Easy to use product to provide central network management
October 26, 2022

Easy to use product to provide central network management

Anonymous | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Azure Firewall Manager

Managed multiple sites and their connections into Azure to link multiple regions. It solved the need for having multiple places to visit to setup / troubleshoot network and firewall issues. Gave us DDOS protection and the ability to implement web application firewalls. Gave one dashboard to view and controll all the network
  • Central Azure Firewall management
  • Automate traffic routing
  • Third Party support
  • Bulk IP address fails, requires you to split it up smaller
  • Firewall Rules dont always have good descriptions
  • No Traffic Splitting
  • Reduced time required to manage multiple products
  • Increased network visability
  • Good logs for audits
Cloud based products so no need to run another virtual / physical appliance on site, good support via microsoft and with 3rd party plugin is easy to customize to your unique use case. Gives a very wide view of the whole network. No need to worry about updates / upgrading software versions.

Do you think Azure Firewall Manager delivers good value for the price?

Yes

Are you happy with Azure Firewall Manager's feature set?

Yes

Did Azure Firewall Manager live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Azure Firewall Manager go as expected?

Yes

Would you buy Azure Firewall Manager again?

Yes

Suited for deploys that are fully committed to moving everything into azure, works well for a cloud first approach. Gives an easy to use interface instead of having to learn multiple firewall cli languages Less suitable when you only have a small azure presence or are working with multiple different vpn endpoints

Azure Firewall Manager Feature Ratings

Policy planning and rule management
5
Automated Policy Orchestration
8
Device Discovery
4
Policy Compliance Auditing
9
Attack Path Simulation Testing
9
Anomalous Event or Behavior Deviation
8
Vulnerability Scans
4
Firewall Rule Cleanup
8