Forcepoint Next Generation Firewall vs Splunk User Behavior Analytics comparison

Cancel
You must select at least 2 products to compare!
Fortinet Logo
123,063 views|89,961 comparisons
90% willing to recommend
Forcepoint Logo
2,483 views|2,061 comparisons
75% willing to recommend
Splunk Logo
2,321 views|1,443 comparisons
100% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Forcepoint Next Generation Firewall and Splunk User Behavior Analytics based on real PeerSpot user reviews.

Find out what your peers are saying about Netgate, Fortinet, OPNsense and others in Firewalls.
To learn more, read our detailed Firewalls Report (Updated: March 2024).
768,246 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"FortiGate SD-WAN facilitated a smooth transition for our customers between their two internet service providers, ensuring uninterrupted connectivity without any downtime.""One of the valuable features is a standardized OS.""The next-generation firewall is great.""The web filtering feature and the intrusion protection system are the most valuable. It is a resilient appliance. I never had an issue with it in terms of any security breaches.""The most valuable feature is the web filter.""It's a user-friendly firewall. Most of the tasks are very simple. It's simple to configure and troubleshoot this firewall.""Advanced routing (RIP, OSPF, BGP, PBR). It gives you a seamless and simple integration into a large network.""Layer-3 firewall and routing are the most valuable features."

More Fortinet FortiGate Pros →

"The Forcepoint Next Generation Firewall is a scalable product.""It is a stable solution, and there are no issues so far.""I like the IPS. IPS is the master feature. I depend on the firewall and sandbox.""It is a scalable solution.""The most valuable feature is the console management.""Forcepoint is a good, stable solution.""Forcepoint is a complete package because it has network and systems applications. Other firewalls are only for the network.""I found the initial setup process to be very simple and straightforward."

More Forcepoint Next Generation Firewall Pros →

"Because of some of the visualizations that we utilize, we are able to understand strange, unusual traffic on our networks.""This is a good security product.""The solution is fast, flexible, and easy to use.""The most valuable feature is being able to take data and put it into other systems so that we could see the output, and to see where we need to apply our focus.""The most valuable features are its data aggregation and the ability to automatically identify a number of threats, then suggest recommended actions upon them.""It is a solution that helps test and measure customer satisfaction.""The solution is definitely scalable.""The solution is extremely scalable. Our customers are regularly scaling up after installing Splunk."

More Splunk User Behavior Analytics Pros →

Cons
"If they had better integration with security products, such as Cisco ISE or Rapid Threat Containment, then it would be an improvement.""Scalability is one of the disadvantages. When it comes to scalability, you have to actually change the box. If you want to upgrade it, you need to actually change the existing box and probably you take the system off to other sites.""Technical support for this solution can be improved.""Application management can be improved.""The biggest "gotcha" is that if the client purchases what they call the UTM shared bundle, which has unified threat management on both, it's not as easy to manage if you have more than one firewall.""We would like to see an upgrade to the VPN feature, we are using the VPN from outside of our office and there is a limitation to 10 connections, more connections would be suitable.""It should have a better pricing plan. It is too expensive. It should also have a more granular view of the attack. I don't have FortiAnalyzer, and it is difficult for me to have a complete view when there is an attack on my server.""The reporting in Fortinet FortiGate could improve. Customers are having to purchase additional reporting components. When I have used the Sophos solution it is a complete solution, in Fortinet FortiGate you have to use additional tools to have the features needed."

More Fortinet FortiGate Cons →

"The ability to dynamically change policies could be improved.""My team is looking for more throughput and better integration with our security framework.""Forcepoint Next Generation Firewall could change its interface, allowing standard or direct connect modes to be configured.""Something that I've noticed that Forcepoint lacks, is the training that they offer to their end-customers""The solution needs to build upon its network functionality. It needs to be a bit smarter.""Next Generation Firewall's configuration could be improved.""The company should update the URL filtering database. They need to enhance the URL filtering and make it easier to customize.""It's a complicated firewall. Until you come to know the firewall inducers, most people don't like the firewall because the components for the firewall are a little bit complex. User-friendliness is a little bit tough. It needs to be user-friendly when creating policies, and pushing policies. Committing takes more time compared to Palo Alto."

More Forcepoint Next Generation Firewall Cons →

"We want to have an automated system for bot hunting that enables us to detect anomalies predictively based on historical data. It would be helpful if Splunk included process mining as an alternative option. We have a threat workflow, but it would be useful if we could supplement that with some process mining capabilities over time.""There are occasional bugs.""They should work to add more built-in correlation searches and more use cases based on worldwide customer experiences. They need more ready-made use cases.""The initial setup was complex because some of the configurations that we required needed customization.""The correlation engine should have persistent and definable rules.""I'm not aware of any lacking features.""I would like improved downward integration with other tools such as McAfee and other GCP solutions.""The ability to do more complicated data investigation would be a welcome addition for pros, though the functionality now gives most people what they need."

More Splunk User Behavior Analytics Cons →

Pricing and Cost Advice
  • "Fortinet has one or two license types, and the VPN numbers are only limited by the hardware chassis make."
  • "These boxes are not that expensive compared to what they can do, their functionality, and the reporting you receive. Fortinet licensing is straightforward and less confusing compared to Cisco."
  • "Go for long term pricing negotiated at the time of purchase."
  • "Work through partners for the best pricing."
  • "The value is the capability of having multiple services with one unique license, not having the limitation per user licensing schema, like other vendors."
  • "Easy to understand licensing requirements."
  • "​We saved a bundle by not needing all the past appliances from an NGFW.​"
  • "The cost is too high... They have to focus on more features with less cost for the customer. If you see the market, where it's going, there are a lot of players offering more features for less cost."
  • More Fortinet FortiGate Pricing and Cost Advice →

  • "The big advantage of this solution is that we can select the right model for our requirements, which is not too expensive."
  • "I believe the licensing fee is for one year, three years, and five years, or something like that. If you wants to increase the support level from a simpler level to platinum, I think that there's a cost. There are differences between every kind of support, but I don't know the numbers."
  • "We would love to take other solution from Forcepoint, but unfortunately the price is too high. That's why we are not considering using Forcepoing for our proxy and DLB. They have a very good DLB, but the matter in the end is the cost."
  • "Forcepoint is very expensive but it's really secure."
  • "It is expensive."
  • "The training that they offer to their end-customers. It's quite expensive, I believe it costs roughly $11,000"
  • "Everything in Forcepoint comes with an individual license, which is kind of a problem. In our last meeting, they said that it may change at the beginning of 2021, and they will try to merge some licenses together. Customers will get more features than what they got previously. We will wait and see."
  • "We have found the price could be reduced. It is a little expensive."
  • More Forcepoint Next Generation Firewall Pricing and Cost Advice →

  • "I hope we can increase the free license to be more than 5 gig a day. This would help people who want to introduce a POC or a demo license for the solution."
  • "My biggest complaint is the way they do pricing... You can never know the pricing for next year. Every single time you adjust to something new, the price goes up. It's impossible to truly budget for it. It goes up constantly."
  • "There are additional costs associated with the integrator."
  • "The licensing costs is around 10,000 dollars."
  • "Pricing varies based on the packages you choose and the volume of your usage."
  • "I am not aware of the price, but it is expensive."
  • More Splunk User Behavior Analytics Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Firewalls solutions are best for your needs.
    768,246 professionals have used our research since 2012.
    Questions from the Community
    Top Answer: When you compare these firewalls you can identify them with different features, advantages, practices and usage at… more »
    Top Answer:From my experience regarding both the Sophos and FortiGate firewalls, I personally would rather use FortiGate. I know… more »
    Top Answer:As a solution, Sophos UTM offers a lot of functionality, it scales well, and the stability and performance are quite… more »
    Top Answer:The solution offers sandboxing, which can be integrated at any time.
    Top Answer:Forcepoint Next Generation Firewall could change its interface, allowing standard or direct connect modes to be… more »
    Top Answer:We are really pleased with Splunk and its features. It would be practically impossible to function without it To… more »
    Top Answer:I am not aware of the price, but it is expensive. A rough estimate would be around 150 gigabytes, given the huge amount… more »
    Top Answer:Currently, we do not have any specific improvement projects in progress. However, we have partnered with some companies… more »
    Comparisons
    Also Known As
    FortiGate 60b, FortiGate 60c, FortiGate 80c, FortiGate 50b, FortiGate 200b, FortiGate 110c, FortiGate
    Forcepoint NGFW, Stonesoft Next Generation Firewall, McAfee Network Security Platform, Intel Security Network Security Platform
    Caspida, Splunk UBA
    Learn More
    Splunk
    Video Not Available
    Overview

    Fortinet FortiGate enhances network security, prevents unauthorized access, and offers robust firewall protection. Valued features include advanced threat protection, reliable performance, and a user-friendly interface. It improves efficiency, streamlines processes, and boosts collaboration, providing valuable insights for informed decision-making and growth.

    Forcepoint Next Generation Firewall is a versatile and comprehensive solution for perimeter security, offering features such as SD-WAN, IPS, VPN, and cloud or on-premises subscription keys. It is preferred by many clients over Cisco and is used for obligation redundancy, VPN access, and as the main point of security in infrastructure. 

    The product is praised for its simplicity, flexibility, complete feature set, scalability, and central management capabilities. Other valuable features include IPS, firewall, sandbox, application control, filtering, security management center, connectivity, and integration capabilities.

    Splunk User Behavior Analytics is a behavior-based threat detection is based on machine learning methodologies that require no signatures or human analysis, enabling multi-entity behavior profiling and peer group analytics for users, devices, service accounts and applications. It detects insider threats and external attacks using out-of-the-box purpose-built that helps organizations find known, unknown and hidden threats, but extensible unsupervised machine learning (ML) algorithms, provides context around the threat via ML driven anomaly correlation and visual mapping of stitched anomalies over various phases of the attack lifecycle (Kill-Chain View). It uses a data science driven approach that produces actionable results with risk ratings and supporting evidence that increases SOC efficiency and supports bi-directional integration with Splunk Enterprise for data ingestion and correlation and with Splunk Enterprise Security for incident scoping, workflow management and automated response. The result is automated, accurate threat and anomaly detection.

    Sample Customers
    1. Amazon Web Services 2. Microsoft 3. IBM 4. Cisco 5. Dell 6. HP 7. Oracle 8. Verizon 9. AT&T 10. T-Mobile 11. Sprint 12. Vodafone 13. Orange 14. BT Group 15. Telstra 16. Deutsche Telekom 17. Comcast 18. Time Warner Cable 19. CenturyLink 20. NTT Communications 21. Tata Communications 22. SoftBank 23. China Mobile 24. Singtel 25. Telus 26. Rogers Communications 27. Bell Canada 28. Telkom Indonesia 29. Telkom South Africa 30. Telmex 31. Telia Company 32. Telkom Kenya
    California Department of Corrections and Rehabilitation (CDCR)
    8 Securities, AAA Western, AdvancedMD, Amaya, Cerner Corporation, CJ O Shopping, CloudShare, Crossroads Foundation, 7-Eleven Indonesia
    Top Industries
    REVIEWERS
    Comms Service Provider16%
    Computer Software Company9%
    Financial Services Firm8%
    Manufacturing Company7%
    VISITORS READING REVIEWS
    Educational Organization20%
    Computer Software Company15%
    Comms Service Provider8%
    Manufacturing Company6%
    REVIEWERS
    Computer Software Company22%
    Comms Service Provider22%
    University11%
    Integrator11%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Comms Service Provider12%
    Government9%
    Manufacturing Company8%
    REVIEWERS
    Financial Services Firm44%
    Insurance Company11%
    Government11%
    Security Firm11%
    VISITORS READING REVIEWS
    Computer Software Company14%
    Financial Services Firm14%
    Government10%
    Manufacturing Company8%
    Company Size
    REVIEWERS
    Small Business48%
    Midsize Enterprise23%
    Large Enterprise30%
    VISITORS READING REVIEWS
    Small Business27%
    Midsize Enterprise32%
    Large Enterprise41%
    REVIEWERS
    Small Business57%
    Midsize Enterprise18%
    Large Enterprise25%
    VISITORS READING REVIEWS
    Small Business26%
    Midsize Enterprise14%
    Large Enterprise59%
    REVIEWERS
    Small Business31%
    Midsize Enterprise31%
    Large Enterprise38%
    VISITORS READING REVIEWS
    Small Business20%
    Midsize Enterprise12%
    Large Enterprise69%
    Buyer's Guide
    Firewalls
    March 2024
    Find out what your peers are saying about Netgate, Fortinet, OPNsense and others in Firewalls. Updated: March 2024.
    768,246 professionals have used our research since 2012.

    Forcepoint Next Generation Firewall is ranked 31st in Firewalls with 39 reviews while Splunk User Behavior Analytics is ranked 2nd in User Entity Behavior Analytics (UEBA) with 17 reviews. Forcepoint Next Generation Firewall is rated 7.6, while Splunk User Behavior Analytics is rated 8.2. The top reviewer of Forcepoint Next Generation Firewall writes "Good URL filtering with helpful technical support and good scalability". On the other hand, the top reviewer of Splunk User Behavior Analytics writes "Easy to configure and easy to use solution that integrates with many applications and scripts ". Forcepoint Next Generation Firewall is most compared with Palo Alto Networks Advanced Threat Prevention, Check Point NGFW, Cisco Secure Firewall, Sophos XG and Netgate pfSense, whereas Splunk User Behavior Analytics is most compared with Darktrace, Microsoft Defender for Identity, IBM Security QRadar, Varonis Datalert and Cynet.

    We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.