We performed a comparison between Check Point UTM-1 [EOL] and Cisco Secure Firewall based on real PeerSpot user reviews.
Find out what your peers are saying about Netgate, Fortinet, OPNsense and others in Firewalls."Our security improved from being able to put in rules and close off unwanted traffic."
"This solution has helped our organization by having strong functions and a reliable firewall."
"FortiGate has a strong security topic which allows all of the Fortinet devices to communicate and share information which makes their security more powerful."
"It is simple to manage, and there are a lot of functionalities in the same box."
"It's quite comfortable to handle the FortiGate firewall."
"The most valuable feature of Fortinet FortiGate is load balancing. It can provide central management and VPNA. Additionally, it has enhanced our security environment."
"The SD-WAN feature is the most valuable. This feature evolved from link load balancing. It has helped us in terms of our uptime and privatizing applications whenever we experience an outage. The SD-WAN feature has been a plus for us. Two-factor authentication has allowed us to add more users in terms of remote working. We have two-factor authentication for remote workers to authenticate them before they get on the network."
"The solution is very user-friendly."
"Firewalls help us a lot in controlling traffic on our network and preventing unauthorized access."
"The UTM platform has been the most valuable."
"The solution is very robust."
"It safeguards against cyber attacks."
"The most outstanding feature is being able to centralize each of the functions in a single device."
"We can create a domain to separate and segregate some functions, some services."
"It provides visibility and drives organizational security."
"The databases and its signatures are its most important features."
"Ease of configuration: It has gotten a lot easier to configure compared to the original Cisco Pix."
"For us, the most valuable features are the IPX and the Sourcefire Defense Center module. That gives us visibility into the traffic coming in and going out, and gives us the heads-up if there is a potential outbreak or potential malicious user who is trying to access the site. It also helps us see traffic generated by an end device trying to reach out to the world."
"I am used to the ASA syntax, therefore it is quite easy to make up new rules. I have found that DNS doctoring rules are useful."
"A powerful enterprise security solution that is dependible."
"Being able to use it as a policy-based VPN is valuable. It's very easy to understand. It's very easy to troubleshoot."
"For our very specific use case, for remote access for VPN, ASAs are very good."
"The TAC is always very helpful. We pay for Tier 1 support, so we get whatever we need from them. They always give us a solution. If they can't give us an answer that day, they get back to us within at least 24 hours with a solution or fix. I have never had a problem with the TAC. I would rate them as 10 out of 10."
"They provide DDoS protection and multi-factor authentication. That is a good option as it enables work-from-home functionality."
"Fortinet FortiGate can improve the integration with Active Directory. Additionally, I would like to have a Cloud Controller, such as they do in the Cisco Meraki solution."
"Lacks sufficient security options."
"FortiOS is not simple."
"This product needs to have an analysis feature, rather than having the analysis done through the integration of a different product."
"The support system could be improved."
"FortiGate support could do some improvements on their IPv6 configuration. Right now it's still in the very early stage for utilizing in an enterprise level network environment."
"The captive portal could be improved."
"We sometimes have issues with FortiGate's routing table in the latest firmware update. We had to downgrade the device because our customers complained about bugs."
"Specifically on the user experience, sometimes the set up of things, such as the VPN SSL, takes a lot of time to load and a lot of time to get up and running on every session."
"What has been the issue of firewalls is they ask me for policies and content filtering application control and all these features that are now part of Harmony."
"Technical support was very bad because the supplier who sold it to us, wasn't very supportive, and he wouldn't giving us direct links to the OEM."
"The solution could be improved if there was a better way to report. The reporting functionality is not really good. Even though it's not the major function. Maybe adding a way to make a custom report."
"While the technical support is good, the Indian level technical support could use an upgrade."
"The solution should be more user-friendly."
"I am not able to see a demo."
"Some features that could be improved are advanced threat protection, sandboxing, and vulnerability management."
"I would like the ability to drill down into certain reports because currently, that cannot be done."
"The cloud does not precisely mimic what is on-premises."
"Multiple WAN connections: Even though you can implement more than one interface to outside connections, it is lacking on load balances, etc."
"We are Cisco partners, and when we recommend Cisco FirePower to customers, they always think that FirePower is bad. For a single installation of FirePower, if I have to write about 18 tickets to Cisco, it's a big problem. There was an issue was related to Azure. We had Active Directory in Azure. The clients had to connect to FirePower through Azure. We had a lot of group policies. After two group policies, we had to make groups in Azure, and they had to sign in and sign back. It was a triple-layer authentication, and there was a big problem, so we didn't use it."
"It has poor performance."
"If they want to add better features to the current Cisco ASA, they can start by increasing the encryption. That is the only thing they need to improve."
"The interface for monitoring could be improved to allow better views to make troubleshooting easier."
"If the implementation was easier, it would be a lot better for us."
Earn 20 points
Check Point UTM-1 [EOL] doesn't meet the minimum requirements to be ranked in Firewalls with 19 reviews while Cisco Secure Firewall is ranked 4th in Firewalls with 404 reviews. Check Point UTM-1 [EOL] is rated 8.2, while Cisco Secure Firewall is rated 8.2. The top reviewer of Check Point UTM-1 [EOL] writes "Great firewalls, VPN, and Intrusion prevention capabilities". On the other hand, the top reviewer of Cisco Secure Firewall writes "Highlights and helps us catch Zero-day vulnerabilities traveling across our network". Check Point UTM-1 [EOL] is most compared with , whereas Cisco Secure Firewall is most compared with Palo Alto Networks WildFire, Netgate pfSense, Meraki MX, Sophos XG and Palo Alto Networks NG Firewalls.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.