I am using pfSense as a firewall and VPN gateway.
External reviews
External reviews are not included in the AWS star rating for the product.
Effective online management, secure, and user-friendly
What is our primary use case?
How has it helped my organization?
pfSense has helped our organization because we use a data center that needed a firewall, VPN, and other features under a budget.
What is most valuable?
The most valuable features of pfSense are security, user-friendliness, and helpful online management.
What needs improvement?
It was difficult to configure our web printer through the solution. This process could be easier. Additionally, integration with SD-WAN solution.
For how long have I used the solution?
I have been using pfSense for approximately one year.
What do I think about the stability of the solution?
I rate the stability of pfSense an eight out of ten.
What do I think about the scalability of the solution?
We have approximately 2,000 people using the solution.
I rate the scalability of pfSense an eight out of ten.
How are customer service and support?
I have not used the support from the vendor. However, I use community support.
How was the initial setup?
The initial setup of pfSense was simple. However, when we install filters or agents it can be difficult.
I rate the initial setup of pfSense an eight out of ten.
What's my experience with pricing, setup cost, and licensing?
I am using the community version of the solution which is free.
The paid version is priced reasonably.
What other advice do I have?
The solution has solved many of our use cases.
I rate pfSense an eight out of ten.
Feature-rich, well documented, and there is good support available online
What is our primary use case?
How has it helped my organization?
PfSense gives tools to protect the network. If you configured things properly then you'll be protected to the distant level. PFsense gives a solid set of functionalities that work perfectly. VPN services are stable and easy to deploy.
What is most valuable?
The classic features such as content inspection, content protection, and the application-level firewall, and VPN Are most common. This is a feature-rich product and the documentation is good.
What needs improvement?
Ease of use is a problem for a user who is unfamiliar with this product because, in the interface, everything has to be set manually. It would be more user-friendly if things were set automatically.
The drop in performance can be drastic when you use more advanced techniques. There is some trade-off between having a certain level of security and maintaining acceptable performance.
For how long have I used the solution?
We have more than ten years of experience with pfSense.
What do I think about the stability of the solution?
The stability of pfSense is standard. It is rated as one of the good solutions in this area.
What do I think about the scalability of the solution?
This product is scalable to some point, although we have never used it for large companies. We use it for small to medium-sized organizations. For big companies, we more often implement Palo Alto.
In our company, we have a data center and some of our clients are hooked to it. This is something that we have on-premises for our customers.
We have plans to increase our usage with pfSense because we have had good feedback from our customers. In fact, with the good experience we have had, our sales have been slightly increasing. Our sales are shifting from Sophos to pfSense.
How are customer service and support?
The technical support is organized well. We do most of the technical support for our customers in-house but there is a second level of outside support available. It is okay.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We currently resell products from both pfSense, Sophos and Cisco. In some areas, pfSense is better than Sophos. I have been a bit disappointed with Sophos because I know their history, and I don't think that they have advanced as well as they should have in that time. Also, they have two different products, XG and UTM. This is another reason that I prefer pfSense, at least a little bit, over Sophos.
How was the initial setup?
The initial setup is complex. If you have a straightforward setup then you will have straightforward, basic protection and nothing else.
It takes a few months to adjust where you start by setting it up, and then you have to monitor it and see what's happening. It's ongoing work because, after this, you have to keep monitoring and adjusting to the situation. This is part of the service that we perform for our customers.
What about the implementation team?
We are the integrators for our customers and deploy with our in-house team. We have people in the company who are specialized in this area.
What was our ROI?
The return on investment depends on the predicted cost of failures of the system, or intrusion of the system, which is hard to give a straight answer on. In part, this is because different companies put a different value on their data.
For example, with medicine, if somebody were to steal the data related to the latest CORONA vaccine then the cost would be tremendous. On the other hand, if there is a company that is making chairs, stealing the design of the chair probably wouldn't be as high when compared to an application in medicine. So, there is not a straight answer for that.
Return on investment, in any case, I think for every company, this is a must. Put in a straightforward way, they can count just the possibilities of having an attack on their system with a cryptovirus. If they can save their data from attackers then it would save them at least two days of not working plus the cost of recovery, which would be much more than the cost of the system and maintenance.
What's my experience with pricing, setup cost, and licensing?
The price of the licensing depends on the size of the deployment. pfSense is open-source, but the support is something that the customer pays for. We charge them for the first line of support and if they want, they can purchase the second line of support. Typically, they take the first-line option.
The term of licensing also depends on the contract. The firewall doesn't always have a contract but rather, there is a contract in place for the network, which includes UTM.
In addition to the licensing fees, there are costs for hardware, installation, and maintenance. We use HPE servers, and the cost depends on how large the installation is. The price of setup is approximately €500 to €800, which also includes the initial monitoring.
The maintenance cost isn't really included in the network fees.
For smaller companies, we charge them a few hours a month for monitoring. It takes longer if the client is bigger.
Which other solutions did I evaluate?
Palo Alto, Fortinet, Sophos, Cisco
What other advice do I have?
It is important to remember that you can't just leave the device to do everything. You still have to know what you're doing.
I recommend the product. It's well-balanced and one with a long history, so it doesn't have child's diseases. There is a lot of online support available online, which they can consult themselves. But, in the case that they need support, they can hire a professional support line and that is highly recommended.
I say this because usually, people look at the UTM as something that should be put in the system, set up, and left alone. But, this is not the case with this type of solution. Therefore, I strongly suggest making an outside agreement with a specialized company that will take care of their security from that point on.
The biggest lesson that I have learned from using this kind of product is that you can't assume that the internet is a big place and nobody will find you. There is always a good possibility that robots will search your system for holes, and they are probably doing so this instant. This means that users should be aware and have decent protection.
In summary, this is a good product but there is always room for improvement.
I would rate this solution a nine out of ten.