The anti-malware engine could use an upgrade. It should automatically classify and sandbox malicious packets with more granular controls, including providing details like TV numbers.
The platform's compatibility with Wi-Fi equipment needs improvement. Sometimes, the Wi-Fi units don't work, or one of the networks stops working, and we have to reboot the FortiGate client's endpoint.
General Manager Group IT at DART GLOBAL LOGISTICS PTE. LTD.
Real User
Top 10
2024-03-04T10:30:00Z
Mar 4, 2024
Ideally, I'd like to see most CLI configuration options exposed in the GUI to avoid manual command typing. However, there should be a more user-friendly approach than simply replicating everything in the GUI. Alternatively, some users might prefer scheduling tasks through commands for automation.
There is room for improvement related to the logging and reporting aspect. It was somewhat challenging as I delved into the logs during an incident. Navigating through the logs to trace the specific information we needed, as well as generating the corresponding report, proved to be less intuitive. In comparison, when considering Sophos XG, which we also use, the logging and reporting functionality is notably more efficient.
IT Engineer at a aerospace/defense firm with 1,001-5,000 employees
Real User
Top 20
2023-11-30T13:53:00Z
Nov 30, 2023
The process of configuring firewall rules appears excessively complex. While FortiGate offers greater functionality than other firewall solutions, its user interface could benefit from simplification. I would like the log viewing process to be improved to provide a clearer understanding of the logs.
Head of computer systems at Indian Institute of Space Science & Technology(IIST)
Real User
Top 5
2023-11-17T11:22:00Z
Nov 17, 2023
The log analyzer, for instance, is a product being developed as a common solution for multiple FortiGate devices. Consequently, the log analyzer's functionalities are not fully integrated into the individual FortiGate products. I would prefer to have more detailed logs within the FortiGate products themselves rather than relying on a separate tool. While Fortinet claims to offer a comprehensive network solution, it falls short in addressing computer application issues, particularly server security. Fortinet's capabilities are primarily focused on network security.
IT Security Analyst at a energy/utilities company with 51-200 employees
Real User
Top 20
2023-11-16T19:07:00Z
Nov 16, 2023
Fortinet needs to overhaul its documentation. Our current reliance on outdated documentation has resulted in significant time wastage. While we can locate the necessary documentation, the constant daily revisions necessitate meticulous identification of the relevant documents to prevent the use of outdated information that could jeopardize our environment. At the very least, Fortinet should classify its documentation to clearly indicate the applicable version, as our attempts to do so manually are becoming increasingly tedious.
Manager Network (IT/OT) at a consumer goods company with 5,001-10,000 employees
Real User
Top 10
2023-11-14T14:13:00Z
Nov 14, 2023
Overall, we are satisfied with the product. However, we encounter occasional capacity issues. The FortiAnalyzer, being a hardware appliance, has limited expansion capabilities. As our organization has grown, we've outpaced the FortiAnalyzer's performance. The inability to scale the FortiAnalyzer to match our growth necessitates the purchase of new hardware. This is an area that could be improved. If we anticipate reaching the size of six countries within the next five years, investing in a solution that can accommodate such growth would be more cost-effective than repeatedly purchasing new hardware. The ability to scale the FortiAnalyzer in tandem with our growth would be a significant improvement.
IT Consultant at Escuela de Comunicación Mónica Herrera
Real User
Top 5
2023-09-29T12:15:00Z
Sep 29, 2023
We'd like to see what they will do when AI attacks are generated. They will need to ensure their prevention continues to be exceptional. The solution isn't missing any features. Maybe they could make some features more accessible, such as a way to translate directions between two networks that share the same subnets.
Presales Manager at a tech services company with 201-500 employees
Real User
Top 10
2023-06-05T16:42:00Z
Jun 5, 2023
I was not looking after the operations part, but sometimes, I did get engaged in some critical activities related to operations. There are some caveats in every product. Tunnel flapping was one of the major things I had seen wherein your internet link remains but your VPN tunnel is down. However, since I got a fix from the TAC team, I have not noticed it, but the customer complained a few times that they couldn't access the internet because of this problem. There were tunnel issues where there was already established connectivity, but at the kernel level, there were some issues. For example, there's a feature for auto-site connectivity wherein whenever it automatically creates a new tunnel, at the kernel level, it also creates an interface. Sometimes, that interface crashes and a new interface could not be created, which results in connectivity loss. Fortinet has established itself in the SMB market segment. It's doing pretty well in that space, but when it comes to the enterprise segment, they are lagging a little bit. It all boils down to the performance of the hardware. If I enable all of the security features available on my device, the throughput degrades quite a lot. If I have put 10 GBPS of throughput on a firewall and I enable all of these features available, such as IPS or UTM functionalities, the throughput comes down to 1 GBPS.
There is some development gap. We had experienced bugs in their operating system. When we were planning to upgrade it, there was no patch available for a bug, and the support team was saying that they need to work on that. That's the part they should work on. There are some complex administration tasks in their administration portal. That needs to be improved.
Palo Alto has a feature called WildFire Analysis that is unavailable in FortiGate. WildFire is better than a sandbox because it can address zero-day threats and vulnerabilities. It can immediately identify zero-day threats from the cloud. Fortinet uses a separate solution called FortiSandbox. It needs to download signatures to identify malware, which takes significantly longer. WildFire is a cloud-based platform that collects threat information from users worldwide.
In the past, NSS Labs was utilized to test files and verify the numbers and datasheets. It would be beneficial to have an organization or testing lab that can verify the numbers in our datasheets since changes are frequently made, which can be inconvenient for review. For instance, when comparing different competitors such as Forcepoint, Palo Alto, and Check Point, the throughput or numbers in the datasheet may be lower than the actual numbers. Conversely, Fortinet typically reports very high numbers, but they cannot be replicated in the real world. Therefore, it would be advantageous for them to partner with a neutral testing organization such as NSS Labs to validate these numbers, thus providing more credibility and comfort to everyone regarding the accuracy of the datasheets. For the migration, everyone has a firewall in use and I am selling Fortinet. Typically, I am replacing another firewall. Previously, there was a tool available to convert configurations from one firewall, such as Palo Alto, to Fortinet, but this tool is no longer free. If it could be made free again, it would be very beneficial. This tool shows a lot of promise and is very good. Making it free would help many companies deliver their products in a more efficient and integrated way. It would also be more valuable to include the tool with the firewall package or license instead of having to pay extra for it. Paying extra puts more pressure on small companies to deliver the firewall and complete the configuration, especially if they have hundreds or thousands of policies. It is very painful to move through these policies line by line. The stability has room for improvement.
In the past, NSS Labs was utilized to test files and verify the numbers and datasheets. It would be beneficial to have an organization or testing lab that can verify the numbers in our datasheets since changes are frequently made, which can be inconvenient for review. For instance, when comparing different competitors such as Forcepoint, Palo Alto, and Check Point, the throughput or numbers in the datasheet may be lower than the actual numbers. Conversely, Fortinet typically reports very high numbers, but they cannot be replicated in the real world. Therefore, it would be advantageous for them to partner with a neutral testing organization such as NSS Labs to validate these numbers, thus providing more credibility and comfort to everyone regarding the accuracy of the datasheets. For the migration, everyone has a firewall in use and I am selling Fortinet. Typically, I am replacing another firewall. Previously, there was a tool available to convert configurations from one firewall, such as Palo Alto, to Fortinet, but this tool is no longer free. If it could be made free again, it would be very beneficial. This tool shows a lot of promise and is very good. Making it free would help many companies deliver their products in a more efficient and integrated way. It would also be more valuable to include the tool with the firewall package or license instead of having to pay extra for it. Paying extra puts more pressure on small companies to deliver the firewall and complete the configuration, especially if they have hundreds or thousands of policies. It's very painful to move through these policies line by line. The stability has room for improvement. When it comes to Secure SD-WAN, everything is fine. They are going the right way. SD-WAN is very promising. They can provide the SD-WAN solution separately, but they will not take this approach because even the smallest firewall can support the features, so there is no need to have a separate service or appliance. They are following the right steps, and there is nothing to be improved. Feature-wise, I'm really satisfied with the new release, and the features they have added. For now, it's fine.
Technical Project Manager at a tech services company with 1-10 employees
Real User
Top 20
2023-04-14T09:42:24Z
Apr 14, 2023
There are mainly two areas of improvement in Fortinet FortiGate— the licensing cost and the timing of upgrading licenses for boxes. FortiGate's renewal cost is quite high, and our customer care team also receives complaints about it. The renewal part of the firewall is expensive. If a customer pays for the license in advance, they may lose their privileges. For example, if the license of a box expires in one or two months, and the customer wants to upgrade, there are three to four months between the operation and the end of the current license. If I purchase a new license, it will only take effect from that date. So, it fails in the backward fetch, and I am currently busy setting it up. But if the customer is not processing the card for six months, they will not benefit from the system.
The pricing could always be better. It is very expensive. We'd like to see Fortgate include WAF services. The maintenance of the product can be a bit difficult.
Sales Director at Visualize Technology (M) Sdn. Bhd.
Real User
Top 20
2023-03-24T08:28:56Z
Mar 24, 2023
They need to improve features related to mobiles with more and more customers adopting that as their way to manage things. They need to look to the future with their features and meet filtering requirements which the solution cannot currently do.
Senior Network Engineer at a government with 201-500 employees
Real User
2022-09-20T09:24:52Z
Sep 20, 2022
In their IPS Web Security Gateway, the reporting functions need to be a little bit more user-friendly for how to get the reports from it. That's one of the reasons why we don't use that function. With the reports, you can see it, and you can get good feelings so upper management can go, "Oh, wow. That looks pretty." However, it's very basic.
Fortinet FortiGate needs to improve the protection, it did not prevent us from being attacked. Additionally, Fortinet FortiGate could provide more features for WAF devices. I should not have to purchase two solutions, it would be a benefit to combine these features into one solution. The main challenge to IT is hacking, and damaging the network software. Anything that can make a threat to our servers, accounts, VC, from an email or internet connection. We need all companies to make investments to improve the facilities of these devices in order to provide a one-package solution to protect our servers, and systems from any hacking, ransomware, virus, any command, or any other threats. They need to improve all the security features.
It can be a little bit more user-friendly in terms of policy definition and implementation. It seems a little bit complicated, and it could be simplified. When there is a change in the IP address from the ISP, there is some disruption in the service. So, we try to do it when we have the least number of people working, which means very late at night. So, for the time being, it is working fine.
My only complaint about FortiGate is a lack of QinQ VLAN tunneling. I haven't found this feature in any Fortinet product. You can do this on all Cisco routers, including the smaller models. However, QinQ isn't available on the biggest, most expensive Fortinet units. They still don't have that. I think now we're on software version 6.0, and they still haven't found a solution for QinQ. It isn't a dealbreaker, but that's my main complaint.
Infrastructure Engineer at a hospitality company with 51-200 employees
Real User
2022-04-05T10:13:00Z
Apr 5, 2022
Fortinet Fortigate could benefit by simplifying some of their processes. For example, if you are using Cisco, and you want to find a source and a destination, you type the IP of the source and then the IP of the destination. Cisco will find any denied packet by highlighting it in yellow. To access it with Cisco, all you need to do is right click. FortiGate is not that simple.
Director Of Information Technology at Al Falah University
Real User
2022-04-05T10:01:44Z
Apr 5, 2022
One of the features that I would like to have is endpoint protection, this should be integrated. For example, the firewall gets notified of any kind of forensic event that needs to be done, such as if there is a ransomware attack and how it originated, all those records have to be available from the firewall, which is not.
Fortinet FortiGate should improve the VPN tokens. The upgrades should be reviewed more frequently, such as daily, to avoid any corruption or issues that can happen, without losing my VPN client. We should not need to downgrade the solution to fix the problems until the Fortinet FortiGate support solves it.
Fortinet FortiGate could improve by having a frequent ask questions(FAQ) area for people to receive quick answers to popular questions. Additionally, it would be beneficial to have an SMS notification feature. For example, if you cannot access your email you could receive an SMS message.
Fortinet FortiGate can improve the integration with Active Directory. Additionally, I would like to have a Cloud Controller, such as they do in the Cisco Meraki solution.
Fraud Risk Analyst at a university with 1,001-5,000 employees
Real User
2022-03-17T15:33:48Z
Mar 17, 2022
An additional feature I'm expecting from Fortinet FortiGate is for it to have an analysis feature, rather than having the analysis done via integration with a different product.
In Brazil, the main problem that we have is related to the protection from various attacks and ransomware in the public sector and the commercial sector. The main focus in Brazil is to deploy a solution to counter-attack ransomware and other attacks. There can be more security in hybrid implementations. When a customer has a hybrid environment where some parts are in the cloud, we need a consistent security solution for such scenarios.
I think that the infrastructure for the VPN could be improved. The way that it is bundled also made it difficult to use and sell as it is too expensive.
Assistant Manager Traditional Channels at FrieslandCampina
Real User
2022-02-22T18:13:28Z
Feb 22, 2022
There are limited features. Scalability could be improved. The issues with the IOS are that they occasionally hang. They are not as reliable as they once were. When there is an issue with IOS, new updates are introduced, but the updates also have a lot of issues. Performance and technical support are the main issues with this solution. When compared to Cisco ISE, the device administration is not very good. Fortinet is not very good at firewalls when compared to Cisco. Cisco offers full administration control, TripleA, SQT, they use TACACS security protocols, and they have much more control. Cisco's approach is superior.
Product Manager at a comms service provider with 1,001-5,000 employees
Real User
2022-02-22T16:58:00Z
Feb 22, 2022
They have to just improve its performance when we enable all UTM features. When you enable all the features, the performance of FortiGate, as well as of Sophos and SonicWall, goes down.
Network Engineer at a logistics company with 10,001+ employees
Real User
2022-02-22T16:10:00Z
Feb 22, 2022
It is quite new for us, and we need to go more in-depth into the monitoring tools. It provides different features that we need to do what we want. So far, it is okay for us. In terms of improvement, in the future, they can provide a faster implementation of features. Some of the features are first available in other solutions. Fortinet sometimes takes a little bit longer than other solutions, such as Check Point, to implement new features.
Founder, Chairman of the Board at a tech services company with 1-10 employees
MSP
2022-02-22T10:02:23Z
Feb 22, 2022
It is very expensive, and their support is not very good. I hope that their technical support will be better in the future. In terms of new features, it is a complete product. I don't expect any new features.
Security Presales Consultant at a tech services company with 501-1,000 employees
Real User
2022-02-22T09:56:12Z
Feb 22, 2022
Fortinet FortiGate could improve by having better visibility. Palo Alto has better visibility. When using Fortinet FortiGate you sometimes have to use the CLI to do some configurations which can be sometimes more difficult than using a GUI that other solutions can use, such as Palo Alto.
Senior Manager at a manufacturing company with 10,001+ employees
Real User
2022-02-09T07:45:48Z
Feb 9, 2022
Fortinet FortiGate could improve by adding FortiAnalyzer to its solution, we should not have to use another solution. FortiAnalyzer can provide more detailed information. I hope that Fortinet FortiGate provides a software define network(SDN) solution. and provide the interface for the user. If we have the SDN interface we can develop our system to manage Fortinet devices.
I'm not sure if it's something that they already have or are developing something, however, we need some dedicated features for container security. Other vendors have developed some kind of specific product to protection. Containers now are very common, especially in the cloud. It's an area that needs to be addressed.
Chief Information Security Officer at ShipServ Limited
Real User
2022-02-07T07:28:56Z
Feb 7, 2022
Fortinet FortiGate is not very easy to use. The navigation could be improved to make it easier to use. Instead of double clicking the items FortiGate needs to click the "details" button to get the configurations or record details
I don't really have anything negative to say as far as Fortinet firewalls are concerned. If anything, they can support a user a little bit better. They can stop being so time-sensitive about how much time the support call has taken, and they can help you do it yourself.
Head of the Satellite Infrastructure and Operation System Department at a government with 1,001-5,000 employees
Real User
2022-02-03T16:26:29Z
Feb 3, 2022
Their software support needs improvement. I would prefer to have better support for bug fixes. Sometimes, we open a ticket, and it is very difficult to get a solution. Specifically, we are not at all happy with their support for load balancing.
Manager at a financial services firm with 11-50 employees
Real User
2022-01-17T13:05:07Z
Jan 17, 2022
There are some limitations to the solution such as publishing multiple servers with a single IP. I'd also like to see some improvement in the support system.
Its filtering is sometimes too precise or strict. We sometimes have to bypass and authorize some of the sites, but they get blocked. We know that they are trusted sites, but they are blocked, and we don't know why. In terms of additional features, I don't have any requirements. It is okay for me. I do lots of things, and I still don't know everything about FortiGate. If I need something, it might already be there in FortiGate.
Currently, FortiGate is providing SSL VPN. But they're missing some features that are available in Palo Alto's SSL VPN. Palo Alto provides a compliance check along with the VPN, and they have a very broad checklist. So Palo Alto's global protection can scan and check multiple things, and we can choose what access users can have based on compliance with policies. So I think this is one area where FortiGate can improve. Also, multi-factor authentication isn't native to FortiGate. If you want to incorporate multi-factor authentication, you have to add a secondary or third-party solution.
Dy General Manager at a real estate/law firm with 501-1,000 employees
Real User
2021-02-05T20:55:16Z
Feb 5, 2021
It would be a benefit if Fortinet would release a one-stop solution that is better integrated with other products and has an automated emergency response system.
Compliance Officer at a venture capital & private equity firm with 11-50 employees
Real User
2021-02-04T12:14:21Z
Feb 4, 2021
We aren't really missing any features. The solution isn't lacking anything. We've been overall very please with the experience we've had. There aren't really any negative aspects to discuss.
Head of Technical at a tech services company with 51-200 employees
Reseller
2021-02-01T12:52:32Z
Feb 1, 2021
The cloud features can be improved. The sandboxing part is only available in limited parts of the cloud. If they could expand that, customers would find it slightly better. The price can always be cheaper as well.
In the balance between links feature normally you can just choose one option to balance. It would be better for the solution to have more than one option, preferably three.
Lead Architect at a computer software company with 51-200 employees
Real User
2021-01-28T21:42:13Z
Jan 28, 2021
The Wi-Fi controller feature needs a lot of improvement. The function itself is not as stable as it should be in our use case which might be a problem in either the APs or the controller. Would like to see more wizards and automation for more features such as virtual servers, SSL VPN, and others where policies, rules entries are created automatically form wizard input. Some of the features related to load-balancing and traffic shaping are not as straightforward as they need to be. The VPN functionality needs low-level debugging get what really going on. Log level is too detailed and requires someone who is quite experienced to analyze and solve those issues. Zero-trust base features are lagging behind the other competition, based on what I have read. Would like to see those features in a clearly in the UI.
The only problem that we have here in China is that the whole subscription process on Fortinet is a little bit difficult if you are doing it from China. China has kind of a firewall around the country, and we sometimes have complications due to that aspect. As a whole, I don't think that the product is actually missing any features. You do need some IT knowledge in order to effectively work with the solution.
Security is a continuous process. In every product, there is a requirement for improvement. Its pricing should also be improved according to Indian market requirements. They must also improve on the reporting part. Its reporting can be more precise. If we can get a real-time report in a specific format, it will be helpful for customers to know about the current status of their security.
In our environment, we need multiple virtual firewalls to facilitate end users and customers. Fortinet doesn't provide that but they really should include that feature.
We currently have two on-premise data centers with several separate firewall units and unfortunately they don't connect with each other. We'll likely migrate to Azure in the next two years because of that.
Network Engineer at a retailer with 10,001+ employees
Real User
2021-01-15T19:06:15Z
Jan 15, 2021
The solution overall is quite good. It works how we need it to. I can't recall seeing any features that are lacking. We haven't had any breaches in our organization, however, I have read in journals that there have been some issues. There may have been some bugs after an update, however, that has since been resolved. We saw a few bugs in the web field and when we ran an update it was resolved in the new version. Some resources must be accessed via web fields. We were not able to access them at first. However, it was a simple task to fix it and that has since been resolved. The pricing could be a bit better, especially when you consider how they have the most basic offering priced.
Network Security Engineer at a tech services company with 201-500 employees
Real User
Top 20
2021-01-13T15:11:57Z
Jan 13, 2021
The sniffing packets or packet captures can be simplified and improved because it's a little confusing. The automation feature has some limitations and could be better.
Director Of Technology at PT Exa Teknologi Indonesia
Real User
2021-01-11T10:00:00Z
Jan 11, 2021
In terms of what could be improved, the SD-WAN is quite difficult, because if you install in the new box, 15 is okay, but if you change from an old configuration, if there is already a configuration and a policy when you change to SD-WAN, you must change the whole policy that you see in the interface.
They can do more tests before they release new versions because I would like to be more assured. We had some experiences where they release something new and great, but some of the old features are disabled or they don't work well, which impacts the product satisfaction. The manufacturer should be able to prove that everything works or not only that it might work. This is applicable to most of the other services, software, and hardware companies. They all should work on this. We cannot trust every new release, such as a beta release, on the first day. We wait for some comments on the forums and from other companies that we know. We always wait a few weeks before we use the updated version. They should also extend the VPN client application, especially for Linux versions. Currently, it has an application for Linux devices, but it doesn't work the way we want to connect to the VPN. They use only the old connection, not the new one. They have VPN client applications for Windows and Mac, but they can add more useful features to better manage the devices and monitor the current health of each device. Such features would be helpful for our company.
The solution isn't really lacking features per se. The product does need better support in the cloud environment. It's not exactly cloud-native right now. The solution needs to do more on the deployment in the multi-cloud. For example, clients have GCP and AWS. How do we deploy FortiGate in a cloud environment? Right now, there's no solution for that. We're worried that the scalability isn't as good as it could be.
Deputy Manager Of Information Technology at Nitco Limited
Real User
2020-12-29T09:29:46Z
Dec 29, 2020
The only challenge that we are facing is that a good internet connection is required for VPN stability. Some of the web policy reports could be improved. There are reports generated that show exactly which user is using how much bandwidth, and which sites they have been browsing. We should have a way to show that on a single screen. As it is now, when I click on a user, the information shows on another tab.
We would like to see an upgrade to the VPN feature, we are using the VPN from outside of our office and there is a limitation to 10 connections, more connections would be suitable. Also, the security could improve on some features that are available.
There is room for improvement. When it comes to email spam detection, Baracuda is the highest or the best, Cisco is the lowest, and Fortinet FortiGate is in the middle. Application management can be improved. Analysis and sandbox can also be improved in the next release.
Solutions Engineer/Consultant at a tech services company with 11-50 employees
Real User
2020-12-23T23:08:27Z
Dec 23, 2020
FortiLink is the interface on the firewall that allows you to extend switch management across all of your switches in the network. The problem with it is that you can't use multiple interfaces unless you set them up in a lag. Only then you can run them. So, it forces you to use a core type of switch to propagate that management out to the rest of the switches, and then it is running the case at 200. It leaves you with 18 ports on the firewall because it is also a layer-three router that could also be used as a switch, but as soon as you do that, you can't really use them. They could do a little bit more clean up in the way the stacking interface works. Some use cases and the documentation on the FortiLink checking interface are a little outdated. I can find stuff on version 5 or more, but it is hard to find information on some of the newer firmware. The biggest thing I would like to see is some improvement in the switch management feature. I would like to be able to relegate some of the ports, which are on the firewall itself, to act as a switch to take advantage of those ports. Some of these firewalls have clarity ports on them. If I can use those, it would mean that I need to buy two less switches, which saves time. I get why they don't, but I would still like to see it because it would save a little bit of space in the server rack.
Data Center Operations and Customer Support Manager at a tech services company with 51-200 employees
Real User
2020-12-23T11:59:09Z
Dec 23, 2020
The feedback that I have received is that the performance could be better, and the user experience is not as good compared to a previous solution we used. It could be more user-friendly. Of course, it still works fine for our operations.
They are doing good, but they can improve the distributor assignment. The availability of the product and the timeline of delivery are the main things. The distribution should be swift, and the distributor should not reach out to end customers directly. They should work as a distributor. There should also be one more local distributor. Currently, there is only one distributor in Pakistan, and the rest of them are in UAE. It is difficult to work with only one distributor. Sometimes, you don't get along with the same distributor, and that's why they should have one more distributor. Their licensing should also be improved. The activation or renewal of the product should be done from the date of renewal, not from the date on which the license expired.
In terms of the product, we don't have anything to improve. But I have a concern about the FortiGate team here in Egypt, because there is an opportunity that we are working on and when we opened it and did the deal installation, it was rejected. When I talked to the FortiGate team here in Egypt, they told me they know about the deal, but they rejected it. Additionally, they could make some modifications in the license. There are some license issues. Not every feature must have a separate license. There must be some kind of synergy between the license so we don't have to pay for every individual license that we would like to have.
IT Infrastructure managerInformation an Communication Services Manager at a agriculture with 5,001-10,000 employees
Real User
2020-12-16T03:13:19Z
Dec 16, 2020
We have an issue with the license when it expires because we're unable to use the computers. We are in the hotel industry and there's an issue with vouchers when guests come in wanting to use them.
IT Infrastructure Specialist at a government with 1,001-5,000 employees
Real User
2020-12-11T16:08:25Z
Dec 11, 2020
Its reporting capabilities can be improved. Some out-of-the-box reports needs to be able to provide usable data for example for web monitoring and reporting or browsing patterns and details. Some customers does not require any forensic type reporting and may not want to invest in all the features offered by the FortiAnalyzer.
I would like to see the product updated more frequently. In the future, I would like to see improvements made to cloud-based management. They already have some features for this, but it's very basic.
In terms of what can be improved, they do have certain features that you can only configure through a CLI and there's no GUI interface for it. That's a pain. But it's nice that the user can do everything one way or the other. They sometimes hide some features and if you want to enable them, you have to go in the CLI, enable the feature and configure it through the CLI. Customers, typically, like everything to be done by the GUI.
IT Infrastructure Engineer at Communication Progress
Real User
2020-12-08T16:51:55Z
Dec 8, 2020
I think some improvements could be made in vulnerability scanning. I'd also like to see additional features in the authentication. They support RADIUS, LDAP but the solution doesn't have API integration with other solutions. They have API in FortiAuthenticator, but not in the firewall and not all customers want to buy another solution.
Sales Engineer - Sênior at a tech services company with 201-500 employees
Real User
2020-12-08T15:30:07Z
Dec 8, 2020
I'm not sure if the solution is really lacking anything major. For us, it works okay. They seem to have made a lot of improvements since the last release. Technical support could be better. You don't always get the level of help you need right away.
Head Of IT Infrastructure at a financial services firm with 1,001-5,000 employees
Real User
2020-12-08T12:00:18Z
Dec 8, 2020
It's difficult to add or define, and it's not that easy to configure and manage. We're looking for something more flexible for the long term. I also find that the performance is limited in comparison to other solutions.
IT Director at Guangdong Technion Institute of Technology
Real User
2020-12-07T12:07:00Z
Dec 7, 2020
In terms of what could be improved, the FortiGate support could do some improvements on their IPv6 configuration. Right now it's still in the very early stage for utilizing in an enterprise level network environment In terms of the FortiGate IPS, we haven't gotten additional tools because they are not free, and we have to purchase them to maximize this IPS feature. As long as they can perform some basic functions to meet our business needs, that is okay. I'm okay with this feature right now, so far. In the next release of FortiGate the price could be better.
Product Manager at a comms service provider with 1,001-5,000 employees
Reseller
2020-12-07T10:32:47Z
Dec 7, 2020
Fortinet currently has many products bundled with FortiGate including the basic firewall and load balancer, and I think that that they need to have separate product portfolios for each of these specialized services. When it comes to large deployments, I don't think it's a good plan to have all of these services in a single box. I think that they should introduce in-line security at the packet level, where they can do filtering and other firewall functions. It should not comes down to the infrastructure level but rather, offer services at the ISP level.
The product has enterprise capabilities, which means there are a ton of configurations possible. What I'd like to see in the product is more of a branch in the box wizard deployment for those that are not as well versed in firewall and routing. For a small business, the firewall should be able to self-configure for a Unified Threat Management configuration with 2 SSIDs for protected wireless network for internal gear and a guest wireless network for employee cell phones and guests. I'd like to open the box, plug in the router behind the cable modem, and check a few boxes, and the rest is done automatically. I don't want to have to build a configure VLANs, SSIDs, security protocols for each port, and try to figure out and understand all the layers in an effort to deploy a solution. It's great to have those capabilities in case you need them, but for most of the offices I am trying to deploy these into--it should be a branch in a box.
Security Systems Analyst at a retailer with 5,001-10,000 employees
Real User
2020-12-06T06:26:41Z
Dec 6, 2020
If I had any criticism that I would give FortiGate, it would be that they need to stop changing their logging format. Every time we do a firmware upgrade, it is a massive issue on the SIM. Parsers have to be rebuilt. Even the FortiGate guys came in and said that they don't play well in the sandbox.
Network Systems Engineer at a tech services company with 501-1,000 employees
Real User
2020-12-06T06:26:41Z
Dec 6, 2020
Fortinet is a very big product. It has FortiGate, FortiWiFi, FortiSwitch, email security, etc. Due to this, they have some weaknesses in the ISPs, the services. They could improve these aspects. Hotspot services especially could be a lot better. There are just some services that aren't available. For example, the Ethernet or point-to-point protocols. They could add these services to their product offering - especially services for ISPs.
Firewall Engineer at a marketing services firm with 1-10 employees
MSP
2020-12-06T06:26:40Z
Dec 6, 2020
The cloud management should improve. There are other manufacturers that have better management cloud solutions. Aruba, for example, is very good at this aspect. Fortinet could look to them as a model of how to do something interesting with management solutions. Fortinet across the board needs to improve the LAN aspect of their products. The solution lacks multi-language support. They could offer access points to small companies and firewalls at those access points. Aruba, in that sense, is much better for smaller organizations as they provide this possibility.
GM: Information Systems at a logistics company with 501-1,000 employees
Real User
2020-12-04T13:50:13Z
Dec 4, 2020
It should provide better visibility over the network and more information in the form of reports for the end users. Its installation should also be easier.
Officer / General Manager Software R&D Laboratory at a manufacturing company with 501-1,000 employees
Real User
2020-12-03T17:54:25Z
Dec 3, 2020
The support could be improved upon somewhat. The performance could be a bit better. Right now, I find it to be lacking. Having good performance is very important for our work. The command line operation is a bit out of our depth.
IT & PPN Coordinator at a manufacturing company
Real User
2020-12-03T16:04:03Z
Dec 3, 2020
The solution needs to improve its integration with cybersecurity. While in general, it's pretty good, this is always a concern as the landscape shifts constantly. They need to ensure they stay on top of things so that their security and integrations stay constantly up to date in order to protect our company.
Telecommunications Engineer at a university with 1,001-5,000 employees
Real User
2020-12-03T07:46:04Z
Dec 3, 2020
Technical support is good but the response time could be faster. When it's overloaded, it works slower and overheats. The data analysis could be improved.
Technical Account Manager at DSM Technology Consultants, LLC
MSP
2020-12-02T18:11:21Z
Dec 2, 2020
I don't like that anything more than very basic reporting is not included. You have to buy their cloud module that's an add-on for getting more customized reporting. It has just about everything that we are looking for and the customer is needing. It's just the reporting part that is lacking in the base application. Technical support could be improved.
The biggest "gotcha" is that if the client purchases what they call the UTM shared bundle, which has unified threat management on both, it's not as easy to manage if you have more than one firewall. If I wanted a unified console, I have to pay extra. And that's the downfall. That's the only needed improvement that I would say for the Fortinet solution, is that they should have it web-based from the get-go. You should not have to buy an extra bundle or an extra device. If I have to make an update to a web filter, and I have 12 devices, I've got to do it in 12 places. If I don't want to do that the client can pay for a pretty expensive device or virtual appliance that does that for them. It's like an expensive centralized management tool. That's the big downfall of Fortinet. It doesn't come included, you have to pay for it. Their web-based one, that's sort of just like an inventory manager. It's not really good for distributing roles. With Cisco, you don't have to do anything. The one from Aruba HD has one too. Fortinet should try to be similar to those options. In the next release, it would be amazing if they could give a better tool for upgrading, so that if I upgrade from an older version to the other, it can read the configuration and processes it for me so that I don't have to rewrite it from scratch. In FortiConverter, they have a tool like this, however, it doesn't work well. It's really more for bringing items in from other vendors, not from one version to the other. That was my last experience where they operated from version five to six. However, that's really the only big thing. The main thing is to include the FortiManager cloud software like Cisco does. To have one solution. If you paid $150 a year for the support, you might as well get that too so I could manage all the devices at one spot. They do have FortiCloud, however, it's not the same as the way Cisco does it. They are selling another product called FortiManager. FortiManager should be included with the support, and that would make it more of a business solution, rather than a feature request.
It should have a better pricing plan. It is too expensive. It should also have a more granular view of the attack. I don't have FortiAnalyzer, and it is difficult for me to have a complete view when there is an attack on my server.
Technical Lead at a tech services company with 10,001+ employees
Real User
2020-11-26T18:55:47Z
Nov 26, 2020
The search tool needs improvement. It's very difficult to search for policies right now. When we need to engage with the endpoint or our customer during an investigation, there should be a way to investigate the issues without the need for the customer to be present. It would make it much easier.
Sales engineer/Technical support engineer at Vietnet
Real User
2020-11-21T08:42:00Z
Nov 21, 2020
The central management for the FortiGate Fortinet Firewall needs improvement. They have the manager to do the essential management for both SD-WAN and the security policy. They should also improve the SD-WAN function.
Technical Services Manager at ProComm technologies
Real User
2020-11-20T16:42:56Z
Nov 20, 2020
It should be more stable. There should be full integration within Fortinet products themselves as well as with other third-party products. Especially when you're not dealing with SIEM and the correlation of the security box, we want Fortinet to be able to share that information with as many other products as it can.
Firewall Engineer at a marketing services firm with 1-10 employees
MSP
2020-11-19T19:51:00Z
Nov 19, 2020
The PPPoE server protocol with a connection to a Radius server is used a lot by ISPs and not so much by the end user. I think it would be great to see this solution with the protocol developed for ISPs.
Information Security at a financial services firm with 51-200 employees
Real User
2020-11-19T05:38:13Z
Nov 19, 2020
Fortinet is huge in today's market and they've become quite expensive. I think there are products at the same level as Fortinet, but with better prices. They've changed their subscription plan and are now forcing companies to subscribe 24/7.
Chief Information Officer at a analyst firm with 10,001+ employees
Real User
2020-11-18T13:22:00Z
Nov 18, 2020
It could be more stable and secure. They can improve the ability to make changes, change requests, and provide more rounded monitoring in terms of security and potential threats.
Deputy General Manager Information Technology at a media company with 201-500 employees
Real User
2020-11-13T14:33:09Z
Nov 13, 2020
The visibility of the network can be better. The GUI can be improved for better visibility of the network flow. Other solutions have better GUI in terms of network visibility.
Solution Architect at a tech services company with 51-200 employees
Reseller
2020-11-12T18:37:56Z
Nov 12, 2020
Fortinet is good in terms of security and threat prevention, but they are not leading. For example, the signature database can be improved. If they had better integration with security products, such as Cisco ISE or Rapid Threat Containment, then it would be an improvement. Customers that have ISE implemented are able to provide inputs based on malicious traffic, and then ISE will automatically block it.
Director at a tech services company with 51-200 employees
Reseller
2020-11-11T08:22:00Z
Nov 11, 2020
I'm from the sales side and therefore I wouldn't really know if there are features that are lacking. It's my understanding that more of the current generation features could be brought in. There could be more integration with EDRs, for example.
System Administrator at a computer software company with 501-1,000 employees
Real User
2020-11-11T08:12:05Z
Nov 11, 2020
There are a lot of known issues in some newer versions of the FortiGate operating system, so there is room for improvement with that. One of the problems I was having was with user mapping, and it is an issue for which I have escalated tickets with Fortinet support. Having the newer features work in the older, more stable versions of the product would be great. Some of the new features might really help a lot, but there are problems with stability.
The commercial side of things can be improved a bit. They have such a good product, and when you disable some features, it has to be commercialized for you to enjoy those features. Therefore, you are actually buying half a product. You have hardware there, and yet, your features are not enabled. The primary things, such as the antivirus, web filter, DNS filter, application intrusion, file filter, and email filter come with the general license. There are other things that you want to also enjoy in this system and you can't. There are SD-WAN network monitoring, SD-WAN features, Industrial Databases, Internet of Things, Detection, etc., however, we do have not licenses for those features. We thought that if you bought a product, you should have all of the features it offers. Why should you need to make so many extra purchases to enable features? They should have one price for the entire offering. That's one of the drawbacks they could look at. Sometimes the firmware automatically updates itself. Then it corrupts the configuration and you have to roll back or you have to do amendments to the configurations. That, however, has happened only once with us. We have put in controls for automatic updates to stop them and now we do manual allowance or we allow the manual update. Most of the features are good. They give you pricing and you get a VPN for about 10 users where you can test it. For us, we feel that we need to buy extra licenses due to COVID, as people are working from home. Under the current conditions, we are not getting the best out of the firewall. They could just maybe put better graphics or better reporting into the solution. I want to know who is the user and what is the exact website they're visiting. Something like that would help. They should do more like what the GFI is doing.
Network Engineer at a comms service provider with 51-200 employees
Real User
2020-11-07T07:35:23Z
Nov 7, 2020
Some of the features in the graphical user interface do not work, which requires that we used the command-line-interface. We have problems with that. Log retention should be greater than 24 hours.
If it would integrate everything in one place then it would be an improvement. I wanted to buy some switches and integrate them into the system, but we couldn't find anyone here in Israel to provide them or to provide support. Also, we could not get a replacement if something needed to be replaced. We wanted to use one vendor to do everything from one managed central management point. It may be something they offer now, but I am not sure. It would be helpful if we can have one easy place to manage, or from the cloud to all the devices that are at the client's location. This is the backbone, the switches, the access points, FortiGate, everything. Sometimes you do need to know some CLI commands, so it's a bit harder for technicians or new people that don't know it. So, if you could do everything without that, it would be much easier when you do V-LANs.
The only thing is sometimes you have to learn with CLI. For those not familiar with CLI it can be an issue. It would be ideal if we could avoid using CLI. If you make a mistake in the command line, it's harder to detect. It would be much better if they had a user-friendly GUI. The initial setup is complex.
Quality control on their firmware versions needs improvement. When they introduce new firmware, there tend to be bugs. I would like the licensing price to be better. It would be nice if it were less than 25 percent of the hardware costs.
Branch Manager at a tech services company with 201-500 employees
Reseller
2020-11-02T21:24:05Z
Nov 2, 2020
There are some cloud-based features that could be much more flexible than they currently are. It's my understanding that they are currently working on improving the cloud solution quite substantially.
Head of Customer Success at a tech services company with 51-200 employees
Real User
2020-10-28T22:16:17Z
Oct 28, 2020
I would like to see a more intuitive dashboard. Technical support can improve in knowledge sharing and they can implement better. The dashboard appearance needs to be more refined. It has to be smoother and more customer-friendly. As the cloud is more prominent and more are moving towards the cloud, people are used to certain ease of doing things, and less complicated. I understand that a firewall is a technical product, but we can try to make it a better customer experience which will increase usability with good results.
In the enterprise proprietary world, Fortinet, in my experience, considering its cost and reliability (maybe they could bring the price down or maybe they could make more plans), I honestly don't think that there is much room for improvement. I think it's a pretty good solution for anyone who is looking for a proprietary solution. I wouldn't look anywhere else. Cisco, for example, is probably way overpriced. Fortinet on the other hand, one of their strong sides is that they have an all-encompassing solution with a very reasonable price point. Cisco and other brands are a little bit more modular — to get everything you'd have to buy a lot of different packages. An automated guide feature or templates that you could pick and choose would be a nice addition. It's definitely not as easy to look at traffic as I would like. Sometimes when I'm trying to see what traffic has been blocked or what traffic has been passed, it's not as easy as I would like to filter it out or to monitor bandwidth. The monitoring is not as good as it could be. It could be a lot easier to understand. For example, I was trying to figure out, in a given timeframe, how much was downloaded off of a certain interface and I didn't really understand how I could get that information or if it was even available. I was searching the documentation online and I couldn't even figure it out. Monitoring and reporting could be better; It's very good, but there's definitely a lot of ways to improve it.
System Administrator at a financial services firm with 5,001-10,000 employees
Real User
2020-10-26T14:49:14Z
Oct 26, 2020
For me, this solution has nothing to improve and it meets the needs that I have. I don't see any way to improve, at least from my point of view on regular use. In the next release, maybe the documentation on how to use this solution could be improved. What I have noticed is that when we have done some configurations directly from the command line, there is not a lot of information regarding splitting.
FortiGate is really good. We have been using it for quite some time. Initially, when we started off, we had around 70 plus devices of FortiGate, but then Check Point and Palo Alto took over the place. From the product perspective, there are no issues, but from the account perspective, we have had issues. Fortinet's presence in our company is very less. I don't see any Fortinet account managers talking to us, and their presence has diluted in the last two and a half or three years. We have close to 1,500 firewalls. Out of these, 60% of firewalls are from Palo Alto, and a few firewalls are from Check Point. FortiGate firewalls are very less now. It is not because of the product; it is because of the relationship. I don't think they had a good relationship with us, and there was some kind of disconnect for a very long time. The relationship between their accounts team and my leadership team seems to be the reason for phasing out FortiGate.
Security Solutions Architect at Verizon Communications
Real User
2020-03-05T20:17:00Z
Mar 5, 2020
To the best of my knowledge, Fortinet does not have a CASB solution and Fortinet does not have a Zero trust solution. Fortinet claims to do everything Zscaler is capable of and I'm looking for a comparison between the supported features. Fortinet VPN and DDoS capabilities are great, yet we need to provide a solution that enables CASB and integration to the cloud.
We are managing FortiGate using a FortiManager and it needs improvement with respect to the ease of administration tasks. There is a lot of improvement needed with SSL-VPN. Technical support could be improved.
Improvement is needed in the Web Filter quotas to restrict users with allocated quotas. It would be an improvement to add a feature for active users to change/reset their own passwords. Fortinet renewal prices for all models are too high, so they should offer discounts for customers on renewal.
FortiWAN was supposed to help in doing intersite linking, but we've realized that most of the ISPs use BGP. FortiWAN supports OSPF but does not support the BGP protocol. This is a problem for us because without BGP they are not doing anything, and we've had to pack them up. I would like to see the BGP protocol supported on FortiWAN. Technical support for this solution can be improved.
This product could be improved with active directory integration and better handling in IPsec and GRE Tunnels. There are not enough recent online materials to assist in integration with Cisco for VPN, GRE, and IPSec.
I use the FortiGate 60D model and realized the 300Mbps bandwidth limitation. Because it is a product that offers many services, I think it could have greater bandwidth capacity.
It is mainly our own application of FortiGate that we need to improve. If you compare FortiGate to any other products, all of the other products have more signatures. I couldn't find that many signatures available in the application. Some features of Fortinet FortiGate are actually fee enabled that are inconvenient for deploying in production. Other issues relate to isolation with Cisco products and your server. Fortinet should make it so that we are not able to use analytics from Cisco at the same time that FortiGate is installed. We are not able to do real-time network monitoring. For the next release, FortiGate should be improved to support these issues. For the setup, you need to prepare a lot for that before engaging the deployment. I learned a lot about FortiGate from books. That should be important in preparation. Fortinet should implement these changes, then we would be able to do more.
Directorate at a wholesaler/distributor with 51-200 employees
Real User
2019-04-18T09:59:00Z
Apr 18, 2019
The reporting needs to be improved. Also, the VPN (Virtual private network) monitoring needs improvement. Beyond these improvements, I cannot think of any additional features that I would like.
IT Specialist 3 at a financial services firm with 51-200 employees
Real User
2019-03-26T08:09:00Z
Mar 26, 2019
They should improve the interface to make it more user-friendly. I would like to see some sort of reporting if there was an issue with the connecting network sources or connections.
Senior System & Security Administrator at a legal firm with 51-200 employees
Real User
2019-03-26T08:09:00Z
Mar 26, 2019
Fortinet needs more memory to save the log files (like in the 101E, the old product). We need it to save the logs on the hardware and not in the cloud. I know this feature is available in FortiCloud, but if we need to log locally, it is not available. Also, the log only records a little time and needs to be longer.
The Fortinet FortiGate firewall has been improved with many new functions. Fortinet is working to develop a new generation of firewalls with better security. Fortinet already improved FortiGate, but in the current market, many brands of security devices have improved together. Fortinet still needs to catch up with market standards. Fortinet is lacking in features in comparison to competitors.
The FortiGate reporting system needs to be more detailed about files. Palo Alto Networks is more detailed in the reporting system than Fortinet. Currently, as for our security, we don't need more. The main reporting in Palo Alto Networks is much more developed than Fortinet, especially in the part of the file exchange. As a security lead, I think Fortinet FortiGate is much more reliable than Palo Alto Networks.
Solutions Architect at Universal Access and Systems Solutions
Reseller
2019-03-12T07:26:00Z
Mar 12, 2019
Flexibility is questionable when it comes to the hardware parts. If Fortinet can make FortiGate modular so that you can actually upgrade it without changing the parts, I would prefer it. If Fortinet FortiGate could actually integrate with the hybrid cloud architecture without changing the storage parts, i.e. the hardware, it would be better.
Fortinet could improve the windows opener or the virtual IP solutions for opening windows. The virtual IP settings need improvement as firewalls are trending in new development directions.
We have many users currently with this solution. One issue that I have had is that sometimes I need to monitor the traffic, so I need to filter it according to the user and which user is using it the most. I experience a bottleneck most of the time, particularly at peak time when the number of contracts and users are at maximum. We feel a kind of bottleneck. When I first entered the log section, I could not find any results. I did not find any proof, i.e. reporting and analytics on the speed and network availability were not optimized. I could not find any such log from the server, maybe Fortinet could improve this service.
The main aspect of FortiGate that could be improved is load balancing. Our management team does not want to buy another appliance for only load balancing. The network routing with Fortinet FortiGate can be an issue, but it generally depends on the size of the company.
Branch Manager at a computer software company with 11-50 employees
Consultant
2019-02-26T08:25:00Z
Feb 26, 2019
I recently saw the new updates that are coming, such as the ability to quarantine a user's machine. Once done, you have the ability to connect to it from the FortiManager Console and you can bring it back online, out of quarantine. This is all very good news. One of the areas that I feel need improvement is on the DLP (Data Leak Prevention) side of things. Compared to some other products, the DLP is not at par for the moment. Also, if in the next few years this solution can be made to support HE between models, it would be better. I feel that improvements can be made on the security side. Sometimes the product does a good job, but sometimes not.
Since we are in the initial stages of implementation I can't suggest any additional features for the next release. At this point, I really need more time to evaluate the tool. The only thing I can recommend at this time is to make improvements for the user end when the user website is running slowly; the speed can definitely be improved. There is room to include IP wise and net-wise and bandwidth settings.
System Administrator at a media company with 11-50 employees
Real User
2019-01-10T08:22:00Z
Jan 10, 2019
We had a minor problem where there was a major system upgrade on the hardware platform and the Apple Mac client was not available as soon as it might have been. The PC client was available immediately, but we had to wait a month or so, before there was a Apple Mac client. I was slightly irritated that it was not ready on time, but it was eventually resolved.
I think there could be more QoS features in GUI. FortiGate has Traffic Shaping feature that is enough in most cases when shaping egressing packets, but sometimes I just need 802.1p prioritizing (Class of Service) of incoming packets and manual ingress queue assignment. This is what would be nice to have, but I realize that such a job is more efficiently done by L4 switch standing before firewall. Fortinet has a FortiSwitch that can do it, and it also can be controlled by FortiGate via FortiLink protocol. [Firmware version FortiOS 6.2 update]: There are a lot of improved and newly added things, so it is very hard to imagine any additional features.
Fortinet FortiGate enhances network security, prevents unauthorized access, and offers robust firewall protection. Valued features include advanced threat protection, reliable performance, and a user-friendly interface. It improves efficiency, streamlines processes, and boosts collaboration, providing valuable insights for informed decision-making and growth.
The anti-malware engine could use an upgrade. It should automatically classify and sandbox malicious packets with more granular controls, including providing details like TV numbers.
I just don't like giving products ten out of ten. There's always something new that can be added or fixed.
The platform's compatibility with Wi-Fi equipment needs improvement. Sometimes, the Wi-Fi units don't work, or one of the networks stops working, and we have to reboot the FortiGate client's endpoint.
The advanced models are expensive.
Ideally, I'd like to see most CLI configuration options exposed in the GUI to avoid manual command typing. However, there should be a more user-friendly approach than simply replicating everything in the GUI. Alternatively, some users might prefer scheduling tasks through commands for automation.
The graphical user interface of Fortinet's FortiGate product does not function well with text-based interfaces. This functionality should be improved.
There is room for improvement related to the logging and reporting aspect. It was somewhat challenging as I delved into the logs during an incident. Navigating through the logs to trace the specific information we needed, as well as generating the corresponding report, proved to be less intuitive. In comparison, when considering Sophos XG, which we also use, the logging and reporting functionality is notably more efficient.
The process of configuring firewall rules appears excessively complex. While FortiGate offers greater functionality than other firewall solutions, its user interface could benefit from simplification. I would like the log viewing process to be improved to provide a clearer understanding of the logs.
We'd like to see the product offer higher discounts to users. They should offer special pricing to premium partners and customers.
The log analyzer, for instance, is a product being developed as a common solution for multiple FortiGate devices. Consequently, the log analyzer's functionalities are not fully integrated into the individual FortiGate products. I would prefer to have more detailed logs within the FortiGate products themselves rather than relying on a separate tool. While Fortinet claims to offer a comprehensive network solution, it falls short in addressing computer application issues, particularly server security. Fortinet's capabilities are primarily focused on network security.
Fortinet needs to overhaul its documentation. Our current reliance on outdated documentation has resulted in significant time wastage. While we can locate the necessary documentation, the constant daily revisions necessitate meticulous identification of the relevant documents to prevent the use of outdated information that could jeopardize our environment. At the very least, Fortinet should classify its documentation to clearly indicate the applicable version, as our attempts to do so manually are becoming increasingly tedious.
Overall, we are satisfied with the product. However, we encounter occasional capacity issues. The FortiAnalyzer, being a hardware appliance, has limited expansion capabilities. As our organization has grown, we've outpaced the FortiAnalyzer's performance. The inability to scale the FortiAnalyzer to match our growth necessitates the purchase of new hardware. This is an area that could be improved. If we anticipate reaching the size of six countries within the next five years, investing in a solution that can accommodate such growth would be more cost-effective than repeatedly purchasing new hardware. The ability to scale the FortiAnalyzer in tandem with our growth would be a significant improvement.
We'd like to see what they will do when AI attacks are generated. They will need to ensure their prevention continues to be exceptional. The solution isn't missing any features. Maybe they could make some features more accessible, such as a way to translate directions between two networks that share the same subnets.
I was not looking after the operations part, but sometimes, I did get engaged in some critical activities related to operations. There are some caveats in every product. Tunnel flapping was one of the major things I had seen wherein your internet link remains but your VPN tunnel is down. However, since I got a fix from the TAC team, I have not noticed it, but the customer complained a few times that they couldn't access the internet because of this problem. There were tunnel issues where there was already established connectivity, but at the kernel level, there were some issues. For example, there's a feature for auto-site connectivity wherein whenever it automatically creates a new tunnel, at the kernel level, it also creates an interface. Sometimes, that interface crashes and a new interface could not be created, which results in connectivity loss. Fortinet has established itself in the SMB market segment. It's doing pretty well in that space, but when it comes to the enterprise segment, they are lagging a little bit. It all boils down to the performance of the hardware. If I enable all of the security features available on my device, the throughput degrades quite a lot. If I have put 10 GBPS of throughput on a firewall and I enable all of these features available, such as IPS or UTM functionalities, the throughput comes down to 1 GBPS.
In some cases, its initial setup could be hard for customers.
There is some development gap. We had experienced bugs in their operating system. When we were planning to upgrade it, there was no patch available for a bug, and the support team was saying that they need to work on that. That's the part they should work on. There are some complex administration tasks in their administration portal. That needs to be improved.
Palo Alto has a feature called WildFire Analysis that is unavailable in FortiGate. WildFire is better than a sandbox because it can address zero-day threats and vulnerabilities. It can immediately identify zero-day threats from the cloud. Fortinet uses a separate solution called FortiSandbox. It needs to download signatures to identify malware, which takes significantly longer. WildFire is a cloud-based platform that collects threat information from users worldwide.
In the past, NSS Labs was utilized to test files and verify the numbers and datasheets. It would be beneficial to have an organization or testing lab that can verify the numbers in our datasheets since changes are frequently made, which can be inconvenient for review. For instance, when comparing different competitors such as Forcepoint, Palo Alto, and Check Point, the throughput or numbers in the datasheet may be lower than the actual numbers. Conversely, Fortinet typically reports very high numbers, but they cannot be replicated in the real world. Therefore, it would be advantageous for them to partner with a neutral testing organization such as NSS Labs to validate these numbers, thus providing more credibility and comfort to everyone regarding the accuracy of the datasheets. For the migration, everyone has a firewall in use and I am selling Fortinet. Typically, I am replacing another firewall. Previously, there was a tool available to convert configurations from one firewall, such as Palo Alto, to Fortinet, but this tool is no longer free. If it could be made free again, it would be very beneficial. This tool shows a lot of promise and is very good. Making it free would help many companies deliver their products in a more efficient and integrated way. It would also be more valuable to include the tool with the firewall package or license instead of having to pay extra for it. Paying extra puts more pressure on small companies to deliver the firewall and complete the configuration, especially if they have hundreds or thousands of policies. It is very painful to move through these policies line by line. The stability has room for improvement.
In the past, NSS Labs was utilized to test files and verify the numbers and datasheets. It would be beneficial to have an organization or testing lab that can verify the numbers in our datasheets since changes are frequently made, which can be inconvenient for review. For instance, when comparing different competitors such as Forcepoint, Palo Alto, and Check Point, the throughput or numbers in the datasheet may be lower than the actual numbers. Conversely, Fortinet typically reports very high numbers, but they cannot be replicated in the real world. Therefore, it would be advantageous for them to partner with a neutral testing organization such as NSS Labs to validate these numbers, thus providing more credibility and comfort to everyone regarding the accuracy of the datasheets. For the migration, everyone has a firewall in use and I am selling Fortinet. Typically, I am replacing another firewall. Previously, there was a tool available to convert configurations from one firewall, such as Palo Alto, to Fortinet, but this tool is no longer free. If it could be made free again, it would be very beneficial. This tool shows a lot of promise and is very good. Making it free would help many companies deliver their products in a more efficient and integrated way. It would also be more valuable to include the tool with the firewall package or license instead of having to pay extra for it. Paying extra puts more pressure on small companies to deliver the firewall and complete the configuration, especially if they have hundreds or thousands of policies. It's very painful to move through these policies line by line. The stability has room for improvement. When it comes to Secure SD-WAN, everything is fine. They are going the right way. SD-WAN is very promising. They can provide the SD-WAN solution separately, but they will not take this approach because even the smallest firewall can support the features, so there is no need to have a separate service or appliance. They are following the right steps, and there is nothing to be improved. Feature-wise, I'm really satisfied with the new release, and the features they have added. For now, it's fine.
There are mainly two areas of improvement in Fortinet FortiGate— the licensing cost and the timing of upgrading licenses for boxes. FortiGate's renewal cost is quite high, and our customer care team also receives complaints about it. The renewal part of the firewall is expensive. If a customer pays for the license in advance, they may lose their privileges. For example, if the license of a box expires in one or two months, and the customer wants to upgrade, there are three to four months between the operation and the end of the current license. If I purchase a new license, it will only take effect from that date. So, it fails in the backward fetch, and I am currently busy setting it up. But if the customer is not processing the card for six months, they will not benefit from the system.
The pricing could always be better. It is very expensive. We'd like to see Fortgate include WAF services. The maintenance of the product can be a bit difficult.
I would like to see improvements in the product's application rules.
They need to improve features related to mobiles with more and more customers adopting that as their way to manage things. They need to look to the future with their features and meet filtering requirements which the solution cannot currently do.
The routing capability on the FortiGate devices has room for improvement.
In their IPS Web Security Gateway, the reporting functions need to be a little bit more user-friendly for how to get the reports from it. That's one of the reasons why we don't use that function. With the reports, you can see it, and you can get good feelings so upper management can go, "Oh, wow. That looks pretty." However, it's very basic.
Fortinet FortiGate needs to improve the protection, it did not prevent us from being attacked. Additionally, Fortinet FortiGate could provide more features for WAF devices. I should not have to purchase two solutions, it would be a benefit to combine these features into one solution. The main challenge to IT is hacking, and damaging the network software. Anything that can make a threat to our servers, accounts, VC, from an email or internet connection. We need all companies to make investments to improve the facilities of these devices in order to provide a one-package solution to protect our servers, and systems from any hacking, ransomware, virus, any command, or any other threats. They need to improve all the security features.
It can be a little bit more user-friendly in terms of policy definition and implementation. It seems a little bit complicated, and it could be simplified. When there is a change in the IP address from the ISP, there is some disruption in the service. So, we try to do it when we have the least number of people working, which means very late at night. So, for the time being, it is working fine.
My only complaint about FortiGate is a lack of QinQ VLAN tunneling. I haven't found this feature in any Fortinet product. You can do this on all Cisco routers, including the smaller models. However, QinQ isn't available on the biggest, most expensive Fortinet units. They still don't have that. I think now we're on software version 6.0, and they still haven't found a solution for QinQ. It isn't a dealbreaker, but that's my main complaint.
Fortinet FortiGate could improve the user interface. There should be more functionality and options through the GUI.
Fortinet Fortigate could benefit by simplifying some of their processes. For example, if you are using Cisco, and you want to find a source and a destination, you type the IP of the source and then the IP of the destination. Cisco will find any denied packet by highlighting it in yellow. To access it with Cisco, all you need to do is right click. FortiGate is not that simple.
One of the features that I would like to have is endpoint protection, this should be integrated. For example, the firewall gets notified of any kind of forensic event that needs to be done, such as if there is a ransomware attack and how it originated, all those records have to be available from the firewall, which is not.
Fortinet FortiGate should improve the VPN tokens. The upgrades should be reviewed more frequently, such as daily, to avoid any corruption or issues that can happen, without losing my VPN client. We should not need to downgrade the solution to fix the problems until the Fortinet FortiGate support solves it.
In an upcoming release, Fortinet FortiGate should add an SD-WAN feature.
Fortinet FortiGate could improve by having a frequent ask questions(FAQ) area for people to receive quick answers to popular questions. Additionally, it would be beneficial to have an SMS notification feature. For example, if you cannot access your email you could receive an SMS message.
Fortinet FortiGate can be integrated with different platforms. They have integrations in place, but I can't say they're 100%.
Fortinet FortiGate can improve the integration with Active Directory. Additionally, I would like to have a Cloud Controller, such as they do in the Cisco Meraki solution.
An additional feature I'm expecting from Fortinet FortiGate is for it to have an analysis feature, rather than having the analysis done via integration with a different product.
In Brazil, the main problem that we have is related to the protection from various attacks and ransomware in the public sector and the commercial sector. The main focus in Brazil is to deploy a solution to counter-attack ransomware and other attacks. There can be more security in hybrid implementations. When a customer has a hybrid environment where some parts are in the cloud, we need a consistent security solution for such scenarios.
I would like Fortinet to add more automation to FortiGate.
I think that the infrastructure for the VPN could be improved. The way that it is bundled also made it difficult to use and sell as it is too expensive.
The cloud management and automation capability could be improved.
I would like reporting to be improved and should offer a lot more tools to monitor the products.
There are limited features. Scalability could be improved. The issues with the IOS are that they occasionally hang. They are not as reliable as they once were. When there is an issue with IOS, new updates are introduced, but the updates also have a lot of issues. Performance and technical support are the main issues with this solution. When compared to Cisco ISE, the device administration is not very good. Fortinet is not very good at firewalls when compared to Cisco. Cisco offers full administration control, TripleA, SQT, they use TACACS security protocols, and they have much more control. Cisco's approach is superior.
They have to just improve its performance when we enable all UTM features. When you enable all the features, the performance of FortiGate, as well as of Sophos and SonicWall, goes down.
It is quite new for us, and we need to go more in-depth into the monitoring tools. It provides different features that we need to do what we want. So far, it is okay for us. In terms of improvement, in the future, they can provide a faster implementation of features. Some of the features are first available in other solutions. Fortinet sometimes takes a little bit longer than other solutions, such as Check Point, to implement new features.
It is very expensive, and their support is not very good. I hope that their technical support will be better in the future. In terms of new features, it is a complete product. I don't expect any new features.
Fortinet FortiGate could improve by having better visibility. Palo Alto has better visibility. When using Fortinet FortiGate you sometimes have to use the CLI to do some configurations which can be sometimes more difficult than using a GUI that other solutions can use, such as Palo Alto.
Fortinet FortiGate could improve by adding FortiAnalyzer to its solution, we should not have to use another solution. FortiAnalyzer can provide more detailed information. I hope that Fortinet FortiGate provides a software define network(SDN) solution. and provide the interface for the user. If we have the SDN interface we can develop our system to manage Fortinet devices.
I'm not sure if it's something that they already have or are developing something, however, we need some dedicated features for container security. Other vendors have developed some kind of specific product to protection. Containers now are very common, especially in the cloud. It's an area that needs to be addressed.
Fortinet FortiGate is not very easy to use. The navigation could be improved to make it easier to use. Instead of double clicking the items FortiGate needs to click the "details" button to get the configurations or record details
I don't really have anything negative to say as far as Fortinet firewalls are concerned. If anything, they can support a user a little bit better. They can stop being so time-sensitive about how much time the support call has taken, and they can help you do it yourself.
Their software support needs improvement. I would prefer to have better support for bug fixes. Sometimes, we open a ticket, and it is very difficult to get a solution. Specifically, we are not at all happy with their support for load balancing.
Its reporting can be improved. Sometimes, I don't get proper reports.
The solution could improve by being more secure.
There are some limitations to the solution such as publishing multiple servers with a single IP. I'd also like to see some improvement in the support system.
Its filtering is sometimes too precise or strict. We sometimes have to bypass and authorize some of the sites, but they get blocked. We know that they are trusted sites, but they are blocked, and we don't know why. In terms of additional features, I don't have any requirements. It is okay for me. I do lots of things, and I still don't know everything about FortiGate. If I need something, it might already be there in FortiGate.
Currently, FortiGate is providing SSL VPN. But they're missing some features that are available in Palo Alto's SSL VPN. Palo Alto provides a compliance check along with the VPN, and they have a very broad checklist. So Palo Alto's global protection can scan and check multiple things, and we can choose what access users can have based on compliance with policies. So I think this is one area where FortiGate can improve. Also, multi-factor authentication isn't native to FortiGate. If you want to incorporate multi-factor authentication, you have to add a secondary or third-party solution.
There are a lot of bugs I have found in the solution and it is difficult to upgrade. These areas need improvement.
It would be a benefit if Fortinet would release a one-stop solution that is better integrated with other products and has an automated emergency response system.
We aren't really missing any features. The solution isn't lacking anything. We've been overall very please with the experience we've had. There aren't really any negative aspects to discuss.
The logs need to be better. They need to be more visible and easier to access. The VPN features could use some improvement.
The initial setup and configuration are not intuitive and require training.
The cloud features can be improved. The sandboxing part is only available in limited parts of the cloud. If they could expand that, customers would find it slightly better. The price can always be cheaper as well.
In the balance between links feature normally you can just choose one option to balance. It would be better for the solution to have more than one option, preferably three.
The Wi-Fi controller feature needs a lot of improvement. The function itself is not as stable as it should be in our use case which might be a problem in either the APs or the controller. Would like to see more wizards and automation for more features such as virtual servers, SSL VPN, and others where policies, rules entries are created automatically form wizard input. Some of the features related to load-balancing and traffic shaping are not as straightforward as they need to be. The VPN functionality needs low-level debugging get what really going on. Log level is too detailed and requires someone who is quite experienced to analyze and solve those issues. Zero-trust base features are lagging behind the other competition, based on what I have read. Would like to see those features in a clearly in the UI.
We would like to see better pricing.
The only problem that we have here in China is that the whole subscription process on Fortinet is a little bit difficult if you are doing it from China. China has kind of a firewall around the country, and we sometimes have complications due to that aspect. As a whole, I don't think that the product is actually missing any features. You do need some IT knowledge in order to effectively work with the solution.
Security is a continuous process. In every product, there is a requirement for improvement. Its pricing should also be improved according to Indian market requirements. They must also improve on the reporting part. Its reporting can be more precise. If we can get a real-time report in a specific format, it will be helpful for customers to know about the current status of their security.
The solution could have licensing fees reduced in the future.
In our environment, we need multiple virtual firewalls to facilitate end users and customers. Fortinet doesn't provide that but they really should include that feature.
The price could be improved. In the next release, I would like to see the interface simplified to be more user-friendly.
We currently have two on-premise data centers with several separate firewall units and unfortunately they don't connect with each other. We'll likely migrate to Azure in the next two years because of that.
The way everything is set up could be easier. Currently, people need a lot of experience and knowledge to administer it and to link it to devices.
The solution overall is quite good. It works how we need it to. I can't recall seeing any features that are lacking. We haven't had any breaches in our organization, however, I have read in journals that there have been some issues. There may have been some bugs after an update, however, that has since been resolved. We saw a few bugs in the web field and when we ran an update it was resolved in the new version. Some resources must be accessed via web fields. We were not able to access them at first. However, it was a simple task to fix it and that has since been resolved. The pricing could be a bit better, especially when you consider how they have the most basic offering priced.
The solution could be more user friendly.
The sniffing packets or packet captures can be simplified and improved because it's a little confusing. The automation feature has some limitations and could be better.
The Fortinet support needs improvement and also the quality control of the firmware (there are a lot of bugs)
In terms of what could be improved, the SD-WAN is quite difficult, because if you install in the new box, 15 is okay, but if you change from an old configuration, if there is already a configuration and a policy when you change to SD-WAN, you must change the whole policy that you see in the interface.
The support costs and licensing are sometimes so expensive. They should work on their pricing model.
They can do more tests before they release new versions because I would like to be more assured. We had some experiences where they release something new and great, but some of the old features are disabled or they don't work well, which impacts the product satisfaction. The manufacturer should be able to prove that everything works or not only that it might work. This is applicable to most of the other services, software, and hardware companies. They all should work on this. We cannot trust every new release, such as a beta release, on the first day. We wait for some comments on the forums and from other companies that we know. We always wait a few weeks before we use the updated version. They should also extend the VPN client application, especially for Linux versions. Currently, it has an application for Linux devices, but it doesn't work the way we want to connect to the VPN. They use only the old connection, not the new one. They have VPN client applications for Windows and Mac, but they can add more useful features to better manage the devices and monitor the current health of each device. Such features would be helpful for our company.
The solution isn't really lacking features per se. The product does need better support in the cloud environment. It's not exactly cloud-native right now. The solution needs to do more on the deployment in the multi-cloud. For example, clients have GCP and AWS. How do we deploy FortiGate in a cloud environment? Right now, there's no solution for that. We're worried that the scalability isn't as good as it could be.
Technical support needs to be improved.
The only challenge that we are facing is that a good internet connection is required for VPN stability. Some of the web policy reports could be improved. There are reports generated that show exactly which user is using how much bandwidth, and which sites they have been browsing. We should have a way to show that on a single screen. As it is now, when I click on a user, the information shows on another tab.
It's good, and I feel that there is nothing more that can be added. The pricing could be reduced or include the first year warranty.
We would like to see an upgrade to the VPN feature, we are using the VPN from outside of our office and there is a limitation to 10 connections, more connections would be suitable. Also, the security could improve on some features that are available.
The customization could be improved. Cisco, for example, is much better at this. They need to work to be at least as good as they are.
There is room for improvement. When it comes to email spam detection, Baracuda is the highest or the best, Cisco is the lowest, and Fortinet FortiGate is in the middle. Application management can be improved. Analysis and sandbox can also be improved in the next release.
FortiLink is the interface on the firewall that allows you to extend switch management across all of your switches in the network. The problem with it is that you can't use multiple interfaces unless you set them up in a lag. Only then you can run them. So, it forces you to use a core type of switch to propagate that management out to the rest of the switches, and then it is running the case at 200. It leaves you with 18 ports on the firewall because it is also a layer-three router that could also be used as a switch, but as soon as you do that, you can't really use them. They could do a little bit more clean up in the way the stacking interface works. Some use cases and the documentation on the FortiLink checking interface are a little outdated. I can find stuff on version 5 or more, but it is hard to find information on some of the newer firmware. The biggest thing I would like to see is some improvement in the switch management feature. I would like to be able to relegate some of the ports, which are on the firewall itself, to act as a switch to take advantage of those ports. Some of these firewalls have clarity ports on them. If I can use those, it would mean that I need to buy two less switches, which saves time. I get why they don't, but I would still like to see it because it would save a little bit of space in the server rack.
The ease of use could be improved.
The feedback that I have received is that the performance could be better, and the user experience is not as good compared to a previous solution we used. It could be more user-friendly. Of course, it still works fine for our operations.
The integration with third-party tools may be something that they should work on. We haven't actually tried to implement that, however.
They are doing good, but they can improve the distributor assignment. The availability of the product and the timeline of delivery are the main things. The distribution should be swift, and the distributor should not reach out to end customers directly. They should work as a distributor. There should also be one more local distributor. Currently, there is only one distributor in Pakistan, and the rest of them are in UAE. It is difficult to work with only one distributor. Sometimes, you don't get along with the same distributor, and that's why they should have one more distributor. Their licensing should also be improved. The activation or renewal of the product should be done from the date of renewal, not from the date on which the license expired.
In terms of the product, we don't have anything to improve. But I have a concern about the FortiGate team here in Egypt, because there is an opportunity that we are working on and when we opened it and did the deal installation, it was rejected. When I talked to the FortiGate team here in Egypt, they told me they know about the deal, but they rejected it. Additionally, they could make some modifications in the license. There are some license issues. Not every feature must have a separate license. There must be some kind of synergy between the license so we don't have to pay for every individual license that we would like to have.
We have an issue with the license when it expires because we're unable to use the computers. We are in the hotel industry and there's an issue with vouchers when guests come in wanting to use them.
A feature for bandwidth monitoring and the ability to have more bandwidth testing would be useful to include in future releases.
Its reporting capabilities can be improved. Some out-of-the-box reports needs to be able to provide usable data for example for web monitoring and reporting or browsing patterns and details. Some customers does not require any forensic type reporting and may not want to invest in all the features offered by the FortiAnalyzer.
The support is the main thing that needs to be improved.
The support structure needs to be improved because every time we contact them, there is a delay in the response.
I would like to see the product updated more frequently. In the future, I would like to see improvements made to cloud-based management. They already have some features for this, but it's very basic.
In terms of what can be improved, they do have certain features that you can only configure through a CLI and there's no GUI interface for it. That's a pain. But it's nice that the user can do everything one way or the other. They sometimes hide some features and if you want to enable them, you have to go in the CLI, enable the feature and configure it through the CLI. Customers, typically, like everything to be done by the GUI.
The price of FortiGate should be reduced because there are some other leading products that are cheaper.
I think some improvements could be made in vulnerability scanning. I'd also like to see additional features in the authentication. They support RADIUS, LDAP but the solution doesn't have API integration with other solutions. They have API in FortiAuthenticator, but not in the firewall and not all customers want to buy another solution.
I'm not sure if the solution is really lacking anything major. For us, it works okay. They seem to have made a lot of improvements since the last release. Technical support could be better. You don't always get the level of help you need right away.
It's difficult to add or define, and it's not that easy to configure and manage. We're looking for something more flexible for the long term. I also find that the performance is limited in comparison to other solutions.
In terms of what could be improved, the FortiGate support could do some improvements on their IPv6 configuration. Right now it's still in the very early stage for utilizing in an enterprise level network environment In terms of the FortiGate IPS, we haven't gotten additional tools because they are not free, and we have to purchase them to maximize this IPS feature. As long as they can perform some basic functions to meet our business needs, that is okay. I'm okay with this feature right now, so far. In the next release of FortiGate the price could be better.
Fortinet currently has many products bundled with FortiGate including the basic firewall and load balancer, and I think that that they need to have separate product portfolios for each of these specialized services. When it comes to large deployments, I don't think it's a good plan to have all of these services in a single box. I think that they should introduce in-line security at the packet level, where they can do filtering and other firewall functions. It should not comes down to the infrastructure level but rather, offer services at the ISP level.
The product has enterprise capabilities, which means there are a ton of configurations possible. What I'd like to see in the product is more of a branch in the box wizard deployment for those that are not as well versed in firewall and routing. For a small business, the firewall should be able to self-configure for a Unified Threat Management configuration with 2 SSIDs for protected wireless network for internal gear and a guest wireless network for employee cell phones and guests. I'd like to open the box, plug in the router behind the cable modem, and check a few boxes, and the rest is done automatically. I don't want to have to build a configure VLANs, SSIDs, security protocols for each port, and try to figure out and understand all the layers in an effort to deploy a solution. It's great to have those capabilities in case you need them, but for most of the offices I am trying to deploy these into--it should be a branch in a box.
If I had any criticism that I would give FortiGate, it would be that they need to stop changing their logging format. Every time we do a firmware upgrade, it is a massive issue on the SIM. Parsers have to be rebuilt. Even the FortiGate guys came in and said that they don't play well in the sandbox.
Fortinet is a very big product. It has FortiGate, FortiWiFi, FortiSwitch, email security, etc. Due to this, they have some weaknesses in the ISPs, the services. They could improve these aspects. Hotspot services especially could be a lot better. There are just some services that aren't available. For example, the Ethernet or point-to-point protocols. They could add these services to their product offering - especially services for ISPs.
The cloud management should improve. There are other manufacturers that have better management cloud solutions. Aruba, for example, is very good at this aspect. Fortinet could look to them as a model of how to do something interesting with management solutions. Fortinet across the board needs to improve the LAN aspect of their products. The solution lacks multi-language support. They could offer access points to small companies and firewalls at those access points. Aruba, in that sense, is much better for smaller organizations as they provide this possibility.
It should provide better visibility over the network and more information in the form of reports for the end users. Its installation should also be easier.
The support could be improved upon somewhat. The performance could be a bit better. Right now, I find it to be lacking. Having good performance is very important for our work. The command line operation is a bit out of our depth.
The solution needs to improve its integration with cybersecurity. While in general, it's pretty good, this is always a concern as the landscape shifts constantly. They need to ensure they stay on top of things so that their security and integrations stay constantly up to date in order to protect our company.
Technical support is good but the response time could be faster. When it's overloaded, it works slower and overheats. The data analysis could be improved.
The solution could be more evenly structured and I'd like to see orchestration in the calls included. The solution currently lacks that feature.
I don't like that anything more than very basic reporting is not included. You have to buy their cloud module that's an add-on for getting more customized reporting. It has just about everything that we are looking for and the customer is needing. It's just the reporting part that is lacking in the base application. Technical support could be improved.
The captive portal could be improved.
The biggest "gotcha" is that if the client purchases what they call the UTM shared bundle, which has unified threat management on both, it's not as easy to manage if you have more than one firewall. If I wanted a unified console, I have to pay extra. And that's the downfall. That's the only needed improvement that I would say for the Fortinet solution, is that they should have it web-based from the get-go. You should not have to buy an extra bundle or an extra device. If I have to make an update to a web filter, and I have 12 devices, I've got to do it in 12 places. If I don't want to do that the client can pay for a pretty expensive device or virtual appliance that does that for them. It's like an expensive centralized management tool. That's the big downfall of Fortinet. It doesn't come included, you have to pay for it. Their web-based one, that's sort of just like an inventory manager. It's not really good for distributing roles. With Cisco, you don't have to do anything. The one from Aruba HD has one too. Fortinet should try to be similar to those options. In the next release, it would be amazing if they could give a better tool for upgrading, so that if I upgrade from an older version to the other, it can read the configuration and processes it for me so that I don't have to rewrite it from scratch. In FortiConverter, they have a tool like this, however, it doesn't work well. It's really more for bringing items in from other vendors, not from one version to the other. That was my last experience where they operated from version five to six. However, that's really the only big thing. The main thing is to include the FortiManager cloud software like Cisco does. To have one solution. If you paid $150 a year for the support, you might as well get that too so I could manage all the devices at one spot. They do have FortiCloud, however, it's not the same as the way Cisco does it. They are selling another product called FortiManager. FortiManager should be included with the support, and that would make it more of a business solution, rather than a feature request.
It should have a better pricing plan. It is too expensive. It should also have a more granular view of the attack. I don't have FortiAnalyzer, and it is difficult for me to have a complete view when there is an attack on my server.
The search tool needs improvement. It's very difficult to search for policies right now. When we need to engage with the endpoint or our customer during an investigation, there should be a way to investigate the issues without the need for the customer to be present. It would make it much easier.
The user interface could be improved.
The command line is complicated, and the interface could be better.
It is stable, but its stability can be improved.
The central management for the FortiGate Fortinet Firewall needs improvement. They have the manager to do the essential management for both SD-WAN and the security policy. They should also improve the SD-WAN function.
It should be more stable. There should be full integration within Fortinet products themselves as well as with other third-party products. Especially when you're not dealing with SIEM and the correlation of the security box, we want Fortinet to be able to share that information with as many other products as it can.
The PPPoE server protocol with a connection to a Radius server is used a lot by ISPs and not so much by the end user. I think it would be great to see this solution with the protocol developed for ISPs.
Fortinet is huge in today's market and they've become quite expensive. I think there are products at the same level as Fortinet, but with better prices. They've changed their subscription plan and are now forcing companies to subscribe 24/7.
It could be more stable and secure. They can improve the ability to make changes, change requests, and provide more rounded monitoring in terms of security and potential threats.
The license renewal process, annual renewal price, and the web application firewall features should be improved.
The visibility of the network can be better. The GUI can be improved for better visibility of the network flow. Other solutions have better GUI in terms of network visibility.
Fortinet is good in terms of security and threat prevention, but they are not leading. For example, the signature database can be improved. If they had better integration with security products, such as Cisco ISE or Rapid Threat Containment, then it would be an improvement. Customers that have ISE implemented are able to provide inputs based on malicious traffic, and then ISE will automatically block it.
I'm from the sales side and therefore I wouldn't really know if there are features that are lacking. It's my understanding that more of the current generation features could be brought in. There could be more integration with EDRs, for example.
There are a lot of known issues in some newer versions of the FortiGate operating system, so there is room for improvement with that. One of the problems I was having was with user mapping, and it is an issue for which I have escalated tickets with Fortinet support. Having the newer features work in the older, more stable versions of the product would be great. Some of the new features might really help a lot, but there are problems with stability.
The commercial side of things can be improved a bit. They have such a good product, and when you disable some features, it has to be commercialized for you to enjoy those features. Therefore, you are actually buying half a product. You have hardware there, and yet, your features are not enabled. The primary things, such as the antivirus, web filter, DNS filter, application intrusion, file filter, and email filter come with the general license. There are other things that you want to also enjoy in this system and you can't. There are SD-WAN network monitoring, SD-WAN features, Industrial Databases, Internet of Things, Detection, etc., however, we do have not licenses for those features. We thought that if you bought a product, you should have all of the features it offers. Why should you need to make so many extra purchases to enable features? They should have one price for the entire offering. That's one of the drawbacks they could look at. Sometimes the firmware automatically updates itself. Then it corrupts the configuration and you have to roll back or you have to do amendments to the configurations. That, however, has happened only once with us. We have put in controls for automatic updates to stop them and now we do manual allowance or we allow the manual update. Most of the features are good. They give you pricing and you get a VPN for about 10 users where you can test it. For us, we feel that we need to buy extra licenses due to COVID, as people are working from home. Under the current conditions, we are not getting the best out of the firewall. They could just maybe put better graphics or better reporting into the solution. I want to know who is the user and what is the exact website they're visiting. Something like that would help. They should do more like what the GFI is doing.
Some of the features in the graphical user interface do not work, which requires that we used the command-line-interface. We have problems with that. Log retention should be greater than 24 hours.
If it would integrate everything in one place then it would be an improvement. I wanted to buy some switches and integrate them into the system, but we couldn't find anyone here in Israel to provide them or to provide support. Also, we could not get a replacement if something needed to be replaced. We wanted to use one vendor to do everything from one managed central management point. It may be something they offer now, but I am not sure. It would be helpful if we can have one easy place to manage, or from the cloud to all the devices that are at the client's location. This is the backbone, the switches, the access points, FortiGate, everything. Sometimes you do need to know some CLI commands, so it's a bit harder for technicians or new people that don't know it. So, if you could do everything without that, it would be much easier when you do V-LANs.
The only thing is sometimes you have to learn with CLI. For those not familiar with CLI it can be an issue. It would be ideal if we could avoid using CLI. If you make a mistake in the command line, it's harder to detect. It would be much better if they had a user-friendly GUI. The initial setup is complex.
The performance and speed are aspects of the solution that could always be improved upon.
Quality control on their firmware versions needs improvement. When they introduce new firmware, there tend to be bugs. I would like the licensing price to be better. It would be nice if it were less than 25 percent of the hardware costs.
There are some cloud-based features that could be much more flexible than they currently are. It's my understanding that they are currently working on improving the cloud solution quite substantially.
I would like to see a more intuitive dashboard. Technical support can improve in knowledge sharing and they can implement better. The dashboard appearance needs to be more refined. It has to be smoother and more customer-friendly. As the cloud is more prominent and more are moving towards the cloud, people are used to certain ease of doing things, and less complicated. I understand that a firewall is a technical product, but we can try to make it a better customer experience which will increase usability with good results.
In the enterprise proprietary world, Fortinet, in my experience, considering its cost and reliability (maybe they could bring the price down or maybe they could make more plans), I honestly don't think that there is much room for improvement. I think it's a pretty good solution for anyone who is looking for a proprietary solution. I wouldn't look anywhere else. Cisco, for example, is probably way overpriced. Fortinet on the other hand, one of their strong sides is that they have an all-encompassing solution with a very reasonable price point. Cisco and other brands are a little bit more modular — to get everything you'd have to buy a lot of different packages. An automated guide feature or templates that you could pick and choose would be a nice addition. It's definitely not as easy to look at traffic as I would like. Sometimes when I'm trying to see what traffic has been blocked or what traffic has been passed, it's not as easy as I would like to filter it out or to monitor bandwidth. The monitoring is not as good as it could be. It could be a lot easier to understand. For example, I was trying to figure out, in a given timeframe, how much was downloaded off of a certain interface and I didn't really understand how I could get that information or if it was even available. I was searching the documentation online and I couldn't even figure it out. Monitoring and reporting could be better; It's very good, but there's definitely a lot of ways to improve it.
For me, this solution has nothing to improve and it meets the needs that I have. I don't see any way to improve, at least from my point of view on regular use. In the next release, maybe the documentation on how to use this solution could be improved. What I have noticed is that when we have done some configurations directly from the command line, there is not a lot of information regarding splitting.
FortiGate is really good. We have been using it for quite some time. Initially, when we started off, we had around 70 plus devices of FortiGate, but then Check Point and Palo Alto took over the place. From the product perspective, there are no issues, but from the account perspective, we have had issues. Fortinet's presence in our company is very less. I don't see any Fortinet account managers talking to us, and their presence has diluted in the last two and a half or three years. We have close to 1,500 firewalls. Out of these, 60% of firewalls are from Palo Alto, and a few firewalls are from Check Point. FortiGate firewalls are very less now. It is not because of the product; it is because of the relationship. I don't think they had a good relationship with us, and there was some kind of disconnect for a very long time. The relationship between their accounts team and my leadership team seems to be the reason for phasing out FortiGate.
We would like to see a better training platform implemented.
They ARE leaders.
To the best of my knowledge, Fortinet does not have a CASB solution and Fortinet does not have a Zero trust solution. Fortinet claims to do everything Zscaler is capable of and I'm looking for a comparison between the supported features. Fortinet VPN and DDoS capabilities are great, yet we need to provide a solution that enables CASB and integration to the cloud.
The user interface could be improved to make it less confusing and easier to set up. There are too many pull-down menus.
We are managing FortiGate using a FortiManager and it needs improvement with respect to the ease of administration tasks. There is a lot of improvement needed with SSL-VPN. Technical support could be improved.
Improvement is needed in the Web Filter quotas to restrict users with allocated quotas. It would be an improvement to add a feature for active users to change/reset their own passwords. Fortinet renewal prices for all models are too high, so they should offer discounts for customers on renewal.
FortiWAN was supposed to help in doing intersite linking, but we've realized that most of the ISPs use BGP. FortiWAN supports OSPF but does not support the BGP protocol. This is a problem for us because without BGP they are not doing anything, and we've had to pack them up. I would like to see the BGP protocol supported on FortiWAN. Technical support for this solution can be improved.
I would like to have logs, monitoring, and reporting for a month without extra fees.
The Web-filter in this solution is not very good. Perhaps because Fortinet does not want to compete with its own dedicated solution.
FortiOS is not simple. Too many people think it should be simple to use, but the complexity of the product makes that impossible.
This product could be improved with active directory integration and better handling in IPsec and GRE Tunnels. There are not enough recent online materials to assist in integration with Cisco for VPN, GRE, and IPSec.
I use the FortiGate 60D model and realized the 300Mbps bandwidth limitation. Because it is a product that offers many services, I think it could have greater bandwidth capacity.
It is mainly our own application of FortiGate that we need to improve. If you compare FortiGate to any other products, all of the other products have more signatures. I couldn't find that many signatures available in the application. Some features of Fortinet FortiGate are actually fee enabled that are inconvenient for deploying in production. Other issues relate to isolation with Cisco products and your server. Fortinet should make it so that we are not able to use analytics from Cisco at the same time that FortiGate is installed. We are not able to do real-time network monitoring. For the next release, FortiGate should be improved to support these issues. For the setup, you need to prepare a lot for that before engaging the deployment. I learned a lot about FortiGate from books. That should be important in preparation. Fortinet should implement these changes, then we would be able to do more.
The reporting needs to be improved. Also, the VPN (Virtual private network) monitoring needs improvement. Beyond these improvements, I cannot think of any additional features that I would like.
The monitoring and the visibility, in this proxy, is very weak. I would for them to develop better visibility, monitoring, and reporting.
They should improve the interface to make it more user-friendly. I would like to see some sort of reporting if there was an issue with the connecting network sources or connections.
Fortinet needs more memory to save the log files (like in the 101E, the old product). We need it to save the logs on the hardware and not in the cloud. I know this feature is available in FortiCloud, but if we need to log locally, it is not available. Also, the log only records a little time and needs to be longer.
The Fortinet FortiGate firewall has been improved with many new functions. Fortinet is working to develop a new generation of firewalls with better security. Fortinet already improved FortiGate, but in the current market, many brands of security devices have improved together. Fortinet still needs to catch up with market standards. Fortinet is lacking in features in comparison to competitors.
The FortiGate reporting system needs to be more detailed about files. Palo Alto Networks is more detailed in the reporting system than Fortinet. Currently, as for our security, we don't need more. The main reporting in Palo Alto Networks is much more developed than Fortinet, especially in the part of the file exchange. As a security lead, I think Fortinet FortiGate is much more reliable than Palo Alto Networks.
Flexibility is questionable when it comes to the hardware parts. If Fortinet can make FortiGate modular so that you can actually upgrade it without changing the parts, I would prefer it. If Fortinet FortiGate could actually integrate with the hybrid cloud architecture without changing the storage parts, i.e. the hardware, it would be better.
Fortinet could improve the windows opener or the virtual IP solutions for opening windows. The virtual IP settings need improvement as firewalls are trending in new development directions.
We have many users currently with this solution. One issue that I have had is that sometimes I need to monitor the traffic, so I need to filter it according to the user and which user is using it the most. I experience a bottleneck most of the time, particularly at peak time when the number of contracts and users are at maximum. We feel a kind of bottleneck. When I first entered the log section, I could not find any results. I did not find any proof, i.e. reporting and analytics on the speed and network availability were not optimized. I could not find any such log from the server, maybe Fortinet could improve this service.
The main aspect of FortiGate that could be improved is load balancing. Our management team does not want to buy another appliance for only load balancing. The network routing with Fortinet FortiGate can be an issue, but it generally depends on the size of the company.
I recently saw the new updates that are coming, such as the ability to quarantine a user's machine. Once done, you have the ability to connect to it from the FortiManager Console and you can bring it back online, out of quarantine. This is all very good news. One of the areas that I feel need improvement is on the DLP (Data Leak Prevention) side of things. Compared to some other products, the DLP is not at par for the moment. Also, if in the next few years this solution can be made to support HE between models, it would be better. I feel that improvements can be made on the security side. Sometimes the product does a good job, but sometimes not.
Since we are in the initial stages of implementation I can't suggest any additional features for the next release. At this point, I really need more time to evaluate the tool. The only thing I can recommend at this time is to make improvements for the user end when the user website is running slowly; the speed can definitely be improved. There is room to include IP wise and net-wise and bandwidth settings.
We had a minor problem where there was a major system upgrade on the hardware platform and the Apple Mac client was not available as soon as it might have been. The PC client was available immediately, but we had to wait a month or so, before there was a Apple Mac client. I was slightly irritated that it was not ready on time, but it was eventually resolved.
I think there could be more QoS features in GUI. FortiGate has Traffic Shaping feature that is enough in most cases when shaping egressing packets, but sometimes I just need 802.1p prioritizing (Class of Service) of incoming packets and manual ingress queue assignment. This is what would be nice to have, but I realize that such a job is more efficiently done by L4 switch standing before firewall. Fortinet has a FortiSwitch that can do it, and it also can be controlled by FortiGate via FortiLink protocol. [Firmware version FortiOS 6.2 update]: There are a lot of improved and newly added things, so it is very hard to imagine any additional features.
Need to Improvement in Reporting