Fortinet FortiGate is a leading network security solution to enhance cybersecurity and protect against cyber threats.
Users highlight its effectiveness in preventing unauthorized access, securing data transmission, and offering robust firewall protection. Key features include advanced threat protection capabilities, reliable performance, and a user-friendly interface.
The device is highly praised for its scalability and ability to handle high network traffic without compromising speed or stability. Organizations benefit from improved efficiency, streamlined processes, and enhanced collaboration among team members.
The software's customizable features and intuitive interface make it easy for employees to adapt and integrate into their daily workflows, ultimately optimizing operations and achieving organizational goals.
Fortinet has one or two license types, and the VPN numbers are only limited by the hardware chassis make.
Go for long term pricing negotiated at the time of purchase.
Fortinet has one or two license types, and the VPN numbers are only limited by the hardware chassis make.
Go for long term pricing negotiated at the time of purchase.
pfSense is a powerful and reliable network security appliance primarily used for security purposes such as firewall and VPN or traffic shaping, network management, and web filtering. It is commonly used by small businesses and managed service providers to protect their customers' networks and enable remote access through VPNs.
PFSENSE turns out to be very economical, the license is free and for little money you get very good support
If you need to buy hardware onto which to install PfSense, go with their boxes on their website, they are great.
PFSENSE turns out to be very economical, the license is free and for little money you get very good support
If you need to buy hardware onto which to install PfSense, go with their boxes on their website, they are great.
Cisco Secure Firewall stands as a robust and adaptable security solution, catering to organizations of all sizes. It's designed to shield networks from a diverse array of cyber threats, such as ransomware, malware, and phishing attacks. Beyond mere protection, it also offers secure access to corporate resources, beneficial for employees, partners, and customers alike. One of its key functions includes network segmentation, which serves to isolate critical assets and minimize the risk of lateral movement within the network.
Cisco devices are for sure costly and budget could be an important constrain on selecting them as our security solution.
I have to admit that the price is high. But I think it's worth it if the stability of your solution counts for you.
Cisco devices are for sure costly and budget could be an important constrain on selecting them as our security solution.
I have to admit that the price is high. But I think it's worth it if the stability of your solution counts for you.
Based on user feedback, the overall consensus is that the solution has received positive reception. Users have expressed satisfaction with various aspects, highlighting its quality, functionality, and value for money. They appreciate its user-friendly interface and the convenience it offers. Additionally, users have praised the prompt and helpful customer support provided. Some users have also mentioned the product's durability and reliability. The user reviews indicate a favorable experience with the solution.
We are not paying any licensing fees. OPNsense is completely free for us.
It costs about $1000.
We are not paying any licensing fees. OPNsense is completely free for us.
It costs about $1000.
Sophos XG Firewall is a complete firewall solution that provides all the real-time security and insights you need to protect your network from ransomware and advanced threats. Sophos XG Firewall provides visibility into suspicious users, unknown and unwanted apps, encrypted traffic, and other threats. With its advanced artificial intelligence capabilities, Sophos XG Firewall immediately identifies potential risks and intrusions on web servers and networks.
For licensing the XG 210, we paid approximately $3000 for three years. There are no additional fees on top of this.
It's a suitable price and license.
For licensing the XG 210, we paid approximately $3000 for three years. There are no additional fees on top of this.
It's a suitable price and license.
Microsoft Defender for Office 365 is a comprehensive security solution designed to protect organizations against advanced threats in their email, collaboration, and productivity environments. It combines the power of Microsoft's threat intelligence, machine learning, and behavioral analytics to provide real-time protection against phishing, malware, ransomware, and other malicious attacks.
It's a user-base subscription.
From the pricing point of view, like any other product in the market, there is scope for negotiation.
It's a user-base subscription.
From the pricing point of view, like any other product in the market, there is scope for negotiation.
Zabbix is a comprehensive monitoring solution that is widely used across various industries. Its primary use case is for monitoring infrastructure, including physical, virtual, and network aspects.
Zabbix helps organizations by providing valuable metrics for preventive maintenance and capacity planning, proactive monitoring and alerting, monitoring a wide range of hardware equipment, optimizing work processes, improving customer experiences, enabling remote appointments with visual communication, and providing an overview of bandwidth consumption.
With Zabbix, organizations can conveniently monitor network metrics in one place, saving time and improving efficiency.
It’s free of cost.
It is a true open-source solution, so there are no licensing costs.
It’s free of cost.
It is a true open-source solution, so there are no licensing costs.
Cisco Meraki MX appliances are next-generation firewalls with all the advanced security services needed for today’s IT security. The appliances are ideal for organizations considering a unified threat management (UTM) solution for branch offices, data centers, distributed sites, or campuses. Since Meraki MX is 100% cloud-managed, installation and remote management are simple and zero-touch.
The Meraki UTM is excellent when you buy the Advanced Security license. If you buy a different license you lost all the valuable functions.
It can always improve pricewise regarding throughput.
The Meraki UTM is excellent when you buy the Advanced Security license. If you buy a different license you lost all the valuable functions.
It can always improve pricewise regarding throughput.
Zscaler Internet Access is a cloud-native security service edge (SSE) platform. Its main purpose is to provide AI-powered protection for all users, all applications, and all locations. The solution replaces other legacy network security solutions to stop advanced attacks and prevent data loss by using a comprehensive zero trust approach.
The pricing is an issue. It is expensive compared to other firewalls on the market.
Our monthly fee is around R3000.
The pricing is an issue. It is expensive compared to other firewalls on the market.
Our monthly fee is around R3000.
CyberArk Privileged Access Manager is a next-generation solution that allows users to secure both their applications and their confidential corporate information. It is extremely flexible and can be implemented across a variety of environments. This program runs with equal efficiency in a fully cloud-based, hybrid, or on-premises environment. Users can now protect their critical infrastructure and access it in any way that best meets their needs.
Pricing and licensing depend on the environment.
It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.
Pricing and licensing depend on the environment.
It is not a cheap solution. It is expensive as compared with other solutions. However, it is one of the best solutions in their domain.
Cloudflare is a highly-regarded Content Delivery Network (CDN) and a Distribution Denial of Service (DDoS) protection solution. The robust global cloud platform that is Cloudflare ensures users are able to connect to the internet quickly, securely, and reliably. Cloudflare is one of the world's largest networks in the marketplace today. Using Cloudflare, businesses, educational entities, NGOs, vloggers, bloggers, and anyone else with an internet presence can use the solution and experience more secure, faster websites and applications.
So far I use free tier and happy with it. You can subscribe to business package if needed.
There are no additional costs beyond the standard licensing fees.
So far I use free tier and happy with it. You can subscribe to business package if needed.
There are no additional costs beyond the standard licensing fees.
WatchGuard Firebox is a versatile security solution primarily used for security purposes such as firewalling, VPN, and protecting networks from outside and inside threats. It is also used for routing, multi-factor authentication, vulnerability management, and segregating industrial networks from corporate networks.
Very competitive pricing regarding throughput compared to other alternatives.
Cheap.
Very competitive pricing regarding throughput compared to other alternatives.
Cheap.
Proofpoint Email Protection is a machine learning email gateway that catches both known and unknown threats. Through Target Attack Protection, emails will be analyzed and potentially blocked from advanced threats while users gain visibility around these threats. The technology can also classify various types of email and can be deployed both on premises or as a cloud service. In addition, users can tag suspicious emails to help raise user awareness and track down any email quickly.
Annually, it costs us about $92,000. This is pretty much what it costs us. There is no additional cost.
The price is reasonable.
Annually, it costs us about $92,000. This is pretty much what it costs us. There is no additional cost.
The price is reasonable.
Sophos UTM is a unified threat management platform designed to protect your businesses from known and emerging malware including viruses, rootkits and spyware. The solution provides a complete network security package with everything your organization needs in a single modular appliance.
The licensing model is very straightforward, it's a bit pricey, but for what you get, it's well worth it.
If you can afford it, go for a small Check Point, as it is easier to manage.
The licensing model is very straightforward, it's a bit pricey, but for what you get, it's well worth it.
If you can afford it, go for a small Check Point, as it is easier to manage.
Juniper SRX is a next-generation security solution that enables users to expand and secure their networks without incurring heavy costs or sacrificing performance.
The prices are very good as compared to other vendors.
Pricing is good. Most of the costs are in the UTM (IDS/IPS, virus scanning, etc) subscription.
The prices are very good as compared to other vendors.
Pricing is good. Most of the costs are in the UTM (IDS/IPS, virus scanning, etc) subscription.
Nagios XI provides monitoring of all mission-critical infrastructure components, including applications, services, operating systems, network protocols, systems metrics, and network infrastructure. Third-party add-ons provide tools for monitoring virtually all in-house and external applications, services, and systems.
You can grow into the higher-priced scale as they learn how to utilize the features for Nagios XI.
The pricing is really cost efficient. The licensing is perpetual and can be renewed very easily.
You can grow into the higher-priced scale as they learn how to utilize the features for Nagios XI.
The pricing is really cost efficient. The licensing is perpetual and can be renewed very easily.
Cisco Secure Network Analytics is a highly effective network traffic analysis (NTA) solution that enables users to find threats in their network traffic even if those threats are encrypted. It turns an organization’s network telemetry into a tool that creates a complete field of vision for the organization’s administrators. Users can find threats that may have infiltrated their systems and stop them before they can do irreparable harm.
It is worth the cost.
Pricing is much higher compared to other solutions.
It is worth the cost.
Pricing is much higher compared to other solutions.
SonicWall NSa dispenses advanced threat protection using a high-performance security platform. The NSa series implements intuitive deep learning technologies in the SonicWall Capture Cloud Platform to dispatch the automated real-time threat detection and deterrence enterprise organizations need today. SonicWall Network Security appliance (NSa) series is best for mid-sized organizations to distributed enterprises and data centers.
SonicWall NSa series next-generation firewalls (NFGWS) combine two very robust security ideologies to deliver advanced threat protection to keep users’ networks safe. Boosting SonicWall’s multi-engine advanced threat protection (ATP) is their Real-time Deep Memory Inspection (RTDMI™). The RTDMI intuitively identifies and stops aggressive zero-day threats and vicious malware by investigating memory directly. This real-time process allows SonicWall RTDMI to be accurate, lessen false positives and discover and alleviate malicious threats and attacks. SonicWall’s single-pass Reassembly-Free Deep Packet Inspection (RFDPI) will audit every byte of each and every packet by investigating both outbound and inbound traffic on the firewall. By combining the SonicWall Capture Cloud Platform along with on-box offerings such as intrusion prevention, web/URL filtering, and anti-malware, the NSa series is able to block the most malicious and dangerous threats at the gateway.
Licensed features provide application control, content filtering, antivirus, and anti-malware all in a single appliance.
The CPUs are not able to compete with a similar price point to the Fortinet, WatchGuard, or Palo Alto product.
Licensed features provide application control, content filtering, antivirus, and anti-malware all in a single appliance.
The CPUs are not able to compete with a similar price point to the Fortinet, WatchGuard, or Palo Alto product.
Imperva DDoS is a solution that offers protection for web applications and websites and all their associated business-critical data from cyberattacks. The cloud-based application delivery service helps improve user experiences by improving their performance. Through its security platform, Imperva DDoS also provides DDoS mitigation, a web application firewall, and a global load balancer, and includes a content delivery network — all designed to maximize performance.
For enterprise contracts you will be in touch with a dedicated account manager who will guide you regarding licensing.
Although the pricing can be a little high, it is worth the protection and security that it offers.
For enterprise contracts you will be in touch with a dedicated account manager who will guide you regarding licensing.
Although the pricing can be a little high, it is worth the protection and security that it offers.
Arbor Networks, the security division of NETSCOUT, is driven to protect the infrastructure and ecosystem of the internet. It is the principle upon which we were founded in 2000; and remains the common thread that runs through all that we do today. Arbor’s approach is rooted in the study of network traffic. Arbor’s suite of visibility, DDoS protection and advanced threat solutions provide customers with a micro view of their network enhanced by a macro view of global internet traffic and emerging threats through our ATLAS infrastructure. Sourced from more than 300 service provider customers, ATLAS delivers intelligence based on insight into approximately 1/3 of global internet traffic. Supported by Arbor’s Security Engineering & Response Team (ASERT), smart workflows and rich user context, Arbor’s network insights help customers see, understand, and solve the most complex and consequential security challenges facing their organizations.
Start with a small license. Measure your bandwidth requirements.
Arbor's products are very expensive. Their competitors are cheap when compared with Arbor.
Start with a small license. Measure your bandwidth requirements.
Arbor's products are very expensive. Their competitors are cheap when compared with Arbor.
Microsoft Defender for Identity is a comprehensive security solution that helps organizations protect their identities and detect potential threats. It leverages advanced analytics and machine learning to provide real-time visibility into user activities, enabling proactive identification of suspicious behavior.
Defender for Identity is a little more expensive than other Microsoft products. Identity and Microsoft Defender for Cloud are both a bit costly.
It is very affordable considering that other SIEM solutions are much more expensive and have many more licensing restrictions and fees.
Defender for Identity is a little more expensive than other Microsoft products. Identity and Microsoft Defender for Cloud are both a bit costly.
It is very affordable considering that other SIEM solutions are much more expensive and have many more licensing restrictions and fees.
Palo Alto Networks VM-Series is a highly effective advanced threat protection (ATP) solution and firewall that can be hosted on cloud computing technologies designed by many different companies. It decreases the amount of time that it will take administrators to respond to threats. Users that deploy VM-series have 70% less downtime than those who use similar firewalls. Neither protection nor efficiency are concerns when this next-generation firewall is in play.
For what you get, it does do what it says. It is a good value for an enterprise firewall.
The licensing is pretty much like everyone else.
For what you get, it does do what it says. It is a good value for an enterprise firewall.
The licensing is pretty much like everyone else.
For mid-sized companies, they sell their appliances for good prices.
The SN200 series costs between $500 USD and $600 USD per year, whereas the SN700 series costs approximately $1,000 annually.
For mid-sized companies, they sell their appliances for good prices.
The SN200 series costs between $500 USD and $600 USD per year, whereas the SN700 series costs approximately $1,000 annually.
Digital Guardian is proud to be part of Fortra’s comprehensive cybersecurity portfolio, and one of the Data Protection family of products. Fortra simplifies today’s complex cybersecurity landscape by bringing complementary products together to solve problems in innovative ways. These integrated, scalable solutions address the fast-changing challenges you face in safeguarding your organization. With the help of the powerful protection from Digital Guardian and others, Fortra is your relentless ally, here for you every step of the way throughout your cybersecurity journey.
The cost was around $300,000.
The price of Digital Guardian is expensive.
The cost was around $300,000.
The price of Digital Guardian is expensive.
Barracuda CloudGen Firewall is a comprehensive network security solution that provides advanced protection for organizations of all sizes. It offers next-generation firewall capabilities, including application control, intrusion prevention, and web filtering.
It is a product with a very transparent model of licensing. In the sense of hidden expenses, they do not exist with this model.
We evaluated a lot of different options. We concluded that Barracuda NG Firewall provided the most features for an exemplary price.
It is a product with a very transparent model of licensing. In the sense of hidden expenses, they do not exist with this model.
We evaluated a lot of different options. We concluded that Barracuda NG Firewall provided the most features for an exemplary price.
Detect the undetectable and stop evasive attacks. Trellix Network Detection and Response (NDR) helps your team focus on real attacks, contain intrusions with speed and intelligence, and eliminate your cybersecurity weak points.
Its price is lower compared to similar solutions.
We're partners with Cisco so we get a reasonable price. It's cheaper than Palo Alto in terms of licensing.
Its price is lower compared to similar solutions.
We're partners with Cisco so we get a reasonable price. It's cheaper than Palo Alto in terms of licensing.
ThreatConnect Threat Intelligence Platform (TIP) is a comprehensive solution designed to help organizations effectively manage and analyze threat intelligence data. With its advanced capabilities, TIP enables users to collect, enrich, and analyze threat data from various sources, providing valuable insights and actionable intelligence.
One of the key features of TIP is its ability to aggregate threat data from multiple sources, including open-source feeds, commercial feeds, and internal sources. This allows organizations to have a holistic view of the threat landscape and identify potential risks and vulnerabilities. TIP also supports the integration of third-party tools and feeds, further enhancing its capabilities.
TIP provides powerful enrichment capabilities, allowing users to enrich threat data with additional context and information. This includes the ability to automatically correlate threat data with indicators of compromise (IOCs), threat actors, and other relevant information. The enrichment process helps organizations gain a deeper understanding of threats and enables them to make more informed decisions.
With its advanced analytics capabilities, TIP enables users to analyze threat data and identify patterns, trends, and anomalies. This includes the ability to perform advanced queries, create custom dashboards and reports, and visualize data in a meaningful way. These analytics capabilities help organizations identify emerging threats, prioritize response efforts, and proactively mitigate risks.
ThreatConnect Threat Intelligence Platform also provides collaboration features, allowing users to share threat intelligence with internal teams, partners, and the broader security community. This includes the ability to create and manage secure communities, share indicators and reports, and collaborate on investigations. By fostering collaboration, TIP helps organizations leverage collective intelligence and improve their overall security posture.
The price of this product is in the mid-range, not too expensive, nor inexpensive.
The price could be better.
The price of this product is in the mid-range, not too expensive, nor inexpensive.
The price could be better.
CloudGuard Network Security is a firewall solution that provides network security for cloud environments. It protects against cyber threats with multi-layered security for public, private, and hybrid clouds.
On average, it is normally on the lower end, being less expensive than Palo Alto or Cisco.
It is more expensive than other solutions and would be more competetive in the market if it came down in price.
On average, it is normally on the lower end, being less expensive than Palo Alto or Cisco.
It is more expensive than other solutions and would be more competetive in the market if it came down in price.
Fortinet FortiSandbox is a behavior-based threat detection solution that prevents and detects malicious code in files transferred within the organization. It is integrated with FortiGate firewalls and FortiMail for threat protection and can be used for monitoring and reporting. The solution inspects files in a virtual environment with different types of virtual machines and can block or quarantine files based on their score.
There are no costs in addition to the standard licensing fees.
The solution is not expensive at all.
There are no costs in addition to the standard licensing fees.
The solution is not expensive at all.
NetWitness Platform is an evolved SIEM and threat detection and response solution that functions as a single, unified platform for ALL your security data. It features an advanced analyst workbench for triaging alerts and incidents, and it orchestrates security operations programs end to end. In short: NetWitness Platform is all you need to run an intelligent SOC.
It’s cheaper to run virtual machines in a VMware environment.
The new pricing and licensing mechanisms are fair. I would advise always to get the full solution (i.e., not only Logs).
It’s cheaper to run virtual machines in a VMware environment.
The new pricing and licensing mechanisms are fair. I would advise always to get the full solution (i.e., not only Logs).
Hillstone E-Series is a comprehensive network security solution designed to protect organizations from advanced threats. It offers a range of features including a firewall, intrusion prevention system (IPS), virtual private network (VPN), and application control.
The cost per year for licensing, and hardware, is approximately $850 for the basic plan.
Hillstone's pricing is economical and neither very high nor very low.
The cost per year for licensing, and hardware, is approximately $850 for the basic plan.
Hillstone's pricing is economical and neither very high nor very low.
Check Point’s evasion-resistant technology maximizes zero-day protection without compromising business productivity. For the first time, businesses can reduce the risk of unknown attacks by implementing a prevent-first approach. Learn More about Check Point Sandblast
We have seen ROI.
I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market.
We have seen ROI.
I think the overall cost for introducing Check Point with SandBlast was reasonable and competitive in the market.
The price is very competitive and the licensing is easy.
It is very reasonably priced as compared to other solutions in the market.
The price is very competitive and the licensing is easy.
It is very reasonably priced as compared to other solutions in the market.
More than 90% of targeted attacks start with email—and these threats are always evolving. Proofpoint Targeted Attack Protection (TAP) helps you stay ahead of attackers with an innovative approach that detects, analyzes and blocks advanced threats before they reach your inbox. This includes ransomware and other advanced email threats delivered through malicious attachments and URLs. And zero-day threats, polymorphic malware, weaponized documents and phishing attacks. TAP provides adaptive controls to isolate the riskiest URL clicks. TAP also detects threats and risks in cloud apps, connecting email attacks related to credential theft or other attacks.
Symantec Advanced Threat Protection is a single unified solution that uncovers, prioritizes, and remediates advanced attacks. The product fuses intelligence from endpoint, network, and email control points, as well as Symantec’s massive global sensor network, to stop threats that evade individual security products. It leverages your existing Symantec Endpoint Protection and Symantec Email Security.cloud investments, so it does not require the deployment of any new agents. You can deploy a new installation of Symantec Advanced Threat Protection and start to discover suspicious activity in under an hour. Using the proven technology in Symantec Insight reputation based detection, Symantec SONAR behavioral analysis with the new Symantec Cynic sandbox and file analysis platform, Symantec Advanced Threat Protection provides better detection and prioritization than other vendors, allowing security analysts to “zero in” on just those specific security events of importance.
Pricing is good. It is nice to have a great product at a fair price.
I do not have experience with the pricing or licensing of the product.
Pricing is good. It is nice to have a great product at a fair price.
I do not have experience with the pricing or licensing of the product.
VMRay is focused on a single mission: to help enterprises protect themselves against the growing global malware threat. The company’s automated malware analysis and detection solutions help enterprises around the world minimize business risk, protect their valuable data and safeguard their brand. VMRay’s founders, Dr. Carsten Willems and Dr. Ralf Hund, were early pioneers in malware sandboxing, developing breakthrough technologies that continue to lead the industry. They founded VMRay to transform their research into practical solutions for making the online world a safer place. Learn more: www.vmray.com
Threats are as vast as the internet. Defending your attack surface is a challenge of continuous change and global scale. RiskIQ Illuminate Internet Intelligence shows cyber threats relevant to your critical assets through connected digital relationships. It is the only security intelligence solution with tailored attack surface intelligence to uncover exposures, risks, and threats against your unique digital footprint, pinpointing what’s relevant to you—all in one place.
Uncover Hidden Threats
The product is expensive, but it is better than the rest of them in the industry.
Our licensing fees for this solution are approximately one million dollars per year.
The product is expensive, but it is better than the rest of them in the industry.
Our licensing fees for this solution are approximately one million dollars per year.
Anomali Match is an intelligence-driven extended detection and response solution that helps organizations quickly identify and respond to threats in real time. Anomali Match boosts organizational efficiency and productivity by automating detection actions that quickly profile a danger and its impact on the organization, allowing for an effective response.
When comparing the price of Anomali Enterprise to other solutions it is in the medium to high range. However, I am satisfied with the price.
The solution is costly.
When comparing the price of Anomali Enterprise to other solutions it is in the medium to high range. However, I am satisfied with the price.
The solution is costly.
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyber attacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectivity and inefficient security. Learn more about Check Point Infinity
The pricing of Check Point Infinity could be better. There is a license needed to use the solution and we pay annually.
The product has good pricing considering the features and a global approach.
The pricing of Check Point Infinity could be better. There is a license needed to use the solution and we pay annually.
The product has good pricing considering the features and a global approach.
Symantec Web Isolation executes web sessions away from endpoints, sending only safe rendering information to users’ browsers thereby preventing any website delivered zero-day malware from reaching your devices. When combined with Symantec Secure Web Gateways, policies allow isolating traffic from uncategorized sites or URLs with suspicious or potentially unsafe risk profiles. By integrating with Symantec messaging solutions, Web Isolation allows to isolate links in email to prevent phishing threats and credential attacks.
The licensing cost of Symantec Web Isolation is high.
The licensing cost of Symantec Web Isolation is high.
SonicWall Capture, a cloud based service available with SonicWall firewalls, revolutionizes advanced threat detection and sandboxing with a multi-engine approach to stopping unknown and zero-day attacks at the gateway, and with automated remediation. Customers benefit from high security effectiveness, fast response times and reduced total cost of ownership.
When you compare it with other solutions, they are cheaper and more economical.
We get our value for our money.
When you compare it with other solutions, they are cheaper and more economical.
We get our value for our money.
ThreatARMOR enhances security performance across your network, removing known bad IP addresses and traffic from not trusted countries.
By eliminating unwanted traffic, ThreatARMOR boosts the performance of your network security infrastructure.
To address advanced malware, the Hillstone Cloud Sandbox delivers a unique, advanced threat detection platform that can emulate the execution environment and analyze all activities related to malicious files, identify advanced threats and collaborate with existing solutions to provide rapid remediation.