SonicWall TZ and Palo Alto Networks VM-Series compete in the network security space, with Palo Alto holding the upper hand due to its superior scalability and advanced security features suitable for complex environments.
Features: SonicWall TZ offers robust threat prevention, ease of configuration, and affordability, enhancing its appeal to small to medium enterprises. Palo Alto Networks VM-Series boasts advanced threat prevention, App-ID and User-ID features, and seamless cloud integration, providing scalability and flexibility for enterprise environments.
Room for Improvement: SonicWall TZ requires enhancements in mail security, reporting tools, and support to improve scalability and performance. Palo Alto Networks VM-Series faces challenges in cloud management and third-party integrations, alongside concerns over complex deployment and antivirus functionality.
Ease of Deployment and Customer Service: SonicWall TZ is praised for its straightforward setup but has inconsistent technical support. Palo Alto Networks VM-Series offers flexible cloud deployment and generally strong technical support, although its complexity makes setup more challenging.
Pricing and ROI: SonicWall TZ is competitively priced for smaller businesses, offering good ROI despite potential increased subscription costs. Palo Alto Networks VM-Series is expensive, justified by its robust security for larger enterprises, providing substantial ROI with concerns about pricing and licensing complexity.
Clients are now comfortable and not wasting productive hours on IT support.
We have experienced a positive return on investment by utilizing Fortinet's products.
There's definitely an ROI. Having a centralized way of managing and applying policies across the entire organization always helps.
Customers can see data within a week, indicating a quick return on investment.
That is a reason to buy a firewall, and it is challenging to put a monetary value on security.
He explained that it required a command line configuration, as it couldn't be done through the graphical user interface.
I would rate their support for FortiGate a nine out of ten.
They offer very accurate solutions.
The support quality could be improved.
The technical support is very good.
It is very hard to reach, and the process can be lengthy and frustrating because support involves several layers.
Customer service is excellent.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The processor, the microprocessor and the security processors are very intelligent so they can scale significantly and manage that well.
There are many options available, and we can choose the size of the box based on our requirements.
They are easy to upgrade, and with credit licensing, they scale effectively according to demand.
If I were to rate it on a scale, it would receive nine out of ten, and with two-factor authentication, it would be ten.
There are no bugs or glitches, and it doesn't crash or freeze.
Improper handling of these can lead to a memory surge, a well-known bug that can cause the entire system to freeze.
It is less stable than Palo Alto Networks and Check Point firewalls because there are lots of bugs in the latest firmware.
Hardware is generally very stable.
In terms of stability, SonicWall doesn't have performance issues.
SonicWall TZ is definitely stable and offers a good value for money.
If I have put 10 GBPS of throughput on a firewall and I enable all of these features available, such as IPS or UTM functionalities, the throughput comes down to 1 GBPS.
By providing an integrated solution, users would have access to all features and functionalities within a single window, eliminating the need to navigate through multiple windows.
Investing in a solution that can accommodate such growth would be more cost-effective than repeatedly purchasing new hardware.
Most customers go for partner-enabled support, which involves multiple layers, leading to delays.
When managing the firewall, it involves a Strata Cloud web browser that requires improvement to enhance deployment ease and call center efficiency.
There is a need for two-factor authentication, particularly for VPN and CloudProtect.
Integration with other vendors, especially with VPNs, can be challenging and requires more effort when configuring.
SonicWall TZ could benefit from newer technology.
Secure SD-WAN is free of charge.
The most expensive part is the renewal of the license subscription.
FortiGate is priced lower than Palo Alto.
Palo Alto is expensive in terms of pricing, particularly when comparing features to cost.
The pricing is reasonable and reflects the quality of the product.
When comparing similar products across vendors, there may be a small difference in cost.
I would also position its pricing as a three, where one is the lowest price and ten is the highest.
Fortigate blocks unusual traffic and therefore secures our network.
It's easy to monitor the end-to-end network through the firewall.
The firewall, IPS, and VPN functions are the most valuable features.
We use these tools to prevent all known and unknown threats using Palo Alto Networks' Wildfire and other data filtering tools to gather information, analyze traffic, manage malicious traffic, and offer visibility, control, and attack prevention.
Palo Alto's robust threat intelligence supports new updates, and I can open cases directly with their Threat Intelligence team.
Palo Alto offers excellent security, with features such as email scanning, malware protection, and efficient VPN and antivirus capabilities.
For SMB segments, SonicWall performs well.
It was beneficial during COVID for remote work through its VPN functionality.
Fortinet FortiGate offers comprehensive network security and firewall protection across multiple locations. It effectively manages data traffic and secures environments with features like VPN, intrusion prevention, and UTM controls.
Organizations rely on Fortinet FortiGate for its robust integration with advanced security policies, ensuring significant protection for enterprises, cloud environments, and educational sectors. It facilitates network segmentation, application-level security, and authentication management, securing communication within and between locations such as branches and data centers. Its efficient SD-WAN and UTM features enable streamlined data management and enhanced threat protection capabilities. Users appreciate its centralized management, facilitating seamless operations across diverse environments.
What are the key features of Fortinet FortiGate?
What benefits should users expect from Fortinet FortiGate?
Fortinet FortiGate is crucial in sectors like education, offering robust networks for secure data flow between campuses and facilitating remote learning. In enterprise environments, it allows efficient management of application traffic and security across multiple branches, while in the cloud, it seamlessly integrates with diverse platforms to enhance security infrastructure.
Palo Alto Networks VM-Series is a highly effective advanced threat protection (ATP) solution and firewall that can be hosted on cloud computing technologies designed by many different companies. It decreases the amount of time that it will take administrators to respond to threats. Users that deploy VM-series have 70% less downtime than those who use similar firewalls. Neither protection nor efficiency are concerns when this next-generation firewall is in play.
VM-Series is being deployed to protect both public and private cloud environments. This level of flexibility empowers organizations to run the environment or environments that best meet their needs without worrying that they are going to be exposed to digital threats due to the environment that they choose.
In the public cloud, users of Palo Alto Networks VM-Series can automate their deployment and dynamically scale up their environment while experiencing a consistent level of protection. This dynamic scalability means that they also integrate their security into their DevOps workflows so that their security can keep up with their activities and requirements. Users of private cloud environments can set up security policies that can be automated to be provisioned as the need arises. Organizations don’t need to slow down when they deploy VM-Series because it makes the task of defending them so simple that they can set their defenses and forget that they are even there.
Users gain a deep level of visibility when they deploy Palo Alto Networks VM-Series. App-ID technology enables organizations to see their network traffic on the application level and spot threats that might be trying to sneak in through vulnerable points in their defenses. It also leverages Palo Alto Networks WildFire and advanced threat protection to block the threats before they can escalate.
Palo Alto Networks VM-Series Features:
Reviews from Real Users:
Palo Alto Networks VM-Series is a solution that stands out when compared to other similar solutions. Two major advantages that it offers are its ability to protect users without degrading the efficiency with which their networks perform and its centralized management system.
Jason H., the director of information technology at Tavoca Inc, writes, “There is no noticeable trade-off between security and network performance. In fact, so far, we've not seen any negative network performance with it. We're very impressed in that regard.”
An information technology manager at a tech services company says, “We use Palo Alto’s Panorama centralized management system. We have an on-prem firewall where Panorama is very good for pulling logs in from the cloud so we can see what is going on. It gives us visibility into that as well as shows us what attacks are coming in. Palo Alto’s Panorama centralized management system simplifies our security posture based on our requirements. Instead of manually pulling logs, then generating them into readable formats, it gives us the console in a readable format to view.”
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.