Over 246,941 professionals have used IT Central Station research.
Compare the best Firewalls vendors based on product reviews, ratings, and comparisons.
All reviews and ratings are from real users, validated by our triple authentication process.
The total ranking of a product, represented by the bar length, is based on a weighted aggregate
score. For Views, Comparisons, Reviews, and Followers the score is calculated as follows: The
product with the highest count in each area gets the highest available score of 17.5 points.
Every other product gets assigned points based on its total in proportion to the #1 product in
that area. For example, if a product has 80% of the number of reviews compared to the product
with the most reviews then the product's score for reviews would be 17.5% (weighting factor) *
80% = 14. For Average Rating, the maximum score is 30 points awarded linearly based on our
rating scale of 1-10. If a product has fewer than ten reviews, the point contribution
for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews;
two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old,
as well as those written by resellers, are completely excluded from the ranking algorithm.
What is a firewall? Technically, a firewall definition could be that it’s the part of a system or network that blocks unauthorized access but permits outbound communications. Most importantly, firewalls are intended to protect key IT assets from security threats such as denial of service attacks or data theft. Firewalls come in many varieties. What makes one better than other will depend on numerous organization-specific factors.
When IT Central Station users were asked about what makes the best firewall, they described a number of factors that will help anyone make the right choice. Some security professionals want to know what is the best free firewall? IT Central Station reviews suggest that this is a question that should asked only after one has assessed many basic requirements about usability and features first.
Visibility is offered as one of the most critical aspects of an effective firewall. Users want global reports and traffic visibility as well as application visibility. IT Central Station members also want the firewall to provide visibility into specific users’ behaviors. Visibility as a key point of value cuts across different types of solutions, including Windows firewalls, firewall software and network firewalls.
Ease of use and simplicity of administration also rated as high priorities for firewall buyers. A firewall should be easy to manage and configure. Easy installation is essential, as is integration. According to IT Central Station reviewers, firewalls typically function in complex, heterogeneous security environments. In parallel, solid vendor support is important. Reviewers noted that the first line of response to an issue with a firewall is almost always an in-house technical resource. That resource needs to be trained easily. If training is too cumbersome or if the firewall admin is a hard-to-find hire, the department will suffer.
Firewall users list many specific functions as “must haves.” These include intrusion protection (IPS), VPN, high throughput, data loss prevention, SSL, IPSEC, application control and web content filtering. Some users want a firewall to easily integrate with an LDAP Server or Radius Server. Anti-spam is desirable, as is anti-virus and anti-spyware protection. Users emphasize the importance of IPv6 native support as well as traffic shaping and bandwidth control.
Read reviews of Firewalls that are trending in the IT Central Station community:
Your trust is our top concern, so companies can't alter or remove reviews.
Network Engineer with a proven track record of problem resolution and implementation success. I treat every challenge uniquely and from start to finish am fully engaged. I enjoy coming to work every day because I know there will be a new challenge waiting for me, allowing me the freedom to work... more>>
A dedicated and innovative Information Technology management professional with demonstrated abilities and contributions in management, team, and individual environments. A highly skilled briefer to diverse audiences. Brings a proven record in progressively responsible and challenging... more>>
Security Consultant (Team lead) in Accenture
Leveraged service delivery (Wipro)
Worked for Bank client .(HP)
Worked on Government Tax dept.(Tulip telecom)
• Firewall (Check point, Cisco, Palo Alto, Fortinet, Juniper)
• IPS/IDS (Cisco, Checkpoint, IBM, McAfee)
• Proxy (Bluecoat,... more>>
Senior Technical Consultant - Network and Security
7+ years of Experience in IT industry with major skills in Networking and security of enterprise networks. Provided solutions to the leading enterprises in UAE for the best IT architecture(Network, Security and wireless solutions), Performed Network audits on the enterprise networks.
A successful Multi-talented system administrator with good all-round technical skills and the ability to develop and maintain close working relationships with both customers and collegues. Quick and eager to learn new things and always looking to improve my knowledge.
Throughout my work experience, I developed self-learning skills. Having to support the technical documentation and working tools such as firewall, IPS, network switches, vmware, I have managed to acquire knowledge for its management,
whether for project recommendation and implementation and... more>>
Specialties: Fortinet design and deployment, Wireless network design and deployment, Apple network integration, Cisco switch deployment and integration, Exchange 2010/2013 deployment, Server 2012 design and deployment.
I also work extensively with vSphere 5, designing and deploying solutions... more>>
I'm a friendly, intelligent, passionate and very curious human being. A self-motivated worker, I enjoy finding any area of a workflow or process that needs improvement and working to empower that to a higher potential. Be it a technical matter involving a network of devices or working to... more>>
I have worked in the IT industry for the past 10 years initially with a primary focus on technology implementation and security administration. I have a strong background in both physical and logical security and have worked in both areas.
I am very interested in information security,... more>>
I'm a highly driven IT Professional with over a decade of experience in the industry. I have acquired a tremendous amount of hands on technical knowledge dealing with all areas of IT. The areas I'm focusing on is Networking, Storage, Virtualisation & Microsoft Technologies.