We just raised a $30M Series A: Read our story

SonicWall TZ OverviewUNIXBusinessApplication

SonicWall TZ is #10 ranked solution in best firewalls. IT Central Station users give SonicWall TZ an average rating of 8 out of 10. SonicWall TZ is most commonly compared to Fortinet FortiGate:SonicWall TZ vs Fortinet FortiGate. The top industry researching this solution are professionals from a comms service provider, accounting for 27% of all views.
What is SonicWall TZ?
The secure, sophisticated SonicWALL TZ is widely deployed at small businesses, retail, government, remote sites and branch offices. It combines high-performance intrusion prevention, malware blocking, content/URL filtering and application control.

SonicWall TZ was previously known as Dell SonicWALL TZ.

SonicWall TZ Buyer's Guide

Download the SonicWall TZ Buyer's Guide including reviews and more. Updated: November 2021

SonicWall TZ Customers
AeroM_xico Delta TechOps, Unimat
SonicWall TZ Video

Pricing Advice

What users are saying about SonicWall TZ pricing:
  • "You need to purchase multiple licenses to manage multiple devices which is cost-prohibitive for the value you would receive."

SonicWall TZ Reviews

Filter by:
Filter Reviews
Industry
Loading...
Filter Unavailable
Company Size
Loading...
Filter Unavailable
Job Level
Loading...
Filter Unavailable
Rating
Loading...
Filter Unavailable
Considered
Loading...
Filter Unavailable
Order by:
Loading...
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Search:
Showingreviews based on the current filters. Reset all filters
BT
Virtual CIO/ CISO at Kyber Security
Real User
Easy to implement, fairly stable, and supports SSL-DPI

Pros and Cons

    • "From a support perspective, if we're talking tech support I think Silver Partners, Gold Partners, Platinum, whatever level, should have a different number to call. End users can call tech support over at SonicWall if they've paid for support as part of their AGSS or whatever services they bought. The end-user can call, or we can call, however, I don't want to be calling the same line that an end user's calling. I don't want the same response time. I need a different level of expertise."

    What is most valuable?

    Once we moved the units up to the Gen 6 platform, they could support SSL-DPI. We are huge fans of the DPI. That piece is incredibly easy to implement. I'd say probably the most powerful thing about the solution is that coupled with the captured functionality. 

    What needs improvement?

    We've turned the SSL inspection on, and it is a nightmare. It doesn't mean it doesn't work, but it will turn your world upside down for weeks until you tune it and get it right. That's an across the board problem. It's not just TZ. That's TZ's, NSA's, etc. Wherever you're using their implementation of SSL, where you've got to implement a certificate on every machine. Once you even get past that it's still going to be particular and finicky. Banking sites are driven crazy by it every time we turn it on.

    It is trying to lock down outbound traffic so tightly that you get to sites that are already very security conscious. It's just a battle to get the traffic through. Intentional traffic, the traffic you want to get through, seems to be a problem. It will stop almost everything. Too much in fact. I understand the concept. It's just a little threatening. We just had a client sign off on a 6650. Then we send them a scope of work for implementing it. We specifically put a note in there in enormous bold type: "Note does not include SSL-DPI implementation". That is additional. The client responded that  "That's the one piece I wanted you guys to do. I'm scared of it."

    He said, "We're scared of it," and I told him, "We're scared of it too." I said, "I don't know how long it's going to take. And it's going to turn your universe upside down for a week to 10 days to maybe two weeks." He said that he heard that this would be the case. 

    My fear is that the client thinks that we'll say it will take four hours and then, when it turns into 40, try to make us give them the submission for free. 

    Even tiny environments, for example, 10 user environments, once you turn it on, you will spend days tuning it. The last one we did took us 22 hours to get it perfect. We learned our lesson. We slotted in four to eight hours to do it and it took us 16 to 20.

    From a support perspective, if we're talking tech support I think Silver Partners, Gold Partners, Platinum, whatever level, should have a different number to call. End users can call tech support over at SonicWall if they've paid for support as part of their AGSS or whatever services they bought. The end-user can call, or we can call, however, I don't want to be calling the same line that an end user's calling. I don't want the same response time. I need a different level of expertise.

    For how long have I used the solution?

    We've been a SonicWall dealer for 21 years approximately. We've been handling the solution since 1999. I personally didn't start using the solution until 2004.

    What do I think about the stability of the solution?

    Once you get past all the configuration issues, If you are on a rock-solid GA (Generally Available firmware), I don't know if I want to say it's bulletproof, however, the stability is really, really good. I don't sit and worry, thinking, "Oh, God. We know another one's going to fail today." We never think that way about that type of stuff. It's the odd time where we might get hardware failures or random reboots. We've had a couple of SMA units go sideways. Even SonicWall couldn't solve the problem. However, that said, it's rare.

    What do I think about the scalability of the solution?

    There's a couple of different ways to answer the question of scalability. They've built the TZ line wide enough so that we've got enough of a selection to be able to fit most bandwidth and user count situations. It's never going to fit everybody and it's not meant to. It shouldn't. It is a little challenging to try to get one of the boxes to do full wire speed. I'm not so sure inside that box, at the price point, you're going to solve that problem.

    That's why we sold the 6650. One client has got a one gig fiber line and they're in a school. On an NSA 3600, he can't get over 400 on it. I told him he never would. Some days I'd be surprised to get 400, depending on the user count. The TZ lineup is pretty good, however, I'm not so sure I'd use the word scalable. 

    If what we mean by scalable is, "oh, well, I buy a 300 and I buy it for 10 users, but I can scale up to 30 users with that box," the answer to that is no you can't. If you ask "could I scale up to 25 users and move to 200 or 300 or 400 meg?" You can't. We've got somebody in that situation right now and we're quoting a box replacement because it just can't scale that way.

    You can't necessarily scale on the appliance. You've got to get the right size. That's the easiest way to scale. If it's the right-sized appliance for the environment with some headroom then I think most situations users are going to be fine. There's going to be some issues where somebody cheaps out. For example, we worked with a law firm. They bought a TZ 300 because they didn't want to spend the money for the 500. Now they're going to have to spend the money for the 500 anyway because they need to scale up. 

    How are customer service and technical support?

    I don't think they really separate support from line to line. Maybe if you get all the way up into supermassive issues they do. Between NSA and TZ, it's the same level of service that you get on the other end of the phone. To be quite honest, level one support is not sparkling. Level two is usually really good. Level three is usually a combination. You get to level three, and you're almost talking to development or a combination of a crew that's dealing with development and senior technical expertise. Those guys rarely fail us.

    That's a typical support story. The level one guys will read the scripts and don't necessarily fix anything. We've already run through level one through three on our end with my staff. If they can't fix it, talking to a level one script reader is definitely not going to get it fixed. You should be able to bypass those guys if you're a reseller and a long-standing Silver Partner, like we are.

    Which solution did I use previously and why did I switch?

    We've also used Cisco previously. A while back, we used to have Cisco as our primary choice, with SonicWall being our second. That changed when I came to the company in 2004, where SonicWall became our solution of choice. We've got 400 or 500 firewalls out there and we don't plan on changing over to anything else.

    What other advice do I have?

    We're a Silver Partner.

    I'm not an engineer. I was a field engineer for nine years a long, long time ago. However, I'm not typically the one that gets my fingers into stuff, and it would be my engineering and senior engineering staff that do that. That said, I can say that I don't think any of our guys have touched the virtual platform yet.

    We use TZ and traditional NSA tech every day. That's our bread and butter.

    The current version we're using right now is the 600 series, although we do still have some 350 series. 90% of what we use are Gen 6. They're either TZ 300, 400, 500, 600 or NSA 2600, 3600, 4600. 

    We've got a smattering of 2650s that we've rolled out, which have been really, really good. Those are powerful units.

    I'd rate the solution eight out of ten. It doesn't warrant more than that. There's plenty of products I'd give a five to out there, however, for the quality of the product offering, I think an eight is a fair mark.

    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    TD
    Owner\Operator with 1-10 employees
    Reseller
    Easy to use with a simple initial setup and very helpful technical support

    Pros and Cons

    • "I've found the technical support to be helpful."
    • "I would like the solution to build in more redundancy. I"

    What is our primary use case?

    We primarily use the solution as a firewall. It's pretty much for content filtering and protection between points.

    What is most valuable?

    The solution works very well.

    They seem to be protecting themselves, or, at least, I assume they are, when they ask you to go online to enable the device.

    The solution is easy to use. The actual setup is pretty easy.

    I've found the technical support to be helpful. With all of the specifics, whether it's VPN stuff or the Analyzer products, et cetera, I'll always call for help. 

    I'm very comfortable with the product. I know enough to really get to where I need to be and then to get it right. For my customers, I can call and get help if I need to, and it's nice to have that option, however, I'm really quite comfortable overall with its functionality.

    What needs improvement?

    There was one complaint I always had in the past. Years ago, you always had to enable the device. You had to go online to enable the device. You had to connect and do that. That was always a thing in my mind: "Well, why do I have to do that? Why do I have to go outside of my network just to do that?" Now, it seems to be less of an issue. However, that's been something that has frustrated me. It's not fixed. It's still the same. It's just something I live with now. I wish you didn't have to go off your network to connect.

    I would like the solution to build in more redundancy. I would hope that doesn't come with a price increase, however, it would make the solution that much better.

    For how long have I used the solution?

    I've been using the solution for ten years at this point. It's been about a decade, therefore I'm comfortable saying that I've worked with it for a long time.

    What do I think about the stability of the solution?

    The solution is largely stable. The one thing I did notice was their VPN connectivity. It hadn't been upgraded for a long time - maybe even years. Whether they were doing stuff with it, I don't know. I just noticed this past last year, they came out with a new VPN client. However, before that, it was a long time. They seem to have sorted it now. I don't know if that means they'll go another extended period without updating again or not.

    What do I think about the scalability of the solution?

    I haven't grown out of one before, and therefore I haven't really had to scale. In terms of their throughput, we got close on one once. The thing is, if I call an inside connection, he'll get me in touch with his inside tech, which is different from tech support and they'll do some numbers. What my throughput is, the bandwidth I actually have, what I'm working with, et cetera. I seem to be always under. I'm really not in the hundreds of users. It's typically under 100. I work with smaller organizations, and there isn't much need to scale.

    How are customer service and technical support?

    I've dealt with technical support in the past. They've been good. I'm satisfied with eh level of support they provide. It's one of the selling points for me. I like to have products with good technical support capabilities.

    Most of them were really sharp. I call with some questions sometimes, or I just want to set up a VPN between the buildings or something real quick and I just want to make sure I've got it right. They're just really great at assisting me. I'll say, "Look, am I missing anything?" And they'll look through and say, "This is good, but change this." Their tech support's been excellent. I'd give them a ten out of ten for sure.

    Which solution did I use previously and why did I switch?

    I've worked with Symantec and Cisco. I haven't dealt with any Cisco in a few years. I did some Cisco and started to learn how to do certain tasks. I haven't really done much with them as my clients are a bit smaller. Cisco is an awesome product. They are likely the best on the market. However, as I recall, they don't really have a GUI and my clients don't need the size.

    How was the initial setup?

    The initial setup is very straightforward. It's nice and easy. A person or company shouldn't have any issues with the setup.

    What other advice do I have?

    I'm a reseller.

    I tend to use the latest version of the solution. I go with whatever's happening. I'll upgrade when necessary when they go end of life. 

    Although it is my understanding that they also have a cloud option, I tend to prefer on-premises deployments. If I need something, I will call my SonicWall rep.

    I'd recommend new users try them. They have very good service and they're easy to use.

    I'd rate them ten out of ten simply for the fact that I really haven't had any issues with them at all.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: reseller
    Learn what your peers think about SonicWall TZ. Get advice and tips from experienced pros sharing their opinions. Updated: November 2021.
    553,954 professionals have used our research since 2012.
    Eric Barba
    Senior Systems Analyst at a construction company with 1,001-5,000 employees
    Real User
    Top 20
    Offers the right amount of control very simply; great integration and ease of management

    Pros and Cons

    • "Offers the right amount of control without being incredibly convoluted and frustrating."
    • "Sonic Analyzer could be improved. It's difficult to manage and not very intuitive."

    What is our primary use case?

    In some cases SonicWall is used to outfit a company, replacing existing infrastructure and getting site-to-site VPN set up for easier management. It provides ease of use for VPN setups. We are customers of SonicWall and I'm a senior system analyst. 

    How has it helped my organization?

    The solution offers the right amount of control without being incredibly convoluted and frustrating, or without being too dumbed down where you don't have options to do certain things. It's very to the point with the controls and simplifies things for us. It's great value for money. 

    What is most valuable?

    The solution has a lot of robust options and it's easy to use. NSM is a good feature, a single pane of glass security center where you can monitor SonicWall for different clients and troubleshoot without it requiring individual access. The product has good integration with their SMA solution, which we deployed for one of our financial firms, and we've also provided a remote access solution for people with PCs at home who want secure access. It offers good content filtering.

    What needs improvement?

    I would probably say their GSM or their Sonic Analyzer could be improved. I have always found it difficult to manage and not very intuitive. I'd like to have better visibility of what each endpoint is doing. That's something Meraki has that is very easy to use.

    For how long have I used the solution?

    I've been using this solution for over seven years. 

    What do I think about the stability of the solution?

    The solution is stable. We're an MSP, so if our clients have any dated hardware, we'll make a plan to switch to SonicWall, otherwise there can be issues with the internet or configuration where we can't get in and troubleshoot. We need to know we can get into the firewalls and make sure that they're online, as opposed to having to schedule someone to come in and deal with the basic physical connections or troubleshoot.

    What do I think about the scalability of the solution?

    The scalability is very good because if you know how to work the base model, the old solution or the TZ 105, all the way up to the NSAs, they just scale up in terms of features and functionality and you don't change a whole lot. They have good terminology that sticks throughout, so if you work with one, you can work with them all. It means upgrading and scaling is very easy. We manage about 1300 users or so across about 100 different clients. For the most part, maybe 80% of them are on SonicWall, and we try to push that just because it makes our lives a lot easier.

    How are customer service and support?

    We don't use the technical support very often, but the last call I had with them, everything was resolved within the hour. I spent more time on hold than I did with the person. It was 15 minutes on hold, for 10 minutes to resolve the issue. Otherwise, it's great. 

    How was the initial setup?

    The initial setup was very straightforward. Deployment time depends on the client but if we're starting from scratch, you can have it updated and deployed within an afternoon without issue. We have our own techs with experience who can get things set up to the best of our ability. Implementation takes one person who knows what they're doing, but we have a team that can help out and troubleshoot if we run into issues. 

    What's my experience with pricing, setup cost, and licensing?

    I'm not sure of licensing costs, but the price point isn't bad. In addition, you need to buy the hardware. There is also a standard support license, and they offer an advanced security gateway with other intrusion detection, prevention, content filtering, etc. There are some additional options we usually go with, but things like content filtering are hit and miss, and depend on what the client wants.

    Which other solutions did I evaluate?

    I've tried Meraki, but their price points are ridiculous and feature functionality is somewhat lacking. After Dell sold SonicWall, things improved a lot, and they've come a long way. There were some things about Meraki that I liked such as endpoint visibility. You can see the list of connected devices and apply a policy. You can get very low network so that bandwidth is not eaten up if someone is watching Netflix all day but they can still receive emails. Those kinds of things are what's missing in SonicWall. I've never been able to do something like that easily on the firewall side. Unfortunately, the cost of Meraki is really prohibitive. We tried a few other solutions and they just didn't pan out. If you want a good firewall, you have to pay thousands of dollars for what SonicWall does in a way that's easier to manage.

    What other advice do I have?

    I would recommend trying the product, it's not too difficult, whether it's the setup or the cost. If you're looking for a really low-cost solution, you'll probably end up using something like pfSense which doesn't really compare to SonicWall. There are probably better solutions out there, but there are things that SonicWall does better, it just depends on your budget.

    I rate the solution eight out of 10. 

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    Harry Srolovitz
    Manager, Customer Security & Guidance at a tech services company with 201-500 employees
    Reseller
    Top 20
    Effective and affordable, simple setup and ease of management, with very good VPN integration

    Pros and Cons

    • "Ease of management and the VPN integration."
    • "In general, the company needs to think contingently and integrate more security options."

    What is our primary use case?

    We are an MSP and Sonicwall partner and have installed virtually every model, from the TZ 150 during the old days, up to the new TZ 500, TZ 600s and NSA series. I've been using SonicWall for many years and it's still a major part of our solutions for many of our customers compared the optional product lines that we sell. I previous owned an IT firm for 30 years and recently merged with a larger organization where I focus on customer security and guidance. 

    How has it helped my organization?

    Sonic has been very progressive, continually updating their product-line and service offerings to stay current with, and ahead of the evolving security landscape. Again, they have consistently developed great solutions for both the SMB and enterprise market which has enable our support team to leverage their expertise with Sonicwall across our entire client base.

    What is most valuable?

    The most valuable features are the ease of setup, ease of management, integration, the VPN integration andnet extender which is part of their remote access, and functionality. Overall, they've been very effective and it's an affordable product. 

    What needs improvement?

    Not relating to this product specifically, but I think overall the company needs to think more broadly about security continuity across the entire security spectrum and integrate more security options with their solutions, like Cisco is doing. They need identity management products and DNS solutions to really complete the line of security. Because of the whole management system, there could also be improvement to their GMS, which is a system allowing you to manage an entire fleet of their firewalls via a central pane of glass. Today as more organizations as forced to working from home and the security perimeter is now the home, businesses need more affordable and scalable systems to manage and monitor numerous devices, more easily and push out updates through essential platforms.

    For how long have I used the solution?

    I've been using this solution for over 15 years. 

    What do I think about the stability of the solution?

    I find it a very stable product and company. We really have not had problems with functionality or support. The ability to meet customer needs and implement security features, as well as just the reliability of the hardware itself has been very good over the years.

    What do I think about the scalability of the solution?

    Scalability is good but once you buy the product itself, you're limited to what that particular device can deliver in terms of throughput and add-on features. You can easily add on additional functionality through various software/licensing, but it can't scale up more than the product's physical limitations. To address this, Sonicwall does have an upgrade program to enable organizations to capitalize on any investments made in training and management tools.

    How are customer service and technical support?

    Obviously they have a dedicated support team for firewalls in general, unless you get to the bigger enterprise products. That's a different team. We find that whenever we have problems, we can get to somebody within a reasonable period of time.

    Which solution did I use previously and why did I switch?

    We also provide CISCO solutions our clients where it may be a better fit.  The decision on which solutions to use can be influenced by either existing infrastructure and/or the experience and resources the customer may have inhouse.  Additionally, product feature-set and customer needs play the biggest role in determining what is the best fit for the customer.

    How was the initial setup?

    Initial setup is quite straightforward via Sonicwall's GUI.

    What's my experience with pricing, setup cost, and licensing?

    I can't talk about specifics, but purchasing the product is an upfront capital expense for maintenance as well as for the product itself so I can't amortize that down to a monthly or annual figure because the products are also very diverse in price depending on the usage or the package that you get. There are a very broad number of products within the TZ series from the very low end to the medium range. You've got many different models to choose from at different price points. On top of that, you've got the maintenance agreements that are relatively priced based on the product, so that is a variable too. I know that they are very competitive in pricing compared to other solutions on the market.

    What other advice do I have?

    It's worth looking into this solution. It's a very competitive product in terms of pricing, performance and features. It's definitely worth evaluating, especially for small to medium size businesses, branch offices and home. 

    I would rate this solution an eight out of 10. 

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
    SS
    Senior Member Of Technical Staff at Flexera
    Real User
    Reliable solution with low-latency and low-bandwidth utilization

    Pros and Cons

    • "With the main firewall routing there, we can do connectivity point-to-point. On the low bandwidth we can connect in all the branches with my corporate office."
    • "In terms of what needs to be improved, I would say better load balancing and data filtering."

    What is our primary use case?

    It is cloud-based. I am managing it from my HQ to centralize all the branches connected with it, point-to point. I'm using the SonicWall for the gateway. Certainly I'm using it for DLP and antivirus logging, and we are using SonicWall firewall for the mail filtering. Also, we can use SonicWall firewall just like on SD-WAN. We can manage all our branches through that central point from their patches.

    How has it helped my organization?

    We have a centralized firewall here and it will take some bandwidth just like a broadband connection, but with low bandwidth or mobility connection. Through that, we can connect from the HQ to all our branches on those devices, through that particular antennae. All the data transmitted from the corporate office to branch offices works smoothly on the low bandwidth.

    What is most valuable?

    Because it is a software-developed feature in SonicWall, we just maintain the main firewall. With the main firewall routing there, we can do connectivity point-to-point. On the low bandwidth we can connect to all the branches from my corporate office.

    What needs improvement?

    In terms of what needs to be improved, I would say better load balancing and data filtering. This way we have low utilization of the net from the corporate office to all the branches. This is the connectivity there. The traffic from the HQ to all the branches goes on the low latency so that connectivity is continuous and not dropped.

    In the next release it should have both the failure and load balancing combined on there. Whenever there is a failure and whenever they are load balancing, it should auto-generate the traffic for any connectivity on there, so it will run smoothly. It should also generate the alert.

    For how long have I used the solution?

    I have been using SonicWall TZ for the last 10 years. We're using the SD-WAN solution from SonicWall.

    What do I think about the stability of the solution?

    This solution is quite stable.

    What do I think about the scalability of the solution?

    Scalability is more than fine.

    We have around 500 users with connectivity on it.

    We do have plans to increase usage.

    How are customer service and support?

    Technical support is good, there is no issue.

    Which solution did I use previously and why did I switch?

    I am comfortable with them all: SonicWall, Check Point, Palo Alto, Sophos. Right now, I'm using the Sophos 225 and 125 in my offices and have a XG 862 in all the branches connected from there. I work on that firewall installation and also the NetScaler on the Citrix. That's simply fundamental. There are some differences with the connectivity and ruling. The rule tab is the same.

    I work on their Azure AD platform and also Exchange. On the Exchange, I am working on the O365.

    I am also using Trend Micro, Symantec, and McAfee.

    This technology comes with these different platforms and you go on the previous one from a couple years ago. The SD-WAN-only technology is not that common. It costs more from US, Canada and from that area of connectivity. It will drop the packet from there.

    How was the initial setup?

    It has an easy setup. You can centralize all the connectivity. This OS is running with each and everything, and you can monitor it all from the centralized point.

    I also give the support for Exchange, but this will take low bandwidth and low latency from any mobile connectivity, any internet, any low-bandwidth connectivity and work fine. But other products like McAfee and Symantec can support the Exchange.

    It can take time for the synchronization of updating the devices. This depends on how many devices we have connecting from the portal and which devices they are working on. Sometimes, you have the scanning on there. So it will take that functionality and we can define for root causes on the other things. We can define according to policy. So this depends on the policy design. It also depends on that criteria.

    What other advice do I have?

    On a scale of one to 10, I would give SonicWall TZ a nine.

    Which deployment model are you using for this solution?

    Public Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    PD
    Director at VULPINE SOFTWARE PVT LTD
    Reseller
    Stable with good threat prevention and an easy initial setup

    Pros and Cons

    • "The best thing about the product is the very good threat prevention output."
    • "The dashboard needs to be improved."

    What is our primary use case?

    We primarily use the solution for its firewall capabilities.

    What is most valuable?

    The best thing about the product is the very good threat prevention output.

    What needs improvement?

    The dashboard needs to be improved.

    They can work on the GUI part of the solution. Currently, it is a little bit complicated as compared to other competitors.

    Each uplink is quite a big and complicated sort of tool. Other products, like Checkpoint, are so-so, however, they are better. Fortinet is a good example of one that is very good and easy to use.

    For how long have I used the solution?

    I've been working with the solution for four to five years.

    What do I think about the stability of the solution?

    The stability is excellent. We find it to be reliable. We haven't had any issues at all.

    What do I think about the scalability of the solution?

    We consider growing the solution based on the company's needs. We work with different sizes of organizations. We try to project out what a company will need, not tomorrow, but three years down the line, and build for that on day one.

    We do this due to the fact that it's not exactly scalable. We build it bigger so organizations can grow into the solution quite a bit. Users are restricted by the model of the firewall, so if you choose something that's too small, it won't be able to meet your needs and you'll have to start over and trade up to a bigger model.

    If a TZ series can handle 500 users, and a company currently has 200 users, they'll be able to scale up, technically speaking, to about 300 more users before they hit their threshold.

    Basically, the scalability is not infinite. It's quite limited to the capacity of the model itself.

    How are customer service and technical support?

    We've never dealt with technical support. We've managed to handle any issues ourselves, in-house. I can't speak to the kind of service they provide.

    Which solution did I use previously and why did I switch?

    I also have experience with Sophos XG.

    I find that there aren't too many differences between firewalls, as everyone has the same platform and goals.

    How was the initial setup?

    The initial setup is not complex. It's very straightforward. We found it to be quite easy.

    It may take a while to deploy the solution, at least here in Haiti. It will take longer than a few hours. Depending on the client, it can take anywhere from a day or two to up to ten or 15 days.

    It's all dependent on the customer side. What will define the length of time will be is the mobile policy they want to implement on the firewall. That depends on the customer.

    You only need one person to deploy and maintain the solution.

    What about the implementation team?

    We're resellers. We handle the implementation for our clients.

    What other advice do I have?

    We use this solution ourselves, however, we also deploy it for our clients. We're resellers.

    We're using the latest version of the solution.

    I don't know if I have specific advice, as each customer is different and has different needs in terms of security. It depends on their policies and how they want to implement them. There are almost endless amounts of policies that can be added to the solution.

    I'd rate the solution nine out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
    RH
    President at a tech services company with 1-10 employees
    Reseller
    Top 20
    Effective unified threat management, stable, and intuitive setup

    Pros and Cons

    • "The most valuable features are unified threat management which provides security intelligence and the VPN for both site-to-site and remote access."
    • "In an upcoming release, SonicWall could improve by adding cloud management for all devices for free or at a nominal cost. Currently, they have a cloud management platform but is not free. We have the MySonicWall portal for purchasing from them for software updates and renewals."

    What is our primary use case?

    We primarily use SonicWall TZ as an internet gateway for a lot of our small to medium-sized clients' sites.

    What is most valuable?

    The most valuable features are unified threat management which provides security intelligence and the VPN for both site-to-site and remote access.

    What needs improvement?

    We are not receiving the rated throughput that the solution claims. We have noticed our client's internet bandwidth has increased but we are not receiving the throughput that the device is sized for. For example, if I have a device that is rated to handle 400 megabits of throughput, we are not receiving that speed. We are receiving significantly less than that in some cases, this needs to be improved. I do not know if this is still the case with the latest generation of SonicWall's, but we have sixth-generation SonicWall's in use and we are not receiving the rated bandwidth.

    We have built a host secondary DNS directly on the firewall. For example, If you have a small business environment where you only have one server or you have a remote office location where you do not have any servers, you could use a VPN back to the main office and rely on the internal DNS server. However, you will have no redundancy for DNS. There are two choices, we can either use a public DNS service, which is a mistake because it will not know where the information is on the local network. The active directory is not going to work properly if the resources you want cannot be found. You end up picking between two poor options. You either have no redundancy for DNS or you have redundant DNS where one of them is not the best quality. The whole industry is lacking an alternative. I would like to be able to host a secondary DNS on a firewall appliance, many people need this feature.

    In an upcoming release, SonicWall could improve by adding cloud management for all devices for free or at a nominal cost. Currently, they have a cloud management platform but is not free. We have the MySonicWall portal for purchasing from them for software updates and renewals.

    For how long have I used the solution?

    I have been using SonicWall TZ for approximately 14 years.

    What do I think about the stability of the solution?

    SonicWall TZ is very stable. We rarely have to reboot the platform.

    What do I think about the scalability of the solution?

    We have not needed to scale the solution very much, our clients are typically small to medium business environments where we do not need the scalability. However, The scalability could improve because there is not a centralized device manager.

    How are customer service and technical support?

    The technical support is good. However, there is a language barrier because their support is based out of India and you cannot always understand the agent that you are speaking with. Sometimes support is outstanding, and other times you do not have the level of technical expertise that you need.

    How was the initial setup?

    The solution is easy to do the setup and is intuitive.

    What about the implementation team?

    To implement and do the maintenance of SonicWall TZ we do not need a dedicated team.

    What's my experience with pricing, setup cost, and licensing?

    You need to purchase multiple licenses to manage multiple devices which is cost-prohibitive for the value you would receive.

    What other advice do I have?

    I rate SonicWall TZ an eight out of ten.

    Disclosure: My company has a business relationship with this vendor other than being a customer:
    Flag as inappropriate
    Enrique PerezAfonso
    Business cybersecurity Specialist at Forlopd
    Real User
    Modern and clear interface for ease of use at all scales

    Pros and Cons

    • "The feature with SonicWall that I have found most valuable is that all the models have the same interface. We don't need to learn different interfaces in the smaller or bigger models."
    • "You need to be a certificate holder to set it up and configure it. It's really important because it looks easy, but it is complex. You need to have the knowledge and experience. But this is normal for technical products. It's not a product for regular user. It's for technical people. You need to have skills."

    What is our primary use case?

    Our use case is that our email and CRM are in the cloud but the rest of the solution is here on our old server on premise. That includes file sharing and internal programs, too. We have some kind of replication of the cloud on premise to use in case of problems.

    What is most valuable?

    The feature with SonicWall that I have found most valuable is that all the models have the same interface. We don't need to learn different interfaces in the smaller or bigger models. The other thing is the actualization and upgrade politic are really strong, really good, very high quality. Lastly, the performance and the price are excellent.

    I am really happy with the product. The new interface is really modern and really clear. The 7th generation is a really big improvement.

    It has a very good design.

    What needs improvement?

    In terms of what could be improved. That is a very good question. Maybe the price could be lower. That is the only thing. Otherwise, it is really a very good product with really good performance. The only thing is maybe to lower the price a little bit - but it's not a complaint. I don't have complaints with SonicWall.

    SonicWall is really a very complete product.

    For how long have I used the solution?

    I have been using SonicWall TZ for five or six years.

    What do I think about the stability of the solution?

    SoinciWall TZ is really very stable.

    What do I think about the scalability of the solution?

    Their scalability is wonderful. SonicWall has a migration table and it's easy to migrate the configuration of a small model to medium or all types. It's really easy. No problem. I have done this a few times and each time was perfect.

    We have almost 100 users.

    One person is enough for doing maintenance on SonicWall.

    We do have plans to increase usage to more or less 10 or 20% more users next year.

    How are customer service and support?

    The support is excellent

    Which solution did I use previously and why did I switch?

    Previous to being introduced to SonicWall, I used Softforce.

    How was the initial setup?

    The initial deployment is easy. Even in the case when a client has a particularly exotic configuration - the support is quick, fast, and very professional.

    How long the deployment takes depends. Normally, the delays are the fault of the misinformation we receive from a client. Or misunderstanding the information the client provided us before we did the setup of the firewall. Normally it's not a problem with SonicWall.

    What's my experience with pricing, setup cost, and licensing?

    We pay yearly or bi-yearly. Normally we offer the license for two or three years. But it's common to buy the license year by year.

    What other advice do I have?

    My only recommendation is that you need to be a certificate holder to set it up and configure it. It's really important because it looks easy, but it is complex. You need to have the knowledge and experience. But this is normal for technical products. It is not a product for the regular user. It's for technical people. You need to have skills.

    As a customer and a reseller, we feel they are doing a really good job.

    On a scale of one to ten, I would give SonictWall TZ obviously a 10.

    Which deployment model are you using for this solution?

    Hybrid Cloud
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    Flag as inappropriate
    Product Categories
    Firewalls
    Buyer's Guide
    Download our free SonicWall TZ Report and get advice and tips from experienced pros sharing their opinions.