The best IT Security Solution
May 18, 2023

The best IT Security Solution

José Manuel Díaz | TrustRadius Reviewer
Score 10 out of 10
Vetted Review

Modules Used

  • WatchGuard Network Security

Overall Satisfaction with WatchGuard Network Security

We use Watchguard Network Security to proactively control and monitor all traffic between our headquarters and the internet. This allows us to detect possible IT security incidents and act accordingly. In the same way it is used by all our clients, with very fabulous results in the protection of their infrastructure.
  • Monitoring
  • Detection
  • Prevention
  • Alerts
  • Reports
  • GUI
  • Cross Selling
  • Up Selling
  • High Aceptance
We are Watchguard Partners and all our clients are very satisfied with Watchguard's IT Security occlusions, both EndPoint and Perimeter, Wifi and MFA.
We offer our clients a professional and highly personalized service, which is why acceptance is very high.
We believe that it is one of Watchguard's differential values, which it must continue to promote and improve.
The impact of the Watchguard Cloud solution has been decisive.
We believe that it is the differentiating detail

Do you think WatchGuard Network Security delivers good value for the price?

Yes

Are you happy with WatchGuard Network Security's feature set?

Yes

Did WatchGuard Network Security live up to sales and marketing promises?

Yes

Did implementation of WatchGuard Network Security go as expected?

Yes

Would you buy WatchGuard Network Security again?

Yes

WatchGuard Network Security adapts well in distributed network scenarios, since its BOVPN solution is very stable, and also in those cases in which the client needs cloud monitoring and management of their IT infrastructure.
And it does not adapt well when the client needs to manage multiple networks (Internal and/or external), since only few appliances allow expansion of ports.

WatchGuard Network Security Feature Ratings

Identification Technologies
10
Visualization Tools
10
Content Inspection
8
Policy-based Controls
10
Active Directory and LDAP
9
Firewall Management Console
9
Reporting and Logging
9
VPN
10
High Availability
10
Stateful Inspection
8
Proxy Server
9