We performed a comparison between Meraki MX and Zyxel Unified Security Gateway based on real PeerSpot user reviews.
Find out in this report how the two Unified Threat Management (UTM) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Ease of management is the best thing about the solution."
"The most valuable feature of Meraki MX is I can manage the solution from anywhere remotely, I can throttle bandwidth, and create all rules. Additionally, it is secure for our customers."
"I think cloud management is key. The cloud management and support are the two things that make the product great."
"What I like best about Meraki MX is that it's easy to deploy remotely. The product works. It has automatic updates. I also like that Meraki MX is a brilliant device. You turn it on, stick the key in there, activate it, and then you're done. Meraki MX does what my customers need at the end of the day, so I also like that."
"Traffic Shaping: The device lets you decide how you want to use your internet services. Due to the fact that Meraki can accept dual WAN, you can decide the way you balance the data traffic."
"We switched to Meraki because it lets you see what's happening in your LAN and WAN in a graphic and web environment."
"When you try to create an IP or when you have an alert about when a website is banned, these features are helpful."
"The initial setup for me was straightforward."
"The solution can scale well."
"This is a capable appliance and the standard features work well for us."
"The most valuable features of the solution stem from web filtering, malware protection, and antivirus."
"What I would like to see in the next version is to have more interfaces for WAN links."
"Expensive licensing and firewall stops immediately working if the license is not renewed at expiration date."
"We have been having a problem with the VPN. When the energy goes down and is back again, the VPN link doesn't get established. We have to manually turn off the modems and other pieces of equipment and manually establish the VPN. It has been around one month since we have been having this problem, and we don't have enough support from Meraki to solve the problem."
"You can only have one tunnel in the whole infrastructure — one tunnel with one device."
"In the next release, because the security is pretty basic, I think they could include additional security features."
"Could possibly use deeper configurations."
"Meraki tech support staff have a lot more visibility into your network than you do, which is frustrating at times. I understand the approach is to keep the dashboard easier to understand. This will frustrate more advanced users at times."
"The product could incorporate tools like ThousandEyes into the system so we can see things directly."
"The product has some scalability and data management issues where improvements are required."
"Although manageable, the user interface is a little bit slow and could be improved."
"Sometimes it reboots when you least expect it, and that's the main issue."
More Zyxel Unified Security Gateway Pricing and Cost Advice →
Meraki MX is ranked 2nd in Unified Threat Management (UTM) with 58 reviews while Zyxel Unified Security Gateway is ranked 10th in Unified Threat Management (UTM) with 3 reviews. Meraki MX is rated 8.2, while Zyxel Unified Security Gateway is rated 6.0. The top reviewer of Meraki MX writes "Cost-effective, simplified, easy to manage, and reliable with advanced security features and granular visibility". On the other hand, the top reviewer of Zyxel Unified Security Gateway writes "Offers good anti-spam and web filtering features but needs to improve in the area of scalability". Meraki MX is most compared with Fortinet FortiGate, Palo Alto Networks NG Firewalls, Cisco Secure Firewall, Sophos XG and Sophos UTM, whereas Zyxel Unified Security Gateway is most compared with Fortinet FortiGate, Netgate pfSense, OPNsense, Sophos XG and Cisco Secure Firewall. See our Meraki MX vs. Zyxel Unified Security Gateway report.
See our list of best Unified Threat Management (UTM) vendors.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.