We currently have a Ivanti/Pulse VPN unit, which is behind a Juniper Firewall and Junuper core switch. This is generally fine for us but we are looking at a hardware refresh next year and wondering what options we might have. We have around 100 ish staff with 80 concurrent vpn licenses though about 40-50 generally connected.
We could just replace this as is, but I’m wondering if there’s other solutions that people are using that could work. Like replacing with a Fortinet and just run the vpn through the firewall.
We had the Juniper/Pulse combo before and swapped to Palo Alto when we had a hardware refresh - partially to avoid the VPN per-user stuff.
We did look at the Fortinet too, but the cost difference was at the time not massive and Palo Alto seemed to be regarded as better. Though this was for the entry class device, and I know Palo Alto stuff is… Well, not always budget friendly.
You can run the VPN through the Juniper firewall as long as you have a recent firmware version. The feature is called “Juniper Secure Connect” and the licensing is rather inexpensive.
Twingate has been good for us. Recently had a high profile user tell me that it’s been the best VPN\ZTNA option he has used over the years with us, we have been through a bunch.
We run Sonicwall, its…fine. Get some weird disconnect issues when transferring large files sometimes, and I wish the transfer speeds were better overall.
Check out CloudZiti. Its a SaaS zero trust overlay built on open source OpenZiti. It builds outbound only connections, least privilege, microsegementation, posture checks, private DNS and more. Others mentioned Twingate, its similar in ways, but also more expansive - e.g., can also do ‘east-west’ ZTN connectivity in LAN. It also supports integration via the Azure API for posture check from Microsoft Endpoint Manager as you mentioned would be good in another comment.
Fortinet works fine aside from the common credentials issues by users or its service stopping. SonicWall along with. Just the amount of users you have make sure mfa is set in place.
Have a look into ZTNA access solutions. Most vendors have them. The main benefit is that you don’t need to expose any ports to the internet for remote access.
I’ve used Netskope Private access which is good and easy to setup.