We performed a comparison between Juniper SRX and Palo Alto Networks WildFire based on our users’ reviews in four categories. After reading the collected data, you can find our conclusion below.
Comparison Results: Juniper SRX finishes slightly ahead of Palo Alto Networks WildFire in this comparison. Juniper SRX provides robust enterprise network protection and connectivity and comprehensive performance, is stable, and scales easily. Palo Alto Network WildFire can be challenging for some users to learn. The overall configuration is a bit complex to use.
"The ease of setting the solution up is a valuable aspect for us."
"The notable features that I have found most valuable are that it includes the antivirus, and also IPS, and even SD-WAN."
"This solution has solid UTM features combined with a nice GUI."
"The product is very stable, easy to troubleshoot, and configure, so it has reduced the time it takes for support."
"UTM/NGFW features and FortiCloud for logs and backups are awesome."
"Our security improved from being able to put in rules and close off unwanted traffic."
"The security features are about the best that I've seen anywhere."
"Using this product makes the VPN seamless and almost invisible to me in the sense that I don't have to think about it."
"One of Juniper SRX's most valuable features is the site-to-site VPN."
"The solution is stable, inexpensive, and works well for medium size companies."
"The most valuable feature is robustness."
"I like the routing and firewall features."
"The firewall features and the routing capability are the most valuable."
"The IPS functionality of Juniper SRX is useful in the telecom industry."
"It provides good routing and high performance of the data center."
"It's a reliable firewall and very stable, for both the hardware and applications it is stable."
"Detailed reporting on analysis of content. The inspections are easily applied to security policy profiles and profile groups, and may be assigned on a per-rule basis."
"I give the initial setup an eight out of ten."
"Installing this product as a datacenter firewall for segregation and segmentation, and also configuring policies between zones has improved my organization."
"For example, if a security Intel threat talks about an IOC. We can then go to our MSP and say, "Is there a signature for this particular type of malware that just came out?" And if they'll say yes, then we'll say, "Okay. Does it apply to these firewalls? And have we seen any hits on it?" There's absolutely value in it."
"It gives a more accurate assessment of a virus in terms of whether it's truly a virus, malware, or a false positive. We have some legacy software that could pop up as being something that is malware. WildFire goes through and inspects it, and then it comes back and lets us know if it's a false positive. Usually, when it finds out that it's not a virus, it lets us know that it's benign, and it can exclude it from that scan, which means I don't even have to worry about that one popping up anymore."
"WildFire's application encryption is useful."
"The most valuable features of the solution are user-friendliness, price, good security, and cloud-related options."
"The solution is easy to use and the Panorama feature is good. The software management or the malware blocking and some authentication management system are good."
"The command line is complicated, and the interface could be better."
"The central management for the FortiGate Fortinet Firewall needs improvement. They have the manager to do the essential management for both SD-WAN and for the security policy. They should also improve the SD-WAN function."
"There could be more integration between the logging and analytical platforms to make it more seamless and integrated."
"The monitor and the visibility, in this proxy, is very weak."
"Reporting is limited to providing an external appliance for improving the reporting capabilities of the FortiAnalyzer. It does not offer a central management and is also sold separably as an appliance."
"If they could extend their fabric towards other vendor environments for integration, that would be great."
"Fortinet FortiGate could improve by having more capabilities for troubleshooting VPN connections. For example, I do get some feedback about the current status, but I could use some history and logging of important events. The information is logged in our Syslog server, but I could use that information from the device. If they could provide a GUI to have some more insight on what's going with my VPN would be useful."
"We would like to see an upgrade to the VPN feature, we are using the VPN from outside of our office and there is a limitation to 10 connections, more connections would be suitable."
"The training videos that are available need to be improved, and made more educative."
"Both the web management and the graphical user interface are inadequate and should be improved."
"I've noticed that the management interface could use some updates and upgrades."
"The setup process should be improved."
"The range of devices should be expanded to include those suitable for a small implementation. Juniper does not have any lower-priced SRX models, useful perhaps for a single ATM or a single bank branch."
"It did not improve our safety because the IDS does not detect some attacks, but our anti-virus software did."
"The technical support has room for improvement."
"The interface could be more user-friendly."
"Any enhancements should likely be focused on the firewall appliance to further strengthen overall security capabilities, such as refining app and user identity features."
"The initial setup was complex."
"They provide a medium level of technical support."
"The size of Palo Alto's cloud is big but it could be easier to use from a product management perspective."
"Palo Alto Networks WildFire could improve by adding support for manual submission of suspicious files and URLs. Additionally, it would be an advantage to add rule-based analysis. Currently, it uses only static and AI. We need to be able to analyze archive files."
"Palo Alto Networks WildFire should be more real-time in nature. The signature updates should happen in a minute or less than a minute to be a very good feature for the customer."
"The VPN and decryption need improvement."
"I think it would be nice for Palo Alto to work without the connection to the cloud. It is 100% powerful when connected to the cloud. But, if you disconnect from the cloud, you only get 40-50% power."
Juniper SRX Series Firewall is ranked 18th in Firewalls with 87 reviews while Palo Alto Networks WildFire is ranked 3rd in Advanced Threat Protection (ATP) with 58 reviews. Juniper SRX Series Firewall is rated 7.8, while Palo Alto Networks WildFire is rated 8.4. The top reviewer of Juniper SRX Series Firewall writes "Highly scalable, user-friendly UI, and easy to maintain". On the other hand, the top reviewer of Palo Alto Networks WildFire writes "Good technical support and provides automatic analysis that saves us time in filtering email". Juniper SRX Series Firewall is most compared with Cisco Secure Firewall, Netgate pfSense, Palo Alto Networks NG Firewalls, Check Point NGFW and Meraki MX, whereas Palo Alto Networks WildFire is most compared with Cisco Secure Firewall, Proofpoint Email Protection, Fortinet FortiSandbox, Check Point SandBlast Network and Zscaler Internet Access.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.