WatchGuard security products, GOOD UTM
September 06, 2022

WatchGuard security products, GOOD UTM

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review

Overall Satisfaction with WatchGuard Network Security

We use WatchGuard product to implement security in all our sites, we use VPN site to site and mobile VPN, the ad authentificator, log for dimension and WatchGuard cloud etc... We sell it to companies that mainly don't have security devices with only the ISP box. We can replace old security firewall by WatchGuard too. It is a product that can fit to almost every company that want to improve security and have visibility of their network.
  • LOG
  • VPN
  • Virus detection
  • RANSOMWARE (APT blocker)
  • Easiest log setup (we have to select log on a lot of rules)
  • Better option for the report (not easy to read by a no-IT person)
  • Wifi a bit expensive
  • Big protection of your network
  • Users know that the network is safe
  • Users know that the link they open is loged, so they are aware of weird links...
We work with the French reseller D2B (Paris), they are available and give good advice.
Prepare the ISP box / Access before so you can use dmz or full nat
The licences are easy to manage, we mainly sell total security licence but sometimes basic too and we can select specific functionality if needed.
Vs stormshield : easiest to install and logs are way better to read, easy to debug if the network have an issue / a bit cheaper

Do you think WatchGuard Network Security delivers good value for the price?

Yes

Are you happy with WatchGuard Network Security's feature set?

Yes

Did WatchGuard Network Security live up to sales and marketing promises?

Yes

Did implementation of WatchGuard Network Security go as expected?

Yes

Would you buy WatchGuard Network Security again?

Yes

Very well suited for 1-500 user company, it can fit 99% of network you can find.
Less appropriate when the ISP dont let you manage the internet flow. (no NAT / DMZ etc...)

WatchGuard Network Security Feature Ratings

Identification Technologies
9
Visualization Tools
9
Content Inspection
8
Policy-based Controls
9
Active Directory and LDAP
8
Firewall Management Console
9
Reporting and Logging
8
VPN
9
High Availability
9
Stateful Inspection
9
Proxy Server
8