Palo Alto Networks VM-Series and Check Point NGFW are top contenders in the cybersecurity market. While Palo Alto Networks VM-Series excels in several key areas, Check Point NGFW provides strong competition with its own set of features and benefits.
Features: Palo Alto Networks VM-Series is recognized for deep packet inspection, robust automation capabilities, and comprehensive security tools. Check Point NGFW is highlighted for advanced threat prevention, intuitive policy management, and a simpler configuration process.
Room for Improvement: Palo Alto Networks VM-Series needs better integration with third-party tools, enhanced reporting functionalities, and improvements in user interface design. Check Point NGFW requires better technical support, a smoother upgrade process, and enhancements in documentation clarity.
Ease of Deployment and Customer Service: Palo Alto Networks VM-Series is easier to deploy and has strong customer service support. Check Point NGFW faces a more complicated deployment process but users report satisfactory support.
Pricing and ROI: Palo Alto Networks VM-Series has higher setup costs but users feel the ROI justifies the investment due to its extensive features and performance. Check Point NGFW is noted for its competitive initial pricing, although some users find the ROI less compelling compared to Palo Alto Networks VM-Series.
The response time for a critical priority one issue was over four hours and they only responded because we threatened legal action for them violating our support contract.
They say they will respond in 24 hours, but I have received responses in a maximum of one hour, which is impressive.
The technical support from Fortinet FortiGate is 24 hours a day seven days a week, and 365 days a year.
The support team we engaged was knowledgeable and well-versed with the application.
I rate technical support from Check Point at ten out of ten.
When I can't resolve an issue technically, I consult with a senior engineer.
FortiWAN supports OSPF but does not support the BGP protocol.
Fortinet VPN and DDoS capabilities are great, yet we need to provide a solution that enables CASB and integration to the cloud.
The relationship between their accounts team and my leadership team seems to be the reason for phasing out FortiGate.
Check Point would benefit from having a single console for both basic and policy configurations.
The graphical user interface (GUI) could benefit from some updates.
In the rule creation process, we need to decide on the source address, destination address, and services.
The devices will usually fail way before reaching the capacity advertised in the data sheets, especially when you activate several of the features the device can handle.
The solution is working and it is still stable even across all of these devices and servers.
We have over 10,000 users behind it.
Scalability must be carefully planned for, considering future growth and user base increases.
It enhances performance with high availability, shifting to a secondary firewall if one fails.
The cost of the original deployment fell below £5,000, and licenses are priced at around £3,000.
Every time you upgrade your license, you also get insurance for the equipment.
Overall, FortiGate is affordable.
In comparison to Fortinet and other products, the pricing may be considered high.
We found the pricing reasonable, ensuring the product was not overpriced.
All of these issues were resolved in v5.2.
Stability has dramatically improved over the previous main version branch of FortiOS; 5.2.x and 5.4.x are stable enough for critical environments.
Overall, the devices have been very stable.
While the solution is generally stable, there are complications, such as requiring SmartConsole for deployment and upgrades, which can be time-consuming.
The two most valuable features are VPN and firewalling.
WiFi network for visitors isolated from our corporate WiFi network using only one unit
Allows for firewall rules to be programmed and named in a way that makes it 'readable'
The firewall's default behavior of blocking all traffic, including a cleanup rule that blocks everything from external to internal sources, is highly valuable for protecting our network.
One of the most valuable features is the ability to whitelist and blacklist sources to control access to our ecosystem, ensuring secured SaaS application access.
In the normal GA login, I can create interfaces and configure interface IPs, while in the SmartConsole, I manage the NAT quality and firewall access.
Fortinet FortiGate offers comprehensive network security and firewall protection across multiple locations. It effectively manages data traffic and secures environments with features like VPN, intrusion prevention, and UTM controls.
Organizations rely on Fortinet FortiGate for its robust integration with advanced security policies, ensuring significant protection for enterprises, cloud environments, and educational sectors. It facilitates network segmentation, application-level security, and authentication management, securing communication within and between locations such as branches and data centers. Its efficient SD-WAN and UTM features enable streamlined data management and enhanced threat protection capabilities. Users appreciate its centralized management, facilitating seamless operations across diverse environments.
What are the key features of Fortinet FortiGate?Fortinet FortiGate is crucial in sectors like education, offering robust networks for secure data flow between campuses and facilitating remote learning. In enterprise environments, it allows efficient management of application traffic and security across multiple branches, while in the cloud, it seamlessly integrates with diverse platforms to enhance security infrastructure.
Check Point NGFW provides comprehensive firewall protection, managing VPNs, and securing network perimeters with advanced threat prevention techniques. It's widely used to protect businesses, data centers, and ensure secure traffic management.
Check Point NGFW offers robust security for companies, delivering security features like threat prevention, URL filtering, and intrusion prevention across both layer 3 and layer 7. It supports remote access, web filtering, application control, and safeguards against malware, botnets, and zero-day attacks. With its intuitive management console, deep packet inspection, centralized management capabilities, and sophisticated threat detection, Check Point NGFW enhances network security and productivity. The system integrates seamlessly with other technologies and provides real-time monitoring, detailed reporting, and automated policy management. Additionally, its setup is straightforward, it scales well, and offers comprehensive logging.
What are the key features?Check Point NGFW is implemented in industries like finance, healthcare, and retail, where protecting sensitive data and ensuring compliance are critical. Its advanced security features and ease of management make it suitable for large enterprises and data centers, ensuring reliable and secure network operations.
Palo Alto Networks VM-Series is a highly effective advanced threat protection (ATP) solution and firewall that can be hosted on cloud computing technologies designed by many different companies. It decreases the amount of time that it will take administrators to respond to threats. Users that deploy VM-series have 70% less downtime than those who use similar firewalls. Neither protection nor efficiency are concerns when this next-generation firewall is in play.
VM-Series is being deployed to protect both public and private cloud environments. This level of flexibility empowers organizations to run the environment or environments that best meet their needs without worrying that they are going to be exposed to digital threats due to the environment that they choose.
In the public cloud, users of Palo Alto Networks VM-Series can automate their deployment and dynamically scale up their environment while experiencing a consistent level of protection. This dynamic scalability means that they also integrate their security into their DevOps workflows so that their security can keep up with their activities and requirements. Users of private cloud environments can set up security policies that can be automated to be provisioned as the need arises. Organizations don’t need to slow down when they deploy VM-Series because it makes the task of defending them so simple that they can set their defenses and forget that they are even there.
Users gain a deep level of visibility when they deploy Palo Alto Networks VM-Series. App-ID technology enables organizations to see their network traffic on the application level and spot threats that might be trying to sneak in through vulnerable points in their defenses. It also leverages Palo Alto Networks WildFire and advanced threat protection to block the threats before they can escalate.
Palo Alto Networks VM-Series Features:
Reviews from Real Users:
Palo Alto Networks VM-Series is a solution that stands out when compared to other similar solutions. Two major advantages that it offers are its ability to protect users without degrading the efficiency with which their networks perform and its centralized management system.
Jason H., the director of information technology at Tavoca Inc, writes, “There is no noticeable trade-off between security and network performance. In fact, so far, we've not seen any negative network performance with it. We're very impressed in that regard.”
An information technology manager at a tech services company says, “We use Palo Alto’s Panorama centralized management system. We have an on-prem firewall where Panorama is very good for pulling logs in from the cloud so we can see what is going on. It gives us visibility into that as well as shows us what attacks are coming in. Palo Alto’s Panorama centralized management system simplifies our security posture based on our requirements. Instead of manually pulling logs, then generating them into readable formats, it gives us the console in a readable format to view.”
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.