Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Reviews from AWS customer

9 AWS reviews

External reviews

157 reviews
from and

External reviews are not included in the AWS star rating for the product.


    Md Shahrukh Siddique

Centralized cloud security has blocked advanced threats and protects our virtual workloads

  • February 01, 2026
  • Review from a verified AWS customer

What is our primary use case?

The main use case for SonicWall NSv is to secure virtual and cloud-based infrastructure by providing centralized firewall security, including VPN access and traffic inspections.

In one of our environments, we had multiple applications running in VMware and cloud VMs for internal users and external clients. We use SonicWall NSv as a virtual perimeter firewall between the internet and the application servers.

Our implementation involved deploying NSv on VMware Cloud as virtual appliances, positioned between the WAN and internal server network.

What is most valuable?

The best features with SonicWall NSv, based on my experience over several years, include next-generation firewall capabilities including stateful inspection and deep packet inspections. Advanced threat blocking at the perimeters is better than basic L3 and L4 firewalls.

IPS detects and blocks exploit attempts, protects virtualized workloads against known vulnerabilities, and helps reduce lateral movement inside networks.

Gateway antivirus and anti-malware scan traffic in real-time, blocking malware and ransomware before they reach servers or endpoints. It works across HTTP and HTTPS traffic with SSL inspections.

Among all of these features, the one I rely on the most in my day-to-day work is Deep Packet Inspections with IPS in SonicWall NSv. In our environment, most applications and users access services over the internet and cloud platform, so we are constantly exposed to external threats. With DPI and IPS enabled, it inspects traffic in real-time at the application and content level, not just at the port level. It detects and blocks attack exploits, including brute-force attacks and malware before they reach the server. It provides protection even when applications have unpatched or zero-day vulnerabilities.

The customer support for SonicWall NSv is outstanding, and the support from SonicWall is excellent.

What needs improvement?

Overall, SonicWall NSv is a strong and reliable virtual firewall, but based on my hands-on experience, there are a few areas where it can definitely be improved.

The first area is the management interface and usability. The management UI sometimes feels outdated and less intuitive compared to some newer firewall platforms. Navigating logs, policies, and monitoring screens can take extra time. Some advanced settings are not very easy to find.

This is the feedback I have regarding areas that need improvement by SonicWall.

For how long have I used the solution?

I have been using SonicWall NSv for around three years as a part of my overall six years of IT experience.

What do I think about the stability of the solution?

SonicWall NSv has been stable and reliable based on my experience. It runs consistently without frequent crashes or unexpected reports.

Security policies and rules apply reliably across the virtual environment when deployed properly with the right resources. It handles traffic well, providing reliable perimeter security with minimal interruptions and few service disruptions related to the firewall itself.

What do I think about the scalability of the solution?

SonicWall NSv's scalability is good, and it can handle growth and spikes in demand effectively when properly sized and configured.

Being a virtual appliance, it scales differently from physical firewalls. You can add more CPUs and RAM to increase throughput and processing capacity, and deploy multiple NSv instances in larger or segmented environments.

How are customer service and support?

The customer support for SonicWall NSv is outstanding, and the support from SonicWall is excellent.

How would you rate customer service and support?

Which solution did I use previously and why did I switch?

We have not used any other solution before SonicWall NSv. This is the first solution we are using, and we continue to use it.

How was the initial setup?

We purchased SonicWall NSv through the Amazon Web Services Marketplace.

What was our ROI?

We have definitely seen a positive return on investment after implementing SonicWall NSv, mainly in terms of time savings, operational efficiency, and reduced security-related costs. Before NSv, we used to spend a lot of time and resources handling security incidents, malware cleaning, and emergency troubleshooting.

What's my experience with pricing, setup cost, and licensing?

My experience with the pricing, setup cost, and licensing of SonicWall NSv has been mostly positive, though there are a few areas that can be improved in licensing.

Pricing for SonicWall NSv is competitive and flexible, with a low initial setup cost due to its virtual nature. Licensing through AWS Marketplace simplified billing and deployment.

Which other solutions did I evaluate?

I do not think there are better options for this cost. I recommend SonicWall NSv as much better in this price range.

What other advice do I have?

Based on my hands-on experience, here is the advice I would give to anyone considering SonicWall NSv. First, plan proper sizing from the start and do not underestimate resource requirements. Second, understand licensing and subscriptions clearly. Third, invest time in initial tuning for much better results. Also, monitor performance regularly. Finally, use high availability for critical systems.

Overall, my advice is to focus on proper sizing, clear licensing understanding, careful policy tuning, continuous monitoring, and high availability deployment. I would rate this product an eight out of ten.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    SurajYadav

Cloud security has unified policies and connects hybrid workloads with consistent protection

  • January 30, 2026
  • Review provided by PeerSpot

What is our primary use case?

SonicWall NSv serves as a parameter and segmentation firewall in a cloud-hosted environment, primarily to secure application workloads and connect on-premises users to cloud resources. I primarily use it to protect a cloud-hosted application server and manage site-to-site VPNs, enforcing east-west traffic segmentation between application tiers.

What is most valuable?

Some of the best features about SonicWall NSv include its flexible virtual firewall deployment, allowing for deployment in cloud platforms like Azure and AWS, or virtual infrastructures such as VMware and Hyper-V, all while maintaining the same SonicWall policy model. Additionally, it has strong VPN capabilities that provide reliable site-to-site and remote access virtual private networks with stable tunnel performance, complemented by the Threat Prevention Suite, which integrates IPS, Gateway Antivirus, Anti-Spyware, Application Control, and Content Filtering for real-time inspections.

Another strong point is the policy familiarity due to maintaining the same rule-based structure as SonicWall physical firewalls, avoiding the need to relearn basics. Scalability in the cloud allows me to scale SonicWall NSv by choosing the proper VM size or cloud configuration that fits workload and throughput needs, while it also supports segmentation and multi-tier security with centralized logging that works well with external SIEMs for deeper visibility.

SonicWall NSv has had a positive impact mainly in terms of security consistency and operational efficiency, allowing me to extend the same firewall policy and VPN standard I already use on-premises into the cloud without redesigning everything from scratch. A clear benefit has been secure cloud adoption, enabling me to move application workloads to the cloud while maintaining strict access control and encrypted connectivity with on-premises systems, reducing public exposure of internal services and improving overall security posture. Day-to-day management has become easier because the policy model and VPN handling are familiar, facilitating faster troubleshooting and less risky adjustments. I have already seen stable VPN connectivity and predictable performance, which has decreased connectivity-related incidents.

SonicWall NSv has helped me to secure cloud workloads faster, maintain consistent security controls, and reduce operational overhead without needing a completely new firewall platform.

What needs improvement?

One feature that really stands out is the consistency between SonicWall NSv and the physical SonicWall firewalls, making it feel familiar for those already acquainted with SonicWall, which reduces operational effort and mistakes. The reliability of VPN stability and policy handling is evident once the initial setup is complete; however, on the improvement side, reporting and visibility could be better since built-in reports are basic, necessitating an external logging or SIEM solution for deeper traffic analysis or compliance.

Moreover, the initial cloud deployment and routing design can be challenging without a well-experienced team in cloud networking. SonicWall NSv is strong for security and day-to-day operation, but it would benefit from more advanced native reporting and smoother cloud onboarding.

For how long have I used the solution?

I have been using SonicWall NSv for around 2.5 to three years in a production environment, primarily in a virtual and cloud setup like Azure and VMware, which includes site-to-site VPNs, remote access, security policies, and day-to-day operations such as rule changes, monitoring, and upgrades.

What do I think about the scalability of the solution?

I had to scale SonicWall NSv up as the cloud workloads grew, mainly due to increased VPN users and higher application traffic, with scaling being accomplished by resizing the virtual machine and allocating more CPUs and memory instead of redeploying the firewall. The process itself was smooth and predictable; after a planned maintenance window and reboot, SonicWall NSv picked up the additional resources without any configuration changes. I did not need to scale down often, but when tested, the process was similar and straightforward.

Properly sizing and aligning licensing is crucial so that the firewall can utilize the added resources. Cloud scalability with SonicWall NSv has worked well and is much easier compared to the physical firewall, though it still requires good planning to avoid performance bottlenecks during peak traffic.

How was the initial setup?

The main challenge lies during the initial deployment and troubleshooting in cloud environments, where routing and network integration need careful planning, and for deeper visibility, logs usually need to be sent to an external logging or SIEM solution. Once deployed correctly, SonicWall NSv is low maintenance for VPN and segmentation tasks.

What was our ROI?

Since deploying SonicWall NSv, I have seen measurable improvements in both operational efficiency and security, with VPN-related incidents dropping by roughly 25 to 30% due to the stability and ease of monitoring of tunnels. Routine tasks such as adding VPN peers or modifying security rules now take 30 to 40% less time because of the consistent policy structure and troubleshooting workflow aligned with physical SonicWall firewalls. In terms of cost, using SonicWall NSv in the cloud has allowed me to avoid purchasing additional physical firewall appliances, while scaling via VM size has proven more cost-effective than hardware refresh cycles, leading to reduced overall infrastructure and firewall expansion costs.

SonicWall NSv delivers solid security and operational gains, yet enhanced reporting and simpler cloud onboarding would strengthen its value further.

What other advice do I have?

If you are planning to use SonicWall NSv, the main advice is to carefully plan the cloud network design before deployment, as most issues later arise from cloud networking rather than the firewall itself. It is essential to size the VM correctly from the beginning, especially if you expect high VPN usage and heavy traffic, because undersizing can lead to performance issues that may resemble firewall problems.

For those already acquainted with SonicWall physical firewalls, managing SonicWall NSv will feel familiar. Also, plan for external logging or a SIEM if you need deep visibility, as built-in reporting is limited.

SonicWall NSv works best for hybrid and cloud environments where strong security is required without needing to transition to a completely new firewall platform. SonicWall NSv delivers solid security and operational gains, yet enhanced reporting and simpler cloud onboarding would strengthen its value further. I rate this solution an 8 out of 10.


    Manoj-Chauhan

Cloud security has improved and secure site‑to‑site access protects our client applications

  • December 22, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for SonicWall NSv is securing the cloud infrastructure, the endpoints, and implementing policies like content filtering and relevant services such as site-to-site VPNs; these are generic tasks that are expected from a normal physical firewall.

Recently, we built a site-to-site tunnel with one of our clients to securely access their applications, which serves as a specific example of how I use SonicWall NSv for one of these tasks.

What is most valuable?

SonicWall NSv offers features that are user-friendly; the options are easily available, and there is no need to drill down into a lot of menu bars to configure it. Support is great as well.

I find the support exceptional, as recently, while building that site-to-site tunnel, the support representative helped us address an issue even when the other party's firewall was not a SonicWall device, demonstrating a good level of expertise. He helped us configure a site-to-site tunnel from a SonicWall device to a non-SonicWall device, so his inputs were very valuable and really saved us a lot of time to configure the tunnel.

SonicWall NSv has positively impacted my organization, as we have not seen any threat or any successful cyberattack; the positive aspect is that we also use SonicWall physical devices for our on-premise infrastructure, so the integration is excellent. Additionally, they have many features in terms of analytics; for example, if we want more information on ongoing threats, they have a tool where we can drill down to each and every packet and see what is incoming and what is outgoing.

What needs improvement?

I believe SonicWall NSv can be improved, as currently, they are rolling out Generation 7 models, and I am not sure if they are also working on Generation 8 and beyond. I faced a problem when migrating from an old Generation 6 firewall to a Generation 7 firewall, where I could not simply copy the configuration from one appliance to the other; I had to rebuild the entire policies, IP addressing, the rules, the NAT rules, the tunnels, and the VPN policies. I believe that if they have an interface that simplifies moving from an old generation to a new one, that would save significant time for the IT team's engineers and organizations as a whole.

For how long have I used the solution?

I have been using SonicWall NSv for five years.

What do I think about the stability of the solution?

SonicWall NSv is stable.

What do I think about the scalability of the solution?

SonicWall NSv's scalability is pretty impressive because even though NSv 270 is an entry model, it supports up to 500 users, which is a very good number for an SME like us.

How are customer service and support?

The customer support for SonicWall NSv is pretty good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We previously used a different solution; however, we were on SonicWall NSv but an older generation which was taken off the shelf by SonicWall, so we had to upgrade to a newer one.

How was the initial setup?

My experience with pricing, setup cost, and licensing has been pretty much linear; it is not high, it is not low, and I found it on par with industry standards.

We have seen a return on investment because setting up the appliance, besides the configuration part, has been pretty straightforward; we have saved a lot of time, and when we say saved a lot of time, it also implies that lesser downtimes mean more productive time, which ultimately means more revenue.

What was our ROI?

We have seen a return on investment because setting up the appliance, besides the configuration part, has been pretty straightforward; we have saved a lot of time, and when we say saved a lot of time, it also implies that lesser downtimes mean more productive time, which ultimately means more revenue.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing has been pretty much linear; it is not high, it is not low, and I found it on par with industry standards.

Which other solutions did I evaluate?

Before choosing SonicWall NSv, we evaluated other options in terms of pricing; we looked at the pricing of Fortinet, Palo Alto, and Check Point, but they were very costly and out of our budget. We also have experience with SonicWall, so we trust the brand.

What other advice do I have?

I would rate SonicWall NSv a 9 out of 10.

I choose a 9 because many times, whenever we try to reach support via phone call, we have to wait around 35 to 40 minutes; if SonicWall can reduce that time, then it would be a 10 out of 10 product.

I would advise others looking into using SonicWall NSv to have a proof of concept before buying the product; I find SonicWall NSv to be a useful and easy-to-use product, and the support is good. They offer an initial 15-day trial, and if requested, they can extend it for another 15 days, so one month is a good time to test any product. I would suggest comparing what they are currently using, the price, and the features they expect.


    Parvendra Kumar

Stateful failover has delivered seamless protection and supports advanced Azure access control

  • December 16, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for SonicWall NSv involves the typical configuration for port shield configuration with HA mode. The implementation was very difficult for me, and I faced issues related to port shield configuration in HA. I am working on the implementation part and have completed multiple projects of SonicWall 2700, 4700, 4300, and multiple firewalls including 2300, 2700, and seventh generation firewalls. Additionally, I am also working on SonicWall NSM.

Currently, my main use case involves configuring the Azure integration for multiple users and customers. Configuring Azure integration is a good approach that allows us to implement with Azure AD.

What is most valuable?

In my experience, the best feature SonicWall NSv offers is its stateful HA, which functions without any impact, ensuring a zero impact failover. This is an excellent feature in SonicWall NSv, and the management of security services is also very easy, which helps in capturing threats and unknown malware.

The stateful feature helps me on a daily basis, especially in critical environments, as customers do not need to experience any downtime during the failover. If any hardware fails, it can continue to work with zero impact failover.

SonicWall NSv has positively impacted my organization, particularly because we need to configure multiple policies for internet access or NAT and port forwarding. Configuring different policies is required, and we can see multiple options on a single page. After making changes, I have not encountered any issues; everything was working very well.

What needs improvement?

While I have not encountered significant challenges, during the configuration part, I noticed that some features, such as user-based policy for web filtering, are not available in SonicWall NSv compared to other firewalls. For dedicated users, we cannot allow a particular website category in a single policy, which is available in Sophos.

I find the features of SonicWall NSv similar to other firewalls, but I believe that application-based QoS policy is very important given the current environment. This feature should be available for application QoS as well in this firewall.

For implementation, I suggest that having a single page to view multiple options would enhance SonicWall NSv. Additionally, the report and logging part is challenging since identifying blocked websites based solely on default logging is quite difficult. Improved logging and reporting capabilities should be available on-box, including at least seven days of reporting and logs.

For how long have I used the solution?

I have been using SonicWall NSv for the last three to four years.

What do I think about the stability of the solution?

In my experience, SonicWall NSv is quite stable when deployed on-premises, and there is no significant impact on the server. We have conducted multiple labs within our organization for testing as well.

On a scale of one to ten, I would rate SonicWall NSv a nine. It offers very good features, and it is stable compared to other OEMs. For example, I can compare it to Sophos, which has experienced some hardware issues. SonicWall NSv is a robust appliance that has not failed during my five to six years of working with it, as I have not had to initiate an RMA for SonicWall.

What do I think about the scalability of the solution?

SonicWall NSv software is very scalable, comparable to other OEMs. In comparison to Sophos, SonicWall has its proprietary OS, SonicOS, which enhances its scalability.

How are customer service and support?

Customer support for SonicWall NSv is very good. Whenever I create a case regarding any issue, their support is prompt and effective, adhering to the SLA, which leaves our customers very satisfied.

How would you rate customer service and support?

Positive

What other advice do I have?

I sometimes receive calls from our customers regarding issues such as firewall login failures due to firmware problems. We recovered from a firmware crash by logging in safe mode, performing OS upgrades, and reinstalling firmware, which solved the issue. This is the main outcome we have received from customers, and generally, everything works fine with the solution; it is indeed a very good solution compared to other OEMs.

As of now, nothing specific comes to mind that I can propose as add-on features for SonicWall NSv. If I receive any responses or suggestions from customers, I will certainly raise a feature request to SonicWall.

I chose a rating of nine out of ten for SonicWall NSv instead of a perfect ten because Palo Alto and Cisco firewalls excel in threat detection and analysis, which SonicWall NSv can improve. SonicWall NSv does a good job, but some threats that are captured successfully by Palo Alto and Cisco are sometimes missed in SonicWall NSv.

For anyone considering SonicWall NSv, if a customer does not want to install any hardware in their on-premises network, recommending SonicWall NSv is a good option. Most customers are using on-premises servers such as VMware or Hyper-V, making it a cost-effective choice.

From my end, I have shared all that I can for now. If I receive any further responses from customers or if any questions arise, I will ensure to suggest ideas and inquiries to our contact at SonicWall SE, with whom we are already in touch. My overall review rating for SonicWall NSv is nine out of ten.


    Vimal Raju

Internal and cloud firewall deployment has reduced costs and improved real-time threat visibility

  • December 03, 2025
  • Review from a verified AWS customer

What is our primary use case?

My main use case for SonicWall NSv is as a firewall, specifically using it as an on-premise VM.

I can give you a quick specific example of how I use SonicWall NSv in my environment: we are using an internal firewall, so it's not a perimeter. We are using an internal firewall and only using an IPS.

Another use case I have is using SonicWall NSv in AWS, which has BYOL. BYOL fits into my workflow because generally, there is no need to buy new hardware. I can use the CPU and RAM, and if it needs to grow, I can increase the CPU and RAM only without needing to change the hardware.

What is most valuable?

Real-time memory inspection in SonicWall NSv is quite unique and valuable, especially for security-focused environments.

SonicWall NSv has positively impacted my organization by being cost-effective, with latency monitoring as an added advantage for us, along with full SD-WAN.

I can share specific outcomes or metrics: it results in cost savings, especially with zero-touch deployment while maintaining it in our VM, which is more cost-effective for us.

What needs improvement?

To improve SonicWall NSv, we need to address that it is currently available only on AWS and Azure, and I think we need to move on with Oracle and GCP.

Regarding improvements, I find that logs are required. I chose 8 out of 10 because logs are unable to restore in the same system, requiring a separate analyzer or analytics. Competitors have seven-day storage available, which is very useful.

For how long have I used the solution?

I have been using SonicWall NSv for two years.

What do I think about the stability of the solution?

SonicWall NSv has been stable for me with no downtime or reliability issues.

What do I think about the scalability of the solution?

I would describe the scalability of SonicWall NSv as excellent. It can easily grow with my organization's needs.

How are customer service and support?

The customer support for SonicWall NSv is really good, and I have found it helpful when I needed assistance.

How would you rate customer service and support?

Positive

What other advice do I have?

I would rate the reporting and analytics features of SonicWall NSv as detailed enough for my needs.

I would describe the ease of management and configuration for SonicWall NSv as very useful, making it simple to create a policy in a single dashboard, which is easy to configure and maintain.

The security capabilities of SonicWall NSv compared to other firewall solutions I have used are moderate because deep inspection is required to prevent the URLs, making it very difficult to secure those.

My advice to others looking into using SonicWall NSv is that it is cost-effective. You can purchase it easily and maintain the firewall without issues.

I have rated this review 8 out of 10.

Which deployment model are you using for this solution?

Public Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?

Amazon Web Services (AWS)


    Alan O'Kelly

User management has improved security and visibility but support still needs refinement

  • December 03, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for SonicWall NSv is user management and protection.

I use SonicWall NSv for adding users to our network and ensuring that security.

What is most valuable?

The best features SonicWall NSv offers are its user-friendliness and ease of access.

SonicWall NSv is user-friendly and easy to access due to how it is generally set up.

SonicWall NSv has positively impacted my organization by allowing us to scale growth without having to constantly reinvent our processes.

SonicWall NSv has helped us scale growth and avoid reinventing processes by providing us with latency visibility, showing us how many people we can add and how we can scale through that capacity.

What needs improvement?

I do not have anything that comes to mind regarding how SonicWall NSv can be improved.

For how long have I used the solution?

I have been using SonicWall NSv for probably the last six months to a year, and I have used similar solutions in different companies throughout my career.

What do I think about the stability of the solution?

SonicWall NSv is stable.

What do I think about the scalability of the solution?

SonicWall NSv's scalability is scalable and very easy.

How are customer service and support?

The customer support for SonicWall NSv is good.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We switched between a couple of products before SonicWall NSv, and I was always more satisfied with SonicWall NSv.

Which other solutions did I evaluate?

I evaluated other options before choosing SonicWall NSv.

What other advice do I have?

I would advise others looking into using SonicWall NSv to use it as it is helpful and helps businesses do what they need to do while giving them the protection that they need.

I would rate this product a 7 out of 10.


    reviewer2783679

Cloud firewall has unified hybrid access and has reduced operational effort across sites

  • December 02, 2025
  • Review from a verified AWS customer

What is our primary use case?

My main use case for SonicWall NSv is to secure cloud, such as using it for threat prevention, IPS, anti-malware, and VPN.

I use SonicWall NSv for threat prevention and VPN in my environment by managing different zones depending on what we're serving, which is practical because it's all software-based. We have been successful using and managing the environment.

I generally use SonicWall NSv as a firewall, so anything that is needed as a firewall is handled well.

What is most valuable?

The best features SonicWall NSv offers mainly include site-to-site VPN and segmentation, which are especially helpful in our hybrid cloud environment.

Segmentation is helpful because you are able to have people working in the same department, even though they are geographically dispersed, and they all will have the same access and user privileges. This allows us to reduce traffic, for example, for broadcasting on the network, and helps in bringing the team together, even though they are geographically dispersed.

SonicWall NSv has positively impacted my organization by allowing us to secure and manage the network in a secure fashion and providing easy access. This is helpful as it doesn't require somebody to be senior to perform small tasks.

A specific outcome that shows how SonicWall NSv helped my organization is that for any change in configuration, we need to make changes on the firewall. Using SonicWall NSv has been beneficial because of the ease of use and maintaining system security, making it business as usual.

What needs improvement?

SonicWall NSv can be improved by incorporating AI to help with configuration, propose scenarios, and check the changes before deployment, which would be helpful.

For how long have I used the solution?

I have been using SonicWall NSv for three years.

What do I think about the stability of the solution?

SonicWall NSv is stable.

What do I think about the scalability of the solution?

SonicWall NSv's scalability is good, as we can expand it to cover our network, making it suitable for the future as well.

How are customer service and support?

Customer support for SonicWall NSv is good.

How would you rate customer service and support?

Which solution did I use previously and why did I switch?

I did not previously use a different solution. We used to use a regular firewall, but now with SonicWall NSv, this has been helpful.

What was our ROI?

I have seen a return on investment with SonicWall NSv, as I have saved money by saving time and needing fewer employees due to the ease of use, allowing us to manage our resources better.

What's my experience with pricing, setup cost, and licensing?

My experience with pricing, setup cost, and licensing for SonicWall NSv is favorable.

Which other solutions did I evaluate?

Before choosing SonicWall NSv, we evaluated other options and used to have the physical SonicWall, the regular SonicWall where you purchase the device.

What other advice do I have?

My advice to others looking into using SonicWall NSv is that if they are using regular firewalls, this will be a game-changer, but there are also other NGFW options. The ROI is good, so that's the main thing, as the ratio between technical and financial benefits is favorable, and you can save money using it. I would rate this product 9 out of 10.

Which deployment model are you using for this solution?

Hybrid Cloud

If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?


    Kallamuddin Ansari

Cloud firewall has secured servers and has simplified centralized VPN access for remote users

  • December 01, 2025
  • Review provided by PeerSpot

What is our primary use case?

I primarily use SonicWall NSv to protect cloud servers. I created firewall rules, check traffic, enable IPS, and use it for VPN access.

My main use case was securing the cloud server. I use SonicWall NSv to control incoming and outgoing traffic and to block threats in the cloud.

In one setup, I had to deploy SonicWall NSv on Azure. I created a virtual machine from a SonicWall image, assigned a network interface, and connected it between the internet and the cloud servers. After deployment, I configured basic firewall rules and NAT. In another setup, I configured SSL VPN for remote users. I created user accounts, assigned them to the VPN group, and configured the portal. The user connected through the SonicWall NSv VPN client and accessed the cloud server securely.

What is most valuable?

The best feature SonicWall NSv offers is its simple and clean interface that makes it easy to create rules, check logs, and manage security, even in the cloud. The IDS and IPS features work well and block common attacks, scanning attempts, and malicious traffic before it reaches the cloud servers. SonicWall NSv manages very stable VPN connectivity, as seen in the SSL VPN example where remote users can connect securely to cloud resources without issues.

There are many features available, including application control features that can detect and control applications in the traffic. This helps block unnecessary or risky applications. Additionally, SonicWall NSv supports NAT and routing very easily, which is important for hosting applications in the cloud. The most valuable aspect is that it is lightweight and flexible compared to other cloud firewalls, and you can scale the VM size up or down based on your needs.

SonicWall NSv has reduced the risk of attack, which is very impactful for any organization, especially larger organizations. With IPS and threat protections enabled, the risk of attack and malware on cloud workloads is reduced significantly. You can have centralized management where you control everything centrally, giving you one place to manage all cloud security rules, VPNs, IPS, and monitoring. This makes management easier for the IT team. Since it is a virtual firewall, you do not need physical hardware, which reduced costs and removed the hardware maintenance effort. It has improved cloud security, reduced attack risk, allowed secure remote access, saved hardware costs, and made management simple for the IT team.

What needs improvement?

There is minimal room for improvement, perhaps one to two percent. The reporting and analytics should be improved. The reports could be more detailed and easier to customize.

For how long have I used the solution?

I have been working in my current field as a network security consultant for more than five years.

What do I think about the stability of the solution?

SonicWall NSv has been stable in our environment. We had no major downtime. From user feedback, it has been rated around eight to nine out of ten for stability.

What do I think about the scalability of the solution?

One challenge was the initial setup. Some options were not very clear in the beginning, so it took some time to configure everything properly. The second challenge was performance. When the traffic increased, we had to upgrade the VM size, otherwise it would slow down. Performance totally depends on the VM size.

How are customer service and support?

Customer support for SonicWall NSv is excellent.

How would you rate customer service and support?

Positive

How was the initial setup?

One challenge was the initial setup. Some options were not very clear in the beginning, so it took some time to configure everything properly. The information provided was very knowledgeable and very helpful.

What was our ROI?

The return on investment was approximately five thousand to eight thousand dollars in savings.

What's my experience with pricing, setup cost, and licensing?

The licensing cost was a bit higher compared to other options, but it is negligible.

Which other solutions did I evaluate?

SonicWall NSv is very helpful to deploy and manage. Everything can be managed easily and it is very simple, so I cannot justify switching to other options.

What other advice do I have?

My advice is to select the correct VM size. There could be a little bit of improvement regarding the VM size selection to ensure optimal performance. My overall rating for this product is eight out of ten.


    Samodthemiya Gamage

Secures east-west cloud traffic and improves threat visibility through deep inspection

  • November 25, 2025
  • Review provided by PeerSpot

What is our primary use case?

I usually use SonicWall NSv for the primary security perspective, including hybrid and multi-cloud security gateway, micro-segmentation, and east-west traffic control. I also use it to secure SD-WAN and virtualized branches, as well as for regulatory compliance and auditability.

I can give you an example for micro-segmentation and traffic control from my previous company. Imagine you have a standard three-tier web application hosted within a single virtual private cloud in AWS or Azure. Before SonicWall NSv segmentation, there is a risk because these three tiers often exist in the same flat virtual network and are separated only by basic security groups. Any successful attack, such as a zero-day exploit, would grant the web tier direct access for the attacker to gain a foothold inside the network because the security groups may only enforce simple port rules, such as allowing the app tier to talk to the database tier on port 1430.

In the solution, SonicWall NSv serves as a network segmentation gateway that can be deployed between these tiers. For example, SonicWall NSv can be deployed as a zoning and policy enforcement gateway with east-west security. By forcing all intra-cloud traffic to east-west to traverse SonicWall NSv, we gain full visibility. We can inspect the encrypted traffic using DPI-SSL between our own servers, and we can check attack containment. If the web tier is compromised, the attacker is immediately blocked by SonicWall NSv IPS signatures, and we maintain regulatory compliance.

Previously, I worked with a company where we had clients from the financial sector. We used a simple illustration about Innova Financial, a medium to large financial service company that is subject to regulations like PCI DSS. They used SonicWall NSv to secure their mission-critical cloud platform in Microsoft Azure.

What is most valuable?

SonicWall NSv offers great features. I cannot pinpoint a single best feature, but the best feature is the ability to deliver the full, high-efficiency inspection power of a physical SonicWall, including zero-day defense using Real-Time Deep Memory Inspection to the cloud, efficiently removing the performance versus cloud trade-off typically associated with virtual firewalls.

Regarding deep memory inspection and real-time zero-day defense in SonicWall NSv, deep memory inspection is distinct from traditional sandboxing methods because it is focused on what is happening in the memory during file execution time, rather than just observing file system behavior. The deep memory inspection process addresses all challenges by employing a proprietary technique within the secure analysis environment, focusing on CPU-level analysis and real-time verdict. Those are the key points.

SonicWall NSv's user interface is quite clear and easy to navigate. If someone has not worked with SonicWall and this is their first experience with the platform, I would highly recommend it. It is very easy to navigate and very user-friendly.

SonicWall NSv has positively impacted our organization because we gained clear visibility into our network, and it helps to identify potential security issues that we had. We were able to remediate those issues, and so far, we have had a great experience with SonicWall NSv. We were able to manage approximately 99% of network-based attacks through this platform.

What needs improvement?

From my perspective, SonicWall NSv currently works very well, but I believe it would be better if you could integrate SonicWall NSv UI with AI. Every platform is now integrating with AI, at least in collaboration. If you can add more AI features to SonicWall NSv, such as recommendations, that would be great.

For how long have I used the solution?

I have been using SonicWall NSv for almost one year when I worked with the previous company.

What do I think about the stability of the solution?

So far, we have not had any downtime or reliability issues with SonicWall NSv. We are getting great performance from SonicWall NSv. If we have any concerns with our platform, we are always contacting the support team, and the support team is also great. We are getting a response in a very quick time. I am very happy with the current experience.

What do I think about the scalability of the solution?

SonicWall NSv's scalability is highly efficient because it is tied directly to the underlying virtual infrastructure and offers a pay-as-you-grow model. As a cybersecurity professional, I would assess its scalability as excellent for both vertical scaling and horizontal scaling with specific cloud limitations. It has met our organization's needs by allowing us to scale our security posture consistently with our cloud compute growth, increased traffic and user areas, new cloud regions, and policy complexity growth. In the growth area, I performed a vertical upgrade from NSv 470 to NSv 870 license upgrade, and also deployed new active and passive SonicWall NSv pairs instantly using marketplace imaging.

How are customer service and support?

Customer support for SonicWall NSv is super good. If we have any issues or any doubts, they are resolved in a very quick time. That is another good thing that we noticed in SonicWall because other platforms take even days to resolve or reach out, but SonicWall NSv customer support is very good and has met our expectations.

I would rate the customer support of SonicWall NSv a nine.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Before SonicWall NSv, we used other solutions including Cisco Secure Firewall and FortiGate. The reason we switched to SonicWall NSv was based on our requirements for our infrastructure, policy management, and performance. Comparing with Cisco, SonicWall NSv is very user-friendly and very helpful to manage policies, and it has very good threat efficiency. For example, in threat efficiency, it is highly rated, especially in zero-day threats, Capture ATP, and Deep Memory Inspection. SonicWall NSv's performance is reliable but can be limited by single-stream CPU usage when DPI-SSL is enabled, but in most cases, it is a great experience. The user interface experience is also superior, which is the reason we made the switch.

How was the initial setup?

The deployment process of SonicWall NSv depends on the metrics that fall into three main categories: security efficiency, operational efficiency, and performance. In security efficiency, it helps with blocking lateral movements, DPI and SSL threat detection, and zero-day block rate. When it comes to operational efficiency metrics, it helped deploy policy time, incident mean time to resolution, and deployment speed. For performance and resiliency metrics, I would mention CPU and memory utilization, latency added, and threat prevention throughput.

What was our ROI?

After deploying SonicWall NSv, I have seen a return on investment because it helps to save our time a lot. Previously, we had other monitoring methods to monitor network traffic, and it took a very long time. Based on SonicWall NSv, it helped us to easily navigate through everything and get done what we needed in a very quick manner. Additionally, with a low number of employees because it is very easy to navigate and everything is connected, anyone can easily navigate through the platform. It is a very user-friendly platform. If you are trained under SonicWall NSv, you will be able to handle most of the tasks. Therefore, it will definitely help to reduce the time and headcount as well.

Which other solutions did I evaluate?

We checked other options, including Palo Alto, before choosing SonicWall NSv. We checked the target market, and Palo Alto is for large enterprise compared to SonicWall NSv. The core differentiators are that Palo Alto offers Application-ID visibility. Additionally, deployment speed is a main concern because Palo Alto takes quite some time to deploy, but SonicWall NSv is very fast for existing SonicWall NSv users. That is an interesting difference. As mentioned, threat efficiency and performance were also factors in our decision.

What other advice do I have?

Based on my experience in cybersecurity, the best advice I can offer to others looking into SonicWall NSv is to focus less on the firewall features and more on the architectural planning and the license alignment with your cloud strategy. Some key points would be to master the cloud routing first, then over-allocate the resources for deep inspection, and license smartly, considering BYOL versus PAYG options, and also create a migration plan. Those are the points I have to give for others who are looking to switch to SonicWall NSv. I would rate this review a nine overall.


    reviewer2782254

Faced challenges with global support reachability but have achieved strong network protection and efficient VPN connections

  • November 25, 2025
  • Review provided by PeerSpot

What is our primary use case?

My main use case for SonicWall NSv was with the other models of the next-generation firewall of SonicWall. SonicWall NSv was primarily used for intrusion prevention and security, with security being my best aim.

How has it helped my organization?

SonicWall NSv has positively impacted my organization by regenerating the network infrastructure, making it more efficient and useful for all of the company's site-to-site VPNs. I had an SD-WAN project that I couldn't complete previously.

SonicWall NSv made my network infrastructure more efficient, especially focusing on downtime as my red line. I used it specifically for that purpose, and there was no downtime while I was using it.

What is most valuable?

The best features SonicWall NSv offers in my experience include secure remote access and cloud secure connect. These features help me in my day-to-day work and my organization overall because I can monitor and check on things.

SonicWall NSv stands out to me as user-friendly, and the zero-day vulnerabilities protection is more efficient than other solutions. The performance and firewall performance are very good, with throughput values that are more efficient, and it is a manageable firewall.

What needs improvement?

SonicWall NSv may need improvement in integrating with access points more. The interface of SonicWall NSv is useful and monitoring is useful, but I think support and global support need to be improved.

For how long have I used the solution?

I used SonicWall NSv deeply approximately four or five years ago, but I am not currently using it. However, I have experience with that firewall.

What do I think about the stability of the solution?

SonicWall NSv appears to be stable.

What do I think about the scalability of the solution?

SonicWall NSv's scalability is exactly as expected.

How are customer service and support?

The customer support for SonicWall NSv is not very reachable or speedy, but we can solve issues. I would rate the customer support of SonicWall NSv seven out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used WatchGuard before SonicWall NSv because the security and monitoring is more efficient with SonicWall NSv.

What was our ROI?

I have not seen a return on investment with SonicWall NSv yet.

What's my experience with pricing, setup cost, and licensing?

My experience with SonicWall NSv's pricing, setup cost, and licensing reveals that the first buying cost is cheap, but the licensing cost is expensive.

Which other solutions did I evaluate?

I can try Sophos and Fortinet regarding my main use case with SonicWall NSv, and I can say that it compares well to other solutions I tried. I evaluated other options before choosing SonicWall NSv, specifically Sophos, but I chose SonicWall NSv because Sophos is not a global product.

What other advice do I have?

SonicWall NSv helped me achieve better security because the next-generation firewall of SonicWall is more efficient for security, VPN connections, site-to-site or peer-to-peer connections. The MAC filtering is better, and the filtering of the addresses is more efficient than before I used other solutions. If you need security and more utility for VPN, you can use SonicWall NSv. I would rate this solution nine out of ten overall.