Meraki MX and Palo Alto Networks NG Firewalls both excel in the network security category with their advanced management features. Based on user feedback, Meraki MX holds an advantage in ease of deployment, while Palo Alto leads in advanced threat prevention capabilities.
Features: Meraki MX stands out for its simple deployment process, centralized cloud management, and intuitive dashboard with automatic firmware updates. Features like Meraki's site-to-site VPN and content filtering enhance user experience. Palo Alto Networks NG Firewalls offer powerful threat prevention, app control, and machine learning capabilities. With advanced security tools like WildFire and GlobalProtect, they provide customizable security solutions.
Room for Improvement: Meraki MX could benefit from enhanced local port control and improved logging capabilities, as well as more advanced networking features such as SSL inspection and load balancing. Palo Alto Networks NG Firewalls could improve user interface simplicity and the quality of customer support, as users find configuration complex.
Ease of Deployment and Customer Service: Meraki's cloud-managed system offers a streamlined deployment process with high user satisfaction regarding customer service, known for its responsiveness and expertise. Although Palo Alto offers robust hybrid deployment options and satisfactory support services, users encounter complexity and a steeper learning curve during setup.
Pricing and ROI: Meraki MX is priced on the higher end but justified by its reduced administrative time and efficient management system, providing a strong ROI. Palo Alto Networks NG Firewalls are also costly; however, the extensive security features they offer validate the expense. Their scalability and comprehensive threat mitigation tools provide significant value.
Clients are now comfortable and not wasting productive hours on IT support.
We have experienced a positive return on investment by utilizing Fortinet's products.
There's definitely an ROI. Having a centralized way of managing and applying policies across the entire organization always helps.
Their user-friendly interface and Panorama central management, which provides a comprehensive overview, make them an ideal investment.
The solution helped reduce downtime, which is crucial in time-sensitive industries like manufacturing.
He explained that it required a command line configuration, as it couldn't be done through the graphical user interface.
I would rate their support for FortiGate a nine out of ten.
They offer very accurate solutions.
Their response time is within one hour.
They offer fast and competent assistance.
They provide fast response and rapid remediation of problems.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The processor, the microprocessor and the security processors are very intelligent so they can scale significantly and manage that well.
There are many options available, and we can choose the size of the box based on our requirements.
We have Juniper solutions, and I would say the Juniper solutions can scale better, however, this solution is still very scalable.
Cloud deployments benefit from auto-scaling, allowing for automatic adjustments to firewall capacity based on demand.
It is important to assess the infrastructure size before choosing a model.
Palo Alto Networks NG Firewalls are scalable and reliable.
There are no bugs or glitches, and it doesn't crash or freeze.
Improper handling of these can lead to a memory surge, a well-known bug that can cause the entire system to freeze.
It is less stable than Palo Alto Networks and Check Point firewalls because there are lots of bugs in the latest firmware.
With appropriately configured policies, these firewalls can provide robust network security.
After the upgrade, we are experiencing performance issues.
I have not experienced any outages or issues.
If I have put 10 GBPS of throughput on a firewall and I enable all of these features available, such as IPS or UTM functionalities, the throughput comes down to 1 GBPS.
By providing an integrated solution, users would have access to all features and functionalities within a single window, eliminating the need to navigate through multiple windows.
Investing in a solution that can accommodate such growth would be more cost-effective than repeatedly purchasing new hardware.
Data is the only path, so optimization is essential.
When performance degrades due to full packet inspection, the solution should be to increase the computing power within the same firewall, not to recommend upgrading to a larger, more expensive model.
Further integration into a unified system could improve usability.
Palo Alto Networks NG Firewalls lack built-in multi-factor authentication, requiring the purchase of a third-party tool to implement this essential security feature.
Secure SD-WAN is free of charge.
The most expensive part is the renewal of the license subscription.
FortiGate is priced lower than Palo Alto.
In terms of pricing, I would say it is not the cheapest, but it was comparable to the others.
It is neither expensive nor cheap.
Palo Alto Networks NG Firewalls are expensive.
Palo Alto Networks NG Firewalls come at a premium, exceeding the cost of most competitors by 45 percent.
Colleagues looking for the cheapest and fastest firewall can still use Palo Alto Networks NG Firewalls because they are affordable.
Fortigate blocks unusual traffic and therefore secures our network.
It's easy to monitor the end-to-end network through the firewall.
The firewall, IPS, and VPN functions are the most valuable features.
We understand that Cisco solutions are very reliable, and we really like the simple management.
Since cybersecurity is my main concern, this type of miscommunication relating to vulnerability blocking is crucial.
The most valuable features of Palo Alto Networks NG Firewalls are DNS sync calls, enabled security features, and Wildfire.
Threat Vault allows us access to a comprehensive threat database, enabling us to get detailed information on threats and how to mitigate them.
The most valuable feature of Palo Alto Networks NG Firewalls is Cortex Data Lake.
Fortinet FortiGate offers comprehensive network security and firewall protection across multiple locations. It effectively manages data traffic and secures environments with features like VPN, intrusion prevention, and UTM controls.
Organizations rely on Fortinet FortiGate for its robust integration with advanced security policies, ensuring significant protection for enterprises, cloud environments, and educational sectors. It facilitates network segmentation, application-level security, and authentication management, securing communication within and between locations such as branches and data centers. Its efficient SD-WAN and UTM features enable streamlined data management and enhanced threat protection capabilities. Users appreciate its centralized management, facilitating seamless operations across diverse environments.
What are the key features of Fortinet FortiGate?
What benefits should users expect from Fortinet FortiGate?
Fortinet FortiGate is crucial in sectors like education, offering robust networks for secure data flow between campuses and facilitating remote learning. In enterprise environments, it allows efficient management of application traffic and security across multiple branches, while in the cloud, it seamlessly integrates with diverse platforms to enhance security infrastructure.
Cisco Meraki MX appliances are next-generation firewalls with all the advanced security services needed for today’s IT security. The appliances are ideal for organizations considering a unified threat management (UTM) solution for branch offices, data centers, distributed sites, or campuses. Since Meraki MX is 100% cloud-managed, installation and remote management are simple and zero-touch.
Meraki MX’s hardware and virtual appliances are configurable in Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform, and private cloud support is offered through Cisco NFVIS and Alibaba Cloud.
Organizations of all sizes and across all industries rely on Meraki MX to deliver secure connectivity to hub locations or multi-cloud environments, as well as application quality of experience (QoE) through advanced analytics with machine learning.
Cisco Meraki’s advanced QoE analytics offers:
Cisco Meraki’s SD-WAN offers:
The Meraki MX’s SD-WAN is unique in that it can be easily extended to deliver optimized access to resources in public and private cloud environments with virtual MX appliances. Its SD-WAN lowers operational costs and improves the performance of remotely-accessed resources. Users can ensure the availability of the apps and services their employees use most through dynamic path selection, policy-based routing, support for application-layer profiles, and VPN.
Meraki MX offers industry-leading cloud management that has template-based settings which can scale easily from small deployments to tens of thousands of devices. It features an intuitive web-based dashboard for managing mobile devices, united firewalls, switching, and wireless LAN. Users can also benefit from role-based administration, configurable email alerts for a variety of important events, and easily auditable change logs. Meraki MX is capable of producing summary reports with device, user, and application details archived in the cloud.
Meraki MX Key Features
MX has a robust suite of network services in an all-in-one device, which saves you money by eliminating the need for multiple appliances. These services include:
Reviews from Real Users
Meraki MX stands out among its competitors for a number of reasons. Two major ones are its easy management and its ability to be accessed remotely. Below is some feedback from PeerSpot users who are currently using Meraki MX as their firewall security solution.
Craig B., a central services engineer at Liberty Technology, writes, “The web console for managing everything keeps everything on Meraki and keeps us from going somewhere else. It is why I think a lot of people like Meraki. Comparing it to SonicWall or even a different Cisco firewall, like traditional ASAs, managing Meraki is a thousand times easier because of fluidity. You don't have to rebuild a table just to change one rule. It's much more readable for a human.”
Edgardo C., an IT director, notes,”By using the VPN, we can connect remotely. We have two offices, and we could connect them through the VPN. We could establish a network between two sites, and that has improved and increased communication and productivity. Our remote site is able to access the server remotely.”
Palo Alto Networks NG Firewalls offer comprehensive security, including application control, traffic shaping, threat prevention, and load balancing, designed to secure internal networks, perimeter protection, VPN services, and cloud environments.
Palo Alto Networks NG Firewalls are a key choice for managing and protecting data centers, securing remote access, network segmentation, malware prevention, and ensuring high availability and performance for business-critical applications. Known for stability and strong security, these firewalls use application-aware identifiers and IPS/IDS subscriptions to offer advanced threat protection. The unified platform facilitates seamless integration, while GlobalProtect and centralized management via Panorama enhance ease of use. However, there are areas for improvement, including pricing strategies, training, user support, and integration with third-party applications.
What are the essential features?In industries like finance, healthcare, and retail, Palo Alto Networks NG Firewalls secure sensitive data and meet regulatory requirements. These firewalls help manage large-scale networks in these sectors, providing essential security features and maintaining high-performance standards. They are implemented to ensure compliance, protect patient information, secure financial transactions, and safeguard customer data.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.