locations such as branches and data centers. Its efficient SD-WAN and UTM features enable streamlined data management and enhanced threat protection capabilities. Users appreciate its centralized management, facilitating seamless operations across diverse environments.
What are the key features of Fortinet FortiGate?
What benefits should users expect from Fortinet FortiGate?
Fortinet FortiGate is crucial in sectors like education, offering robust networks for secure data flow between campuses and facilitating remote learning. In enterprise environments, it allows efficient management of application traffic and security across multiple branches, while in the cloud, it seamlessly integrates with diverse platforms to enhance security infrastructure.
Check Point NGFW provides comprehensive firewall protection, managing VPNs, and securing network perimeters with advanced threat prevention techniques. It's widely used to protect businesses, data centers, and ensure secure traffic management.
Check Point NGFW offers robust security for companies, delivering security features like threat prevention, URL filtering, and intrusion prevention across both layer 3 and layer 7. It supports remote access, web filtering, application control, and safeguards against malware, botnets, and zero-day attacks. With its intuitive management console, deep packet inspection, centralized management capabilities, and sophisticated threat detection, Check Point NGFW enhances network security and productivity. The system integrates seamlessly with other technologies and provides real-time monitoring, detailed reporting, and automated policy management. Additionally, its setup is straightforward, it scales well, and offers comprehensive logging.
What are the key features?Check Point NGFW is implemented in industries like finance, healthcare, and retail, where protecting sensitive data and ensuring compliance are critical. Its advanced security features and ease of management make it suitable for large enterprises and data centers, ensuring reliable and secure network operations.
Cisco Meraki MX appliances are next-generation firewalls with all the advanced security services needed for today’s IT security. The appliances are ideal for organizations considering a unified threat management (UTM) solution for branch offices, data centers, distributed sites, or campuses. Since Meraki MX is 100% cloud-managed, installation and remote management are simple and zero-touch.
Meraki MX’s hardware and virtual appliances are configurable in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform, and private cloud support is offered through Cisco NFVIS and Alibaba Cloud.
Organizations of all sizes and across all industries rely on Meraki MX to deliver secure connectivity to hub locations or multi-cloud environments, as well as application quality of experience (QoE) through advanced analytics with machine learning.
Cisco Meraki’s advanced QoE analytics offers:
Cisco Meraki’s SD-WAN offers:
The Meraki MX’s SD-WAN is unique in that it can be easily extended to deliver optimized access to resources in public and private cloud environments with virtual MX appliances. Its SD-WAN lowers operational costs and improves the performance of remotely-accessed resources. Users can ensure the availability of the apps and services their employees use most through dynamic path selection, policy-based routing, support for application-layer profiles, and VPN.
Meraki MX offers industry-leading cloud management that has template-based settings which can scale easily from small deployments to tens of thousands of devices. It features an intuitive web-based dashboard for managing mobile devices, united firewalls, switching, and wireless LAN. Users can also benefit from role-based administration, configurable email alerts for a variety of important events, and easily auditable change logs. Meraki MX is capable of producing summary reports with device, user, and application details archived in the cloud.
Meraki MX Key Features
MX has a robust suite of network services in an all-in-one device, which saves you money by eliminating the need for multiple appliances. These services include:
Reviews from Real Users
Meraki MX stands out among its competitors for a number of reasons. Two major ones are its easy management and its ability to be accessed remotely. Below is some feedback from PeerSpot users who are currently using Meraki MX as their firewall security solution.
Craig B., a central services engineer at Liberty Technology, writes, “The web console for managing everything keeps everything on Meraki and keeps us from going somewhere else. It is why I think a lot of people like Meraki. Comparing it to SonicWall or even a different Cisco firewall, like traditional ASAs, managing Meraki is a thousand times easier because of fluidity. You don't have to rebuild a table just to change one rule. It's much more readable for a human.”
Edgardo C., an IT director, notes,”By using the VPN, we can connect remotely. We have two offices, and we could connect them through the VPN. We could establish a network between two sites, and that has improved and increased communication and productivity. Our remote site is able to access the server remotely.”
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.