SenITCOn45IT Senior Consultant at a manufacturing company
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Initially, we didn't have much visibility around what is occurring at our applications lower level. For instance, if we are exposed to any malicious attacks or SQL injections. But now we've integrated FireEye with Splunk, so now we get lots of triggers based on policy content associated with FireEye. The solution has allowed for growth and improvement in our information security and security operations teams."
"The product has helped improve our organization by being easy to use and integrate. This saves time, trouble and money."
"If we are receiving spam emails, or other types of malicious email coming from a particular email ID, then we are able to block them using this solution."
"The most valuable feature is MVX, which tests all of the files that have been received in an email."
"The server appliance is good."
"The most valuable feature is the network security module."
"It is stable and quite protective. It has a lot of features to scan a lot of malicious things and vulnerabilities."
"The most valuable feature was the EDR, endpoint detection and response."
"The most valuable feature is the protection and the way it works, the technology is what I like the most."
"The solution is very good because it catches a lot of threats in emails."
"he solution's GUI is good."
"The technical support is very good."
"What I find most valuable, is that it is easy to use."
"The analysis engine is a very valuable feature."
"The initial setup is straightforward."
"Improvements could be achieved through greater integration capabilities with different firewall solutions. Integrating with the dashboard itself for different firewalls so users can also pull tags into their firewall dashboard."
"As far as future inclusions, it would be useful to display more threat intelligence, such as the actual area of the threat and the origin of the web crawling (Tor and Dark Web)."
"It would be a good idea if we could get an option to block based upon the content of an email, or the content of a file attachment."
"It would be very helpful if there were better integration with other solutions from other vendors, such as Fortinet and Palo Alto."
"Technical packaging could be improved."
"It is very expensive, the price could be better."
"I heard that FireEye recently was hacked, and a lot of things were revealed. We would like FireEye to be more secure as an organization. FireEye has to be more protective because it is one of the most critical devices that we are using in our environment. They have a concept called SSL decryption, but that is only the packet address. We would like FireEye to also do a lot of decryption inside the packet. Currently, FireEye only does encryption and decryption of the header, but we would like them to do encryption and decryption of the entire packet."
"In the next release, I would like to see machine learning and anti-exploitation included."
"The licensing can be very confusing. It needs to be simplified."
"The response time from technical support should be improved."
"At least once a week we have a false alarm. This needs to be adjusted so that we get fewer of these occurrences."
"Most people are confused about how to use the right integration of the right Fortinet product."
"Something that needs to improve, is the end-point protection."
"Product could include a user interface and be made simpler for customers to configure."
"The integration is limited. The solution needs to offer better integration with multiple vendors."
"FireEye is comparable to other products, such as HX, but seems expensive. It may cause us to look at other products in the market."
"When I compare this solution to its competitors in the market, I find that it is a little expensive."
"The user fee is not as high but the maintenance fee is expensive."
"It's an expensive solution."
"There are additional costs, which isn't included in the licensing fee."
"The solution is not expensive at all."
"Altogether, it is about €10,000 for the Sandbox and Email Gateway."
FireEye Network Security is an advanced threat protection and breach detection platform that provides industry leading threat visibility and protection against the world’s most sophisticated and damaging attacks. By leveraging FireEye’s unique technologies and threat intelligence, FireEye Network Security detects what other security solutions miss, providing holistic security from the perimeter to the network core.
Today’s threats are increasingly sophisticated and often bypass traditional malware security by masking their malicious activity. A sandbox augments your security architecture by validating threats in a separate, secure environment. FortiSandbox offers a powerful combination of advanced detection, automated mitigation, actionable insight, and flexible deployment to stop targeted attacks and subsequent data loss. It's also a key component of our Advanced Threat Protection solution.
FireEye Network Security is ranked 4th in Advanced Threat Protection with 7 reviews while Fortinet FortiSandbox is ranked 5th in Advanced Threat Protection with 10 reviews. FireEye Network Security is rated 7.8, while Fortinet FortiSandbox is rated 8.0. The top reviewer of FireEye Network Security writes "Stable, protective, easy to set up, and has a lot of features to scan vulnerabilities". On the other hand, the top reviewer of Fortinet FortiSandbox writes "Good performance and integration capabilities with good technical support". FireEye Network Security is most compared with Palo Alto Networks WildFire, Zscaler Internet Access, Cisco Stealthwatch, Check Point SandBlast Network and Sophos UTM, whereas Fortinet FortiSandbox is most compared with Palo Alto Networks WildFire, Check Point SandBlast Network, McAfee Advanced Threat Defense, SonicWall Capture Advanced Threat Protection and Cisco Stealthwatch. See our FireEye Network Security vs. Fortinet FortiSandbox report.
See our list of best Advanced Threat Protection vendors.
We monitor all Advanced Threat Protection reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.