The majority of use cases have been around UTM. Initially, they were famous for their UTM solution because nobody was offering what Fortinet was offering.
We most probably use the latest version.
The majority of use cases have been around UTM. Initially, they were famous for their UTM solution because nobody was offering what Fortinet was offering.
We most probably use the latest version.
Fortinet has a very strong OS. They have a single OS through which they integrate all the networks and security operations. Our experience has been very good. Fortinet gives us a single fabric for the security and network teams. This unification has helped us a lot in providing Secure SD-WAN and other solutions, such as network switches, wireless controllers, FortiNAC, FortiAuthenticator, etc. They have a single pane of glass for all these from the monitoring and visibility aspect.
The integrated application protection provided by Secure SD-WAN is very good. Fortinet is a security-focused company. The features related to application recognition and how to enhance the performance and security of applications are pretty good.
The customers for whom we deployed FortiGate have become long-term customers of Fortinet. Even when they compare the solution with some of the other vendors, they're more comfortable with going with Fortinet and upgrading and refreshing the hardware and the software. It's a very good product, and the customer satisfaction is pretty good.
It impacts operational efficiency because we can quickly make the changes. For example, Cisco has some limitations in terms of the time it takes for any change to take effect, which impacts the operational efficiency, whereas in the case of Fortinet, they've got a very quick way of doing the changes and reverting them, which eliminates any downtimes because of the configurations. Their method for configuring and applying policies is very simple and easy. Because of that, it's very easy to do complex changes, and in the case of misconfiguration, revert those changes without much of an impact. Overall, Fortinet FortiGate brings a lot of operational improvements because of the strength of FortiOS.
Secure SD-WAN has helped us remediate threats more quickly. Normally, with the WAN solutions or the simple SD-WAN solutions, security is done on the hub side. With the Secure SD-WAN solution, we can apply security at the branch level, so unnecessary or malicious traffic doesn't reach the data centers or the hub site, which helps in improving the overall security posture. Also, we can tighten and apply a single security policy across all the branches or different segments of the WAN, which improves overall security. Fortinet offers different security measures for blocking malicious traffic and having a uniform policy across the entire organization.
Secure SD-WAN has helped reduce our mean time to detect (MTTD) and mean time to resolve (MTTR). Applying a central security policy at the branch level immediately helps us to detect any malicious traffic and block it there, so the chances of anything reaching the hub or the data center side are less. It improves MTTD and MTTR because it has a very good interface where we can easily respond to all the attacks and manipulate things. Applying security with the help of Secure SD-WAN helps to mitigate attacks from where they are originating, which improves MTTD and MTTR.
Secure SD-WAN has helped reduce help desk tickets. Because of the operational efficiency and security, there are not many issues that impact the number of tickets.
With the help of Secure SD-WAN, we can provide operational efficiency because we can apply policies on an application-level basis. With Secure SD-WAN, we can apply a security policy per application. The central security application structure helps to apply all the measures from one central place and from the cloud. Because it's connected to many intelligence centers, it future-proofs a business and improves it overall.
Fortinet has a very good solution for Secure SD-WAN. One very good feature is that they have robust and simple FortiOS through which they provide all solutions. That's their strength. There's not much complexity involved with the Secure SD-WAN solution of Fortinet as compared to Cisco's solution, which has a lot of flexibility but complexity also comes with that flexibility.
From a reporting perspective, there's room for improvement. They provide FortiAnalyzer through which one can get some enhancements, but the visibility and reporting still need slight improvement. Recently, a customer had a requirement of getting some reports on their internet usage. Palo Alto has a bit better reporting than the Cisco and Fortinet firewalls, but we cannot get granular details about the user-level security, usage, etc.
Their support also needs improvement.
I've been working with this solution for around ten years.
It's very stable.
For small and mid-level enterprises, it has been a very good solution, and that's why they captured that market. Our experience with it has been very good. It's easy to configure and deploy. In our country, their main market is small and big enterprises, but they are gradually focusing on the performance aspect. It's being used in large enterprises as well as a firewall solution.
It's scalable. There were some performance issues a few years ago, but they've fixed them for better performance, optimization, and high throughput. Performance-wise, it's very good.
Support is one of the areas that they need to look into because as compared to some of the other companies, Fortinet's support is not that responsive. The product is very stable, but their support needs to be improved. I'd rate their support a six out of ten.
Neutral
We used Cisco and Juniper. We switched to FortiGate because it offers a lot of features at a very good price point. Unlike some of the other vendors, you don't have many license restrictions. For large and medium enterprises, they provide a wireless controller, authenticator, and mail features. There are so many features integrated within FortiOS, whereas, with many vendors, you have to work with different products. It's very helpful for small organizations with tighter budgets. There's also the ease of configuration that helps to bring things online as quickly as possible as compared to some of the other solutions that have a learning curve and that take some time.
I mostly work on the pre-sales side. I discuss all the features, and then I work with the deployment team. They do the installation.
Its installation is easy. Normally, we get the scope and have the high-level design. After that, we go to the low-level design where we manage all the configuration templates. We have discussions with the customer and finalize all the policies that need to be applied at the site. We segment sites by size, traffic, application usage, etc. We apply the policies on a group basis, and then we apply the configurations on the controllers or the sites.
In our area, people are mostly interested in on-prem setup instead of cloud because not many controllers are located within the country, so the traffic has to be traversed outside the country. For banks and financial sectors, on-prem is more suitable, but small organizations can have it on the cloud.
We implement it ourselves. For small projects, one or two people are good enough because we majorly find all the things at the LLD stage. We have a team that works on the LLD and configurations, and then we've got an on-field team that takes those configurations and applies the changes. Normally, if the implementation isn't distributed across the country, not many resources are required. Two or three resources are good enough, but if it's distributed across different regions, then a larger team is required. Once we have the templates, things are posted automatically, so not much to be done at the sites. We just have to do connectivity and configure the policies. As compared to other deployments, we require much less staff for the deployment tasks.
It requires maintenance, but generally, the product is very stable and doesn't require much maintenance. Normally, there aren't many changes. If there are any issues, we definitely need to monitor and check. Most of the issues aren't related to the solution itself if you have implemented it in the right manner, so planning needs to be done in the right manner.
There's definitely an ROI. Having a centralized way of managing and applying policies across the entire organization always helps. The time to manage, operate, and resolve issues is much lower. When you have a central place to manage and do the changes, you get efficiency and time savings.
A year or two years back, its price was competitive and reasonable. That was one of the reasons that people easily switched to Fortinet. Over the last two years, the prices have increased drastically. However, the prices of others have also increased. An advantage is there from the price point but not as much as it was previously.
It's a very good product. It has all the features required for operations. We strongly recommend using Fortinet for your edge or data center security or for your SD-WAN. FortiGate is doing very well. Fortinet has been capturing the security market, and now they're capturing the market for SD-WAN as well. They're a leader in Gartner's Quadrant. Their FortiMail and FortiWeb solutions are also very good. They provide all these solutions, and we have deployed all these solutions in the market. They're working perfectly, and customers have minor complaints about them.
Currently, no SD-WAN solution is interoperable with other vendors. Every SD-WAN vendor has its own solution. There's no standardization, so there isn't much interoperability. For example, we need a controller and branch-level software or hardware. Hardware is agnostic for some vendors, but normally, vendors also have their hardware. There are a few vendors that provide hardware-agnostic SD-WAN solutions, but Fortinet has its own hardware on which the complete SD-WAN solution runs.
Overall, I'd rate Fortinet FortiGate an eight out of ten.
In our current data center, we use eight Fortinet firewalls. These firewalls serve multiple tiers of the network, including internet users, server farms, and DMZ ports. This gives us multiple approaches to our system and network. As a result, we are able to receive all reports before the analyzer.
In 2011, we were using a Cisco ASA 5540 fixed firewall. We moved to Fortinet because their UTM appliance was a next-generation firewall that offered more than one solution in a single box. This meant that we could handle the network, server, and client parts of our infrastructure with a single device. We also chose Fortinet because of the ease of its GUI and its ease of implementation in multiple locations. Currently, I have three data centers. We are using a consolidated console with a broader view of the network traffic. This is why we moved to Fortinet. We had previously used Juniper and Cisco, but we found that Fortinet offered a better solution for our needs.
We deployed the solution on-premises because, while the private sector in Kuwait has begun to move to the cloud, government entities are not permitted to do so.
I started with the firewall module, and we were using multiple boxes for multiple functions. I was using a Juniper SSL VPN. They came to us with a single-box solution that included SSL VPN, so we moved to that. Then they came up with client endpoint security, and we moved to that as well. They also introduced web filtering in Fortinet, so we moved to that as well. All of the technology that we were using previously on separate consoles is now consolidated into a single console. I can see the beauty of this product in that it has a single console that manages all of the facilities on one web page.
The firewall is top-notch. We are using SSL VPN.
When we first started, Fortinet was using a single appliance with a firewall module in the region. They later came up with many different solutions. I have also used FortiDB, but it has been discontinued. We have since removed it. We are looking forward to Fortinet considering a sandboxing solution. This would allow us to secure our database at that layer. I see the database area as being weaker. I would suggest that Fortinet add sandboxing to their solution.
I have been using Fortinet FortiGate for 12 years.
Fortinet FortiGate is stable which is why we have stuck with it for almost 12 years.
The scalability is good. In 2016, we scaled our system to ensure that we would have enough capacity for the next five to seven years. We are currently only utilizing 25 percent of the hardware processing.
We have around 900 users on our networks per second with a total active directory of 7,000.
The technical support in our region is excellent. There are three levels of support. I remember one time when my problem was not resolved by level one or level two, so it was escalated to level three which was awesome. The level three technician was able to understand the issue quickly by reviewing the chain of email logs and the available information.
Positive
We previously used Juniper and Cisco firewalls before switching to Fortinet FortiGate. We were drawn to Fortinet because of its superior control and visibility, as well as its high availability, throughput, and durability. Fortinet's FortiGate firewalls are ASIC-based, which makes them more reliable and efficient than other solutions. As a result, we were able to handle more traffic with Fortinet than with any other vendor.
The initial deployment was complex. We started with a low-level design, discussing with the vendor that we had a certain number of firewalls and concurrent sessions available on the network, and that we had remote sites. We began by implementing the boxes in the data center, then the main data center headquarters, and then the campus network, which has its own data center with a firewall module. We later installed it in one of our accessory branches in their data center. The installation was done in phases.
When the high-level design was in place, we began migrating the configuration. We used a migration tool from Cisco and Juniper, which was very smooth because it was intelligent enough to take all the network IDs, policies, and source destinations, forward based. This meant that we had fewer challenges when we started the migration.
However, we did encounter some challenges during the migration. These were not due to Fortinet, but rather to the configuration that had been migrated from the other vendor. We resolved these challenges by manually checking each policy one by one, and the issue was rectified within a couple of days.
A total of four people were involved in the deployment. Two people from our organization, one from the vendor, and one from the partner. We have to go through our partner to access the vendor.
The implementation was completed by the vendor.
Fortinet FortiGate's features and price have provided a return on investment for our organization.
The pricing is a bit more expensive than the others but Fortinet is the best in the region. They have a good hold on the market because they are everywhere.
We pay for support and licensing fees.
I give the pricing a nine out of ten.
We evaluated Palo Alto Networks, but they did not have a presence in our region, so we did not move forward with them. We also evaluated Check Point, but it is not a government-approved solution in our region.
I give Fortinet FortiGate a nine out of ten.
Fortinet FortiGate has good regional support. One of the best things about this solution is that Fortinet doesn't disappear after the sale. They keep engaging us with new technologies. For example, they recently engaged us with a SIEM and SOAR solution that allows me to have a single console for all of my security needs. I have a plan to move to this solution and consolidate all of my firewalls into a single FortiManager. This will allow me to have a more secure and efficient network.
Fortinet is not as focused on cybersecurity as some other companies, but they are very strong in network security. They are constantly coming up with new and innovative solutions that help us to protect our networks. I am very happy with Fortinet FortiGate and I would recommend it to anyone looking for a reliable and secure network solution.
We have deployed the solution in multiple locations.
Our partner is involved in maintenance, especially when a new FortiOS is released. We engage the vendor to understand the maintenance requirements, such as stability and any potential risks. We follow the vendor's recommendations and perform maintenance accordingly. We also use FortiAnalyzer to manage our logs. We delete old logs in accordance with government policy, which requires six months of data to be kept. We take care to ensure that maintenance does not affect these logs.
Fortinet FortiGate is one of the best and most affordable solutions with top-notch technology on the market. We get something that is both cheaper and of good quality with Fortinet FortiGate. Fortinet submitted the lowest-priced bid and met all of our technical requirements.
I specify, configure and deploy firewalls in organizations with 500 or fewer employees and 15 or fewer sites. Primarily I choose between Cisco, Sonicwall and Fortigate small and medium sized appliances. Occasionally I deploy virtual appliances in AWS. I prefer to use Fortigate firewalls for several reasons- remote access is simple and the included client works with MacOS Windows and IOS devices. The level of security works well for most clients and the authentication with AD/LDAP makes the solution easier to deploy. I also find that the clients appreciate the lower price point than other vendors.
We have a standard build. We give the client the laptop, and, especially with the pandemic, we send them home with the laptop or FedEx the laptop already configured, and the user is ready to go.
I don't even need to know the client's password. I can just install the software and create a profile. The client fills the profile in with simple instructions, types in their password instructions, and connects it and they're good. It's really simple.
That's why we have standardized recommending Fortinet. That doesn't mean that I don't support other solutions as well, however, the device that I like the best is the one that's easy to use for me and it's easy to use for the clients. The price point is not bad as well.
The ease of setting the solution up is a valuable aspect for us.
The most valuable aspect that differentiates it from other solutions is that the client (the SSL VPN client or the IP sec VPN client, the same clients) is included in the solution. We don't have to pay extra for the software and the clients.
I have had some issues, but no more than others and I don't have to buy an expensive add-on license to do it and it's managed and it's updated automatically. That's the key thing, that the client is included and it updates itself so I don't have to do too much to manage it and it's very transparent to the end-user.
The biggest "gotcha" is that if the client purchases what they call the UTM shared bundle, which has unified threat management on both, it's not as easy to manage if you have more than one firewall.
If I wanted a unified console, I have to pay extra. And that's the downfall. That's the only needed improvement that I would say for the Fortinet solution, is that they should have it web-based from the get-go. You should not have to buy an extra bundle or an extra device.
If I have to make an update to a web filter, and I have 12 devices, I've got to do it in 12 places. If I don't want to do that the client can pay for a pretty expensive device or virtual appliance that does that for them. It's like an expensive centralized management tool. That's the big downfall of Fortinet. It doesn't come included, you have to pay for it. Their web-based one, that's sort of just like an inventory manager. It's not really good for distributing roles. With Cisco, you don't have to do anything. The one from Aruba HD has one too. Fortinet should try to be similar to those options.
In the next release, it would be amazing if they could give a better tool for upgrading, so that if I upgrade from an older version to the other, it can read the configuration and processes it for me so that I don't have to rewrite it from scratch. In FortiConverter, they have a tool like this, however, it doesn't work well. It's really more for bringing items in from other vendors, not from one version to the other.
That was my last experience where they operated from version five to six. However, that's really the only big thing. The main thing is to include the FortiManager cloud software like Cisco does. To have one solution. If you paid $150 a year for the support, you might as well get that too so I could manage all the devices at one spot. They do have FortiCloud, however, it's not the same as the way Cisco does it. They are selling another product called FortiManager. FortiManager should be included with the support, and that would make it more of a business solution, rather than a feature request.
I would say that I have been using the solution for over 10 years. It's likely been between 10 and 15 years at this point.
Fortigate firewalls are very reliable- in the past 15 years I believe only 2 devices in a 100 have failed. The failures were due to harsh environments (dust and water will ruin any electronic device). The input I can give to any technology person or client looking to choose a firewall / threat management device I would highly recommend the stability / reliability of fortigate. Once installed it will do it's job efficiently and effectively for several years.
I will tell a client not to go with Fortinet if they have no firewall or they have a very, very old firewall. If this is from scratch, I'd say let's not go with Fortinet, let's go with Meraki if you have the money. I always say create the budget for it if you have a lot of sites, as Cisco does a better job if you have a lot of sites. If you have two sites, then it's fine to go with Fortinet. It'll scale to that scale. However, if you want to go over a couple of sites, it's not the best option.
The solution's initial setup is straightforward. It's actually gotten better. I got good at doing it from scratch from the command line, or even from the GUI with all the 50 steps to set up stuff. However, now they're wizards and it's much better. It was the thing that probably a lot of people commented on initially, and they just worked hard to fix it. They updated the software from version four to five to six. They did a good job at making it easier.
If the client had a lot of downtime or a lot of issues with older equipment, or they did not like the fact that they had to pay every year just to be able to use the device, then the return on investment of spending $900 for a Fortinet 60E per site for a three-year contract will hands-down beat pretty much anybody.
It is definitely set it and forget it. There's very little input. You'll save money on consulting. If you were to call me and you're doing Juniper or you're doing Palo Alto, there's a lot more configuring and it's a lot harder to add stuff and therefore, as a consultant, I make more money, and I'm being serious. Once I set up a Fortinet I really don't have to touch it for years.
Maybe I have to log in to check that I need to do an update, however, in that case, they usually send me an email saying hey, your license key is up and maybe you want to buy a new one. I take the old one out and put a new one in, that's when I get paid again. It's boiled down to that.
I'm not only an authorized reseller. I am a consultant that uses their equipment and recommends them on a routine basis. I am not a Fortinet partner, however.
I use a series of FortiGate products, including the 60, the 90, and the 100. Some of them are E's, some of them are S's; it all depends. However, they have pretty much the same user interface.
If a company is considering the solution, I'd advise that they consider purchasing the FortiManager if they really like the feature set and the way that Fortinet works. For example, a company we work with has these large scale solutions, and they use FortiManager. If you're a very large implementation, definitely look into Fortinet. If you're small, for example, under 20 devices, consider joining Cisco Meraki as it's so much easier. That's what I would tell any client.
FortiManager and FortiGate are really good. If you like the way the GUI works it's more flexible than Cisco. There are more bells and whistles, however, Cisco is going to be the way to do it if you're going to do 50 sites. If you were to do a lot of sites, consider Cisco. If not, you can do Fortinet.
At the end of the day, the solution is very flexible, and if the client has special business partners that want a special type of nailed up VPN or special configuration for the clients, it offers that. The lesson I learned using the solution was to go with the solution that's most flexible for the client and at the same time is as low touch as possible. That's why I've standardized on FortiGate, as it's low touch for me and I'd rather spend time fixing other stuff or troubleshooting the other problems for clients than this particular solution.
You want to spend less time fighting with your remote access solution or your firewall solution and work on other problems. It should not be a difficult thing, and yet, a lot of people struggle with that. Especially today with the pandemic, they have to be able to have access to their stuff and that's crucial. That's the biggest takeaway. Is it easy to manage it, is it easy to connect? If so, it's worth the investment.
I would rate the solution nine out of ten. If they included FortiManager in their offering, I'd give the product a perfect ten.
My customers use Fortinet FortiGate for SD-WAN, network security, branch-to-branch communication, site-to-site channel communication, multi-layer protection, authentication, and antivirus solutions. They span various industries, including IT setups, chip-level designing, VLSI companies, software development, SAP implementation, manufacturing, and production groups.
The strengths of Fortinet FortiGate include network security, VPN, site-to-site tunnels, client VPN solutions, two-factor authentication for VPN clients, and SD-WAN for branch level. We have implemented these solutions for various customers.
Regarding challenges, customers initially faced issues like internet dropping, but after firmware upgrades, everything worked well.
I believe Fortinet should offer short and frequent training sessions, preferably in video format, whenever they introduce new features. These sessions should be around five to ten minutes long, allowing users and partners to quickly grasp the information without disrupting their daily tasks.
Long training sessions spanning one or two full days can lead to distractions and reduced focus due to continuous support calls. Therefore, providing brief and focused training snippets would be more beneficial for users.
I have been using Fortinet FortiGate for six to seven years.
Our customers are satisfied with the stability of Fortinet FortiGate. I would rate it as a ten out of ten for stability.
Fortinet FortiGate is quite flexible and scalable, allowing us to scale up from sixty to a hundred units. However, there are limitations for extremely high production levels. I would rate its scalability an eight out of ten.
Positive
Setting up Fortinet FortiGate is straightforward and easy. I would rate it a ten out of ten for ease of setup. The deployment typically takes around two to three hours.
Operational costs for Fortinet FortiGate are pretty low because once it's configured, no changes are needed. In terms of ROI, clients have seen benefits. After switching from other brands to
Fortinet, they experienced fewer support calls. Initially, there were some support calls in the first one to two months, but after that, there were none. Clients are now comfortable and not wasting productive hours on IT support.
The cost of Fortinet FortiGate is competitive and not expensive compared to other enterprise- grade solutions. On average, the license cost per year is around seventy percent of the firewall's purchase price.
Regarding AI elements, I believe Fortinet has the capability to implement machine learning snippets for improved security and advanced configurations, but this should be integrated as part of their overall strategy.
I will advise to focus on configuring the admin tools and monitoring users and serial numbers effectively.
As for rating the solution, I would give it a ten out of ten for being a very good solution.
We used FG-90D as UTM device to protect some users and servers, and also to enable inter-vlan routing with advanced security policies inside our lab zone. Also used FG-500D in transparent mode in front of Cisco ASA for advanced and high performance protection by applying IPS, AV, AntiSpam, App.Control and DoS-protection profiles.
We have better manageability: opening and closing ports/services, adding addresses is done very quickly (can be done in single page of the web GUI).
It offers outstanding reporting tools when coupled with FortiAnalyzer (Fortinet's log collector and reporting tool) help meet compliance (there are PCIDSS, HIPAA and many more report types).
Better security posture: safe web surfing, less spam and viruses in incoming email messages, very granular AppControl, blocking vulnerability exploitation attempts and traffic anomalies by IPS, preventing DoS attacks by DoS policies.
Good VPN, both IPSEC and SSL (web-mode, tunnel-mode). An engineer/network administrator has tools to debug VPN issues that can occur during tunnel setup with other vendors' equipment.
SD-WAN feature at no cost. This is really great feature for remote locations (branch offices) and HQ, application steering between many ISP links becomes a simple task. Steering can be done dynamically by measuring link quality (latency, jitter, packet loss, available bandwidth).
Wi-Fi and Switch controller at no cost. FortiSwitch and FortiAP can become a kind of port extender of the firewall, all its ports can be referenced in firewall policies. When you have such management plane consolidation it gives you a simpler way to operate.
Security Fabric Framework is helping in analyzing sudden and rapid changes in whole infrastructure, and gives the ability to simplify daily operations (e.g. address objects synchronization between all firewalls in Fabric, estimating overall security rating, single-sign-on for admin access and many more)
Single Sign On support with deep LDAP integration (several variants for environments with different scales), RADIUS authentication.
Can work as transparent and explicit web-proxy, the last option supports Kerberos authentication which requires no agents installed on any windows server.
Human readable firewall policies with editable security policies and
addresses in single page. This is very useful and time saving feature.
Firmware upgrade process is very simple, even for cluster configurations it is fully automated by default.
Straightforward SNAT and DNAT; you may work in two ways: with Central NAT rules configuration and by applying translation directly inside firewall policies.
Bulk CLI commands are uploaded via gui in script file (portions of config file).
VDOMs are very useful when you need to grant admin role to clients separately. VDOMs in FortiGate can be represented in FortiAnalyzer's ADOMs (administrative domain), which can have different log storage policies, event handling and alerting configurations. You can create one VDOM working in NAT/Route mode, and another VDOM working in Transparent mode.
If you don't want to create and use second VDOM you can still transparently inspect traffic at layer 2 level while having only one VDOM in NAT/Route mode. This is achived by configuring Virtual Wire Pair ports that work like a separate bridge.
Ability to capture packets going through any interface of device (and VM too). You can set number of packets, filter out packets by IP and port number for particular troubleshooting purposes, then download a .pcap file from web gui and analyze it in your favorite programm.
Advanced routing (RIP, OSPF, BGP, PBR). It gives you a seamless and simple integration into a large network.
IPS, AV, Web Filter, AppControl profiles are working very well.
SSL Inspection and CASI (Cloud Access Security Inspection) profiles.
Rich logging options allow you troubleshoot most problems.
Straightforward HA with different redundancy schemas.
IPv6 support.
I think there could be more QoS features in GUI. FortiGate has Traffic Shaping feature that is enough in most cases when shaping egressing packets, but sometimes I just need 802.1p prioritizing (Class of Service) of incoming packets and manual ingress queue assignment. This is what would be nice to have, but I realize that such a job is more efficiently done by L4 switch standing before firewall. Fortinet has a FortiSwitch that can do it, and it also can be controlled by FortiGate via FortiLink protocol.
[Firmware version FortiOS 6.2 update]: There are a lot of improved and newly added things, so it is very hard to imagine any additional features.
Four years.
Small models (up to FG-90) are build on SoC (System on a Chip), so they need to be mounted in places with enough airflow and right temperature, otherwise they could hang, slow down traffic processing, but more often you just can't log in to the device's web-interface (reboot won't help you until it cools down). Actually, that's not an issue. It is a technical requirement for operating environment to be 5-40 degrees (but at 35 degrees with poor airflow there may be issues mentioned above).
For large scale deployment I would suggest to look at FortiManager, a central management point for large amount of FortiGates. I have tested the solution and found it quite useful. I could download configuration from any device and install edited list of policies to several devices simultaneously through a couple of clicks. Also I liked functionality of clearing out Address objects list from unused entries. It can be configured to be a central repository of firmware and updates, and a local rating server (url and antispam rating services) which can improve rating lookup latency value.
Technical support is good (in average).
We used an old IPS from Cisco. We switched because of End-of-Support on that device.
Initial setup in plain networks is very straightforward. For large environment you should prepare beforehand, because FortiGate is a highly-tunable and feature rich product, so you must have a plan with many considered details.
We did not engage a vendor team. Documentation is good enough to implement with an in-house team.
Setup cost may be not so low, as you expect, because it depends on different factors, but TCO for 5 years may pleasantly surprise you.
Palo Alto, Cisco ASA, CheckPoint
Many interesting things are hidden in CLI, they can help you in different situations. Web-interface (GUI) is primarily intended for day-to-day routine.
Don't underestimate FortiAnalyzer. It can give you a better understanding of what is going on in your network. When FortiGate sends logs to FortiAnalyzer, FortiAnalyzer inserts received log data into database. Predefined and customizable data queries, charts and reports can significantly help you by visualizing problem points, so you can thoroughly investigate security events and traffic behavior anomalies.
FortiGate is a constantly evolving product, so pay attention to FortiOS version it runs.
I use it for a VPN. I use it as a gateway between locations. That's what I use it for.
They're Point-to-Point Networks, Metro Ethernet Networks, and over across the internet. We set it up with an AD VPN tunnel in between the various connections.
We use it for interconnectivity between the various sites to provide VPN tunnels. In contrast, service providers, even on Metro Ethernet and Point-to-Point Networks, cannot provide a secure connection between two points.
We've actually replaced 30 or more Cisco routers that were doing these VPN connections, and we replaced them with the FortiGates in order to provide Point-to-Point connectivity. It increased throughput on the various links, and it increased security.
Their VPN connection, their routing capabilities, their layer three throughput, and their firewall management capabilities that limit access from one VLAN to another are all the most valuable aspects for us.
The solution is stable.
It can expand easily.
Support is helpful.
The product is significantly cheaper than, for example, Cisco.
The user productivity has been good as they can, for example, transfer files easier. There is no slowdown.
In their IPS Web Security Gateway, the reporting functions need to be a little bit more user-friendly for how to get the reports from it. That's one of the reasons why we don't use that function.
With the reports, you can see it, and you can get good feelings so upper management can go, "Oh, wow. That looks pretty." However, it's very basic.
I've been using the solution for two years.
The stability is very good. There are no bugs or glitches, and it doesn't crash or freeze.
We've been able to scale pretty well. It's not a problem of you need to expand.
End users will be passing through it. Most of the accounting passes through it to various other locations. We have about 1,500 people on the product, technically.
We do have plans to increase usage. We have not completed the entire County yet. We've done 80% and still need to action the last 20%.
Technical support is very helpful.
Positive
We used to use Cisco. We switched to FortiGate due to its throughput, ease of use, and cost.
Our needs are a little bit more complex than others. That said, overall, I would say it's about average in terms of the ease of setup. We got to do a VPN tunnel across, and it was AD VPN, it was something brand new.
When I set things up now, it's pretty straightforward. When I first started, it was different as I'd never seen the technology before. When I first started, I'd never seen this technology, I didn't have a clue. Others may be in the same boat.
Now that we're familiar with technology, this is very easy to set up. We've deployed 30 of them. I've got junior engineers that can follow my instructions and set up the FortiGate, and we're up and running. It gets easier over time. We've been doing this over the last two years.
We have up to two people needed for deployment and maintenance tasks.
The deployment is completely done in-house. We didn't have any outside assistance.
We did use Fortinet's tech support when we came into some problems. However, we didn't use any extra vendor.
Licensing is renewed every three to five years. They are less expensive e than Cisco. It has reduced the overall cost of maintaining a Cisco environment.
It's a package deal. There are no extra costs.
We did not look into other solutions.
I'd advise potential users to just implement the right size for you and what your needs are.
I'd rate the product nine out of ten.
We are just a customer and end-user.
We use Fortinet FortiGate as our security and routing solution.
We implemented Fortinet FortiGate to enhance our security posture by blocking and restricting access to certain websites and securing our VPN traffic.
Fortinet FortiGate offers enhanced visibility and segmentation for our industrial devices, a crucial process when some machines utilize systems demanding high-level security.
We have implemented Fortinet Security Fabric on our VM infrastructure, and it has provided great service in helping us meet regulations, governance, and compliance requirements. This is important to us because Fortinet Security Fabric connects to our sandbox, allowing us to scan shares across all clusters and enabling FortiGate to resolve any online issues.
Fortinet FortiGate has enhanced our organization's security by enabling secure VPN access and restricting access to social media sites, thus ensuring that employees can focus on their work. We saw the benefits of FortiGate within weeks of the deployment.
FortiGate helps reduce the risk of cyberattacks that could disrupt our production by isolating the affected traffic and creating a log for us.
It also helps to centralize the management of our network and security operations.
The centralized management allows us to access all of our firewalls and policies using a single interface.
Fortinet provides actionable data to help us make informed decisions about the actions to take. For example, if one of our firewalls goes down, the solution helps us rectify the issue by providing details on the problem and how to address it.
By consolidating the numerous individually connected batches, FortiGate helped us reduce operational expenses associated with the extra costs they incurred.
Fortinet FortiGate has helped us mature our approach to cybersecurity for protecting our industrial equipment. Their knowledge and daily webinars on email security and virus prevention have empowered us to stop attacks and maximize our efficiency.
The most valuable features are SD-WAN, application control, IPS control, and FortiSandbox. These features help reduce our downtime, manage the ISPs, and deploy SLAs for all the website traffic.
The graphical user interface of Fortinet's FortiGate product does not function well with text-based interfaces. This functionality should be improved.
I have been using Fortinet FortiGate for seven years.
I would rate the stability of Fortinet FortiGate a ten out of ten.
While Fortinet FortiGate firewalls are scalable, upgrading to a new version or adding hardware requires purchasing a new license to migrate the old backup to the new firewall.
While the technical support team is knowledgeable, their response time to support tickets is concerning. It typically takes them 48-72 hours to respond, which significantly disrupts my work.
Neutral
While we previously used the open-source PSS firewall, it lacked the layered security architecture offered by Fortinet FortiGate.
We migrated to Fortinet FortiGate for its superior control, in-depth scanning, and ability to minimize cybersecurity risks, features not offered by other firewall solutions.
The initial deployment is easy. The solution can be installed by following the on-screen prompts, and the policies can be implemented through the interface dashboard.
Deploying the system takes one full business day. We begin by gathering user requirements from each department, as they have varying policies. The policies are implemented department-first, followed by branches. Finally, VPNs are generated for remote users. Two people are required for the deployment.
The implementation was completed in-house.
Since implementing Fortinet FortiGate, we have observed an increase in user productivity, which translates to a positive return on investment.
While Fortinet FortiGate has a higher price point compared to Sophos XG, its user-friendly interface justifies the cost. Additionally, its fixed pricing structure eliminates concerns about surprise fees.
After evaluating Sophos XG and finding its interface overly complex for our needs, we opted for the user-friendly interface of Fortinet FortiGate.
I would rate Fortinet FortiGate an eight out of ten.
We have one person that deals with maintaining Fortinet FortiGate.
We have 1,100 users in multiple cities and departments using FortiGate.
The Fortinet FortiGate 60F is a good choice for organizations to begin evaluating firewalls.
Fortinet FortiGate needs to improve the logging and reporting. Additionally, the next-generation application's policies should be improved. When they were released they had bugs.
I have been using Fortinet FortiGate for approximately 12 years.
Whenever we install a new release of an OS we should expect lots of bugs on the system that could break the system. Something that is working fine in the previous system, if we upgrade it, it could break it. Fortinet should work a lot on this to remediate it before releasing any OS. This includes any update and upgrade of FortiOS because I have seen issues when I upgraded, such as the memory and CPU jumping to 100 percent, and some or all functions were not operational. These bugs should be fixed in the firmware.
If there is a need for some upgrade or update on an existing system then I will plan ahead, but if it is not stable I will not do it. We have new releases being tested now and once they are rated stable I will upgrade.
I have found the support from Fortinet FortiGate very poor. I do not use them anymore because they are not very good. This is based on the support I have received from South Africa and India. However, the support from France I have heard was excellent. I only open support tickets for bugs.
I would rate the support from Fortinet FortiGate a two out of five.
I have previously used SonicWall, Sophos, Juniper, and Cisco Meraki.
The initial setup of Fortinet FortiGate was straightforward.
The time it takes to implement a firewall a large and small firewall is the same. It does not matter the size of the firewall. The complexity comes from the network and the scope of work that we need to do for the customer on the network.
If it is a large network, it will take us more time to deploy it, because there is more to configure. If it is a small network, it will take less time, but configuration-wise, it's likely the same.
I have deployed Fortinet FortiGate on my own. I have never needed help from any third-party consultant, or integrator. I work as a consultant and integrator for other companies. I provide my service as a consultant.
Fortinet FortiGate doesn't require a lot of maintenance if you deploy the system correctly, it will run well. However, you do need to have some security checks, auditing, and cleanup of the system, every month. It depends on the company policies.
If you already deployed the solution correctly you should not have an issue. Maintenance is required, we do have some customers that are doing morning checks on memory and CPU, it does not take much time.
The license for Fortinet FortiGate is affordable in my country.
I rate Fortinet FortiGate an eight out of ten.