Centralized cloud security has blocked advanced threats and protects our virtual workloads
What is our primary use case?
The main use case for SonicWall NSv is to secure virtual and cloud-based infrastructure by providing centralized firewall security, including VPN access and traffic inspections.
In one of our environments, we had multiple applications running in VMware and cloud VMs for internal users and external clients. We use SonicWall NSv as a virtual perimeter firewall between the internet and the application servers.
Our implementation involved deploying NSv on VMware Cloud as virtual appliances, positioned between the WAN and internal server network.
What is most valuable?
The best features with SonicWall NSv, based on my experience over several years, include next-generation firewall capabilities including stateful inspection and deep packet inspections. Advanced threat blocking at the perimeters is better than basic L3 and L4 firewalls.
IPS detects and blocks exploit attempts, protects virtualized workloads against known vulnerabilities, and helps reduce lateral movement inside networks.
Gateway antivirus and anti-malware scan traffic in real-time, blocking malware and ransomware before they reach servers or endpoints. It works across HTTP and HTTPS traffic with SSL inspections.
Among all of these features, the one I rely on the most in my day-to-day work is Deep Packet Inspections with IPS in SonicWall NSv. In our environment, most applications and users access services over the internet and cloud platform, so we are constantly exposed to external threats. With DPI and IPS enabled, it inspects traffic in real-time at the application and content level, not just at the port level. It detects and blocks attack exploits, including brute-force attacks and malware before they reach the server. It provides protection even when applications have unpatched or zero-day vulnerabilities.
The customer support for SonicWall NSv is outstanding, and the support from SonicWall is excellent.
What needs improvement?
Overall, SonicWall NSv is a strong and reliable virtual firewall, but based on my hands-on experience, there are a few areas where it can definitely be improved.
The first area is the management interface and usability. The management UI sometimes feels outdated and less intuitive compared to some newer firewall platforms. Navigating logs, policies, and monitoring screens can take extra time. Some advanced settings are not very easy to find.
This is the feedback I have regarding areas that need improvement by SonicWall.
For how long have I used the solution?
I have been using SonicWall NSv for around three years as a part of my overall six years of IT experience.
What do I think about the stability of the solution?
SonicWall NSv has been stable and reliable based on my experience. It runs consistently without frequent crashes or unexpected reports.
Security policies and rules apply reliably across the virtual environment when deployed properly with the right resources. It handles traffic well, providing reliable perimeter security with minimal interruptions and few service disruptions related to the firewall itself.
What do I think about the scalability of the solution?
SonicWall NSv's scalability is good, and it can handle growth and spikes in demand effectively when properly sized and configured.
Being a virtual appliance, it scales differently from physical firewalls. You can add more CPUs and RAM to increase throughput and processing capacity, and deploy multiple NSv instances in larger or segmented environments.
How are customer service and support?
The customer support for SonicWall NSv is outstanding, and the support from SonicWall is excellent.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
We have not used any other solution before SonicWall NSv. This is the first solution we are using, and we continue to use it.
How was the initial setup?
We purchased SonicWall NSv through the Amazon Web Services Marketplace.
What was our ROI?
We have definitely seen a positive return on investment after implementing SonicWall NSv, mainly in terms of time savings, operational efficiency, and reduced security-related costs. Before NSv, we used to spend a lot of time and resources handling security incidents, malware cleaning, and emergency troubleshooting.
What's my experience with pricing, setup cost, and licensing?
My experience with the pricing, setup cost, and licensing of SonicWall NSv has been mostly positive, though there are a few areas that can be improved in licensing.
Pricing for SonicWall NSv is competitive and flexible, with a low initial setup cost due to its virtual nature. Licensing through AWS Marketplace simplified billing and deployment.
Which other solutions did I evaluate?
I do not think there are better options for this cost. I recommend SonicWall NSv as much better in this price range.
What other advice do I have?
Based on my hands-on experience, here is the advice I would give to anyone considering SonicWall NSv. First, plan proper sizing from the start and do not underestimate resource requirements. Second, understand licensing and subscriptions clearly. Third, invest time in initial tuning for much better results. Also, monitor performance regularly. Finally, use high availability for critical systems.
Overall, my advice is to focus on proper sizing, clear licensing understanding, careful policy tuning, continuous monitoring, and high availability deployment. I would rate this product an eight out of ten.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Internal and cloud firewall deployment has reduced costs and improved real-time threat visibility
What is our primary use case?
My main use case for SonicWall NSv is as a firewall, specifically using it as an on-premise VM.
I can give you a quick specific example of how I use SonicWall NSv in my environment: we are using an internal firewall, so it's not a perimeter. We are using an internal firewall and only using an IPS.
Another use case I have is using SonicWall NSv in AWS, which has BYOL. BYOL fits into my workflow because generally, there is no need to buy new hardware. I can use the CPU and RAM, and if it needs to grow, I can increase the CPU and RAM only without needing to change the hardware.
What is most valuable?
Real-time memory inspection in SonicWall NSv is quite unique and valuable, especially for security-focused environments.
SonicWall NSv has positively impacted my organization by being cost-effective, with latency monitoring as an added advantage for us, along with full SD-WAN.
I can share specific outcomes or metrics: it results in cost savings, especially with zero-touch deployment while maintaining it in our VM, which is more cost-effective for us.
What needs improvement?
To improve SonicWall NSv, we need to address that it is currently available only on AWS and Azure, and I think we need to move on with Oracle and GCP.
Regarding improvements, I find that logs are required. I chose 8 out of 10 because logs are unable to restore in the same system, requiring a separate analyzer or analytics. Competitors have seven-day storage available, which is very useful.
For how long have I used the solution?
I have been using SonicWall NSv for two years.
What do I think about the stability of the solution?
SonicWall NSv has been stable for me with no downtime or reliability issues.
What do I think about the scalability of the solution?
I would describe the scalability of SonicWall NSv as excellent. It can easily grow with my organization's needs.
How are customer service and support?
The customer support for SonicWall NSv is really good, and I have found it helpful when I needed assistance.
How would you rate customer service and support?
What other advice do I have?
I would rate the reporting and analytics features of SonicWall NSv as detailed enough for my needs.
I would describe the ease of management and configuration for SonicWall NSv as very useful, making it simple to create a policy in a single dashboard, which is easy to configure and maintain.
The security capabilities of SonicWall NSv compared to other firewall solutions I have used are moderate because deep inspection is required to prevent the URLs, making it very difficult to secure those.
My advice to others looking into using SonicWall NSv is that it is cost-effective. You can purchase it easily and maintain the firewall without issues.
I have rated this review 8 out of 10.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)
Cloud firewall has unified hybrid access and has reduced operational effort across sites
What is our primary use case?
My main use case for SonicWall NSv is to secure cloud, such as using it for threat prevention, IPS, anti-malware, and VPN.
I use SonicWall NSv for threat prevention and VPN in my environment by managing different zones depending on what we're serving, which is practical because it's all software-based. We have been successful using and managing the environment.
I generally use SonicWall NSv as a firewall, so anything that is needed as a firewall is handled well.
What is most valuable?
The best features SonicWall NSv offers mainly include site-to-site VPN and segmentation, which are especially helpful in our hybrid cloud environment.
Segmentation is helpful because you are able to have people working in the same department, even though they are geographically dispersed, and they all will have the same access and user privileges. This allows us to reduce traffic, for example, for broadcasting on the network, and helps in bringing the team together, even though they are geographically dispersed.
SonicWall NSv has positively impacted my organization by allowing us to secure and manage the network in a secure fashion and providing easy access. This is helpful as it doesn't require somebody to be senior to perform small tasks.
A specific outcome that shows how SonicWall NSv helped my organization is that for any change in configuration, we need to make changes on the firewall. Using SonicWall NSv has been beneficial because of the ease of use and maintaining system security, making it business as usual.
What needs improvement?
SonicWall NSv can be improved by incorporating AI to help with configuration, propose scenarios, and check the changes before deployment, which would be helpful.
For how long have I used the solution?
I have been using SonicWall NSv for three years.
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
SonicWall NSv's scalability is good, as we can expand it to cover our network, making it suitable for the future as well.
How are customer service and support?
Customer support for SonicWall NSv is good.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I did not previously use a different solution. We used to use a regular firewall, but now with SonicWall NSv, this has been helpful.
What was our ROI?
I have seen a return on investment with SonicWall NSv, as I have saved money by saving time and needing fewer employees due to the ease of use, allowing us to manage our resources better.
What's my experience with pricing, setup cost, and licensing?
My experience with pricing, setup cost, and licensing for SonicWall NSv is favorable.
Which other solutions did I evaluate?
Before choosing SonicWall NSv, we evaluated other options and used to have the physical SonicWall, the regular SonicWall where you purchase the device.
What other advice do I have?
My advice to others looking into using SonicWall NSv is that if they are using regular firewalls, this will be a game-changer, but there are also other NGFW options. The ROI is good, so that's the main thing, as the ratio between technical and financial benefits is favorable, and you can save money using it. I would rate this product 9 out of 10.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Secures east-west cloud traffic and improves threat visibility through deep inspection
What is our primary use case?
I usually use
SonicWall NSv for the primary security perspective, including hybrid and multi-cloud security gateway, micro-segmentation, and east-west traffic control. I also use it to secure SD-WAN and virtualized branches, as well as for regulatory compliance and auditability.
I can give you an example for micro-segmentation and traffic control from my previous company. Imagine you have a standard three-tier web application hosted within a single virtual private cloud in
AWS or
Azure. Before
SonicWall NSv segmentation, there is a risk because these three tiers often exist in the same flat virtual network and are separated only by basic security groups. Any successful attack, such as a zero-day exploit, would grant the web tier direct access for the attacker to gain a foothold inside the network because the security groups may only enforce simple port rules, such as allowing the app tier to talk to the database tier on port 1430.
In the solution, SonicWall NSv serves as a network segmentation gateway that can be deployed between these tiers. For example, SonicWall NSv can be deployed as a zoning and policy enforcement gateway with east-west security. By forcing all intra-cloud traffic to east-west to traverse SonicWall NSv, we gain full visibility. We can inspect the encrypted traffic using DPI-SSL between our own servers, and we can check attack containment. If the web tier is compromised, the attacker is immediately blocked by SonicWall NSv IPS signatures, and we maintain regulatory compliance.
Previously, I worked with a company where we had clients from the financial sector. We used a simple illustration about Innova Financial, a medium to large financial service company that is subject to regulations like PCI DSS. They used SonicWall NSv to secure their mission-critical cloud platform in
Microsoft Azure.
What is most valuable?
SonicWall NSv offers great features. I cannot pinpoint a single best feature, but the best feature is the ability to deliver the full, high-efficiency inspection power of a physical SonicWall, including zero-day defense using Real-Time Deep Memory Inspection to the cloud, efficiently removing the performance versus cloud trade-off typically associated with virtual firewalls.
Regarding deep memory inspection and real-time zero-day defense in SonicWall NSv, deep memory inspection is distinct from traditional sandboxing methods because it is focused on what is happening in the memory during file execution time, rather than just observing file system behavior. The deep memory inspection process addresses all challenges by employing a proprietary technique within the secure analysis environment, focusing on CPU-level analysis and real-time verdict. Those are the key points.
SonicWall NSv's user interface is quite clear and easy to navigate. If someone has not worked with SonicWall and this is their first experience with the platform, I would highly recommend it. It is very easy to navigate and very user-friendly.
SonicWall NSv has positively impacted our organization because we gained clear visibility into our network, and it helps to identify potential security issues that we had. We were able to remediate those issues, and so far, we have had a great experience with SonicWall NSv. We were able to manage approximately 99% of network-based attacks through this platform.
What needs improvement?
From my perspective, SonicWall NSv currently works very well, but I believe it would be better if you could integrate SonicWall NSv UI with AI. Every platform is now integrating with AI, at least in collaboration. If you can add more AI features to SonicWall NSv, such as recommendations, that would be great.
For how long have I used the solution?
I have been using SonicWall NSv for almost one year when I worked with the previous company.
What do I think about the stability of the solution?
So far, we have not had any downtime or reliability issues with SonicWall NSv. We are getting great performance from SonicWall NSv. If we have any concerns with our platform, we are always contacting the support team, and the support team is also great. We are getting a response in a very quick time. I am very happy with the current experience.
What do I think about the scalability of the solution?
SonicWall NSv's scalability is highly efficient because it is tied directly to the underlying virtual infrastructure and offers a pay-as-you-grow model. As a cybersecurity professional, I would assess its scalability as excellent for both vertical scaling and horizontal scaling with specific cloud limitations. It has met our organization's needs by allowing us to scale our security posture consistently with our cloud compute growth, increased traffic and user areas, new cloud regions, and policy complexity growth. In the growth area, I performed a vertical upgrade from NSv 470 to NSv 870 license upgrade, and also deployed new active and passive SonicWall NSv pairs instantly using marketplace imaging.
How are customer service and support?
Customer support for SonicWall NSv is super good. If we have any issues or any doubts, they are resolved in a very quick time. That is another good thing that we noticed in SonicWall because other platforms take even days to resolve or reach out, but SonicWall NSv customer support is very good and has met our expectations.
I would rate the customer support of SonicWall NSv a nine.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
Before SonicWall NSv, we used other solutions including
Cisco Secure Firewall and FortiGate. The reason we switched to SonicWall NSv was based on our requirements for our infrastructure, policy management, and performance. Comparing with Cisco, SonicWall NSv is very user-friendly and very helpful to manage policies, and it has very good threat efficiency. For example, in threat efficiency, it is highly rated, especially in zero-day threats,
Capture ATP, and Deep Memory Inspection. SonicWall NSv's performance is reliable but can be limited by single-stream CPU usage when DPI-SSL is enabled, but in most cases, it is a great experience. The user interface experience is also superior, which is the reason we made the switch.
How was the initial setup?
The deployment process of SonicWall NSv depends on the metrics that fall into three main categories: security efficiency, operational efficiency, and performance. In security efficiency, it helps with blocking lateral movements, DPI and SSL threat detection, and zero-day block rate. When it comes to operational efficiency metrics, it helped deploy policy time, incident mean time to resolution, and deployment speed. For performance and resiliency metrics, I would mention CPU and memory utilization, latency added, and threat prevention throughput.
What was our ROI?
After deploying SonicWall NSv, I have seen a return on investment because it helps to save our time a lot. Previously, we had other monitoring methods to monitor network traffic, and it took a very long time. Based on SonicWall NSv, it helped us to easily navigate through everything and get done what we needed in a very quick manner. Additionally, with a low number of employees because it is very easy to navigate and everything is connected, anyone can easily navigate through the platform. It is a very user-friendly platform. If you are trained under SonicWall NSv, you will be able to handle most of the tasks. Therefore, it will definitely help to reduce the time and headcount as well.
Which other solutions did I evaluate?
We checked other options, including Palo Alto, before choosing SonicWall NSv. We checked the target market, and Palo Alto is for large enterprise compared to SonicWall NSv. The core differentiators are that Palo Alto offers Application-ID visibility. Additionally, deployment speed is a main concern because Palo Alto takes quite some time to deploy, but SonicWall NSv is very fast for existing SonicWall NSv users. That is an interesting difference. As mentioned, threat efficiency and performance were also factors in our decision.
What other advice do I have?
Based on my experience in cybersecurity, the best advice I can offer to others looking into SonicWall NSv is to focus less on the firewall features and more on the architectural planning and the license alignment with your cloud strategy. Some key points would be to master the cloud routing first, then over-allocate the resources for deep inspection, and license smartly, considering BYOL versus PAYG options, and also create a migration plan. Those are the points I have to give for others who are looking to switch to SonicWall NSv. I would rate this review a nine overall.