OPNsense and Palo Alto Networks NG Firewalls are direct competitors in the firewall industry. OPNsense appears more favorable for small businesses due to its cost-efficiency and open-source advantages, while Palo Alto Networks NG Firewalls are preferred for advanced security in enterprise settings.
Features: OPNsense is recognized for its flexibility, user-friendly interface, and support for open-source plugins like Suricata and ClamAV, which enhance visibility and reporting. Palo Alto Networks NG Firewalls provide advanced threat prevention capabilities, application awareness, and utilize machine learning to offer robust security solutions for enterprise-level needs, with features like deep packet inspection and application-based rules.
Room for Improvement: OPNsense users face challenges with integration in varied environments, VPN reliability, and scalability limitations for large deployments, alongside a need for better technical documentation and support. Palo Alto Networks NG Firewalls, while feature-rich, are critiqued for their high costs, and there is a demand for more intuitive interfaces, better integration across security solutions, and improved customer support.
Ease of Deployment and Customer Service: OPNsense is often used in on-premises scenarios due to its ease of configuration and community-based support options, although official support can be limited. Palo Alto Networks NG Firewalls are deployed in various environments, including hybrid and public cloud, with structured customer support available, though there are some concerns regarding the complexity and delays in accessing qualified personnel.
Pricing and ROI: OPNsense offers significant savings with no licensing fees, making it attractive for small businesses and home users, with a rapid ROI due to low ongoing costs. Conversely, Palo Alto Networks NG Firewalls are costlier due to substantial licensing fees, but users justify these expenses with the advanced security and operational efficiencies, although there is concern over pricing for small to medium-sized enterprises.
Clients are now comfortable and not wasting productive hours on IT support.
The automation part is giving us a cost benefit and speed; we can react faster.
It's a very useful tool to mitigate and protect your enterprise.
The network attacks reduced by approximately 60% after using that, even without customizing the custom configuration yet.
For a very little investment, I was able to increase the security of my network.
Their user-friendly interface and Panorama central management, which provides a comprehensive overview, make them an ideal investment.
The solution helped reduce downtime, which is crucial in time-sensitive industries like manufacturing.
I have seen a return on investment since using Palo Alto Networks NG Firewalls in terms of time saved.
They offer very accurate solutions.
The quick resolution of issues with Fortinet FortiGate is due to the support of the company and the fact that the equipment is easy to work with.
I would rate the technical support for Fortinet FortiGate a ten out of ten.
Compared to some open-source projects with weak support, OPNsense stands out for having both a strong community and commercial backing options.
I mainly rely on community support since the solution is open source.
If you say you do not have one, it is finished. This is where the monopoly starts.
Palo Alto's network support is excellent, and I would rate it a ten out of ten.
Their response time is within one hour.
They offer fast and competent assistance.
They scale up really well from smaller models like the FortiGate 40 and 50 to bigger sites with the FortiGate 100 for more throughput - up to enterprise datacenters.
The variation comes in terms of the interfaces and throughputs, but from a security perspective, you get the same benefit, irrespective of whether you have an entry-level unit or an enterprise.
We determine sizing based on multiple factors: number of users, available links, traffic types, server count, services in use, and whether services will be published.
Aside from these aspects, it demonstrated good scalability.
It supports routing, VPN setups, and traffic monitoring with additional packages like Snort and Suricata.
OPNsense is an extremely scalable solution.
Cloud deployments benefit from auto-scaling, allowing for automatic adjustments to firewall capacity based on demand.
It is important to assess the infrastructure size before choosing a model.
Palo Alto Networks NG Firewalls are scalable and reliable.
We're experiencing 99.999% availability consistently.
I would rate the stability of Fortinet FortiGate a ten out of ten.
Currently, we are experiencing a general outage of one of the main internet service providers of the Dominican Republic, and we have not been impacted in our operations because with SD-WAN, we have another internet service provider and we are working with the second WAN connection without any disruption.
For home and small network use, OPNsense is also reliable, providing enterprise-grade security at no cost.
OPNsense is the same, but it does have a way of installing the Realtek drivers, which gives you a lot more stability overall on the system.
The only challenge faced was its inadequacy to manage large voice traffic effectively, even with dedicated hardware.
With appropriately configured policies, these firewalls can provide robust network security.
After the upgrade, we are experiencing performance issues.
I have not experienced any outages or issues.
Investing in a solution that can accommodate such growth would be more cost-effective than repeatedly purchasing new hardware.
While Fortinet claims to offer a comprehensive network solution, it falls short in addressing computer application issues, particularly server security.
When considering Sophos XG, which we also use, the logging and reporting functionality is notably more efficient.
For high availability, it's crucial to have a method in place where a designated component oversees the entire process.
Improved guidance on package usage and integration beyond relying on external tutorials or community support would be beneficial.
I would like the APIs to be more mature and more developed and have more options to automate threat hunting.
When performance degrades due to full packet inspection, the solution should be to increase the computing power within the same firewall, not to recommend upgrading to a larger, more expensive model.
Further integration into a unified system could improve usability.
Palo Alto Networks NG Firewalls lack built-in multi-factor authentication, requiring the purchase of a third-party tool to implement this essential security feature.
Last year, I renewed the support for three years, which can sometimes be expensive but depends on the security benefits and how it helps us.
It offers cost savings as it is generally cheaper than the competition.
It is about 20% cheaper.
It is a free solution, and when you compare it to alternatives like FortiGate, which is quite powerful but also costly, the value becomes evident.
I would rate the pricing a nine out of ten, especially considering the availability of a free community edition.
It is free.
Palo Alto Networks NG Firewalls are expensive.
Palo Alto Networks NG Firewalls come at a premium, exceeding the cost of most competitors by 45 percent.
Colleagues looking for the cheapest and fastest firewall can still use Palo Alto Networks NG Firewalls because they are affordable.
In terms of security, we have not experienced any security flaws or loopholes, and it has proven to be quite stable.
FortiGate has helped reduce the risk of cyberattacks that might disrupt our client's production.
These features help reduce our downtime, manage the ISPs, and deploy SLAs for all the website traffic.
The most valuable features include the basic firewall functionality and the GeoIP location services.
I can have a Wi-Fi VLAN and feel secure that the server network or the VM network that I have on a different VLAN are isolated, and they cannot talk to one another, which adds a great level of security.
It offers enterprise-grade features such as intrusion detection and prevention system, VPN support, traffic shaping, and web filtering, all without license cost.
The most valuable features of Palo Alto Networks NG Firewalls are DNS sync calls, enabled security features, and Wildfire.
Threat Vault allows us access to a comprehensive threat database, enabling us to get detailed information on threats and how to mitigate them.
The most valuable feature of Palo Alto Networks NG Firewalls is Cortex Data Lake.
Product | Market Share (%) |
---|---|
Fortinet FortiGate | 20.4% |
OPNsense | 11.0% |
Palo Alto Networks NG Firewalls | 4.2% |
Other | 64.4% |
Company Size | Count |
---|---|
Small Business | 350 |
Midsize Enterprise | 130 |
Large Enterprise | 187 |
Company Size | Count |
---|---|
Small Business | 30 |
Midsize Enterprise | 5 |
Large Enterprise | 8 |
Company Size | Count |
---|---|
Small Business | 74 |
Midsize Enterprise | 56 |
Large Enterprise | 84 |
Fortinet FortiGate excels in providing integrated VPN, firewalling, and Unified Threat Management (UTM) with centralized management and high availability. It supports remote access and comprehensive threat protection, making it a preferred choice for securing networks.
Fortinet FortiGate offers a robust security platform with features such as strong intrusion prevention, application control, and web filtering. Its integration with Active Directory and SD-WAN functionality provides scalable solutions for large networks. Users appreciate its ease of use through centralized management interfaces, ensuring robust security with flexible configurations. However, FortiGate could enhance its graphical interface and technical support responsiveness, address firmware bugs and costly licensing, improve logging, integrate better with third-party tools, and strengthen scalability and memory for log storage. Complexity in configuration and the need for intuitive features are noted challenges, and there's a demand for advanced security, zero-trust capabilities, and AI integration.
What are the key features of Fortinet FortiGate?Fortinet FortiGate is widely implemented across industries like education, finance, and government. Companies use it for firewall protection, VPN, and SD-WAN capabilities, ensuring secure perimeter and data center security. It facilitates remote access management and traffic routing optimization, offering reliable security and connectivity solutions.
OPNsense is an adaptable open-source firewall and routing platform appreciated for its flexibility, scalability, and user-friendly interface. It is equipped with robust security features and offers excellent reporting and visibility, essential for small businesses and home setups.
OPNsense stands out for its modular design, allowing cost-effective customization. This system supports VPNs and various firewall capabilities, making it suitable for securing networks from malicious traffic. Its frequent updates and extensive documentation, combined with a supportive online community, enhance user experience. However, there is room for improvement in integration with virtual servers and Azure. Scalability and hardware updates are important for large-scale environments, and users desire more reliable VPN solutions and enhanced threat intelligence tools.
What are OPNsense's most important features?OPNsense is implemented in industries requiring VPN and firewall functions, supporting site-to-site connections, protecting servers, and managing commercial network traffic. Companies apply it for security, UTM, SD-WAN, content filtering, intrusion detection, and prevention, utilizing its open-source nature and effectiveness as a next-generation firewall.
Palo Alto Networks NG Firewalls deliver advanced threat protection with machine learning, enhancing security through real-time attack prevention. Known for application visibility and a user-friendly interface, they offer robust network protection and flexibility in rule creation.
Palo Alto Networks NG Firewalls are designed to secure environments with features like GlobalProtect VPN, WildFire malware detection, and unified platform integration. Their strong firewall capabilities and high-performance throughput make them suitable for perimeter and data center protection, VPN configurations, application control, and network segmentation. Users consistently highlight the ease of managing network security policies and integrating third-party tools, ensuring a comprehensive protection strategy. While enhancements in support, training resources, and configuration simplicity are needed, these firewalls are integral for securing both on-prem and cloud environments, aligning with platforms like Azure and AWS.
What are the key features of Palo Alto Networks NG Firewalls?Palo Alto Networks NG Firewalls are commonly implemented across industries for securing LAN environments, URL filtering, and ensuring Zero Trust security. They secure both on-premises and cloud infrastructures, often becoming integral parts of security frameworks within enterprises. Leveraging these firewalls in conjunction with Azure or AWS enhances the overall network protection strategies employed by organizations.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.