Overall Satisfaction with WatchGuard Network Security
Today we use the WatchGuard Network Security solution to perform our network perimeter protection, protection for our users to access the internet, allow a remote secure connection to external users working away [from] the company through the use of SSL VPN, and interconnection between company sites using VPN IPSec with ikev2.
- Ease of deployment
- Better the visibility of security issues
- Better experiencie of users to acess the internet and to access the company remotely
The policy manager tool, a tool used to create the firewall policies and other firewalls configurations like internet links, VPN e, etc every mature e and so easy of use. The function of [downloading] the policy file and [editing] the configurations in offline mode causes more security in [editing] the configurations, [reviewing] them and so after [deploying] to the production in the firewall.
In the decision-making process, it had a strong influence on some aspects. 1. Performance, considering the fact that you can enable all security features including DPI SSL without fully compromising the appliance availability; 2. The centralized management and reporting tools are already included in the licensing; 3. Quantity and level of security features available in licensing.
Do you think WatchGuard Network Security delivers good value for the price?
Are you happy with WatchGuard Network Security's feature set?
Did WatchGuard Network Security live up to sales and marketing promises?
Did implementation of WatchGuard Network Security go as expected?
Would you buy WatchGuard Network Security again?
The WatchGuard Network Security is well suited to * For a distributed Company ( a lot of sites) * Location with a few numbers of people ( the solution has a price very interesting) * Locations have a lot of internet links where is need balance the use by all of them And less appropriated to: * Scenario where is needed a very powerful application control rules * Scenarios where is needed a high efficiency in malware analysis with the use of sand