Solved

Palo Alto vs Fortinet

Posted on 2011-09-16
1
2,082 Views
Last Modified: 2012-08-14
Hello,

Wanted to ask the community for some of their input. I am currently looking at the Foritnet 200B (http://www.fortinet.com/products/fortigate/200B.html) and the Palo Alto PA500 (http://www.paloaltonetworks.com/products/platforms/pa-500.html)

Currently I use Forto but Palo Alto has caught our eye as we are looking to upgrade

Anyone for or against either of these products? Thank you

I understand the Palo Alto is considerdly more expensive



0
Comment
Question by:skyjumperdude
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 18

Accepted Solution

by:
Garry Glendown earned 500 total points
ID: 36550371
Maybe if you elaborated a bit on your requirements a bit? What features of the PA are you currently using, what throughput of stuff like content filtering/IDS do you need, etc. ...
The Fortinet boxes are pretty good value for the money, but not having used them before, calculate in some time to learn ... or get a good provider/partner to at least get the whole system set up and running to get you started ...
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

There is a question posted at http://www.experts-exchange.com/OS/Microsoft_Operating_Systems/Server/Windows_Server_2008/Q_28324159.html (http://www.experts-exchange.com/OS/Microsoft_Operating_Systems/Server/Windows_Server_2008/Q_28324159.html) and i…
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question