Solved

Palo Alto vs Fortinet

Posted on 2011-09-16
1
2,065 Views
Last Modified: 2012-08-14
Hello,

Wanted to ask the community for some of their input. I am currently looking at the Foritnet 200B (http://www.fortinet.com/products/fortigate/200B.html) and the Palo Alto PA500 (http://www.paloaltonetworks.com/products/platforms/pa-500.html)

Currently I use Forto but Palo Alto has caught our eye as we are looking to upgrade

Anyone for or against either of these products? Thank you

I understand the Palo Alto is considerdly more expensive



0
Comment
Question by:skyjumperdude
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 18

Accepted Solution

by:
Garry-G earned 500 total points
ID: 36550371
Maybe if you elaborated a bit on your requirements a bit? What features of the PA are you currently using, what throughput of stuff like content filtering/IDS do you need, etc. ...
The Fortinet boxes are pretty good value for the money, but not having used them before, calculate in some time to learn ... or get a good provider/partner to at least get the whole system set up and running to get you started ...
0

Featured Post

Portable, direct connect server access

The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A few customers have recently asked my thoughts on Password Managers.  As Security is a big part of our industry I was initially very hesitant and sceptical about giving a program all of my secret passwords.  But as I was getting asked about them mo…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

735 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question