Introducing G2.ai, the future of software buying.Try now

Best Unified Threat Management Software

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Unified threat management software and hardware provide dynamic firewalls that can provide other security services such as VPNs and malware detection.

To qualify for inclusion in the Unified Threat Management category, a product must:

Provide firewall capabilities to protect networks and data
Integrate with hardware
Offer other security tools such as a VPN or malware detection

Best Unified Threat Management Software At A Glance

Highest Performer:
Easiest to Use:
Best Free Software:
Top Trending:
Show LessShow More
Easiest to Use:
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
33 Listings in Unified Threat Management (UTM) Available
(458)4.5 out of 5
2nd Easiest To Use in Unified Threat Management (UTM) software
View top Consulting Services for Check Point Next Generation Firewalls (NGFWs)
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Offered via the Check Point Infinity architecture, Check Point’s NGFW includes 23 Firewall models optimized for running all threat prevention technologies simultaneously, including full SSL traffic in

    Users
    • Network Security Engineer
    • Network Engineer
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 47% Enterprise
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point Next Generation Firewalls (NGFWs) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    35
    Features
    35
    Network Security
    34
    Threat Protection
    34
    Threat Detection
    31
    Cons
    Expensive
    26
    Slow Performance
    17
    Complexity
    16
    Complex Configuration
    12
    Complex Setup
    12
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Next Generation Firewalls (NGFWs) features and usability ratings that predict user satisfaction
    8.9
    Whitelists
    Average: 8.5
    9.0
    Web Filtering
    Average: 8.8
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    9.0
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Offered via the Check Point Infinity architecture, Check Point’s NGFW includes 23 Firewall models optimized for running all threat prevention technologies simultaneously, including full SSL traffic in

Users
  • Network Security Engineer
  • Network Engineer
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 47% Enterprise
  • 41% Mid-Market
Check Point Next Generation Firewalls (NGFWs) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
35
Features
35
Network Security
34
Threat Protection
34
Threat Detection
31
Cons
Expensive
26
Slow Performance
17
Complexity
16
Complex Configuration
12
Complex Setup
12
Check Point Next Generation Firewalls (NGFWs) features and usability ratings that predict user satisfaction
8.9
Whitelists
Average: 8.5
9.0
Web Filtering
Average: 8.8
8.9
Has the product been a good partner in doing business?
Average: 8.8
9.0
Content Filtering
Average: 8.4
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(180)4.7 out of 5
3rd Easiest To Use in Unified Threat Management (UTM) software
View top Consulting Services for FortiGate NGFW
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

    Users
    • Network Engineer
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 64% Mid-Market
    • 21% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • FortiGate NGFW Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    16
    Features
    12
    Security
    11
    Security Protection
    7
    Customer Support
    6
    Cons
    Update Issues
    5
    Slow Performance
    4
    Upgrade Issues
    4
    Limited Features
    3
    Pricing Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FortiGate NGFW features and usability ratings that predict user satisfaction
    9.4
    Whitelists
    Average: 8.5
    9.7
    Web Filtering
    Average: 8.8
    9.0
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortinet
    Year Founded
    2000
    HQ Location
    Sunnyvale, CA
    Twitter
    @Fortinet
    151,611 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14,832 employees on LinkedIn®
    Ownership
    NASDAQ: FTNT
Product Description
How are these determined?Information
This description is provided by the seller.

FortiGate offers a network security platform, designed to deliver threat protection and performance with reduced complexity.

Users
  • Network Engineer
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 64% Mid-Market
  • 21% Enterprise
FortiGate NGFW Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
16
Features
12
Security
11
Security Protection
7
Customer Support
6
Cons
Update Issues
5
Slow Performance
4
Upgrade Issues
4
Limited Features
3
Pricing Issues
3
FortiGate NGFW features and usability ratings that predict user satisfaction
9.4
Whitelists
Average: 8.5
9.7
Web Filtering
Average: 8.8
9.0
Has the product been a good partner in doing business?
Average: 8.8
9.3
Content Filtering
Average: 8.4
Seller Details
Seller
Fortinet
Year Founded
2000
HQ Location
Sunnyvale, CA
Twitter
@Fortinet
151,611 Twitter followers
LinkedIn® Page
www.linkedin.com
14,832 employees on LinkedIn®
Ownership
NASDAQ: FTNT

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(194)4.3 out of 5
5th Easiest To Use in Unified Threat Management (UTM) software
View top Consulting Services for Cisco Meraki
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Manage your entire network from a centralized dashboard.

    Users
    • IT Manager
    • Network Engineer
    Industries
    • Information Technology and Services
    • Financial Services
    Market Segment
    • 62% Mid-Market
    • 20% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cisco Meraki Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    8
    Security
    8
    Device Management
    5
    Setup Ease
    5
    User Interface
    5
    Cons
    Expensive
    7
    Limited Compatibility
    3
    Lacking Features
    2
    Limited Customization
    2
    Policy Confusion
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco Meraki features and usability ratings that predict user satisfaction
    9.1
    Whitelists
    Average: 8.5
    8.8
    Web Filtering
    Average: 8.8
    8.6
    Has the product been a good partner in doing business?
    Average: 8.8
    8.8
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

Manage your entire network from a centralized dashboard.

Users
  • IT Manager
  • Network Engineer
Industries
  • Information Technology and Services
  • Financial Services
Market Segment
  • 62% Mid-Market
  • 20% Small-Business
Cisco Meraki Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
8
Security
8
Device Management
5
Setup Ease
5
User Interface
5
Cons
Expensive
7
Limited Compatibility
3
Lacking Features
2
Limited Customization
2
Policy Confusion
2
Cisco Meraki features and usability ratings that predict user satisfaction
9.1
Whitelists
Average: 8.5
8.8
Web Filtering
Average: 8.8
8.6
Has the product been a good partner in doing business?
Average: 8.8
8.8
Content Filtering
Average: 8.4
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(261)4.7 out of 5
Optimized for quick response
4th Easiest To Use in Unified Threat Management (UTM) software
View top Consulting Services for WatchGuard Network Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    For over 20 years, WatchGuard has pioneered cutting-edge cyber security technology and delivered it as easy-to-deploy and easy-to-manage solutions. Our unique approach to network security focuses on b

    Users
    • IT Manager
    • IT Director
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 54% Mid-Market
    • 43% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • WatchGuard Network Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Cybersecurity
    3
    Customer Support
    2
    User Interface
    2
    Configuration Flexibility
    1
    Cons
    Expensive
    2
    Limited Customization
    1
    Limited Features
    1
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • WatchGuard Network Security features and usability ratings that predict user satisfaction
    9.1
    Whitelists
    Average: 8.5
    9.1
    Web Filtering
    Average: 8.8
    9.1
    Has the product been a good partner in doing business?
    Average: 8.8
    9.1
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1996
    HQ Location
    Seatle, WA
    Twitter
    @watchguard
    19,681 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,191 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

For over 20 years, WatchGuard has pioneered cutting-edge cyber security technology and delivered it as easy-to-deploy and easy-to-manage solutions. Our unique approach to network security focuses on b

Users
  • IT Manager
  • IT Director
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 54% Mid-Market
  • 43% Small-Business
WatchGuard Network Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Cybersecurity
3
Customer Support
2
User Interface
2
Configuration Flexibility
1
Cons
Expensive
2
Limited Customization
1
Limited Features
1
Poor Customer Support
1
WatchGuard Network Security features and usability ratings that predict user satisfaction
9.1
Whitelists
Average: 8.5
9.1
Web Filtering
Average: 8.8
9.1
Has the product been a good partner in doing business?
Average: 8.8
9.1
Content Filtering
Average: 8.4
Seller Details
Company Website
Year Founded
1996
HQ Location
Seatle, WA
Twitter
@watchguard
19,681 Twitter followers
LinkedIn® Page
www.linkedin.com
1,191 employees on LinkedIn®
(34)4.3 out of 5
6th Easiest To Use in Unified Threat Management (UTM) software
View top Consulting Services for Cisco ASA 5500-X Series
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The industry's first threat-focused next-generation firewall (NGFW).

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 44% Enterprise
    • 44% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cisco ASA 5500-X Series features and usability ratings that predict user satisfaction
    8.4
    Whitelists
    Average: 8.5
    8.9
    Web Filtering
    Average: 8.8
    9.0
    Has the product been a good partner in doing business?
    Average: 8.8
    8.7
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cisco
    Year Founded
    1984
    HQ Location
    San Jose, CA
    Twitter
    @Cisco
    728,816 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    95,057 employees on LinkedIn®
    Ownership
    NASDAQ:CSCO
Product Description
How are these determined?Information
This description is provided by the seller.

The industry's first threat-focused next-generation firewall (NGFW).

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 44% Enterprise
  • 44% Mid-Market
Cisco ASA 5500-X Series features and usability ratings that predict user satisfaction
8.4
Whitelists
Average: 8.5
8.9
Web Filtering
Average: 8.8
9.0
Has the product been a good partner in doing business?
Average: 8.8
8.7
Content Filtering
Average: 8.4
Seller Details
Seller
Cisco
Year Founded
1984
HQ Location
San Jose, CA
Twitter
@Cisco
728,816 Twitter followers
LinkedIn® Page
www.linkedin.com
95,057 employees on LinkedIn®
Ownership
NASDAQ:CSCO
(148)4.1 out of 5
9th Easiest To Use in Unified Threat Management (UTM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SonicWall real-time breach detection and prevention solutions protect more than one million networks worldwide

    Users
    • Network Engineer
    • IT Manager
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 61% Mid-Market
    • 30% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SonicWall Next Generation Firewall Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    4
    Features
    3
    Ease of Implementation
    2
    Free Licensing
    2
    Network Connectivity
    2
    Cons
    Poor Customer Support
    4
    Expensive
    2
    Slow Performance
    2
    Complex Configuration
    1
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SonicWall Next Generation Firewall features and usability ratings that predict user satisfaction
    8.7
    Whitelists
    Average: 8.5
    9.0
    Web Filtering
    Average: 8.8
    8.1
    Has the product been a good partner in doing business?
    Average: 8.8
    8.7
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SonicWall
    Year Founded
    1991
    HQ Location
    Milpitas, CA
    Twitter
    @SonicWall
    29,682 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,997 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SonicWall real-time breach detection and prevention solutions protect more than one million networks worldwide

Users
  • Network Engineer
  • IT Manager
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 61% Mid-Market
  • 30% Small-Business
SonicWall Next Generation Firewall Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
4
Features
3
Ease of Implementation
2
Free Licensing
2
Network Connectivity
2
Cons
Poor Customer Support
4
Expensive
2
Slow Performance
2
Complex Configuration
1
Complexity
1
SonicWall Next Generation Firewall features and usability ratings that predict user satisfaction
8.7
Whitelists
Average: 8.5
9.0
Web Filtering
Average: 8.8
8.1
Has the product been a good partner in doing business?
Average: 8.8
8.7
Content Filtering
Average: 8.4
Seller Details
Seller
SonicWall
Year Founded
1991
HQ Location
Milpitas, CA
Twitter
@SonicWall
29,682 Twitter followers
LinkedIn® Page
www.linkedin.com
1,997 employees on LinkedIn®
(88)4.1 out of 5
10th Easiest To Use in Unified Threat Management (UTM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The global network of highly skilled researchers and analysts, protecting businesses from known and emerging malware - viruses, rootkits and spyware.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 60% Mid-Market
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sophos United Threat Management features and usability ratings that predict user satisfaction
    7.9
    Whitelists
    Average: 8.5
    8.1
    Web Filtering
    Average: 8.8
    8.5
    Has the product been a good partner in doing business?
    Average: 8.8
    7.8
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,757 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,926 employees on LinkedIn®
    Ownership
    LSE:SOPH
Product Description
How are these determined?Information
This description is provided by the seller.

The global network of highly skilled researchers and analysts, protecting businesses from known and emerging malware - viruses, rootkits and spyware.

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 60% Mid-Market
  • 25% Small-Business
Sophos United Threat Management features and usability ratings that predict user satisfaction
7.9
Whitelists
Average: 8.5
8.1
Web Filtering
Average: 8.8
8.5
Has the product been a good partner in doing business?
Average: 8.8
7.8
Content Filtering
Average: 8.4
Seller Details
Seller
Sophos
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,757 Twitter followers
LinkedIn® Page
www.linkedin.com
4,926 employees on LinkedIn®
Ownership
LSE:SOPH
(45)4.5 out of 5
8th Easiest To Use in Unified Threat Management (UTM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations an

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 53% Mid-Market
    • 18% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Barracuda CloudGen Firewall Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Deployment Ease
    3
    Centralized Management
    2
    Ease of Management
    2
    Ease of Use
    2
    Firewall Efficiency
    2
    Cons
    Complex Configuration
    1
    Difficult Learning Curve
    1
    Lack of Interfaces
    1
    Poor Interface Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Barracuda CloudGen Firewall features and usability ratings that predict user satisfaction
    7.9
    Whitelists
    Average: 8.5
    8.3
    Web Filtering
    Average: 8.8
    9.4
    Has the product been a good partner in doing business?
    Average: 8.8
    7.7
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Barracuda
    Year Founded
    2002
    HQ Location
    Campbell, CA
    Twitter
    @Barracuda
    15,550 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,135 employees on LinkedIn®
    Ownership
    Private
Product Description
How are these determined?Information
This description is provided by the seller.

Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations an

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 53% Mid-Market
  • 18% Small-Business
Barracuda CloudGen Firewall Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Deployment Ease
3
Centralized Management
2
Ease of Management
2
Ease of Use
2
Firewall Efficiency
2
Cons
Complex Configuration
1
Difficult Learning Curve
1
Lack of Interfaces
1
Poor Interface Design
1
Barracuda CloudGen Firewall features and usability ratings that predict user satisfaction
7.9
Whitelists
Average: 8.5
8.3
Web Filtering
Average: 8.8
9.4
Has the product been a good partner in doing business?
Average: 8.8
7.7
Content Filtering
Average: 8.4
Seller Details
Seller
Barracuda
Year Founded
2002
HQ Location
Campbell, CA
Twitter
@Barracuda
15,550 Twitter followers
LinkedIn® Page
www.linkedin.com
2,135 employees on LinkedIn®
Ownership
Private
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Huawei Enterprise is a leading global ICT solutions provider.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 80% Mid-Market
    • 13% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Huawei Firewall features and usability ratings that predict user satisfaction
    9.4
    Whitelists
    Average: 8.5
    9.4
    Web Filtering
    Average: 8.8
    9.2
    Has the product been a good partner in doing business?
    Average: 8.8
    9.6
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1987
    HQ Location
    Shenzhen, China
    Twitter
    @HuaweiEnt
    419,084 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    140,945 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Huawei Enterprise is a leading global ICT solutions provider.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 80% Mid-Market
  • 13% Enterprise
Huawei Firewall features and usability ratings that predict user satisfaction
9.4
Whitelists
Average: 8.5
9.4
Web Filtering
Average: 8.8
9.2
Has the product been a good partner in doing business?
Average: 8.8
9.6
Content Filtering
Average: 8.4
Seller Details
Year Founded
1987
HQ Location
Shenzhen, China
Twitter
@HuaweiEnt
419,084 Twitter followers
LinkedIn® Page
www.linkedin.com
140,945 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Our security solution provides fine-grained access comtrol that identifies, mitigates, and fully reports on the sophisticated security threats of the moment

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 43% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Juniper Firewall Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Features
    1
    Firewall Efficiency
    1
    Network Security
    1
    Reliability
    1
    Cons
    Lack of Features
    1
    Poor Interface Design
    1
    Poor Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Juniper Firewall features and usability ratings that predict user satisfaction
    7.9
    Whitelists
    Average: 8.5
    7.9
    Web Filtering
    Average: 8.8
    8.6
    Has the product been a good partner in doing business?
    Average: 8.8
    7.5
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1996
    HQ Location
    Sunnyvale, CA
    Twitter
    @JuniperNetworks
    105,379 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11,845 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Our security solution provides fine-grained access comtrol that identifies, mitigates, and fully reports on the sophisticated security threats of the moment

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 43% Enterprise
  • 40% Mid-Market
Juniper Firewall Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Features
1
Firewall Efficiency
1
Network Security
1
Reliability
1
Cons
Lack of Features
1
Poor Interface Design
1
Poor Management
1
Juniper Firewall features and usability ratings that predict user satisfaction
7.9
Whitelists
Average: 8.5
7.9
Web Filtering
Average: 8.8
8.6
Has the product been a good partner in doing business?
Average: 8.8
7.5
Content Filtering
Average: 8.4
Seller Details
Year Founded
1996
HQ Location
Sunnyvale, CA
Twitter
@JuniperNetworks
105,379 Twitter followers
LinkedIn® Page
www.linkedin.com
11,845 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Capsule is one seamless solution that addresses all your mobile security needs. Capsule protects your mobile devices from threats, provides a secure business environment for mobile device

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 53% Enterprise
    • 26% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point Capsule Mobile Secure Workspace features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.3
    Has the product been a good partner in doing business?
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Capsule is one seamless solution that addresses all your mobile security needs. Capsule protects your mobile devices from threats, provides a secure business environment for mobile device

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 53% Enterprise
  • 26% Mid-Market
Check Point Capsule Mobile Secure Workspace features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.3
Has the product been a good partner in doing business?
Average: 8.8
0.0
No information available
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
(26)4.8 out of 5
1st Easiest To Use in Unified Threat Management (UTM) software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    threatER is a comprehensive cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale. threatER offers a wide range o

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 62% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Threater features and usability ratings that predict user satisfaction
    9.4
    Whitelists
    Average: 8.5
    9.2
    Web Filtering
    Average: 8.8
    9.6
    Has the product been a good partner in doing business?
    Average: 8.8
    10.0
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Threater
    HQ Location
    Tysons, Virginia
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

threatER is a comprehensive cybersecurity platform that provides active network defense by automating the discovery, enforcement, and analysis of cyber threats at scale. threatER offers a wide range o

Users
No information available
Industries
No information available
Market Segment
  • 62% Mid-Market
  • 27% Enterprise
Threater features and usability ratings that predict user satisfaction
9.4
Whitelists
Average: 8.5
9.2
Web Filtering
Average: 8.8
9.6
Has the product been a good partner in doing business?
Average: 8.8
10.0
Content Filtering
Average: 8.4
Seller Details
Seller
Threater
HQ Location
Tysons, Virginia
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
(25)4.6 out of 5
7th Easiest To Use in Unified Threat Management (UTM) software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    State-of-the-art server security with an all-in-one platform BitNinja offers an advanced server security solution with a proactive and unified system designed to effectively defend against a wide ran

    Users
    No information available
    Industries
    • Information Technology and Services
    • Internet
    Market Segment
    • 88% Small-Business
    • 8% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BitNinja Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    2
    Ease of Use
    1
    Features
    1
    Security
    1
    User Interface
    1
    Cons
    Ineffective Blocking
    2
    Bugs
    1
    Cloud Compatibility
    1
    False Positives
    1
    Inefficient Alert System
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BitNinja features and usability ratings that predict user satisfaction
    7.5
    Whitelists
    Average: 8.5
    9.2
    Web Filtering
    Average: 8.8
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    8.3
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Debrecen
    Twitter
    @bitninjaio
    1,102 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    24 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

State-of-the-art server security with an all-in-one platform BitNinja offers an advanced server security solution with a proactive and unified system designed to effectively defend against a wide ran

Users
No information available
Industries
  • Information Technology and Services
  • Internet
Market Segment
  • 88% Small-Business
  • 8% Mid-Market
BitNinja Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
2
Ease of Use
1
Features
1
Security
1
User Interface
1
Cons
Ineffective Blocking
2
Bugs
1
Cloud Compatibility
1
False Positives
1
Inefficient Alert System
1
BitNinja features and usability ratings that predict user satisfaction
7.5
Whitelists
Average: 8.5
9.2
Web Filtering
Average: 8.8
8.9
Has the product been a good partner in doing business?
Average: 8.8
8.3
Content Filtering
Average: 8.4
Seller Details
Year Founded
2014
HQ Location
Debrecen
Twitter
@bitninjaio
1,102 Twitter followers
LinkedIn® Page
www.linkedin.com
24 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    GajShield's extensive portfolio of Next Generation Firewall (NGFW) Appliances provides complete visibility into various threats and performance inhibitors allowing organisation to make informed and pr

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 73% Mid-Market
    • 18% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • GajShield Next Generation Firewall features and usability ratings that predict user satisfaction
    7.9
    Whitelists
    Average: 8.5
    9.6
    Web Filtering
    Average: 8.8
    9.2
    Has the product been a good partner in doing business?
    Average: 8.8
    9.2
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    GajShield
    Year Founded
    2002
    HQ Location
    Mumbai, Maharashtra
    Twitter
    @GAJSHIELD
    193 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    72 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

GajShield's extensive portfolio of Next Generation Firewall (NGFW) Appliances provides complete visibility into various threats and performance inhibitors allowing organisation to make informed and pr

Users
No information available
Industries
No information available
Market Segment
  • 73% Mid-Market
  • 18% Small-Business
GajShield Next Generation Firewall features and usability ratings that predict user satisfaction
7.9
Whitelists
Average: 8.5
9.6
Web Filtering
Average: 8.8
9.2
Has the product been a good partner in doing business?
Average: 8.8
9.2
Content Filtering
Average: 8.4
Seller Details
Seller
GajShield
Year Founded
2002
HQ Location
Mumbai, Maharashtra
Twitter
@GAJSHIELD
193 Twitter followers
LinkedIn® Page
www.linkedin.com
72 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point Harmony Connect redefines SASE by making it easy to access corporate applications, SaaS and the internet for any user or branch, from any device, without compromising on security. Built to

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 44% Small-Business
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point CloudGuard Harmony Connect (CloudGuard Connect) Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    2
    Access Centralization
    1
    Centralized Management
    1
    Ease of Connectivity
    1
    Performance Efficiency
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point CloudGuard Harmony Connect (CloudGuard Connect) features and usability ratings that predict user satisfaction
    8.3
    Whitelists
    Average: 8.5
    9.3
    Web Filtering
    Average: 8.8
    8.6
    Has the product been a good partner in doing business?
    Average: 8.8
    8.7
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point Harmony Connect redefines SASE by making it easy to access corporate applications, SaaS and the internet for any user or branch, from any device, without compromising on security. Built to

Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 44% Small-Business
  • 28% Mid-Market
Check Point CloudGuard Harmony Connect (CloudGuard Connect) Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
2
Access Centralization
1
Centralized Management
1
Ease of Connectivity
1
Performance Efficiency
1
Cons
This product has not yet received any negative sentiments.
Check Point CloudGuard Harmony Connect (CloudGuard Connect) features and usability ratings that predict user satisfaction
8.3
Whitelists
Average: 8.5
9.3
Web Filtering
Average: 8.8
8.6
Has the product been a good partner in doing business?
Average: 8.8
8.7
Content Filtering
Average: 8.4
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Check Point’s multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Check Point SandBlast Network Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security Protection
    2
    Threat Detection
    2
    Accuracy of Information
    1
    Customer Support
    1
    Deployment Ease
    1
    Cons
    Cost
    1
    Expensive
    1
    Limited Customization
    1
    Slow Loading
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Check Point SandBlast Network features and usability ratings that predict user satisfaction
    8.3
    Whitelists
    Average: 8.5
    9.2
    Web Filtering
    Average: 8.8
    9.4
    Has the product been a good partner in doing business?
    Average: 8.8
    6.7
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    San Carlos, CA
    Twitter
    @CheckPointSW
    71,087 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,977 employees on LinkedIn®
    Ownership
    NASDAQ:CHKP
Product Description
How are these determined?Information
This description is provided by the seller.

Check Point’s multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
Check Point SandBlast Network Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security Protection
2
Threat Detection
2
Accuracy of Information
1
Customer Support
1
Deployment Ease
1
Cons
Cost
1
Expensive
1
Limited Customization
1
Slow Loading
1
UX Improvement
1
Check Point SandBlast Network features and usability ratings that predict user satisfaction
8.3
Whitelists
Average: 8.5
9.2
Web Filtering
Average: 8.8
9.4
Has the product been a good partner in doing business?
Average: 8.8
6.7
Content Filtering
Average: 8.4
Seller Details
Year Founded
1993
HQ Location
San Carlos, CA
Twitter
@CheckPointSW
71,087 Twitter followers
LinkedIn® Page
www.linkedin.com
7,977 employees on LinkedIn®
Ownership
NASDAQ:CHKP
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cloud Edge Unified threat management as a service for managed service providers

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 47% Mid-Market
    • 41% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloud Edge features and usability ratings that predict user satisfaction
    7.3
    Whitelists
    Average: 8.5
    6.7
    Web Filtering
    Average: 8.8
    8.3
    Has the product been a good partner in doing business?
    Average: 8.8
    7.3
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1988
    HQ Location
    Tokyo
    Twitter
    @trendmicro
    112,808 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    7,690 employees on LinkedIn®
    Ownership
    OTCMKTS:TMICY
Product Description
How are these determined?Information
This description is provided by the seller.

Cloud Edge Unified threat management as a service for managed service providers

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 47% Mid-Market
  • 41% Small-Business
Cloud Edge features and usability ratings that predict user satisfaction
7.3
Whitelists
Average: 8.5
6.7
Web Filtering
Average: 8.8
8.3
Has the product been a good partner in doing business?
Average: 8.8
7.3
Content Filtering
Average: 8.4
Seller Details
Year Founded
1988
HQ Location
Tokyo
Twitter
@trendmicro
112,808 Twitter followers
LinkedIn® Page
www.linkedin.com
7,690 employees on LinkedIn®
Ownership
OTCMKTS:TMICY
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    UTM.io is the all-in-one solution for seamless, effective, and collaborative UTM tracking. Replace that old messy spreadsheet with a streamline solution. Our app simplifies the process of creating and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 25% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • UTM.io features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    UTM.io
    Year Founded
    2018
    HQ Location
    Orlando, Florida
    Twitter
    @utmio
    68 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

UTM.io is the all-in-one solution for seamless, effective, and collaborative UTM tracking. Replace that old messy spreadsheet with a streamline solution. Our app simplifies the process of creating and

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 25% Enterprise
UTM.io features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
10.0
Has the product been a good partner in doing business?
Average: 8.8
0.0
No information available
Seller Details
Seller
UTM.io
Year Founded
2018
HQ Location
Orlando, Florida
Twitter
@utmio
68 Twitter followers
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kerio Control is a security solution that brings together next-generation firewall capabilities, intrusion detection and prevention (IPS), gateway anti-virus, VPN, and web content and application filt

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 60% Small-Business
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • KerioControl Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Affordable
    1
    Free Licensing
    1
    Network Connectivity
    1
    Reliability
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • KerioControl features and usability ratings that predict user satisfaction
    9.2
    Whitelists
    Average: 8.5
    7.5
    Web Filtering
    Average: 8.8
    6.7
    Has the product been a good partner in doing business?
    Average: 8.8
    7.5
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1992
    HQ Location
    Austin, US
    Twitter
    @GFISoftware
    30,010 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    195 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kerio Control is a security solution that brings together next-generation firewall capabilities, intrusion detection and prevention (IPS), gateway anti-virus, VPN, and web content and application filt

Users
No information available
Industries
No information available
Market Segment
  • 60% Small-Business
  • 30% Mid-Market
KerioControl Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Affordable
1
Free Licensing
1
Network Connectivity
1
Reliability
1
Cons
This product has not yet received any negative sentiments.
KerioControl features and usability ratings that predict user satisfaction
9.2
Whitelists
Average: 8.5
7.5
Web Filtering
Average: 8.8
6.7
Has the product been a good partner in doing business?
Average: 8.8
7.5
Content Filtering
Average: 8.4
Seller Details
Year Founded
1992
HQ Location
Austin, US
Twitter
@GFISoftware
30,010 Twitter followers
LinkedIn® Page
www.linkedin.com
195 employees on LinkedIn®
(11)4.8 out of 5
Optimized for quick response
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence and observables by enabling cybersecurity teams to organize, store, and operationalize threat i

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • OpenCTI by Filigran Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Features
    6
    Integration Capabilities
    5
    Ease of Use
    4
    Threat Detection
    4
    Automation
    3
    Cons
    Poor Customer Support
    2
    Deployment Difficulties
    1
    Difficult Customization
    1
    Difficult Learning Curve
    1
    Lack of Automation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenCTI by Filigran features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    9.2
    Has the product been a good partner in doing business?
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Filigran
    Company Website
    Year Founded
    2022
    HQ Location
    New York, US
    Twitter
    @FiligranHQ
    715 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    117 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence and observables by enabling cybersecurity teams to organize, store, and operationalize threat i

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 36% Mid-Market
OpenCTI by Filigran Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Features
6
Integration Capabilities
5
Ease of Use
4
Threat Detection
4
Automation
3
Cons
Poor Customer Support
2
Deployment Difficulties
1
Difficult Customization
1
Difficult Learning Curve
1
Lack of Automation
1
OpenCTI by Filigran features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
9.2
Has the product been a good partner in doing business?
Average: 8.8
0.0
No information available
Seller Details
Seller
Filigran
Company Website
Year Founded
2022
HQ Location
New York, US
Twitter
@FiligranHQ
715 Twitter followers
LinkedIn® Page
www.linkedin.com
117 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Full Protect product utilizes a unique proactive signature-less technology which protects efficiently against unknown and sophisticated attacks.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Stormshield Endpoint Protection features and usability ratings that predict user satisfaction
    9.4
    Whitelists
    Average: 8.5
    9.4
    Web Filtering
    Average: 8.8
    0.0
    No information available
    9.4
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    N/A
    Twitter
    @Stormshield
    5,659 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    362 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Full Protect product utilizes a unique proactive signature-less technology which protects efficiently against unknown and sophisticated attacks.

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
Stormshield Endpoint Protection features and usability ratings that predict user satisfaction
9.4
Whitelists
Average: 8.5
9.4
Web Filtering
Average: 8.8
0.0
No information available
9.4
Content Filtering
Average: 8.4
Seller Details
HQ Location
N/A
Twitter
@Stormshield
5,659 Twitter followers
LinkedIn® Page
www.linkedin.com
362 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ZyWALL USG/40/40W/60/60W offers unbeatable protection from malware and unauthorized applications for smaller-sized enterprises.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ZyWALL USG/40/40W/60/60W features and usability ratings that predict user satisfaction
    7.2
    Whitelists
    Average: 8.5
    8.9
    Web Filtering
    Average: 8.8
    9.2
    Has the product been a good partner in doing business?
    Average: 8.8
    8.3
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ZyXEL
    Year Founded
    1989
    HQ Location
    Noida, Uttar Pradesh
    Twitter
    @ZyxelNews
    2,701 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ZyWALL USG/40/40W/60/60W offers unbeatable protection from malware and unauthorized applications for smaller-sized enterprises.

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Mid-Market
ZyWALL USG/40/40W/60/60W features and usability ratings that predict user satisfaction
7.2
Whitelists
Average: 8.5
8.9
Web Filtering
Average: 8.8
9.2
Has the product been a good partner in doing business?
Average: 8.8
8.3
Content Filtering
Average: 8.4
Seller Details
Seller
ZyXEL
Year Founded
1989
HQ Location
Noida, Uttar Pradesh
Twitter
@ZyxelNews
2,701 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Microland provides flexible and scalable services to meet the needs of branch offices that unlock new levels of business productivity and end-user experience.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microland Smartbranch Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cybersecurity
    1
    Security
    1
    Cons
    Connection Issues
    1
    Network Connectivity Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microland Smartbranch features and usability ratings that predict user satisfaction
    10.0
    Whitelists
    Average: 8.5
    10.0
    Web Filtering
    Average: 8.8
    0.0
    No information available
    8.3
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microland
    Year Founded
    1989
    HQ Location
    Bangalore
    Twitter
    @MicrolandLtd
    2,289 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,209 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Microland provides flexible and scalable services to meet the needs of branch offices that unlock new levels of business productivity and end-user experience.

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Microland Smartbranch Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cybersecurity
1
Security
1
Cons
Connection Issues
1
Network Connectivity Issues
1
Microland Smartbranch features and usability ratings that predict user satisfaction
10.0
Whitelists
Average: 8.5
10.0
Web Filtering
Average: 8.8
0.0
No information available
8.3
Content Filtering
Average: 8.4
Seller Details
Seller
Microland
Year Founded
1989
HQ Location
Bangalore
Twitter
@MicrolandLtd
2,289 Twitter followers
LinkedIn® Page
www.linkedin.com
6,209 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A Machine Learning and AI Platform built on Big/Fast Data Architecture for Breach Avoidance/Detection and Automated Elimination/Containment. It is an integrated solution with comprehensive threat dete

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Seceon Open Threat Management Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Cons
    Lack of Automation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Seceon Open Threat Management Platform features and usability ratings that predict user satisfaction
    6.7
    Whitelists
    Average: 8.5
    5.0
    Web Filtering
    Average: 8.8
    8.3
    Has the product been a good partner in doing business?
    Average: 8.8
    5.8
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Seceon
    Year Founded
    2015
    HQ Location
    Westford, MA
    Twitter
    @Seceon_Inc
    1,187 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    111 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A Machine Learning and AI Platform built on Big/Fast Data Architecture for Breach Avoidance/Detection and Automated Elimination/Containment. It is an integrated solution with comprehensive threat dete

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Enterprise
Seceon Open Threat Management Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Cons
Lack of Automation
1
Seceon Open Threat Management Platform features and usability ratings that predict user satisfaction
6.7
Whitelists
Average: 8.5
5.0
Web Filtering
Average: 8.8
8.3
Has the product been a good partner in doing business?
Average: 8.8
5.8
Content Filtering
Average: 8.4
Seller Details
Seller
Seceon
Year Founded
2015
HQ Location
Westford, MA
Twitter
@Seceon_Inc
1,187 Twitter followers
LinkedIn® Page
www.linkedin.com
111 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Designed to provide a complete security solution in a single product, giving you complete protection and visibility in all-in-one.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Smoothwall UTM features and usability ratings that predict user satisfaction
    8.3
    Whitelists
    Average: 8.5
    9.2
    Web Filtering
    Average: 8.8
    8.3
    Has the product been a good partner in doing business?
    Average: 8.8
    9.2
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2001
    HQ Location
    Leeds, GB
    Twitter
    @Smoothwall
    2,853 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    155 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Designed to provide a complete security solution in a single product, giving you complete protection and visibility in all-in-one.

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Smoothwall UTM features and usability ratings that predict user satisfaction
8.3
Whitelists
Average: 8.5
9.2
Web Filtering
Average: 8.8
8.3
Has the product been a good partner in doing business?
Average: 8.8
9.2
Content Filtering
Average: 8.4
Seller Details
Year Founded
2001
HQ Location
Leeds, GB
Twitter
@Smoothwall
2,853 Twitter followers
LinkedIn® Page
www.linkedin.com
155 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Trustwave UTM provides a comprehensive set of integrated network security technologies designed to defend against external threats, while also offering protective measures from the inside of the netwo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 150% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trustwave UTM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.3
    Has the product been a good partner in doing business?
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trustwave
    Year Founded
    1995
    HQ Location
    Chicago, IL
    Twitter
    @Trustwave
    22,121 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,097 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Trustwave UTM provides a comprehensive set of integrated network security technologies designed to defend against external threats, while also offering protective measures from the inside of the netwo

Users
No information available
Industries
No information available
Market Segment
  • 150% Mid-Market
  • 50% Small-Business
Trustwave UTM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.3
Has the product been a good partner in doing business?
Average: 8.8
0.0
No information available
Seller Details
Seller
Trustwave
Year Founded
1995
HQ Location
Chicago, IL
Twitter
@Trustwave
22,121 Twitter followers
LinkedIn® Page
www.linkedin.com
1,097 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Exosphere is the first UTM endpoint protection for SMBs and scans files in real-time using an advanced anti-malware engine. Exosphere provides multi-layered detection, that applies signature-based, he

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Exosphere Inc. features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Exosphere
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Exosphere is the first UTM endpoint protection for SMBs and scans files in real-time using an advanced anti-malware engine. Exosphere provides multi-layered detection, that applies signature-based, he

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Exosphere Inc. features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Exosphere
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Taegis XDR is a cloud-native extended detection and response security platform that consolidates best-of-breed security components into a holistic ecosystem to provide proactive protection against com

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Secureworks Taegis XDR Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Network Security
    2
    Alerting
    1
    Alerts
    1
    Customer Support
    1
    Easy Integrations
    1
    Cons
    Expensive
    1
    False Positives
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Secureworks Taegis XDR features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.3
    Has the product been a good partner in doing business?
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,757 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,926 employees on LinkedIn®
    Ownership
    LSE:SOPH
Product Description
How are these determined?Information
This description is provided by the seller.

Taegis XDR is a cloud-native extended detection and response security platform that consolidates best-of-breed security components into a holistic ecosystem to provide proactive protection against com

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Secureworks Taegis XDR Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Network Security
2
Alerting
1
Alerts
1
Customer Support
1
Easy Integrations
1
Cons
Expensive
1
False Positives
1
UX Improvement
1
Secureworks Taegis XDR features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.3
Has the product been a good partner in doing business?
Average: 8.8
0.0
No information available
Seller Details
Seller
Sophos
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,757 Twitter followers
LinkedIn® Page
www.linkedin.com
4,926 employees on LinkedIn®
Ownership
LSE:SOPH
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Sepio security suite detects infected peripherals or altered and malicious device behavior, isolates the attack and triggers alerts—stopping the rogue hardware before it can jeopardize normal oper

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sepio features and usability ratings that predict user satisfaction
    10.0
    Whitelists
    Average: 8.5
    10.0
    Web Filtering
    Average: 8.8
    0.0
    No information available
    8.3
    Content Filtering
    Average: 8.4
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Rockville, US
    Twitter
    @sepiosys
    552 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    71 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Sepio security suite detects infected peripherals or altered and malicious device behavior, isolates the attack and triggers alerts—stopping the rogue hardware before it can jeopardize normal oper

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Sepio features and usability ratings that predict user satisfaction
10.0
Whitelists
Average: 8.5
10.0
Web Filtering
Average: 8.8
0.0
No information available
8.3
Content Filtering
Average: 8.4
Seller Details
Year Founded
2016
HQ Location
Rockville, US
Twitter
@sepiosys
552 Twitter followers
LinkedIn® Page
www.linkedin.com
71 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aker raised the level of automation and created a true Digital Fortress to include a number of features in its NGFW Firewall that, in addition to preserving the network environment, enable the efficie

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aker UTM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Ogasec
    Twitter
    @ogasecbrasil
    393 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aker raised the level of automation and created a true Digital Fortress to include a number of features in its NGFW Firewall that, in addition to preserving the network environment, enable the efficie

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Aker UTM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Ogasec
Twitter
@ogasecbrasil
393 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Endian is the leading provider of open source network security and remote connectivity solutions. Our Unified Threat Management (UTM) hardware, software and virtual appliances provide comprehensive g

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Endian UTM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Endian
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Endian is the leading provider of open source network security and remote connectivity solutions. Our Unified Threat Management (UTM) hardware, software and virtual appliances provide comprehensive g

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Endian UTM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Endian
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ICS CUBE is the single solution of the whole set of issues small business network faces when using the Internet. Having Internet security as the primary focus, ICS CUBE is Unified Threat Management (U

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ICS CUBE features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2003
    HQ Location
    Yaroslavl, RU
    Twitter
    @ICS_CUBE
    834 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ICS CUBE is the single solution of the whole set of issues small business network faces when using the Internet. Having Internet security as the primary focus, ICS CUBE is Unified Threat Management (U

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
ICS CUBE features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2003
HQ Location
Yaroslavl, RU
Twitter
@ICS_CUBE
834 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SafeGuard Cyber is a SaaS security platform providing cloud-native defense for critical cloud communication applications. Protect critical communication systems such as Microsoft Teams, Zoom, Slack,

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SafeGuard Cyber features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Charlottesville, US
    Twitter
    @SafeGuard_Cyber
    1,994 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    27 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SafeGuard Cyber is a SaaS security platform providing cloud-native defense for critical cloud communication applications. Protect critical communication systems such as Microsoft Teams, Zoom, Slack,

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
SafeGuard Cyber features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
10.0
Has the product been a good partner in doing business?
Average: 8.8
0.0
No information available
Seller Details
Year Founded
2016
HQ Location
Charlottesville, US
Twitter
@SafeGuard_Cyber
1,994 Twitter followers
LinkedIn® Page
www.linkedin.com
27 employees on LinkedIn®

Learn More About Unified Threat Management Software

What is Unified Threat Management (UTM) Software?

Unified threat management (UTM) software provides multiple security features combined into a single device within a network. UTM enables an organization to consolidate IT security services into one device, simplifying the protection of the network.

What are the Common Features of Unified Threat Management (UTM) Software?

A UTM system usually includes the following:

Antivirus protection: Antivirus software prevents and detects the presence of malicious software within an endpoint device. These tools typically contain detection features for identifying potential malware and computer viruses that attempt to penetrate a device.

Malware analysis: Malware analysis tools isolate and investigate malware as it is detected on a company’s IT resources, endpoints, and applications. They detect malware and move infected resources to an isolated environment. 

Email protection: Email anti-spam software prevents malicious content from being delivered via email. These tools scan email messages, content, and attachments for potential threats and then filter or block suspicious messages from being delivered.

Website security: Website security software is designed to protect business websites from several internet-based threats. These tools combine features of distributed denial of service DDoS protection software, content delivery networks (CDN), and web application firewalls (WAF) to create an all-encompassing website protection solution. 

Endpoint protection: Endpoint management software tracks devices in a system and ensures software is secure and up to date. Typical features of endpoint management products are asset management, patch management, and compliance evaluation.

Vulnerability management: UTM software usually includes vulnerability management software, such as risk-based vulnerability management, which identifies and prioritizes vulnerabilities based on customizable risk factors.

What are the Benefits of Unified Threat Management (UTM) Software?

There are several benefits to using UTM software.

Flexibility: UTM software allows users to possess flexible solutions by offering a variety of security technologies from which an organization can pick and choose what is most beneficial. They can also acquire a single licensing model with all the solutions included. 

Centralized management: The UTM framework consolidates multiple security components under one management console. This makes the system easier to monitor and allows its operators to examine specific components that may need attention for specific functions.

Cost savings: The centralized framework reduces the number of devices that are needed, as well as the number of staff that were previously required to manage multiple devices.

Who Uses Unified Threat Management (UTM) Software?

IT and cybersecurity staff: These workers use UTM software to securely monitor data and network traffic.

Industries: Organizations in all industries, especially technology, professional, and financial services, seek UTM solutions to consolidate security solutions for more efficiency and cost savings.

Challenges with Unified Threat Management (UTM) Software?

There are some challenges IT teams can encounter with UTM systems.

Single point of failure: Combining all these security components into one system that allows IT to manage everything in one dashboard also presents a potential single point of failure. A whole network could be completely exposed if the UTM system fails. 

Loss of granularity: Components within UTM software may not have as granular or robust as dedicated solutions, which may mean degraded performance.

How to Buy Unified Threat Management (UTM) Software

Requirements Gathering (RFI/RFP) for Unified Threat Management (UTM) Software 

If an organization is just starting and looking to purchase UTM software, G2 can help.

The manual work necessary in security and compliance causes multiple pain points. If the company is large and has a lot of networks, data, or devices in its organization, it may need to shop for scalable UTM solutions. Users should think about the pain points in security to help create a checklist of criteria. Additionally, the buyer must determine the number of employees who will need to use this software and if they currently have the skills to administer it. 

Taking a holistic overview of the business and identifying pain points can help the team springboard into creating a checklist of criteria. The checklist serves as a detailed guide that includes both necessary and nice-to-have features, including budget features, number of users, integrations, security staff skills, cloud or on-premises solutions, and more.

Depending on the deployment scope, producing an RFI, a one-page list with bullet points describing what is needed from UTM software, might be helpful.

Compare Unified Threat Management (UTM) Software Products

Create a long list

Vendor evaluations are essential to the software buying process, from meeting the business functionality needs to implementation. For ease of comparison, after all demos are complete, it helps to prepare a consistent list of questions regarding specific needs and concerns to ask each vendor.

Create a short list

From the long list of vendors, it is helpful to narrow down the list of vendors and come up with a shorter list of contenders, preferably no more than three to five. With this list, businesses can produce a matrix to compare the features and pricing of the various solutions.

Conduct demos

To ensure the comparison is comprehensive, the user should demo each solution on the short list with the same use cases. This allows the business to evaluate like for like and see how each vendor stacks up against the competition. 

Selection of Unified Threat Management (UTM) Software

Choose a selection team

Before getting started, creating a winning team that will work together throughout the process, from identifying pain points to implementation, is crucial. The selection team should consist of organization members with the right interest, skills, and time to participate. 

A good starting point is to aim for three to five people who fill roles such as main decision maker, project manager, process owner, system owner, or staffing subject matter expert, as well as a technical lead, head administrator, or security administrator. The vendor selection team may be smaller in smaller companies, with fewer participants multitasking and taking on more responsibilities.

Compare notes

The selection team should compare notes, facts, and figures noted during the process, such as costs, security capabilities, and alert and incident response times.

Negotiation

Just because something is written on a company’s pricing page does not mean it's final. It is crucial to open up a conversation regarding pricing and licensing. For example, the vendor may be willing to give a discount for multi-year contracts or for recommending the product to others.

Final decision

After this stage, and before going all in, it is recommended to roll out a test run or pilot program to test adoption with a small sample size of users. If the tool is well used and well received, the buyer can be confident that the selection was correct. If not, it might be time to go back to the drawing board.

What Does Unified Threat Management (UTM) Software Cost?

UTM is considered a long-term investment. This means there must be a careful evaluation of vendors, and the software should be tailored to each organization's specific requirements. Once UTM software is purchased, deployed, and integrated into an organization’s security system, the cost could be high, so the evaluation stage of selecting the right tool is crucial. 

The notion of rip-and-replace cost can be high. The chosen UTM vendor should continue to provide support for the platform with flexibility and open integration. Pricing can be pay-as-you-go, and costs may also vary depending if unified threat management is self-managed or fully managed.

Return on Investment (ROI)

As organizations consider recouping the money spent on the software, it is critical to understand the costs that will be saved in terms of efficiency. In the long run, the investment must be worth preventing downtime, loss of revenue, and any reputation damage that a security breach would cause.