Fortinet FortiGate for advance security features
June 01, 2021

Fortinet FortiGate for advance security features

Vinit Sharma | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Fortinet FortiGate

We are using Fortinet FortiGate in our Remote area locations because it has one of the best features of remote VPN for connecting remote sites to the main branch. Also, they are providing the UTM feature that is giving the best outputs as compared to other firewalls we have in our enviorment. Fortinet FortiGate resolved our Security & remote VPN issues.
  • Real UTM
  • Remote VPN
  • DLP
  • Email filtering as well as content filtering
  • Anti-Spam
  • No advance routing feature available
  • Nating customization options not good as compare to other market available firwall's
  • CLI needs to be more easier for begineers
  • Deep Scaning
  • Data Loss prevention
  • Email filtering
  • Anti-Malware
  • Advance IPS
  • Easy to understand GUI
  • Advance security features in low cost
  • Best Technical Support
  • Easy to understand packet flow
We are previously using Cisco ASA in our environment & always concerned regarding security because ransomware attacks are increasing day by day. After implementing Fortinet FortiGate we are getting a bucket of security features at almost the same cost with the best technical support.

Do you think Fortinet FortiGate delivers good value for the price?

Yes

Are you happy with Fortinet FortiGate's feature set?

Yes

Did Fortinet FortiGate live up to sales and marketing promises?

Yes

Did implementation of Fortinet FortiGate go as expected?

Yes

Would you buy Fortinet FortiGate again?

Yes

Fortinet FortiGate Provides a Deep Scanning feature identifies malicious traffic over network easily & also having advance level of such security feature in a cost-effective manner. It also helps us to content filtering & anti-spam over data.

FortiGate Feature Ratings

Identification Technologies
10
Visualization Tools
9
Content Inspection
9
Policy-based Controls
10
Active Directory and LDAP
8
Firewall Management Console
10
Reporting and Logging
9
VPN
10
High Availability
9
Stateful Inspection
9
Proxy Server
10