We performed a comparison between Fortinet Fortigate and Cisco SD-WAN based on our users’ reviews in four categories. After reading all of the collected data, you can find our conclusion below.
Comparison of Results: Based on the parameters we compared, Fortinet Fortigate seems to be the superior solution. All other things being more or less equal, our reviewers found Cisco SD-WAN rather expensive to purchase, not as secure as it should be, and somewhat difficult to deploy.
"Any technical support we needed was great."
"I have found the solution's main features are its ability to be customized, network traffic classification, and has a wide range of features that can be set."
"From my observations, Cisco has been rolling out new features every other day, so I would say their speed of innovation is one of the most valuable aspects for me."
"Cisco SD-WAN's most valuable feature is the ease of transition."
"It's very easy to manage and monitor the network's health and security using the solution."
"One of the most valuable features is that they have multiple SD-WAN options: you have Meraki for simple management solutions, you have Viptela, and you have the option of having any type of WAN interfaces. Presently, you can also have a single combined solution for both WAN as well as for voice, so you can have a voice bundle as well. These are major unique points of this solution."
"Troubleshooting is swift, allowing for fast turnaround times whenever we encounter an issue."
"I like creating policies. This way, we can better utilize our WAN circuit and get better rates. Its GUI is user-friendly, and the CLI is also great."
"I like that you are able to manage FortiGate from the FortiManager to create a more centralized environment."
"The most valuable features are simplicity, management, and that it's constantly evolving."
"What's most important is the ease of use."
"It's very easy to set up, it's very easy to make policies and, for an organization, that means you don't need IT expert in firewalls. You just need to have somebody who knows a little bit of IT, and that's it. With other products, you need someone with a "Masters" degree in firewalls."
"The web filtering facility and application control are the most valuable features from the point of view of our clients. The VPN feature is also quite popular amongst our clients. Two-factor authentication is one of the good features in Fortinet. These features are important for the current scenario of security. Security has become a necessity nowadays. With cyber-attacks becoming more common, protecting an organization's data is one of the major tasks. It is also very stable and scalable, and it is very straightforward to configure. Their technical support is also good."
"Layer-3 firewall and routing are the most valuable features."
"Overall, the pricing of the solution is very good. The product offers good value."
"The integration with Active Directory is one of the good features. Most of the customers are now looking for the Single Sign-on feature. So, being able to integrate Active Directory with the firewall is useful. It is also easy."
"This solution could be improved with a simpler implementation process and licensing model."
"Compresson deduplication should be added."
"The whole solution needs to be re-imagined. It's quite complex right now and really needs to be simplified to make it easier for those of us using it. It should offer more simplified management as well."
"The solution is a bit complicated."
"The installation is not easy. If you have experience and it is not your first time doing the installation, it can be easier."
"The price could be better. From a technical side, and everything's working smoothly. Cisco SD-WAN could be cheaper."
"The bandwidth limitations would be good to remove, but it is a policy and license situation for Cisco because the cost is very high. It would be good to have OTP implemented with VRF. It can have support for EIGRP Over the Top (OTP) VRF. I saw some limitations in regards to the VRF protocol and the advertisement between VRF configuration. EIGRP Over the Top basically was quite limited with the VRF configuration. If you wanted to do rollback in VRF by using the EIGRP OTP protocol, the formation was not populated across. Cisco got back and confirmed that it is a configuration that I need to wait for until the next release, which is going to happen in one year. Cisco documentation is not the way it used to be before. It just gives an easy way to configure, but it doesn't go into the details of the configuration. The information that you need is there, but sometimes you want to go further and get more information, but the information is quite limited. It would be good to cover a few business cases or configuration cases. They used to be there in the past."
"The product's application delivery feature needs improvement."
"The scalability could be better."
"A couple of things I've seen that need improvement, especially in terms of a hard coding. The driver-level active moment really is out-of-the-box and we have to have contact the customer support and sometimes it is difficult to resolve."
"Some of the software stability could improve."
"Technical support could be better. You don't always get the level of help you need right away."
"FortiLink is the interface on the firewall that allows you to extend switch management across all of your switches in the network. The problem with it is that you can't use multiple interfaces unless you set them up in a lag. Only then you can run them. So, it forces you to use a core type of switch to propagate that management out to the rest of the switches, and then it is running the case at 200. It leaves you with 18 ports on the firewall because it is also a layer-three router that could also be used as a switch, but as soon as you do that, you can't really use them. They could do a little bit more clean up in the way the stacking interface works. Some use cases and the documentation on the FortiLink checking interface are a little outdated. I can find stuff on version 5 or more, but it is hard to find information on some of the newer firmware. The biggest thing I would like to see is some improvement in the switch management feature. I would like to be able to relegate some of the ports, which are on the firewall itself, to act as a switch to take advantage of those ports. Some of these firewalls have clarity ports on them. If I can use those, it would mean that I need to buy two less switches, which saves time. I get why they don't, but I would still like to see it because it would save a little bit of space in the server rack."
"The support structure needs to be improved because every time we contact them, there is a delay in the response."
"The support we receive when we need to upgrade is not satisfactory and has room for improvement."
"Backup can be improved."
Cisco SD-WAN is ranked 1st in Software Defined WAN (SD-WAN) Solutions with 86 reviews while Fortinet FortiGate is ranked 2nd in Software Defined WAN (SD-WAN) Solutions with 306 reviews. Cisco SD-WAN is rated 8.0, while Fortinet FortiGate is rated 8.4. The top reviewer of Cisco SD-WAN writes "A solution for integrating services to enhance up-time, performance and lower costs". On the other hand, the top reviewer of Fortinet FortiGate writes "It's a reliable solution that's easy to install and cheaper than competitors ". Cisco SD-WAN is most compared with Meraki SD-WAN, VMware SD-WAN, Juniper Session Smart Router, Versa Unified Secure Access Service Edge (SASE) Platform and Cato SASE Cloud Platform, whereas Fortinet FortiGate is most compared with Sophos XG, Cisco Secure Firewall, Netgate pfSense, Meraki MX and OPNsense. See our Cisco SD-WAN vs. Fortinet FortiGate report.
See our list of best Software Defined WAN (SD-WAN) Solutions vendors and best WAN Edge vendors.
We monitor all Software Defined WAN (SD-WAN) Solutions reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.