The Forrester Wave™ - Enterprise Firewalls, Q3 2020
The Forrester Wave™ - Enterprise Firewalls, Q3 2020
by David Holmes
August 10, 2020
This PDF is only licensed for individual use when downloaded from forrester.com or reprints.forrester.com. All other distribution prohibited.
forrester.com
For Security & Risk Professionals
by David Holmes
with Joseph Blankenship, Matthew Flug, and Peggy Dostie
August 10, 2020
8 Vendor Offerings
9 Vendor Profiles
14 Evaluation Overview
16 Supplemental Material
Security buyers looking to build the enterprise connectivity architecture of the future should consider
enterprise firewall solutions that:
›› Support the Zero Trust edge model. The Zero Trust edge (ZTE) describes the security stack
fully or partially edge-delivered and consumed as a service. The Zero Trust edge includes content
inspection, intrusion detection/prevention (IDS/IPS), malware detonation, DNS firewalling, secure
web gateway (SWG), CASB, and most importantly, Zero Trust network access (ZTNA). Branches
use SD-WAN to connect to the edge network instead of backhauling traffic to the security stack
in the data center. Nearly every firewall vendor evaluated in this report recognizes the opportunity
(and threat) of ZTE and has a strategy to address it.
›› Extend management into the cloud. Multiple vendors in this report can manage native public
cloud security objects, like AWS security groups, containers, and Azure and Alibaba firewall
objects. We describe this capability as the fourth generation of firewalls, or FW4. The value
proposition of FW4 derives from the fact that network security functions are already controlled
through the firewall management console and log collectors and that no retraining or new vendor
vetting is necessary in this model. FW4 solutions consolidate and normalize various public cloud
provider security interfaces into one that end users already know.
›› Feature a strong endpoint or tight integration with an endpoint leader. According to a 2020
Forrester survey, over 50% of employees who went home for pandemic lockdown hope to
stay there even after the lockdown is over.1 For remote users, a strong endpoint component is
necessary to direct traffic through to a vendor edge network for content inspection and secure
remote access. When a remote client host becomes compromised, the endpoint component
needs to isolate and assist incident response. Endpoint has not been a core strength for enterprise
firewall vendors in the past, but the pandemic lockdown and the future of remote work make this
functionality a priority.
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 2
[email protected] or +1 866-367-7378
For Security & Risk Professionals August 10, 2020
The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
Evaluation Summary
The Forrester Wave™ evaluation highlights Leaders, Strong Performers, Contenders, and Challengers.
It’s an assessment of the top vendors in the market and does not represent the entire vendor landscape.
We intend this evaluation to be a starting point only and encourage clients to view product evaluations
and adapt criteria weightings using the Excel-based vendor comparison tool (see Figure 1 and see
Figure 2). Click the link at the beginning of this report on Forrester.com to download the tool.
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 3
[email protected] or +1 866-367-7378
For Security & Risk Professionals August 10, 2020
The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
Enterprise Firewalls
Q3 2020
Strong
Challengers Contenders Performers Leaders
Stronger
current
offering Palo Alto Networks
Fortinet
Juniper
Networks Huawei
Forcepoint
Sophos
Barracuda Networks
SonicWall
WatchGuard
Weaker
current
offering
Market presence
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 4
[email protected] or +1 866-367-7378
For Security & Risk Professionals August 10, 2020
The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
es
gi
lo
no
ch
Te
e
ar
ks
ftw
or
w
So
et
N
t
in
nt
gh r’s
da
Po
g
oi
tin
ei te
cu
ei
ep
ne
ck
w res
w
co
rra
rti
rc
he
ua
r
is
Ba
Fo
Fo
Fo
C
H
Current offering 50% 2.48 4.16 4.16 2.98 3.74 3.00
Policy creation and management 4% 3.00 5.00 5.00 5.00 3.00 3.00
Rule management over time 3% 1.00 5.00 3.00 1.00 3.00 3.00
Management API 3% 3.00 5.00 5.00 5.00 3.00 3.00
Management plane security 2% 3.00 3.00 5.00 1.00 5.00 3.00
Usability 5% 1.00 5.00 5.00 3.00 3.00 3.00
TLS decryption 5% 3.00 1.00 5.00 3.00 5.00 5.00
High availability and clustering 4% 1.00 5.00 5.00 5.00 5.00 3.00
Centralized management 3% 3.00 5.00 3.00 5.00 5.00 3.00
Cloud-delivered components 5% 1.00 3.00 5.00 1.00 1.00 3.00
Incident response and SOC automation 4% 3.00 5.00 5.00 3.00 3.00 5.00
User and application context 3% 3.00 5.00 5.00 3.00 3.00 3.00
IDS/IPS 4% 1.00 5.00 5.00 1.00 3.00 5.00
Automated malware analysis 4% 3.00 5.00 3.00 1.00 5.00 5.00
Email, web, and email filtering 2% 3.00 5.00 3.00 3.00 5.00 3.00
Threat intelligence 3% 1.00 5.00 5.00 3.00 3.00 3.00
Risk scoring 3% 3.00 1.00 3.00 5.00 3.00 3.00
Microsegmentation 5% 3.00 3.00 5.00 3.00 3.00 3.00
Zero Trust 2% 1.00 5.00 5.00 3.00 1.00 1.00
Workload protection 5% 1.00 5.00 5.00 1.00 5.00 1.00
Endpoint 5% 3.00 5.00 3.00 5.00 3.00 1.00
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 5
[email protected] or +1 866-367-7378
For Security & Risk Professionals August 10, 2020
The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
ks
ks
or
or
w
w
et
rd
et
N
gh r’s
ua
l
rN
g
al
to
tin
ei te
G
cW
os
Al
pe
w res
ch
ph
ni
lo
ni
at
r
So
So
Pa
Fo
Ju
W
Current offering 50% 3.60 3.94 2.14 2.91 1.96
Policy creation and management 4% 5.00 3.00 3.00 3.00 1.00
Rule management over time 3% 5.00 3.00 3.00 5.00 3.00
Management API 3% 5.00 3.00 3.00 3.00 1.00
Management plane security 2% 3.00 3.00 1.00 5.00 3.00
Usability 5% 3.00 5.00 3.00 3.00 3.00
TLS decryption 5% 5.00 3.00 1.00 3.00 3.00
High availability and clustering 4% 1.00 1.00 3.00 1.00 1.00
Centralized management 3% 5.00 3.00 3.00 3.00 1.00
Cloud-delivered components 5% 3.00 5.00 1.00 1.00 1.00
Incident response and SOC automation 4% 5.00 5.00 3.00 3.00 3.00
User and application context 3% 3.00 5.00 3.00 5.00 3.00
IDS/IPS 4% 5.00 5.00 3.00 5.00 1.00
Automated malware analysis 4% 5.00 5.00 3.00 5.00 1.00
Email, web, and email filtering 2% 5.00 3.00 3.00 3.00 1.00
Threat intelligence 3% 3.00 5.00 3.00 5.00 3.00
Risk scoring 3% 3.00 5.00 1.00 3.00 1.00
Microsegmentation 5% 3.00 3.00 0.00 0.00 0.00
Zero Trust 2% 1.00 5.00 1.00 3.00 1.00
Workload protection 5% 5.00 5.00 3.00 1.00 1.00
Endpoint 5% 3.00 3.00 3.00 5.00 3.00
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 6
[email protected] or +1 866-367-7378
For Security & Risk Professionals August 10, 2020
The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
es
gi
lo
no
ch
Te
e
ar
ks
ftw
or
w
So
et
N
t
in
nt
gh r’s
da
Po
g
oi
tin
ei te
cu
ei
ep
ne
ck
w res
w
co
rra
rti
rc
he
ua
r
is
Ba
Fo
Fo
Fo
C
H
Current offering 50% 2.48 4.16 4.16 2.98 3.74 3.00
Firewall-as-a-service 5% 1.00 5.00 5.00 3.00 3.00 3.00
Software-defined WAN 5% 5.00 1.00 1.00 5.00 5.00 3.00
IPSec and VPN 2% 5.00 5.00 3.00 3.00 5.00 1.00
Certifications 2% 1.00 5.00 3.00 3.00 3.00 5.00
Performance characteristics 4% 3.00 3.00 1.00 3.00 5.00 3.00
ICS/OT/IoT 5% 5.00 5.00 5.00 1.00 5.00 1.00
Additional security control integrations 3% 3.00 5.00 5.00 3.00 5.00 3.00
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 7
[email protected] or +1 866-367-7378
For Security & Risk Professionals August 10, 2020
The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
ks
ks
or
or
w
w
et
rd
et
N
gh r’s
ua
l
rN
g
al
to
tin
ei te
G
cW
os
Al
pe
w res
ch
ph
ni
lo
ni
at
r
So
So
Pa
Fo
Ju
W
Current offering 50% 3.60 3.94 2.04 2.91 1.96
Firewall-as-a-service 5% 1.00 5.00 0.00 1.00 0.00
Software-defined WAN 5% 3.00 3.00 3.00 3.00 3.00
IPSec and VPN 2% 3.00 3.00 1.00 3.00 3.00
Certifications 2% 3.00 3.00 3.00 5.00 5.00
Performance characteristics 4% 5.00 3.00 1.00 1.00 3.00
ICS/OT/IoT 5% 3.00 5.00 1.00 3.00 3.00
Additional security control integrations 3% 3.00 5.00 3.00 3.00 3.00
Vendor Offerings
Forrester included 11 vendors in this assessment: Barracuda Networks, Check Point Software
Technologies, Cisco, Forcepoint, Fortinet, Huawei, Juniper Networks, Palo Alto Networks, SonicWall,
Sophos, and WatchGuard (see Figure 3).
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 8
[email protected] or +1 866-367-7378
For Security & Risk Professionals August 10, 2020
The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
Product version
Vendor Product evaluated evaluated
Vendor Profiles
Our analysis uncovered the following strengths and weaknesses of individual vendors.
Leaders
›› Palo Alto Networks is moving aggressively to the cloud. Migration to the cloud is inevitable,
and the user exodus caused by the pandemic is accelerating that trend. Palo Alto Networks has
been aggressively acquiring strategic technologies to enable a cloud-delivered future. For example,
the vendor’s recent acquisition of CloudGenix for SD-WAN is an onramp to its Prisma Access.
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 9
[email protected] or +1 866-367-7378
For Security & Risk Professionals August 10, 2020
The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
Cloud-delivered Prisma Access is the vendor’s ZTNA solution, which enables secure work-from-
home connectivity for many during the pandemic. With its combination of NGFWs, Cortex, Strata,
and Prisma Access platforms, Palo Alto Networks is aiming to own not just the enterprise firewall
market, but the cloud-security stack market of the future.
Palo Alto Networks’ next-generation firewalls have unique capabilities like recording PCAPs of the
transmissions of suspected malware, and the ability to provide MFA for legacy applications that
don’t support it. Palo Alto Networks is also one of the few firewall vendors with a container security
solution that integrates with the firewall’s cloud management console. Palo Alto Networks’ Demisto
acquisition demonstrates dedication to incident response automation. Firewall administrators in
years past gushed how easy Palo Alto Networks was to use, but the company may be slipping in
its customer experience journey. One reference customer felt neglected, saying, “I love the product,
but I struggle with the relationship.” Enterprise security buyers with a preference for a single
solution vendor should look to Palo Alto Networks to enable their SOC staff and security program.
›› Cisco has all the security you can eat and more. Cisco’s security business is growing (6%
YoY).2 The vendor’s acquisitions of SourceFire, OpenDNS, and Duo integrate well into its enterprise
firewall and associated services. The vendor’s Umbrella platform maps to a Zero Trust edge
approach and incorporates major security services, like firewalls and CASBs, that can be cloud-
delivered. Cisco is the gold standard for online technical documentation, certification, and is a
member of numerous standards bodies. Cisco has at least three firewalls, Meraki, ASA, and the
one being evaluated in this report, Firepower Threat Defense (FTD).
FTD has tie-ins with endpoint (through Cisco AMP) and microsegmentation (through a Cisco
Tetration module). FTD has a unique capability to identify user and application traffic via custom
Lua scripts, and PCAPs can be loaded and tested against them. In the past, buyers worried about
integration and if the pieces would “talk” to each other properly. A customer reference for this
report was initially similarly skeptical, but said, “They won me over. Cisco has really fixed their
problems and done their own testing.” Multiple reference customers expressed that the vendor
needs to improve FTD’s usability, and value for price was cited as a weakness as well. Very large
enterprise buyers with an existing Cisco ecosystem, distributed campuses, thousands of workers,
and a diverse set of requirements should consider Cisco’s Firepower Threat Defense firewall and
Umbrella platform.
Strong Performers
›› Check Point Software Technologies’ security is broad and deep. The oldest and largest security
company in Israel, Check Point has long been the standard bearer to which other firewall vendors
have compared themselves for centralized management and usability. Today, the company’s tagline
is “Secure Your Everything,” and the vendor is embarking on a strategy to help customers do just
that. Check Point acquired Dome9 for cloud guardrails, Protego for workload security, and Cymplify
for an ambitious IoT security strategy. Check Point has a well-publicized threat intelligence team
and a global incident response service that fights nation-state battles.
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 10
[email protected] or +1 866-367-7378
For Security & Risk Professionals August 10, 2020
The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
Check Point’s NGFW has an intuitive and pleasing aesthetic. One reference customer concurred,
saying, “I really love the UI for managing the whole network. The SmartConsole makes it so easy.”
Check Point’s cloud workload protection, endpoint protection, and centralized management are
solid. The vendor’s integration to many SIEM and SOAR solutions enable security operations.
Check Point’s strategic weakness is its hands-off approach to SD-WAN. It’s the last of the big
firewall vendors that explicitly rely on an SD-WAN partner vendor like SilverPeak or Velocloud (part
of VMware), yet SD-WAN is a strategic point of control for vendors looking to boost customers
into their Zero Trust edge networks and security services in the cloud. Large enterprises with many
high-security requirements that are happy with their current SD-WAN vendor, and manufacturers
with IP-based ICS/SCADA networks should look to Check Point.
›› Fortinet focuses on performance. Fortinet’s first product was the FortiGate firewall. After a public
offering in 2009 (Nasdaq: FTNT), Fortinet grew its business greatly by building its product portfolio
into a fabric of adjacent networking and security technologies with the flagship enterprise firewall
at the center. Today, the vendor offers secure wireless, secure WLAN, 3G/4G/5G connectivity,
application security, SIEM, SOAR, and secure email gateway solutions. Fortinet firewalls are deployed
where high performance matters — in data centers, colos, and telco networks around the world.
More than other firewall vendors, Fortinet invests in custom silicon to accelerate network and
security policy. But this reliance on hardware is a double-edged sword. Fortinet has a strong
combination of firewall, SD-WAN, and routing, but the vendor is behind in offering its own hosted
cloud security services, including firewall-as-a-service and ZTNA. One reference customer said,
“We chose them because they were more bang for the buck. Also, they had a lot more flexibility
than other vendors.” Security pros looking for on-premises appliances with a focus on performance
and should consider Fortinet’s FortiGate firewall.
With its endpoint agent, for example, Forcepoint can detect when an insider is attempting to
access critical data, increase the user’s risk score at the firewall, and then capture video of
the user’s activities after. Forcepoint engineered multitenancy into its cloud-based centralized
management, added clustering up to 16 devices, and added zero-touch SD-WAN deployment into
its most recent releases. Forcepoint lacks the robust solutions for IoT/OT, workload protection and
microsegmentation that some of its more established competitors feature. Reference customers
cited the vendor’s IDS/IPS as needing improvement. Federal agencies may already be familiar
with Forcepoint, but high-security enterprise buyers looking for integrated data security should
evaluate Forcepoint.
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 11
[email protected] or +1 866-367-7378
For Security & Risk Professionals August 10, 2020
The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
›› Sophos surprises with innovative, unique features. Founded in Oxford in 1985, Sophos is
headquartered in the UK, with a heavy presence in EMEA. Sophos has long been well-respected
for its research arm, SophosLabs. With intuitive interfaces, tactical features, and its long presence
in EMEA, Sophos XG firewall will continue to flourish there and in markets where the vendor can
provide a value-oriented, tactical, next-generation firewall or even a hardware-based UTM for the
really conventional buyer.
The Sophos endpoint client enables the XG firewall to automatically isolate an infected host from
its peers. Customer references indicate they chose the XG firewall specifically for this feature,
as it enabled remote threat mitigation. Sophos also has an ultra-thin SD-WAN that performs
hardware split tunneling for use by corporate execs or ultra-small offices. Interestingly, the vendor
offers centralized management for free. Like the other firewall vendors that straddle the line
between SMB and enterprise, Sophos lacks a global vendor network from which to deliver rich
cloud security services like CASB and ZTNA. For the on-premises enterprise market, Sophos will
need to add custom hardware offloads if it wants to jump to the 10G/40G feeds common there.
In the meantime, small to medium buyers, especially those in the services, government, and
manufacturing verticals, should put Sophos XG on their shortlist.
One of Juniper’s most unique features is the Policy Enforcer. The SRX firewall uses it to push
security policy decisions to other parts of the network — its MX routers for faster blocking
or Carbon Black endpoints for host isolation. Juniper is also one of a few firewall vendors to
apply machine learning to encrypted traffic to augment malicious behavior detection. Customer
references specifically praised Juniper’s performance with threat prevention enabled. SRX uses the
Juniper ATP Cloud sandbox in the cloud, where the vendor is building its Zero Trust edge vendor
network. However, the vendor has catching up to do in the cloud. It lacks its own CASB and ZTNA,
both of which will become crucial, must-have features in the next three years. Enterprise buyers
looking for excellent performance and solid integration with existing Juniper routers and security
vendors like Carbon Black and NetSkope can get Connected Security from Juniper’s SRX.
›› Huawei leads the China market. Founded in China by Ren Zhengfei in 1987, Huawei has always
been a telecommunications equipment company, but is branching into other technology areas,
including security. Today, the Asian conglomerate boasts annual revenues exceeding $100 billion.3
Huawei has global services and support in seven countries. Mexico serves as the support center
for North America. The vendor’s vision for network security in the future closely aligns to those
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 12
[email protected] or +1 866-367-7378
For Security & Risk Professionals August 10, 2020
The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
of other firewall vendors in bridging the gap between on-premises and their own cloud security
services. Huawei has some vendor network services, currently offering firewall-as-a-service (but for
SMB) and SD-WAN initialization from the cloud. The vendor lacks ZTNA and CASB, two services
that will be critical cloud features for a Zero Trust Edge network.
Huawei refers to its USG series as the world’s first AI firewall, and it is one of only a handful of
vendors in this analysis to apply ML to encrypted traffic analysis. It’s little surprise that Huawei’s
USG firewall strategy has advanced 5G support earlier than other vendors. Reference customers
were unanimous in their praise for both the value provided and the total cost of ownership of the
USG firewall series, and all would recommend it to a colleague. Chinese buyers looking for an
enterprise firewall should evaluate Huawei. Geopolitical concerns, however, may influence the
selection and deployment of Huawei equipment in many Western countries.
Contenders
›› Barracuda Networks punches above its weight. Recently taken private by Thoma Bravo,
Barracuda’s new management does brisk business in EMEA and the turbulent APAC market.
Barracuda identified key recent technological trends in the firewall market and executed on
them. The vendor was among the first firewall vendors to spot the significance of SD-WAN and
cloud integration for the firewall market, and it has a strong play for IoT/ICS/OT environments.
Barracuda’s CloudGen firewall is an excellent on-ramp to Azure and, someday, AWS.
Barracuda is heavily invested in the Microsoft ecosystem. It was the first firewall to achieve
Microsoft Azure certification and is ahead of competitors in Azure integration for both security and
virtual WAN. Barracuda is the only firewall vendor building a DIY security-stack-in-the-public cloud,
which is bold. Barracuda’s on-premises firewalls are a good fit for the OT environments in which
they actively compete, but the vendor lacks generalized firewall-as-a-service, CASB, and Zero
Trust Network Access. Midmarket buyers and those interested in building a DIY security stack in
the cloud should consider Barracuda.
Today, customers use WatchGuard as a template for distributed environments, where a small to
medium-size firewall needs to be replicated reliably. WatchGuard’s cloud-based RapidDeploy
and WatchGuard Cloud management options help create and manage firewall policy for these
distributed environments (such as retail outlets, manufacturing locations, and healthcare facilities).
Reference customers cited the flexibility that WatchGuard provides for integration with best-of-
breed antivirus solutions as a strength, and specifically praised the Firebox’s “extremely low failure
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 13
[email protected] or +1 866-367-7378
For Security & Risk Professionals August 10, 2020
The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
rate.” The Firebox does lack many advanced features like workload protection, microsegmentation
integration, and firewall-as-a-service. Security pros looking to deploy and manage thousands
of small firewalls in dispersed physical locations can build and repeat a great template with the
WatchGuard Firebox.
SonicWall’s on-premises firewall product series is sold with a basic feature set — policy creation,
malware analysis, and SD-WAN for free. The vendor still needs to invest in critical technologies that
are needed by enterprises now — SOAR integration for incident response, firewall as a service,
and cloud security extensions. Reference customers reported dissatisfaction with its reporting and
analytics. But SonicWall does have its fans. A customer reference commented that SonicWall, as
a company, “Helps me out when I need them, even with sales and pricing.” SMB and education
buyers should evaluate SonicWall from a value perspective. Enterprise architects looking for a
properly sized tactical solution to stamp out for hundreds of retail outlets should evaluate SonicWall.
Evaluation Overview
We evaluated vendors against 34 criteria, which we grouped into three high-level categories:
›› Current offering. Each vendor’s position on the vertical axis of the Forrester Wave graphic
indicates the strength of its current offering. Our evaluation of each vendor’s current offering
covered the breadth of each solution as it related to integration with adjacent security functionality
(like workload security or microsegmentation), the ability of each solution to assist incident
response (host isolation), usability, manageability, and performance.
›› Strategy. Placement on the horizontal axis indicates the strength of the vendors’ strategies. We
evaluated each vendor’s strategic vision and roadmap as it aligned to a Zero Trust edge architecture,
where many security functions are delivered from a secure edge and both on-premises and remote
users have the ability to access enterprise resources with Zero Trust rather than user-to-site VPN.
For vendors not (yet) aligning to the Zero Trust edge architecture, we evaluated their roadmap as it
aligned to their own stated strategy and feedback we’ve heard from Forrester clients.
›› Market presence. Represented by the size of the markers on the graphic, our market presence
scores reflect each vendor’s enterprise firewall revenue and number of enterprise customers (with
5000 or more employees).
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 14
[email protected] or +1 866-367-7378
For Security & Risk Professionals August 10, 2020
The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
Forrester included 11 vendors in the assessment: Barracuda Networks, Check Point Software
Technologies, Cisco Systems, Forcepoint, Fortinet, Huawei Technologies, Palo Alto Networks, Sophos,
SonicWall and WatchGuard. Each of these vendors has:
›› A global presence. Each vendor included in this report had to sustain at least 20% of its firewall
revenue outside its primary region. This requirement had the effect of excluding three vendors,
Hillstone, H3C, and QiAnXin, who do nearly 100% of their business in AP.
›› Significant enterprise firewall revenue. In order to compare the most significant of these
vendors, we stipulated that those vendors with a global presence must also show at least $75
million in firewall revenue.
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 15
[email protected] or +1 866-367-7378
For Security & Risk Professionals August 10, 2020
The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
To help you put research Translate research into Join our online sessions
into practice, connect action by working with on the latest research
with an analyst to discuss an analyst on a specific affecting your business.
your questions in a engagement in the form Each call includes analyst
30-minute phone session of custom strategy Q&A and slides and is
— or opt for a response sessions, workshops, available on-demand.
via email. or speeches.
Learn more.
Learn more. Learn more.
Supplemental Material
Online Resource
We publish all our Forrester Wave scores and weightings in an Excel file that provides detailed product
evaluations and customizable rankings; download this tool by clicking the link at the beginning of this
report on Forrester.com. We intend these scores and default weightings to serve only as a starting
point and encourage readers to adapt the weightings to fit their individual needs.
A Forrester Wave is a guide for buyers considering their purchasing options in a technology
marketplace. To offer an equitable process for all participants, Forrester follows The Forrester Wave™
Methodology Guide to evaluate participating vendors.
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 16
[email protected] or +1 866-367-7378
For Security & Risk Professionals August 10, 2020
The Forrester Wave™: Enterprise Firewalls, Q3 2020
The 11 Providers That Matter Most And How They Stack Up
In our review, we conduct primary research to develop a list of vendors to consider for the evaluation.
From that initial pool of vendors, we narrow our final list based on the inclusion criteria. We then gather
details of product and strategy through a detailed questionnaire, demos/briefings, and customer
reference surveys/interviews. We use those inputs, along with the analyst’s experience and expertise in
the marketplace, to score vendors, using a relative rating system that compares each vendor against
the others in the evaluation.
We include the Forrester Wave publishing date (quarter and year) clearly in the title of each Forrester
Wave report. We evaluated the vendors participating in this Forrester Wave using materials they
provided to us by April 24, 2020 and did not allow additional information after that point. We encourage
readers to evaluate how the market and vendor offerings change over time.
In accordance with The Forrester Wave™ Vendor Review Policy, Forrester asks vendors to review our
findings prior to publishing to check for accuracy. Vendors marked as nonparticipating vendors in the
Forrester Wave graphic met our defined inclusion criteria but declined to participate in or contributed
only partially to the evaluation. We score these vendors in accordance with The Forrester Wave™ And
The Forrester New Wave™ Nonparticipating And Incomplete Participation Vendor Policy and publish
their positioning along with those of the participating vendors.
Integrity Policy
We conduct all our research, including Forrester Wave evaluations, in accordance with the Integrity
Policy posted on our website.
Endnotes
Base: 1,606 to 1,755 global purchase influencers (past 12 months/next 12 months) who responded during the COVID-19
1
pandemic; 1,606 of them have had their organizations transition to full-time remote work as a result of the pandemic.
Source: Forrester Analytics Business Technographics® Priorities And Journey COVID-19 Recontact Survey, 2020.
Source: “Cisco Reports Third Quarter FY20 Earnings,” Cisco press release, May 13, 2020 (https://newsroom.cisco.
2
com/press-release-content?type=webcontent&articleId=2074002).
Source: Dan Strumpf, “Huawei’s Revenue Hits Record $122 Billion in 2019 Despite U.S. Campaign,” The Wall Street
3
Panda Security is an endpoint protection software provider based in Madrid and Bilbao, Spain.
4
© 2020 Forrester Research, Inc. Unauthorized copying or distributing is a violation of copyright law. 17
[email protected] or +1 866-367-7378
forrester.com
Client support
For information on hard-copy or electronic reprints, please contact Client Support at
+1 866-367-7378, +1 617-613-5730, or [email protected]. We offer quantity
discounts and special pricing for academic and nonprofit institutions.
158796