The main use case for Fortinet FortiGate is as a perimeter firewall between the internet and the LAN to protect the networks from the internet.
We are using Fortinet FortiGate in the education industry.
External reviews are not included in the AWS star rating for the product.
The main use case for Fortinet FortiGate is as a perimeter firewall between the internet and the LAN to protect the networks from the internet.
We are using Fortinet FortiGate in the education industry.
One of the best features of Fortinet FortiGate is that it's a very powerful equipment that gives many security features in a single box with good performance, and the user interface is friendly to use and configure. The performance is good compared to other vendors that I have used, and the price is competitive.
I am utilizing Fortinet FortiGate's SD-WAN, and my experience in integrating the SD-WAN capabilities with Fortinet FortiGate in my network has been good. It was easy to integrate the SD-WAN capabilities with Fortinet FortiGate, and from my experience and background, it was easier with Fortinet FortiGate compared to other vendors. The monitoring after installing the SD-WAN is also easier. It is easy to see how it behaves and how the traffic goes through the different links. It's improving our performance with SD-WAN.
If you want to conduct some statistics or generate a report to understand the status of your configuration or filtering, you need FortiGate Analyzer for long-term data retention. FortiGate can only retain logs for 24 hours or 7 days. I'm not sure if it holds them for a longer period, such as for a month. It will be useful for assessing our strategy and monitoring our environment without investing in FortiGate Analyzer. It would be beneficial if Fortinet could enhance the FortiGate by providing more statistical and monitoring views for a longer timeframe, rather than requiring access to FortiGate Analyzer. Without Fortinet Analyzer, currently, I cannot see past events.
I have had more than 10 years of experience with Fortinet FortiGate.
Fortinet FortiGate is very stable, and I have never seen a Fortinet FortiGate get stuck because of performance or memory issues. They have good hardware and ASICs, and I have not experienced any performance issues with all the features I have implemented in it.
Fortinet FortiGate scales effectively, and even though I can't recall a specific use case regarding scalability, I am sure it is very scalable.
Their support is very good. I would rate them a nine out of ten. When I open a case or provide feedback, they are very responsive. If I don’t get the answer I need, I can call them directly, which also deserves a nine.
The initial setup is straightforward and easy.
The duration depends on the size of the installation and the features you want to implement. It can take anywhere from one day to several days. In our case, we had to install it across all our campuses. We have 12 campuses with FortiGate devices installed at the central location. The main setup took about two to three days at the main site. After that, I prepared the templates for the other sites, which took about half a day to install once they were ready. Overall, if you are trained and familiar with the FortiGate environment, it can be quite straightforward. If you're not familiar, it may take some time to read and prepare everything; however, it’s not particularly difficult.
Typically, we have a variety of roles in our environment, so I deal with multiple tasks. We need someone who understands the network, so I also function as a network engineer. It requires knowledge of both networking and security, hence network security.
It reduces the cost of operations by automating many tasks that I would do manually. It also helps to be proactive by detecting things and proposing features to improve the security posture. In that regard, I have seen a return on investment because it reduces the cost of operations. It saves about 20% of time per month.
The pricing is comprehensive and clear. You can easily understand what you are purchasing, including which features correspond to each license and maintenance contract. Overall, the information is straightforward. Additionally, compared to other vendors, their prices are competitive.
I have not yet tested or installed Fortinet unified SASE, but from what I read and my knowledge, it is something that may be good to integrate with existing systems. However, I cannot confirm its effectiveness as I haven't tested it yet. I do not utilize Fortinet FortiGate's data center solution at the moment.
I didn't work with all the FortiGate equipment. Based on the equipment I worked with, I would rate it an eight out of ten. It's very good.
We use Fortinet FortiGate for gateway security, specifically for VPN access, security control, and filtering of traffic. For net monitoring, it has the capability to put the network traffic over to the analyzer. We use FortiAnalyzer to look at the traffic and to see what's happening, what's hitting our gateway, and what our users are doing. We use filtering rules on top of that.
Fortinet FortiGate is pretty robust. The updates and firmware releases are pretty timely. They have a good product revision and review system, so they are constantly reviewing their configuration and the different mechanisms that are used on Fortinet FortiGate. They review that periodically and provide new definitions and updates. We have quarterly fixes, updates, and releases, and there are constant new CVEs coming out. They are always keeping ahead of the threat monitoring system that notifies us of the latest landscape, what's new in the phishing landscape, botnets, rootkits, and all of those different malicious tools that are out there. We appreciate the filtering capabilities as well.
It integrates well with the SD-WAN capabilities. It works easily, and the transition was quite simple with literally no downtime.
It is very customizable. We have multiple different subnets going into that FortiGate controller. We have used various models and various designs. We can diversify the number of links coming in either the WAN gateways or the local LANs. We can separate various subnets across the LAN segment. It's quite diverse.
We haven't tapped into most of the functionalities that Fortinet FortiGate offers because we're using it just for gateway security. One of the things that I would prefer is a more expansive use of their analyzer. They could do more work on FortiAnalyzer in terms of the data and the information coming from it. I'm not sure if it is because the team managing our analyzer isn't giving us all the information that's required. It could be something based on our own usage of the platform. As we continue to use the appliance, we may learn more about the utility and functionalities that are offered.
I have been using Fortinet FortiGate for about seven years.
Fortinet FortiGate is pretty stable, especially the enterprise version.
The reliability of Fortinet FortiGate is through the roof. We're experiencing 99.999% availability consistently. Fortinet FortiGate only goes offline for maintenance. I have seen it running for two years nonstop without doing a reboot. They're pretty stable and energy-efficient, and I make a lot of headroom for growth, specifying my units at least 40% greater than what I need. They are working within the requirements of their provision, and usually, the published specifications for the units are within the range of their operational usage.
Scalability is all based on our design. Based on our network design, we can select or pick a product from the product listing that can scale with the growth potential of the organization within a specific time period. We tend to do our planning within time spans, such as the next 10 years, 5 years, or whatever the growth prospect is for that period. We put the units in place that can grow along with that growth development timeline.
I would rate Fortinet's support a solid eight because I'm hard on my support. They're responsive to a greater extent. There are lots of things that I want to get done that aren't done on time. However, the local support that we use for Fortinet FortiGate is pretty technically competent and capable of managing the unit and delivering the functionality we need from the device.
We outsource the management and configuration of Fortinet FortiGate to a third-party SOC center in Ireland. We don't do that ourselves, but we do manage it and go out to the third party to tell them what we want. They will recommend different methodologies, capabilities, or new features that we can implement, such as SD-WAN, and go ahead with it. We don't manage and do the configuration ourselves. My team's role is pretty much just to operate and utilize the service.
They handle the initial setup in the background. I just give them the requirements, and the engineers respond.
We interacted with two engineers, but I'm not sure what the backend team is like.
It's very hard to measure return on investment with security because security is so dynamic. Based on our plan, the ROI has been pretty good. Whatever we expected and planned for, as far as usage goes, I can extend and push my Fortinet FortiGate up to maybe three or four quarters past its end of life. It has performed as expected in that concern, giving us good ROI for what we planned.
It was pretty affordable. We did go a little bit above MSRP, but the service pack that was included was quite worth the additional costs.
It is competitively priced compared to other major players in the market. It is significantly cheaper than Check Point, which is a primary competitor. Additionally, its pricing is comparable to that of Cisco's ASA and a few other vendors.
Besides the pricing, we chose Fortinet FortiGate because of the service providers that are here locally and the support for the unit and the product.
I would rate Fortinet FortiGate a nine out of ten.
We are using it for security purposes. We have deployed it across multiple locations where we are already using it.
The security features are valuable, particularly the ransomware attack protection features. Fortinet FortiGate provides excellent security against ransomware attacks.
It contains every feature that is required. The things we require are already sorted out, so there isn't any scope for improvement as far as our requirements go. However, its price can be better.
We have been using it for more than one and a half months.
It's stable. I would rate it an eight out of ten for stability.
It's scalable. I would rate it a nine out of ten for scalability.
I am handling all the operations. We have multiple staff members at multiple locations.
Coming from a technical background, there hasn't been any requirement to speak with customer care representatives. The manual provided covers everything comprehensively.
I have experience with Sophos, Fortinet FortiGate, and SonicWall.
We purchased it through our vendor. Our company doesn't prefer to make purchases through online shopping platforms such as Amazon and Flipkart.
We have seen a return on investment of more than 20%.
It is somewhat expensive compared to other solutions such as Sophos.
I would recommend it to others. I would rate Fortinet FortiGate a nine out of ten. There isn't a need to compare it with anyone else because Fortinet FortiGate is at the top of the market.
I was involved in deciding on Fortinet FortiGate, but I am not the one who's using it on a day-to-day basis.
We want to make sure that our on-prem servers are protected. We basically use VPN to configure that on Fortinet FortiGate, so that is the major purpose, and that part is working well.
We have not had any incidents where our servers got compromised. It's all good.
For security, it has all the required features, such as the web filter and DNS filter. Also, for accessing the network, we have various rules.
Our IT staff says that some of the security features are better than Sophos's.
Its usability is good. We can easily navigate the system, and we have a very good user experience. It's easier to understand the software compared to Sophos, which I feel is a little more technical and could be difficult for a first-time user.
I want some additional features. For example, I want something to ensure that when we are using Google email or Microsoft email, or Google Workspace, emails can only be accessed on designated machines given to our employees. I would like them to access data from designated machines, not from any machine. It should work for designated mobiles and laptops. I don't know if Fortinet provides something like that out of the box.
We have just installed Fortinet FortiGate, and it has been two months since our installation.
Fortinet FortiGate is stable.
Fortinet FortiGate is scalable.
We are going through the vendor for technical support. If we have any issues, we raise a ticket, and they respond immediately.
Previously, we were using another firewall device, Sophos. Compared to that, Fortinet FortiGate provides more features and better security. Fortinet FortiGate supports WAN migration. Fortinet FortiGate is also better in terms of speed. In the dashboard, we can get all the stats reports and logs.
Deployment is not very difficult because they have their migration tool.
We are facing some challenges. We are working with a third-party vendor, not FortiGate directly, for the installation and other things. The problem is that their knowledge is very limited. We are facing some challenges. With Sophos, we could enable multi-factor authentication for VPN users. FortiGate also allows that, as per our initial analysis. The people we are working with are not able to configure MFA. They are having some technical issues. Fortinet needs to ensure that its partners are well-trained.
Only two people were involved in the deployment process. The vendor side had their own technician, and we had one person here.
Cost-wise, there is not much difference from Sophos, but feature-wise, we get more features.
We did some comparisons between Fortinet FortiGate and Sophos. We went with Fortinet FortiGate because of the security features and easy-to-understand console.
I would rate Fortinet FortiGate an eight out of ten.
We use Fortinet FortiGate to help protect and secure mission-critical data. There are policies and rules that we apply, and there is an intrusion prevention system that notifies if there are critical vulnerabilities on some clients.
I assess the security services provided by Fortinet FortiGate, such as URL filtering and DNS filtering, as quite good; they are quite effective. Fortinet FortiGate is rather sustainable; it's a good, stable product that gets faster and uses less power with new versions.
It helps us remediate threats more quickly because we have specialists who can work with it rather effectively. When there is an alert on the Fortinet FortiGate, they work together with our FortiAnalyzer and can quickly remediate the incidents.
They should do a better job in testing when they put out a new release because when a new software version is released, it is not always stable or does not always have all the previous features working correctly. They should do more testing or launch a new version later when they have tested it more thoroughly.
They already did a good job in their GUI, but they can make more features available in the GUI that are still only accessible through the command line.
My proper experience is only two or three years, but in the company, they have been using it for over 10 years.
In terms of network and security convergence, they are there, but we are not currently using them because in the office itself, we have other brands of switches and access points. It's now not quite stable in the demo lab environment; we are now on the latest version, but in the production environment, we are not. Production is always on a lower version.
It is scalable.
I would give Fortinet's technical support an eight out of 10; they are responsive and helpful.
I previously used Sophos before Fortinet FortiGate.
If you first implement Fortinet FortiGate to get it up and running, it takes just a couple of minutes, but to get all the policies configured correctly, it takes a couple of days.
For my company, Exclusive Networks, the whole company had three or four engineers involved.
We have seen a return on investment from using Fortinet FortiGate for integration with the SOC team. The automation part is giving us a cost benefit and speed; we can react faster.
The price-to-performance ratio from using Fortinet FortiGate is very good; I would give it a nine out of 10. It has helped save on costs due to reduced power consumption.
Performance is the reason I switched from Sophos to Fortinet FortiGate. It has good value for money, ease of use, and a higher security level, with better security solutions. It's more expensive, but it offers a really good total cost of ownership and is still considerably cheaper than Palo Alto.
I would suggest to anyone considering purchasing Fortinet FortiGate's data center firewall to get training to understand very thoroughly how FortiOS works, and if you have several Fortinet FortiGates, to go for a FortiManager with the necessary training.
The users who work with Fortinet FortiGate are only the IT people, around three or four. Locally, we have around 60 end-users for Fortinet FortiGate. The biggest lesson would be that Fortinet FortiGate provides a high level of security at a good total cost of ownership.
I would give Fortinet FortiGate an overall rating of nine.
I use Fortinet FortiGate for SD-WAN, specifically for branches, and for firewall purposes.
Fortinet FortiGate is sold to everyone, including banks, mining companies, and oil companies, as it's one of the most popular SD-WAN products that we sell. These are mainly medium-sized businesses or enterprise businesses because we only sell business-to-business, B2B, and we don't sell to normal clients, only businesses.
We usually do not have any problems. It's a very easy-to-use product. We also have a SOC or service operations center. They are certified in Fortinet FortiGate.
From the point of view of a reseller, Fortinet FortiGate improves our business because it is one of the products that we sell the most. We also use it on our backend because the devices have many slots and support substantial bandwidth.
The most valuable features of Fortinet FortiGate are its SD-WAN capabilities, such as dynamic routing, and other features, including security options such as antivirus, IPS, and IDS—all integrated into one device.
Another beneficial aspect of using Fortinet FortiGate is that if you have a LAN network, you can integrate it with FortiSwitch. You can manage everything from Fortinet FortiGate. It is easy to manage and integrate with other Fortinet devices.
Fortinet FortiGate is a very good device overall, though it can be improved in certain areas regarding the licenses, particularly the big one called unified threat management, which has many capabilities. The big license options have web filtering, IDS, and a lot of other things, but it's not like they are all good. That's the only thing I would change because the rest is very good.
I have about 4 or 5 years of experience with Fortinet FortiGate.
I find Fortinet FortiGate to be quite stable, as I have never heard of any issues where they broke or malfunctioned; they are always working. I would rate the stability of Fortinet FortiGate a ten out of ten.
I would rate the scalability for Fortinet FortiGate as an eight out of ten
We don't usually use that service. We only engage with Fortinet support when a device is broken and needs RMA, so I am not familiar with their operational teams.
We used to use Cisco firewalls and devices, which are also quite good. However, Cisco is more expensive, approximately twice their prices, but they are similar in functionality. With Fortinet, we are partner experts, which is a big advantage, whereas with Cisco, we are premium partners, which is not the biggest status, so if we are going to resell to our clients, we don't have the best discount or prices.
I am not part of the initial setup or deployment process since I work in presales. The setup or deployment is quite easy, as you can do a one-touch deployment that automatically connects to the FortiManager cloud when you connect it to a broadband or dynamic IP, allowing you to start the configuration from that point.
We usually sell it for on-premises setups. It's on the cloud only when the client has virtual machines or their own service. Sometimes they have a service on the cloud like AWS, but it's more difficult to sell now because AWS has an e-commerce option where you can buy FortiGate directly. The only thing you need is someone to manage and configure.
For deployments at one site, it usually requires only one person, and if we are talking about 1 to 50 sites, it still only takes one person because the same template is used for all sites.
In Argentina, we service about 100 locations. There are about 200 companies in Colombia and Brazil.
We service about 100 locations with Fortinet FortiGate in Argentina, but if we account for all the company's clients, it can be around 2,000 across Colombia and Brazil, since we have clients in all of these countries.
Fortinet prices are around $600 for the small 40F model, and for licenses, the simplest option is about $300 for a year. They sell licenses that can last for 1, 2, 3, or 5 years.
Before using Fortinet, we evaluated other options such as Versa and Meraki, but Meraki is also from Cisco. Fortinet is better than Versa. One of the main differences between them is that we don't have many partners or distributors for Versa here in Argentina, making it difficult to sell something that you cannot pay for locally. It has been easier in the past to handle payments, but Versa doesn't have many providers or distributors in Latin America, making it a less viable option. Fortinet offers more products that are easier to integrate into our clients' networks, such as firewalls and access points, so that was one of the main reasons we didn't use Versa.
My advice to other businesses or people considering using Fortinet FortiGate is that it is the starting product from Fortinet, and when you start using Fortinet FortiGate, you can then move on to the next products they offer, which are numerous.
We sell the 40F, 60F, 80F, 100F, and 200F models. There are the ones we sell readily from the bottom to the top. Sometimes, we sell bigger ones such as the 300 model.
Overall, I would rate Fortinet FortiGate around a nine out of ten.
We use Fortinet FortiGate for the firewall as well as for the VPN. Any of the users outside the organization use the VPN. Any staff members working outside the office headquarters or our office location use the VPN.
The main aspect that I deal with is URL blocking and web access. I don't work with other aspects of this firewall.
It has upscaled our security posture, especially regarding external connectivity, because any access or connection from the company has to go through the Fortinet FortiGate firewall. It's doing a pretty good job. We do not have any complaints there.
Anything that we don't want to allow is not coming in. Anything we want to allow is not being blocked. We always have the granular control where we can block malicious IPs or subnets if needed.
Geofencing allows us to limit the countries from which we allow IP connections. There are many features that I may not even know or haven't explored, but in general, Fortinet FortiGate is doing a pretty good job for us.
The web controls are what I appreciate about Fortinet FortiGate. We have extensive controls over areas where we could block external-facing IPs, external URLs. We can do geo-fencing with the firewalls, which is a good feature.
There are too many updates coming for VPN, and the VPN keeps disconnecting frequently, which I find problematic. It does what it's supposed to do, but I practically face reconnection issues with the VPN.
Regarding the Fortinet FortiGate firewall, I don't have any input. My scope is limited.
I have been using Fortinet FortiGate for around three years.
Fortinet FortiGate is stable. We haven't seen any latency issues related to it, though we do experience latency from ISPs.
I would rate the scalability as eight out of ten based purely on my exposure to security controls relating to URL blocking and website access.
I haven't had a chance to work with Fortinet FortiGate technical support, but from my colleagues' experience, they say the Fortinet FortiGate people are easy to reach but hard to schedule time with. It's not as easy as having the Fortinet FortiGate engineer on the call and getting other teams involved; it requires careful arrangements to join in with the Fortinet team. I would give their support a neutral score of maybe five.
I don't know why we switched to Fortinet FortiGate from Juniper; it's a management decision.
I was not involved in the deployment. I think it's not that difficult; there's no complexity involved as long as we are clear on what we want to do.
We have it on both cloud and on-premises.
I was not part of the team that implemented it. I don't know how much they invested, but it would be worth the investment.
My overall experience with Fortinet FortiGate rates as eight out of ten.
We primarily use Fortinet FortiGate as endpoint firewalls for our campuses. Nothing too extravagant, just providing access out and limiting access to certain applications and restricting unauthorized access from external sources. I have recently been using it also as the controller for the wireless access points.
It is pretty straightforward to manage and has robust capabilities. I appreciate that Fortinet FortiGate can be a central controller for other Fortinet products, such as switches and access points. I have used its VPN abilities a little bit, but not a great deal. I appreciate that it has some SD-WAN capabilities, though I've only used that to a limited degree. It is a solid, usable, reliable solution.
It's one of the more expensive brands.
FortiManager has not been my favorite. I don't use it and cannot say I really care for FortiManager for managing the firewalls. I primarily just access and manage the firewalls individually. Nothing else particularly comes to mind, as it has been a pretty good experience.
I have about four and a half years of experience with Fortinet FortiGate.
The stability has been very good. I have had very few issues. I had one unit that required some reboots and eventually needed a factory reset. But outside of one issue, I've never had stability issues or problems with them going down or disconnecting or having other issues. They have been very stable and reliable.
I have experienced no scalability problems thus far. We expand out with other campuses as needed. If there are any scalability problems, I think that would probably be with making FortiManager a little bit better. Otherwise, scalability is fine.
We are a medium-sized business with 17 campuses. We plan to increase its usage. We'll probably continue with FortiGate for any other campuses that we extend out to, as well as keeping them when we do our hardware refresh.
Fortinet FortiGate has very good support. I've been able to contact them on a couple of things for FortiGate and other products, and I've never had an issue. They've always been polite and helpful and worked to get me to solutions. I've had a good experience with Fortinet support.
We've always had Fortinet FortiGate in place, so I don't have a previous firewall here to compare it to, but it has basically done its job. It's manageable, and it has not created a lot of problems. Only once, I had to call their support to apply a patch update across a couple of them. One of the best features is that it does not require a lot of extra attention for me to fix problems. It's not a problem generator, so that's probably the best quality.
I've set up several Fortinet FortiGate firewalls, and it's a pretty straightforward setup. I haven't ever really had any particular issue with getting them in place.
It's deployed physically at the locations for our campuses. To deploy one, it takes approximately an hour to program and then another hour or so to install. It can get deployed within three hours.
Just one person can manage Fortinet FortiGate; I'm able to manage everything by myself.
The implementation was done by me, one person. Sometimes I need to walk through someone else to physically install it because it might be at a site remote from me. If I'm not physically there, it requires a second person. However, if that was not the case, I could do it as a single person.
It's one of the more expensive brands.
The 100 series costs around $4,000. They are similar in pricing to what you might get from Cisco solutions and probably other similar ones. They're not more expensive than other similar solutions, but they're certainly not cheaper either.
The advice is to go ahead and try it out and see how it works. The product speaks for itself.
I would rate Fortinet FortiGate a nine out of ten, as I always prefer to leave a little bit of room for improvement.
We are using it for perimeter security. By implementing Fortinet FortiGate, we wanted to have secure internet access to our network and prevent cyber risks.
The content filtering and URL filtering capabilities, along with packet content filtering, are very good. It helps us restrict internet traffic during working hours to legitimate work-related traffic. Workers are only able to access social media, YouTube, and similar sites after work hours.
It helps in protecting the edge significantly because we are able to determine what must be accepted and what must not be accepted. We also have FortiAnalyzer, which is the log analyzer for Fortinet FortiGate. Being AI-driven, it helps us see what is happening and new emerging threats quickly. We are able to make the necessary interventions to protect the network.
We are using QRadar as a SIEM, and Fortinet FortiGate integrates with it seamlessly. FortiAnalyzer picks all logs from Fortinet FortiGate, integrates with QRadar, and allows us to see everything. It also integrates beautifully with our EDR from WithSecure.
It also helps reduce power consumption. Fortinet FortiGate is a greener listing in terms of power consumption.
Stateful packet inspection is valuable. It also does SSL packet inspection. It is able to provide a VPN for remote users with secure connectivity. Being a next-generation firewall, it helps.
It has been able to host internet feeds from two different ISPs, with one as a backup. We've two internet services on Fortinet FortiGate. We have been able to deploy it in a high-availability mode. We have redundancy. When there is a problem with one, the other picks up quickly, ensuring business continuity.
I wish that they could integrate zero-trust technology into Fortinet FortiGate. I am not sure whether it has been done already, but if they could implement that, it would help significantly.
I have been using it for about ten years now.
Their support is good.
I didn't use any similar solution previously.
I wasn't involved in the recent deployment.
It was quite quick. The last deployment was more of a migration, where we migrated from an old platform to a new platform. It was a matter of hours because the configs had been backed up. In eight hours, we were done completely.
We had two people from my side and two from Fortinet's side.
If we look at the average revenue loss due to downtime, even if I conservatively put it at $10,000 an hour, we have paid back the investment within six months.
Compared to a sister company that did not take security seriously and lost significant money through ransomware attacks and outages, we have not experienced a single successful ransomware attack. In one instance, we were able to thwart an attack by detecting the initial steps quickly through EDR and FortiAnalyzer. We saw the footprints and stopped it before it reached the encryption phase of the ransomware attack.
The analysis being AI-based helped us quickly pick up unusual activity. Once alerted, we were able to quickly identify the affected nodes, isolate them, and stop the attack.
It has reduced the total cost of ownership by 10%.
For the performance that we get, the price is reasonable. There are cheaper options, but they may not deliver the same kind of performance that we want. For the performance they provide, the price is acceptable.
Currently, there is a project we are doing to converge OT and IT using Fortinet FortiGate, because of the cluster we have. Fortinet FortiGate is going to broker the convergence between IT and OT. We want to make the convergence one-way, with only read-only data coming from OT into IT.
They keep bringing new versions and firmware updates, making sure that their products are always relevant. They are always providing what the industry needs.
We have implemented FortiAnalyzer. We are also looking seriously at FortiIdentity to help us with enterprise single sign-on and multi-factor authentication. Because we already have Fortinet FortiGate in the system, we are seriously considering other Fortinet solutions.
I would rate this solution a nine out of ten.
We use Fortinet FortiGate for any of our customers or clients that need to have more security features built-in, whether licensed or not.
For instance, if it's a medical firm doing VPN to ensure no traffic leaks, that would be a use case. We use Fortinet FortiGate for anything that needs specific features, such as SD-WAN or other security features, including malware checking and blocking. We also use it for Zero Trust.
It differs for everyone with Fortinet FortiGate, but one benefit was checking for malware on incoming traffic or security issues, compared to a users using a residential router off the shelf.
The second benefit was properly dividing up the network, which helps us significantly.
Users benefit from a recognizable brand and good security features.
Ease of use is one feature of Fortinet FortiGate, and the Cloud Controller and Cloud Connector are the second one; these are the two main features that are quite useful. For example, with the Cloud Connector in Fortinet FortiGate, if a user has an issue, we can see it directly without having to build a VPN tunnel or something of that nature.
From time of deployment, users tend to see benefits once there's a major event that stops. From my end, I see benefits right away.
For Fortinet FortiGate, their code development would definitely be something they need to improve on to reduce vulnerabilities that need to be patched.
Additionally, if I were to suggest another improvement, it would be their competitive pricing.
I have had experience with Fortinet FortiGate for six years.
With Fortinet FortiGate, scalability is good; it's very easy to scale with them.
The only downside is sometimes you can't just cut over, so if you go from a bigger model. Or if you need to upgrade the model, you would have to reprogram it, compared to just importing and exporting, which can be time-consuming.
The scalability is easy with switches and access points that are basically plug-and-play for the most part.
I've never had a problem with Fortinet FortiGate support, so I'd rate it ten out of ten. However, if you don't have a support contract, it's not easy to get support.
I've dealt with many firewalls, such as SonicWalls, UniFi, pfSense, and Cisco. We found SonicWall very confusing for the average network engineer or network administrator. I don't recommend SonicWall due to its hard-to-find auditing process for exploits. Although they have fewer exploits, when they do occur, they're significant.
With Fortinet FortiGate, you can access the whole firewall, with no hidden spots. pfSense is great, however, it requires a lot of manual work and has no Cloud Connect or easy management from an MSP's perspective.
Palo Alto is another option that's great, but their price point isn't for everyone, especially for medium and small businesses; a $10,000 investment doesn't necessarily fit into most budgets.
UniFi is another product we've started to use more alongside Fortinet FortiGate, as they have almost all features without a license, with advanced rules that are relatively inexpensive compared to Fortinet FortiGate's $1,500 a year.
Fortinet FortiGate and UniFi are the two firewalls we primarily deal with. My opinion is that UniFi has better integration and oversight of the environments compared to Fortinet FortiGate.
From an average user's perspective, setting up Fortinet FortiGate is quite complex; most people don't understand the terminology, so I'd rate that complexity at a high nine out of ten. From an MSP's perspective, it's probably about a five or six out of ten in terms of difficulty; it's easy for us as an MSP. For the end-user, it would be really complicated.
For Fortinet FortiGate, deployment takes approximately two to three hours.
From our side, as an MSP, we require one person for Fortinet FortiGate. That job role is network administration.
For Fortinet FortiGate, calculating the return on investment is complex.
The ROI is seen almost immediately in terms of security and protection against malicious attacks. While you never really get your money back in terms of direct investment, you get the security and protection benefits immediately.
Fortinet FortiGate provides cost savings since you wouldn't need extra security features; you don't have to have four other programs for all the other parts of the environment, as it takes care of most of that.
I'd rate the pricing eight out of ten.
The Fortinet FortiGate security features cost approximately $1,500 a year. The firewall itself doesn't have a recurring cost. It's the security features on top of that that you pay for.
I recommend Fortinet FortiGate.
It's always updating the security package and security features.
I have not looked into the solution's AI features.
Overall, on a scale of one to ten, I would rate Fortinet FortiGate a nine. I'd recommend the solution to others. It's always updating its security features.