We have two SonicWalls in the High Availability setup with failover configuration.
We use it for the firewalling, for IPS protection and for VPN clients.
We have two SonicWalls in the High Availability setup with failover configuration.
We use it for the firewalling, for IPS protection and for VPN clients.
With SonicWall we have more insight in the applications that users are using and what they are doing on the internet, so we can monitor better. It gives us better monitoring.
We now have more insight and information; what protocols and what websites users are trying to reach and what is blocked and what is not blocked, so we can better follow the tracks of the users.
The features that I have found most valuable are the firewalling, which is very good and the GUI which is very intuitive. It is easy to use and provides great security.
Overall, I'm quite happy about the product. The configuration and the interface are very good. Maybe the pricing and licensing could be improved.
It is not scalable. If your enterprise is growing hard then you have to buy another, bigger product. Maybe if you use it virtually it is more scalable.
We have been using SonicWall NSa for maybe eight to 10 years.
I work for several companies, and we use the NSa with one of them.
It is very stable.
Scalability is an issue. If you need to scale for more performance you will need another product in a higher range. You cannot scale the product itself. That's not possible.
It is not scalable at all.
We have about 350 users. I do the maintenance on my own.
We use it daily.
We do not have plans to increase at the moment.
Their technical support is very good.
The initial setup is not complex, it is very easy.
In terms of my implementation strategy - at first I write down the case we need. I investigate all the uses we have to implement with the SonicWall, and then I install and configurate it. I think the primary configuration was maybe three or four hours.
It was all done by myself.
You can buy the license for one or three years, and we mostly choose the three year. That's a little bit cheaper.
We looked at the Cisco and we looked at the Palo Alto, but the SonicWall was the most valuable for the pricing, the best product for us. The main difference is the pricing.
SonicWall NSa is a very good product with a very nice price, and it is low-level to use.
It is easy to manage and easy to implement.
On a scale of one to ten, I would give SonicWall NSa a nine because of the stability and the easy-to-use GUI. It's a very nice product.
SonicWall suits our business, also cost-wise, and commercial-wise. It is in a feasible range for our organization.
We like the features, but the main thing is from a commercial and cost perspective it is very good.
The interface is user-friendly.
Vendor support needs improvement. The frequency of time and support should be increased.
From a vendor perspective, we were expecting more support.
When we experience a technical issue, it should be rectified immediately. We are facing a delay with response and resolution.
I have been using SonicWall NSA for approximately eight years.
SonicWall is stable.
This is a scalable solution.
We have approximately 2,000 users.
We are facing some issues with compatibility. We have moved to the latest version.
Previously, we were using another version and the 5000 model of NSA.
It is fine. It is user-friendly.
It took a month and a half to deploy
We have a dedicated team here. They handle all of our deployment and troubleshooting.
We have a team of six to seven administrators to deploy and maintain this solution.
SonicWall is not an expensive solution.
I would recommend this version of SonicWall to others who are interested in implementing this solution. This latest version is quite fine.
I would rate SonicWall NSA an eight out of ten.
SonicWall NSa's most valuable features are the ease of configuration and the GUI. It's a web-based application, so we can easily configure all we want in the browser.
An area for improvement would be SonicWall NSa's integration with antiviruses. In the next release, SonicWall should include a wireless solution so we can implement the firewall in our networks and for wireless users and access points.
I've been using SonicWall NSa for about two years.
SonicWall NSa is a stable system that's really easy to handle and communicate with.
SonicWall's technical support is very responsive and helpful whenever we need support from them.
Positive
Previously, I worked with PMG Firewall, but SonicWall has a higher level of compatibility, and the integration between the software and hardware gives us more speed in traffic and processing the data over the firewall.
The initial setup was easy - we could implement rules for mapping, network traffic, and network address translation easily on our firewall. I would rate the ease of the setup as four out of five.
SonicWall NSa is a great choice for any growing company - it's really helpful, and it's suitable for networks with limited or unlimited users. I would rate SonicWall NSa as eight out of ten.
Our operation depends heavily on Internet access and we depend on a solution that can provide us with productivity and security for the continuity of our business.
With this need, we implemented a SonicWall NSA firewall to control all access to and from the Internet.
With the deployment of the SonicWall NSA solution, we never suffered a problem due to invasion or contamination of any kind.
The solution always responded very efficiently, delivering us:
This solution has always delivered us security features with great efficiency like:
The solution was deployed to suit all areas of the company.
This product is unable to secure access to endpoints for our external employees. Our next plan will be to deploy a solution for visibility and control of 'shadow IT' applications and also to provide security for accesses outside our company. We plan to use another solution from SonicWall, such as Cloud App Security (CASB), to meet the needs of our external employees.
The solution has always been very stable and efficient.
My impression is that the solution is quite scalable.
Support services are categorized by the criticality level. We had a few critical events, but each was attended quickly and efficiently.
Before this solution, we used Microsoft Forefront TMG Server.
We migrated because the solution was proxy-based and did not have the features of NG firewalls.
Initially, we had to review our security policy and this was the stage that involved the highest level of complexity.
With the policy defined according to our needs, the initial configuration of the solution was simple, but obviously, because it is an advanced-level security solution, it must be implemented by a specialized professional.
The solution was implemented by our internal team. Our team participated in an official solution training prior to deployment.
This question is very relative as we are dealing with an asset. But for our business, it was positive for a short period of time.
In our evaluation, we found that the costs of deploying the solution, and also purchasing the hardware and licenses, were very attractive.
The ratio of costs vs efficiency of SonicWall products is very good.
We did not test other solutions.
SonicWall is for general security purposes.
SonicWall has all the usual functions, like LAN configurations, security features, word filters, etc., but it also has the CFS agent, which isn't available in any other firewall. Reporting port support is also there.
I also like the ability to manage all the firewalls from a single location. We can support all those things from this application. It's a cloud-based solution.
The thing main thing is that there's no user admin and in other firewalls, we can enable the scalable features, but SonicWall doesn't have that feature.
I've used SonicWall for about seven years.
SonicWall NSa is reliable.
It's cloud-based, so the scalability is good, and it's suitable for any size of customer.
SonicWall support is good. I rate it 10 out of 10.
Positive
SonicWall NSa is easy to understand. The initial setup for any firewall is straightforward. Having a single console is also good. The deployment time can vary depending on the client's requirements, like VPNs, routing, policies, load balancing, etc. At most, it will take one hour. I rate it 10 out of 10 for ease of setup. After deployment, SonicWall doesn't require specific maintenance.
We are resellers, so the clients who purchase the firewall deploy it themselves. We provide support, too.
I rate SonicWall NSa nine out of 10.
We are integrators, but for SonicWall, we use it for a specific project in industrial cybersecurity. It was for ransomware recovery and network restoration.
We did the firewall and the configuration for the ransomware prevention.
Our clients were using it to control the SCADA System in their industry.
The most valuable features of this solution are the GUI pre-filtering and the ATP (advanced threat protection). Also, the ATP packet capture is helpful. We used these features during our restoration.
The content ID needs to be improved. If I compare it with Palo Alto, there are more features in Palo Alto that are not included in SonicWall. For example, PDoS is not available in the current version, that I could find.
They do have DLP and Host protection, but not PDoS.
Also, the IPS and the UTM need to be improved.
I haven't found anything regarding the IoT security in the device security on SonicWall.
I have been working with SonicWall for one year.
We are working with NSA 3600, which is the latest version.
We have no complaints about the model.
The scalability level is medium. They are okay with the model, the throughput, and the traffic rate.
We did not require technical support.
Currently, we are running Palo Alto, Check Point, and SonicWall.
Two or three months ago, we were working with Fortinet FortiGate. We have also used Vyatta.
This solution was not implemented properly.
The AV enforcement feature in SonicWall is limited to only one vendor for antivirus, which is Kaspersky. It's the only antivirus solution that we can enforce through the firewall.
Other vendors provide you with multiple options such as Sophos, Kaspersky, Trend Micro, and Bitdefender.
I would rate SonicWall NSA a six out of ten.
I am a consultant. I work with a software dealer in the IT security business.
I deployed SonicWall for a customer just last month.
It's very simple to use and the support is great. I am in India and they have a support office here. As a company product, SonicWall firewalls and their support has been excellent.
It's a simple, rugged product. When I say rugged, mechanically, it's a very rugged box. The same thing applies to Sophos also, it's also a very rugged box. It's rugged technology, it can take a beating and still be operational.
One of the greatest strengths of the SonicWall system is that they have multiple portals for multiple tasks, whereas all the other solutions have no single tool for doing multiple tasks. That has been one major advantage of SonicWall. Regarding the SonicWall box, you need to be capable of taking multiple loads compared to the competition. That's a very unique feature of the SonicWall system. They also have an antivirus solution that is tied to their system which is called SentinelOne.
The support is very good. The product is also very reliable. There are always new, frequent updates — nothing more or less. It's very flexible; it's ready to go right out of the box, unlike some other solutions which require a lot of training. The GUI is very user-friendly. Even if you've never touched a firewall in your life, with a bit of time and practice, you'll get the hang of it.
In terms of improvement, they should consider changing the logic of how the rules are created. Everything is spread out into multiple pockets, so to speak; it should be more condensed. The technology is sound; I am not saying that it's brilliant, but it is very sound for most mid-range uses — it does a fantastic job.
They should consider upgrading the capabilities within the GUI. The way the GUI is configured for creating rules, I would say they should consider making that a bit more flexible. That would really help a lot.
I have used SonicWall NSA for three years.
SonicWall NSA is very stable. I ran my last box for 10 years before I switched it off. 10 years is a long time for anything. If it can run for 10 years, it's stable. It's money made twice over. It might not be technologically up to speed and it may not be upgradeable, but that's a different matter.
These boxes are well-known for the amount of mechanics and users they can handle.
The initial setup is very easy.
The basic setup takes roughly half an hour. After that, when it comes to configuring the rules and dependencies, with ideal conditions, I would say that it takes roughly a week. Overall, within two to three weeks, we were in production.
Roughly 90% (50% in the worst-case scenario) of the customer's settings are ready within a couple of days from the time the box is powered up. When you power up the box, you have to set the rules. So, I implement it, engage the rules, and then ask somebody to test some of the connections and give me some feedback. That takes a bit of time, but otherwise, it only takes a couple of days until the box is ready. If you want to push it, within a week it's possible to reach roughly 90% to 95% production — the rules and the performance have to be fine-tuned which takes a little bit of time.
I would definitely recommend SonicWall for their simplicity of use, but if you can configure SonicWall, have a look at Sophos also. Sophos has put a lot of hard work into their connections and the GUI. SonicWall's GUI is slightly lacking compared to Sophos' GUI; however, capabilities-wise, Sophos doesn't have a lead over SonicWall.
If I had to make a recommendation to a customer, I would tell them to look at both products. I would push the Sophos box because it has certain advantages, technologically, compared to SonicWall. For example, they have their own antivirus solution — the Sophos antivirus solution. It's a firewall as well and the tool will communicate with the central cloud. From the cloud instance, you can control the system.
The Sophos gateway has got allied products, like SD run connectors. You can manage the same rules between multiple firewalls because they're all connected to the same account. Overall, Sophos is superior to SonicWall.
The first requirement of a paying customer, independent of their choice of product, is to check if the technical support of the product is locally available. That's the first requirement I would give to any customer. The product may be great but if the support in your geographical region is not there, then it's not worth it.
Take Trend Micro for example. If you're a customer of Trend Micro but you're not in the immediate support region, then what happens? You will have to raise a ticket and wait, but you don't have anybody on the ground to come to your office and do an emergency scan and raise your ticket, so it's a bit of a dangerous issue. I would recommend a product that has both local technical and physical support.
On a scale from one to ten, I would give SonicWall a rating of eight.
We are a solution provider and SonicWall NSA is one of the firewalls that we implement for our clients. I have implemented it for many companies and currently, I have four or five clients that we are supporting.
The most valuable features are the VPN, SSL VPN, and IPSec VPN.
The port forwarding functionality works well.
The number of concurrent VPN users is too limited.
SonicWall does not support DynDNS, yet this is an important feature for smaller companies that do not have a static IP address. It means that if the IP address changes then it would automatically be picked up by the firewall and it will assist with site-to-site VPN connections.
I have been working with SonicWall NSA for two years.
SonicWall NSA is a stable firewall.
I have set up SonicWall NSA for smaller companies in Dubai. Most of my customers are small to medium-sized with between 20 and 100 users. I would say that it is scalable.
The support offered by SonicWall is good. I would rate them a six or seven out of ten.
I also have more than five years of experience with Fortinet FortiGate. I have worked with models such as the 30E, 50E, 60E, 100E, and 60D. I also have experience with the Meraki Firewall.
The VPN limitations are better with FortiGate. Even with the lower versions, such as the 30E, it supports 100 tunnels and 100 users. With SonicWall, you are limited to five IPSec VPN connections at one time.
FortiGate also supports DynDNS, which is an important feature for smaller companies.
The initial setup is okay and I don't have any issues with it. When you configure any UTM box, whether it's new or if you are configuring it for the first time, it will take some time to complete. Once you get through it for the first time, it is much easier from then on.
If you want to connect more than five concurrent users by VPN then you have to pay an additional fee.
Overall, this is a good firewall and they would do much better in the market if they included support for DynDNS and additional VPN connections for free.
At this point, because of the restrictions with the VPN, we are recommending Fortinet rather than SonicWall. If in the future these concerns are dealt with, then I will recommend SonicWall.
I would rate this solution an eight out of ten.