A Cost effective Firewall to All sized company- Fortinet FortiGate
June 21, 2021

A Cost effective Firewall to All sized company- Fortinet FortiGate

Binita Kharbanda | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User

Overall Satisfaction with Fortinet FortiGate

Fortinet's FortiGate solution is being used in my organization and we are able to achieve the security with this cost efficient firewall. It comes with powerful technologies to secure the infra from known and unknown both attack types. On the top of that, it has an user friendly user interface where policy creation is easy and we can select the security profiles per rules.
  • IPS
  • Remote VPN (Forti VPN)
  • Advanced Malware protection
  • Logs
  • Cost effective
  • CLI Commands
  • Documentations
  • High Availability
  • Content filtering
  • IPS, Anti-Virus
  • Advanced Malware Protection
  • FortiView
  • Throughput and scalability
  • Logs and Monitoring
  • Comprehensive Prevention Security
  • Traffic Visibility and Control
  • CLI mode complexity
[Fortinet] FortiGate is not only cost effective but it gives the comprehensive security against the APT attacks and gives the complete traffic visibility and granular control. You can easily create the VDOMs (Virtual firewall) within a Fortigate firewall and customize the dashboard as per your requirement if you have multiple VDOMs within a single firewall.

Do you think Fortinet FortiGate delivers good value for the price?


Are you happy with Fortinet FortiGate's feature set?


Did Fortinet FortiGate live up to sales and marketing promises?


Did implementation of Fortinet FortiGate go as expected?


Would you buy Fortinet FortiGate again?


Fortinet's Fortigate is a Firewall which can be suited to all the types of organizations starting from Small/ mid size to Large enterprises. Due to its cost effectiveness even a Small organizations can afford it. In the return Fortigate will give you the industry best technology to secure your organization infra.

FortiGate Feature Ratings

Identification Technologies
Visualization Tools
Content Inspection
Policy-based Controls
Active Directory and LDAP
Firewall Management Console
Reporting and Logging
High Availability
Stateful Inspection