Solved

Fortigate fire wall vs sonicwall

Posted on 2012-03-14
3
759 Views
Last Modified: 2012-06-11
I'm looping to replace my firewall. Thé proposition is for a sonicwall nsa 2400. I found good comment on internet about fortigate. What model i can compare to sonicwall 2400? Some personne have good experience with sonicwall or fortigate?

Thank

John grenon
0
Comment
Question by:jeansebgrenon
3 Comments
 
LVL 11

Accepted Solution

by:
diprajbasu earned 500 total points
ID: 37724476
sonicwall av and ips engine has not been proven by 3rd party analysis to detect the most and current viruses and attacks.
where as fortinet antivirus and antispyware engine is always validate industry authorizes 3rd party like ICSA and VB100.not only that fortinet's UTM and IPS approach has been validate by NSS labs.

there are some other differences also...if you require i can provide.
0
 

Author Comment

by:jeansebgrenon
ID: 37732629
@diprajbasu

Think for information. I have requiest for both. The price is very different! Fortigate is most expensive.

My organisation is a non-profit organisation and my budget is limited. I need a  firewall with a good protection, and VPN for windows, Mac lion, iPad and iPhone. I do static nat for my server. I want to have ability to autorize or not some web site. I dont have email server locally.
0
 
LVL 4

Expert Comment

by:senseifedon
ID: 37839521
Hi;
We are using sonicwall at my university. Model is Sonicwall NSA E7500. It's the best price and work I have ever seen. Gateway antivirus, IPS, L7 firewall, Content filter, Client antivirus, vpn... Very cheap and usefull.
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When posting a question about a Cisco ASA, Cisco Router or Cisco Switch, it can aid diagnosis if a suitably sanitised copy of the config is provided. It is much better to leave as much of the configuration as original as possible, as it could be tha…
Before I go to far, let's explain HA (High Availability) and why you should consider it.  High availability is the mechanism used to provide redundancy to any service at the same site and appears as a single service to the users of that service.  As…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now