I mainly use Fortinet FortiGate to implement it as a perimetral firewall solution because Fortinet FortiGate are next-generation firewalls. I use it to protect internal network customers and configure remote access, firewall policies, internal access websites, web filtering solutions, IPS, and IDS configurations.
I implemented it approximately one year ago in an Italian manufacturer producer. My perspective on the effectiveness of the unified SASE in providing consistent security policies across multiple locations is that it is very similar to Fortinet FortiGate, so if you know how to manage Fortinet FortiGate firewalls, it is easier and very easy to implement and configure FortiSASE.
For Fortinet FortiGate, it is very easy because it is very near to zero-touch provisioning. You need to install the box and if we speak about hardware appliances, you just need to install the boxes on the infrastructure and connect the cables to connect Fortinet FortiGate firewalls to the internet routers or MPLS routers, and configure basically the main IP address to have the connectivity. Next, you configure policy firewalls and it is very easy and very fast.
You can implement Fortinet FortiGate for small, medium, and large enterprise because it is very suitable for small and medium enterprise. For one to five or six firewalls on different branches or different sites, you can manage it manually and independently. But if you need to scale or have a large enterprise deployment, you can manage all Fortinet FortiGates directly in one panel with the FortiManager solution. There is a dedicated orchestrator delivered by Fortinet in hardware or VM solution, and with FortiManager you can manage all Fortinet FortiGates in one platform. For example, two years ago, I used to manage around 500 Fortinet FortiGates with FortiManager. It is very scalable with the correct solution and the other things you need to manage large deployments.