We performed a comparison between Fortinet FortiClient and Prisma Access by Palo Alto Networks based on real PeerSpot user reviews.
Find out in this report how the two Enterprise Infrastructure VPN solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."It's an ideal gateway solution for small and medium businesses, i.e., around 300 devices can be easily handled."
"The solution has good performance."
"The configuration is the most valuable feature."
"EMS central reporting with fabric connectivity to FortiGate and FortiAnalyser is great and has seamless integration which makes managing 3000 devices a breeze."
"The integration of the vulnerability scan, mobile detection, and VPN client."
"What I like most about FortiClient is that it's easy to use. The way it displays information is very straightforward."
"Fortinet FortiClient is not disruptive, and its interface is great. It has an in-built VPN, which is very useful."
"The EMS server gives us good control and central management."
"I find it very easy to configure and also very stable."
"It is very simple to use. I've used some of the others in the past, such as Cisco AnyConnect, which was a nightmare. I've used a couple of others, but FortiClient is very simple to use."
"The most valuable feature of Prisma Cloud-native, in my opinion, is that it assists in identifying, analyzing, and remediating vulnerabilities."
"It protects all app traffic so that users can gain access to all apps. Unlike other solutions that only work from ports 80 and 443, which are predominantly for web traffic, Prisma Access covers all protocols and works on all traffic patterns... The most sophisticated attacks can arise from sources that are not behind 80/443."
"Being able to use the user ID or Active Directory Group is one of the great features for control and providing more flexibility without worrying about IP addresses."
"It's quite reliable and performs well for users."
"The tool's consolidation is pretty quick."
"Palo Alto Firewall is one of the best firewalls in the world."
"The features I find most valuable is WildFire, user integration, and the basic technology features."
"It has predefined or preconfigured rules, which are getting periodically updated. They are providing continuous improvements and periodically updating all search queries that they are looking for. That is one thing that helps us to stay vigilant and focused. If we query our AWS account for any breaches or vulnerabilities with any of the cloud tests, and it alerts us based on these predefined rules. It also provides an option to configure our own rules, and based on these rules, it can query the cloud trail logs, pull the information, and trigger alerts in real-time. I haven't explored this feature much because there are multiple accounts, and we don't have enough time to explore this feature. It also provides multiple integrations. When vulnerabilities or breaches are happening, you should be aware of them immediately. It provides integration with tools such as Slack, PagerDuty so that you can get alerted as soon as the high severity stuff comes up. For example, you have a security group that has allowed public traffic on port 22. As TechOps, you should be aware of this immediately. You cannot scan each machine or look into all security groups to identify it. So, Prisma helps us and alerts us when this kind of high-priority stuff comes up. It has different statistics, analytics, and graphs for data. The description of alerts is also pretty good. They describe what are the possible causes for this and what are the solutions. From Prisma Cloud, you can directly go to the AWS account. When you click on an alert, a resource, or a resource ID, it takes you to the AWS console where you need to log in. If you are already logged in, it will take you to that instance directly, and you can fix the issue there. I have found this feature very useful."
"There must be a more easy-to-use GUI."
"With the lower-end licenses, it tends to kick you out after eight hours. There is a function where it automatically kicks you out after eight hours. They could improve that and not kick you out after eight hours. Other than that, it is already pretty good."
"The filtering process could be improved."
"The connectivity could be improved."
"The solution requires skillful users."
"I would like Fortinet to improve FortiClient's compatibility with macOS."
"More integration would be beneficial."
"There is lagging in some of the authentication tools to support the newer versions, this is happening because they are not supported."
"Compatibility issues between different versions."
"Its integration with non-Palo Alto products can be improved. Currently, it is easy to integrate it with other Palo Alto products such as Cortex XDR. It integrates well with other Palo Alto products. A major part of our network is based on Palo Alto products, but for those companies that use multi-vendor products in their infrastructure, Palo Alto should optimize the integration of Prisma Access with the network devices from other vendors."
"I would like to see better pricing and an easier logging process. Also, if there was a way to log a global log, everything could go onto the system. It would be better if there was a third log, otherwise one would have to do everything manually."
"It is a managed firewall. When you run into issues and have to troubleshoot, there is a fair amount of restriction. You run into a couple of restrictions where you don't have any visibility on what is happening on the Palo Alto managed infrastructure, and you need to get on a call to get technical assistance from Palo Alto's technical support. You have to get them to work with you to fix the problem. I would definitely like them to work on the visibility into what happens inside Palo Alto's infrastructure. It is not about getting our hands onto their infrastructure to do troubleshooting or fixing problems; it is just about getting more visibility. This will help us in guiding technical support folks to the area where they need to work."
"The product's current price is an area of shortcoming where improvements are required."
"Prisma Access by Palo Alto Networks should consolidate the portals into a single portal. It is slow and takes more than ten seconds to load a page."
"I would like the solution to support a different type of authentication. We can't configure a secondary method for our portal."
"The one thing that I've been a little bit disappointed with is when we have had to open cases with Palo Alto about Prisma Access issues. Versus their other platforms, like their firewalls, where we tend to get really quick responses and very definitive answers, the few tickets I've had to open for Prisma Access have taken them longer to respond to. And they haven't necessarily given me the kind of answer I was looking for, meaning a fix to the problem."
"The Cloud Management application has room for improvement. There are a lot of things on the roadmap for that application; things are going to happen soon."
More Prisma Access by Palo Alto Networks Pricing and Cost Advice →
Fortinet FortiClient is ranked 2nd in Enterprise Infrastructure VPN with 86 reviews while Prisma Access by Palo Alto Networks is ranked 5th in Enterprise Infrastructure VPN with 59 reviews. Fortinet FortiClient is rated 8.0, while Prisma Access by Palo Alto Networks is rated 8.2. The top reviewer of Fortinet FortiClient writes "Easy to set up and user-friendly with good support ". On the other hand, the top reviewer of Prisma Access by Palo Alto Networks writes "Integration with Palo Alto platforms such as Cortex Data Lake and Autofocus gives us visibility into our attack surface". Fortinet FortiClient is most compared with OpenVPN Access Server, Fortinet FortiEDR, Microsoft Defender for Endpoint, Kaspersky Endpoint Security for Business and ESET Endpoint Protection Platform, whereas Prisma Access by Palo Alto Networks is most compared with Netskope , Zscaler Zero Trust Exchange, Cisco Umbrella, Zscaler Internet Access and Cisco AnyConnect Secure Mobility Client. See our Fortinet FortiClient vs. Prisma Access by Palo Alto Networks report.
See our list of best Enterprise Infrastructure VPN vendors.
We monitor all Enterprise Infrastructure VPN reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.