Skip to content

Commit e6ea22a

Browse files
author
Michał Gryczka
authored
Merge pull request #79 from DefGuard/fortigate
comaprison table rearanged
2 parents bf1bac5 + e364059 commit e6ea22a

File tree

1 file changed

+17
-12
lines changed

1 file changed

+17
-12
lines changed

src/pages/defguard-vs-fortinet.astro

Lines changed: 17 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ import BaseLayout from "../layouts/BaseLayout.astro";
44
import ProductSection from "../layouts/ProductSection.astro";
55
import OrganizationJSONLD from "../scripts/OrganizationJSONLD.astro";
66
7-
const title = "Defguard vs Fortinet: Modern WireGuard® VPN vs Legacy Solutions";
7+
const title = "Fortinet (FortiClient VPN) vs Defguard: Modern WireGuard® VPN vs Legacy Solutions";
88
const description = "Compare Defguard's modern WireGuard®-based VPN with Fortinet VPN (FortiGate & FortiClient) legacy IPsec/SSL solutions. See why enterprises choose Defguard Enterprise VPN for zero-trust security, superior performance, and effortless management.";
99
const featuredImage = "github.com/DefGuard/defguard.github.io/raw/main/public/images/png/defguard.png";
1010
const imageWidth = "1080";
@@ -67,20 +67,15 @@ const tags = [
6767
</thead>
6868
<tbody>
6969
<tr>
70-
<td>Open source</td>
71-
<td>Yes - Fully open-source, written in Rust</td>
72-
<td>No - Proprietary closed-source solution</td>
70+
<td>MFA Enforcement</td>
71+
<td>WireGuard VPN Protocol-level MFA - Every connection authenticated</td>
72+
<td>MFA enabled throgh FortiToken and FortiAuthenticator</td>
7373
</tr>
7474
<tr>
7575
<td>VPN Protocol</td>
7676
<td>WireGuard® - Fast, stateless, resilient</td>
7777
<td>IPsec & SSL VPN - Slower, stateful, legacy</td>
7878
</tr>
79-
<tr>
80-
<td>MFA Enforcement</td>
81-
<td>Protocol-level MFA - Every connection authenticated</td>
82-
<td>Login-based MFA - Authentication only at login</td>
83-
</tr>
8479
<tr>
8580
<td>Architecture</td>
8681
<td>Secure microservice - Stateless proxy, internal core</td>
@@ -93,9 +88,10 @@ const tags = [
9388
</tr>
9489
<tr>
9590
<td>Performance</td>
96-
<td>Superior - High throughput, low latency</td>
91+
<td>Superior - High throughput, low latency peer to peer</td>
9792
<td>Variable - Depends on protocol and hardware offloading</td>
9893
</tr>
94+
9995
<tr>
10096
<td>Identity Management</td>
10197
<td>Built-in OIDC IdP - Seamless SSO and directory sync</td>
@@ -106,6 +102,16 @@ const tags = [
106102
<td>Open-source & auditable - Rust-based, minimal dependencies</td>
107103
<td>Proprietary - Closed-source, larger attack surface</td>
108104
</tr>
105+
<tr>
106+
<td>Open source</td>
107+
<td>Yes - Fully open-source, written in Rust</td>
108+
<td>No - Proprietary closed-source solution</td>
109+
</tr>
110+
<tr>
111+
<td>Cost</td>
112+
<td>Subscription-based - No hardware required, simple pricing based on number of users and locations</td>
113+
<td>Complex pricing depending on the number of components and features. Additional high costs for MFA and HA</td>
114+
</tr>
109115
</tbody>
110116
</table>
111117
</div>
@@ -222,8 +228,7 @@ const tags = [
222228
ChaCha20, HMAC‑SHA variants) for VPN tunnels, plus TLS for HTTPS management sessions and SSL inspection on NGFWs.
223229
</p>
224230
<p>
225-
Of note, Fortinet is ending support for SSL VPN tunnel mode from version 7.6.3 onwards. Fortinet has been phasing out
226-
the functionality and is now forcing a migration to IPsec VPN solutions.
231+
Fortinet is ending support for SSL VPN tunnel mode and is now forcing a migration to IPsec VPN solutions. The functionality of SSL VPN has been deprecated and is no longer supported. This creates a significant migration cost for customers who are not using IPsec VPN.
227232
</p>
228233
<p>
229234
Fortinet's approach allows for deep inspection for malware or anomalies through NGFW (next-generation firewall) services.

0 commit comments

Comments
 (0)