Top Enterprise Firewalls – 2015 Edition

For any corporation, firewalls are network security systems that control as well as monitor all incoming and outgoing network traffic. Firewalls have long provided the first line of defense in network security infrastructures by comparing corporate policies about users’ network access rights to the connection information surrounding each access attempt. User policies and connection information must match up, or the firewall does not grant access to network resources; this helps avert break-ins. The rise of internal threats has come about by the emergence of new network perimeters that have formed inside the corporate LAN, thus increasing the importance firewalls.

Here at IT Central Station, we offer a crowdsourced platform that allows real users to share their opinions about tech products with the rest of the enterprise tech community. We have compiled over 85,000 views of the top Firewalls by real users in 2014 and Q1 2015 and analyzed their trends in the infographic below. All of our data is based on actual behavior of real users researching and comparing vendors on IT Central Station.

firewalls-ver2

If you have any questions regarding our research or would like to read our reviews, please visit our IT Firewalls category page on IT Central Station at http://www.itcentralstation.com/category/firewalls.

View our infographic on IT Central Station.

Review Roundup: Talking about Firewalls

This week’s review roundup is dedicated to a topic that you could say is catching on like wildfire…Firewalls. Many of our community members have recently been writing reviews about the Firewall solutions they are using – here is a selection of great user content:Fire_from_brazier

FireEye – “I like the ability to detect zero day attacks, APT’s, and other types of malware which almost every other security device in the world is unable to detect. Improvements to My Organization: One of the projects where we were deploying was a POC. When it was tested, it detected one of the world’s most dangerous APTs, like KABA, that was specially designed to target the telecommunication industry. This was one of the many thousands of findings that we were proud of.” Read the full review here.

Another user wrote the following about Sourcefire: “Alright, let’s end on a high note. Apart from those four things, the Cisco ASA with FirePOWER Services solution works well, provides great insight, applies Advanced Malware Protection strongly, and shuts down a ton of illegitimate connections before they can attACK ;). If you’re looking to get your feet wet, and if SSL inspection isn’t critical, I recommend giving FirePOWER a shot.” Read the full review here.

Another real user recently wrote about Fortinet FortiGate. He wrote: “Valuable features include: Active Directory integration, QO, Balance/Fail-over, Web filtering and protection with AV engine and WiFi network for visitors isolated from our corporate WiFi network using only one unit. Improvements to My Organization: After the implementation we stopped internet disruptions and abuse by users. Room for Improvement: Everything needs to be improved, but they have improvements with each new version.” Read this full review here. 

Lastly, check out this recent review about Palo Alto Networks WildFire: “User identification and the Applipedia are the most useful. The integration of the Applipedia with the application identification at layer seven makes it a very comprehensive, and secure, firewall. Improvements to My Organization: We have the ability to see what traffic is coming and going in a much deeper and more detailed fashion. We have also found, and stopped, several malware applications before they infected the endpoints. The product is straightforward to implement, though if you are looking for a quick implementation, I would suggest bringing in an expert.” Read the full review here.

You can check out these Firewall reviews and more – as well as see a side-by-side comparison!