To help with your enterprise firewall comparison, IT Central Station ranked them based on hundreds of real user reviews. These reviews cover all of the best solutions from top firewall vendors, based on user reviews from our esteemed community of enterprise technology professionals. You'll find comparisons, based on pricing, performance, features, stability and many other criteria. Read below to find out what your peers have to say about firewall vendors such as Fortinet, Cisco, Sophos and others.
The total ranking of a product, represented by the bar length, is based on a weighted aggregate score.
The score is calculated as follows: The product with the highest count in each area gets the highest available score.
(20 points for Reviews; 16 points for Views, Comparisons, and Followers.)
Every other product gets assigned points based on its total in proportion to the #1 product in
that area. For example, if a product has 80% of the number of reviews compared to the product
with the most reviews then the product's score for reviews would be 20% (weighting factor) *
80% = 16. For Average Rating, the maximum score is 32 points awarded linearly based on our
rating scale of 1-10. If a product has fewer than ten reviews, the point contribution
for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews;
two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old,
as well as those written by resellers, are completely excluded from the ranking algorithm.
What is a firewall? Technically, a firewall definition could be that it’s the part of a system or network that blocks unauthorized access but permits outbound communications. Most importantly, firewalls are intended to protect key IT assets from security threats such as denial of service attacks or data theft. Firewalls come in many varieties. What makes one better than other will depend on numerous organization-specific factors.
When IT Central Station users were asked about what makes the best firewall, they described a number of factors that will help anyone make the right choice. Some security professionals want to know what is the best free firewall? IT Central Station reviews suggest that this is a question that should asked only after one has assessed many basic requirements about usability and features first.
Visibility is offered as one of the most critical aspects of an effective firewall. Users want global reports and traffic visibility as well as application visibility. IT Central Station members also want the firewall to provide visibility into specific users’ behaviors. Visibility as a key point of value cuts across different types of solutions, including Windows firewalls, firewall software and network firewalls.
Ease of use and simplicity of administration also rated as high priorities for firewall buyers. A firewall should be easy to manage and configure. Easy installation is essential, as is integration. According to IT Central Station reviewers, firewalls typically function in complex, heterogeneous security environments. In parallel, solid vendor support is important. Reviewers noted that the first line of response to an issue with a firewall is almost always an in-house technical resource. That resource needs to be trained easily. If training is too cumbersome or if the firewall admin is a hard-to-find hire, the department will suffer.
Firewall users list many specific functions as “must haves.” These include intrusion protection (IPS), VPN, high throughput, data loss prevention, SSL, IPSEC, application control and web content filtering. Some users want a firewall to easily integrate with an LDAP Server or Radius Server. Anti-spam is desirable, as is anti-virus and anti-spyware protection. Users emphasize the importance of IPv6 native support as well as traffic shaping and bandwidth control.
Network Engineer with a proven track record of problem resolution and implementation success. I treat every challenge uniquely and from start to finish am fully engaged. I enjoy coming to work every day because I know there will be a new challenge waiting for me, allowing me the freedom to work... more>>
A highly driven IT Professional, possessing more than 8 years of experience in various aspects of Security Management, Vulnerability Assessment, deployment, and security, of large enterprise networks. Possessing a wide range of technical proficiencies, in Telecommunication and Real time... more>>
Security Consultant -Team lead at Accenture
Sr Engineer - Security management at Wipro
Service delivery consultant at HP
Sr Engineer network and security at Tulip telecom
Information security policies and procedures
Security compliance, Governance
Firewall (Check point, Cisco,... more>>
An ambitious, optimistic and self‐motivated business development professional with 15+ years of experience in first‐rate Management, Commercial and Technical skills field of Data Communication, Data Centers, IoT and Services Lifecycle – from solution designing & products development through... more>>
A dedicated and innovative Information Technology management professional with demonstrated abilities and contributions in management, team, and individual environments. A highly skilled briefer to diverse audiences. Brings a proven record in progressively responsible and challenging... more>>
PROFILE AND SKILLS
High level networking specialist and consultant with proven abilities in engineering implementations.
• Working knowledge of IT, networking technologies and telecommunications, specially their integration into multi vendor solutions encompassing both technological and... more>>
Senior Technical Consultant - Network and Security
7+ years of Experience in IT industry with major skills in Networking and security of enterprise networks. Provided solutions to the leading enterprises in UAE for the best IT architecture(Network, Security and wireless solutions), Performed Network audits on the enterprise networks.
Network Engineer Certified Ethical Hacker, CHFI, MS ISA @ WGU March 2013 with a diverse skill set to bring about control and change to an existing infrastructure. Documentation of current configurations and teaching others. Focus is information security assurance with expected graduation... more>>
Specialties: Fortinet design and deployment, Wireless network design and deployment, Apple network integration, Cisco switch deployment and integration, Exchange 2010/2013 deployment, Server 2012 design and deployment.
I also work extensively with vSphere 5, designing and deploying solutions... more>>
A successful Multi-talented system administrator with good all-round technical skills and the ability to develop and maintain close working relationships with both customers and collegues. Quick and eager to learn new things and always looking to improve my knowledge.
I'm a friendly, intelligent, passionate and very curious human being. A self-motivated worker, I enjoy finding any area of a workflow or process that needs improvement and working to empower that to a higher potential. Be it a technical matter involving a network of devices or working to... more>>
I have worked in the IT industry for the past 10 years initially with a primary focus on technology implementation and security administration. I have a strong background in both physical and logical security and have worked in both areas.
I am very interested in information security,... more>>
I'm a highly driven IT Professional with over a decade of experience in the industry. I have acquired a tremendous amount of hands on technical knowledge dealing with all areas of IT. The areas I'm focusing on is Networking, Storage, Virtualisation & Microsoft Technologies.