Firewalls Comparison

Posted on 2002-06-27
Last Modified: 2013-11-16
1] What's the comparison between Checkpoint VPN-1 Enterprise VPN Center versus Watchguard versus CISCO PIX?I need white paper on this matter pls..
Question by:Mariecel_LSI
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
LVL 16

Expert Comment

ID: 7119721
All overpriced and rather crappy - check out astaro [ ]- I guarantee their salespeople will provide you with the "white paper" comparison you desire - if they cannot, I can...


Author Comment

ID: 7121001
I really need the comparison between checkpoint vpn-1 enterprise versus cisco pix versus watchguard..i need the whitepaper as soon as client needs it..tnx..captain
LVL 23

Accepted Solution

Tim Holman earned 100 total points
ID: 7125184
It all depends what the client wants to do and how much they've got to spend.
They're all excellent products, but if you've a particularly complicated or large Enterprise, then Check Point is really the only choice.
I don't think there's a whitepaper as such, but these links may help:
What Is Transaction Monitoring and who needs it?

Synthetic Transaction Monitoring that you need for the day to day, which ensures your business website keeps running optimally, and that there is no downtime to impact your customer experience.


Expert Comment

ID: 7151266
Ummm, and why not OpenBSD? One hole in nearly six years in the default install is a poretty good record, ipsec out of the box. All it needs is a good admin (hell, IIRC there are GUIs for pf rules too).
LVL 16

Expert Comment

ID: 7151676
Just give him his whitepaper - I get the impression he doesn't have much choice.  And I am sad to say I agree with tim (use checkpoint) if those are your only 3 choices, but he is crazy to suggest that they are all "exellent products".


Expert Comment

ID: 7163576
Hmm. Since each and every network is unique, recommending anything is nothing but impossible. In fact, the recommended products are likely not the product of choice, some for a simple lack of quality and self-centered security, others because they deliver substandard performance and quality at exorbitant prices.

Expert Comment

ID: 7203756
I did a google search and read through stuff for about 10 minutes.  There wasn't a lot, but here is a review from last year that covers all three companies.  Granted, it is a little dated, but at least it's something:

I really wouldn't rely on a whitepaper anyway.  The goal should be to purchase something that fits your needs.  To do this, you need to know what your needs are and how each product addresses them.  Then you can make your decision.

Personally, I would recommend calling each vendor and have them explain why their solution is the best and how their solutions address your needs.  Once you spoken with all three, you can compare what they have to say.  You can then go back to them with better questions.  It might also help to post what they say to a board like this one for some input from people who actually use the products.

Who knows, you may get a free lunch out or two of the deal too. =)
LVL 16

Expert Comment

ID: 7205173
Whatever the vendor says over the phone, make them put it in writing - I've seen countless salesdroids lie like dogs about product functionality just to get one more comission (they always pretend later to not have properly undertood the question, or sometimes the technology)...

Once again, if you can influence the decision at all, may I suggest Astaro - I've deployed several of these and they have always outmeasured all the other crap I see out there (in fact, I often have to use Astaro to diagnose problems with remote Ciscos, Checkpoints, Watchguards, etc - see below).  The diagnostic capabilities alone have paid for the licenses many times over - my company has many corporate clients that connect to our network via a variety of methods (our contracts specify that if we engage in network consulting for any of our clients or contractors, we shall invoice them at a rather exhorbitant rate).  Every time anyone has had connectivity issues with our network, not only has it not been our problem, but I have been able to provide explicit diagnostic evidence that usually indicates the exact problem on the remote network (and then we travel directly to "Go", and collect our exhorbitant network consulting fees).  The fact that we can bill people for fixing their networks (which is only a secondary service - we are actually primarily engaged in an entirely, non-computer related business), rather than wasting time diagnosing problems on our own network is enough to sell me on Astaro (and our accountants, as well).



Expert Comment

ID: 9711603
Hey people,

No comment has been added in roughly 1 year, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question
be PAQ'd and pts awarded to tim_holman.
Please leave any comments here within the next seven days.


EE Page Editor

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There is a lot to be said for protecting yourself and your accounts with 2 factor authentication.  I found to my own chagrin, that there is a big downside as well.
In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question