Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Palo Alto vs Fortinet

Posted on 2011-09-16
1
Medium Priority
?
2,199 Views
Last Modified: 2012-08-14
Hello,

Wanted to ask the community for some of their input. I am currently looking at the Foritnet 200B (http://www.fortinet.com/products/fortigate/200B.html) and the Palo Alto PA500 (http://www.paloaltonetworks.com/products/platforms/pa-500.html)

Currently I use Forto but Palo Alto has caught our eye as we are looking to upgrade

Anyone for or against either of these products? Thank you

I understand the Palo Alto is considerdly more expensive



0
Comment
Question by:skyjumperdude
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 18

Accepted Solution

by:
Garry Glendown earned 2000 total points
ID: 36550371
Maybe if you elaborated a bit on your requirements a bit? What features of the PA are you currently using, what throughput of stuff like content filtering/IDS do you need, etc. ...
The Fortinet boxes are pretty good value for the money, but not having used them before, calculate in some time to learn ... or get a good provider/partner to at least get the whole system set up and running to get you started ...
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Read about achieving the basic levels of HRIS security in the workplace.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question