Try our new research platform with insights from 80,000+ expert users
reviewer2107434 - PeerSpot reviewer
Senior Network Administrator at a comms service provider with 201-500 employees
Real User
Good performance and good support
Pros and Cons
  • "Their performance is most valuable."
  • "The stability could be better because we have a lot of issues with the stability of Cisco Firepower."

What is our primary use case?

We use them for firewall purposes. We use the small ones with the partners for the services they need, such as VPN and security.

What is most valuable?

Their performance is most valuable.

What needs improvement?

The stability could be better because we have a lot of issues with the stability of Cisco Firepower.

For how long have I used the solution?

I've been using Cisco firewalls for 20 years.

Buyer's Guide
Cisco Secure Firewall
November 2024
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.

What do I think about the stability of the solution?

We have a lot of issues with the stability of Cisco Firepower.

What do I think about the scalability of the solution?

It depends on the model. We are hitting some issues with scalability. It's getting very expensive to scale out.

How are customer service and support?

They sometimes take too long and don't fix the issue quickly, but eventually, it is fixed. I'd rate their support a nine out of ten.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We have been using different Cisco firewalls for a long time. We are currently using Cisco Firepower and Cisco ASA. Cisco Firepower is better than Cisco ASA, but stability is an issue.

How was the initial setup?

It's now easier than before. You can have virtual appliances.

We mostly have it on-prem, but some customers want on-prem virtual.

Which other solutions did I evaluate?

We considered using a different solution such as Check Point or Huawei. We chose to stay with Cisco because we're experienced with Cisco and because of the support.

What other advice do I have?

The old versions or models saved us time, but the newer ones take our time. Overall, I'd rate Cisco Secure Firewall an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
PeerSpot user
Catalin Enea - PeerSpot reviewer
System Engineer at a computer software company with 5,001-10,000 employees
Real User
Reliable and helps to increase security and protect the company's data
Pros and Cons
  • "There are some hiccups here and there, but compared to the technical support from other vendors, I have had the best experience with Cisco's technical support. I would rate them at nine out of ten."
  • "Firepower's user experience should be a little bit better."

What is our primary use case?

We use Cisco ASA and Firepower.

ASA is used for AnyConnect connections, that is, for users to connect to the office. It is very reliable and works fine.

We use Firepower in some sites as firewalls to control inbound/outbound access. We use it as a software protection layer. However, because most users are now working from home, few users need it in the office. As a result, in some places, we have switched to SD-WAN.

What is most valuable?

The network products help save time if they are well configured at the beginning. They help increase security and protect the company's data.

What needs improvement?

Firepower's user experience should be a little bit better.

For how long have I used the solution?

I've been using Cisco Firepower for six months.

How are customer service and support?

There are some hiccups here and there, but compared to the technical support from other vendors, I have had the best experience with Cisco's technical support. I would rate them at nine out of ten.

How would you rate customer service and support?

Positive

How was the initial setup?

The initial setup was somewhat easy because we had previous experience with implementation. We copied that strategy or tried to align it to that implementation, but there were some challenges.

We have a hybrid cloud deployment. We have our own data centers and a lot of branches. In the data centers, most Cisco technologies start with ACI. With firewalls for big branches, we find that it's easier to break out to the internet globally rather than to use data centers.

What's my experience with pricing, setup cost, and licensing?

Cisco's prices are more or less comparable to those of other products.

What other advice do I have?

Compared to other vendors' firewalls, Cisco's firewalls are a bit behind. Overall, however, I would rate Cisco Firewall at eight on a scale from one to ten.

Which deployment model are you using for this solution?

Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Cisco Secure Firewall
November 2024
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
Tim Maina - PeerSpot reviewer
Network Engineer at a tech vendor with 5,001-10,000 employees
Real User
Provides us with a critical piece of our in-depth security stack
Pros and Cons
  • "The Packet Tracer is a really good tool. If someone calls because they're having problems, you can easily create fake traffic without having to do an extended packet capture. You can see, straight away, if there's a firewall rule allowing that traffic in the direction you're trying to troubleshoot."
  • "One of the challenges we've had with the Cisco ASA is the lack of a strong controller or central management console that is dependable and reliable all the time."

What is our primary use case?

We have the Cisco 5585-X in our data center for perimeter security, internet protection, and for applications behind Cisco ASA DMZs. The challenges we wanted to address were security and segregating the internal networks and the DMZs.

How has it helped my organization?

Security-wise, it's given us the protection that we were looking for. Obviously, we're using an in-depth type of design, but the Cisco ASA has been critical in that stack for security.

What is most valuable?

The Packet Tracer is a really good tool. If someone calls because they're having problems, you can easily create fake traffic without having to do an extended packet capture. You can see, straight away, if there's a firewall rule allowing that traffic in the direction you're trying to troubleshoot. As a troubleshooting tool, Packet Tracer is one of the things that I like. It comes up in all my interviews. When I want to figure out if someone knows how to use the ASA, I ask them about use cases when they use the Packet Tracer.

What needs improvement?

One of the challenges we've had with the Cisco ASA is the lack of a strong controller or central management console that is dependable and reliable all the time. There was a time I was using what I think was called CMC, a Cisco product that was supposed to manage other Cisco products, although not the ASA. It wasn't very stable.

The controller is probably the biggest differentiator and why people are choosing other products. I don't see any other reason.

For how long have I used the solution?

I've used the Cisco ASA going back to the 2014 or 2015 timeframe.

What do I think about the stability of the solution?

The ASA has been very stable for us. Since I deployed the ASA 5585 in our data center, we've not had to resolve anything and I don't even recall ever calling TAC for an issue. I can't complain about its stability as a product.

Our Cisco ASA deployment is an Active-Standby setup. That offers us resilience. We've never had a case where both of them have gone down. In fact, we have never even had the primary go down. We've mainly used that configuration when we're doing code upgrades or maintenance on the network so that we have full network connectivity. When we're working on the primary, we can switch over to the standby unit. That type of resiliency works well for our architecture.

How are customer service and support?

TAC is good, although we've had junior engineers who were not able to figure things out or fix things but, with escalations, we have eventually gotten to the right person. We also have the option to call our sales rep, but we have never used that option. It seems like things are working.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

In the old days, we used Check Point. We did an evaluation of the Cisco ASA and we liked it and we brought it on board.

At that time, it was easy for our junior operations engineers to learn about it because they were already familiar with Cisco's other products. It was easier to bring it in and fit it in without a lot of training. Also, the security features that we got were very good.

How was the initial setup?

The one we deployed in the data center was pretty straightforward. I also deployed the Cisco ASA for AnyConnect purposes and VPN. I didn't have to call TAC or any professional services. I did it myself.

What about the implementation team?

We used a Cisco reseller called LookingPoint. I would recommend them. We've done a lot of other projects with them as well.

What was our ROI?

It's a great investment and there's a lot of value for your money if you're a CSO or a C-leader. As an engineer, personally, I have seen it work great wonders for us. When we're doing code upgrades or other maintenance we are able to keep the business going 100 percent of the time. We have definitely seen return on our investment.

What's my experience with pricing, setup cost, and licensing?

I don't look at the pricing side of things, but from what I hear from people, it's a little pricey.

Which other solutions did I evaluate?

At the time, we looked at Juniper and at Palo Alto. We didn't get a feeling of confidence with Palo Alto. We didn't feel that it offered the visibility into traffic that we were looking for.

What other advice do I have?

We use Cisco AnyConnect and we've not had any issues with it. During COVID we had to scale up and buy licenses that supported the number of users we had, and we didn't have any problems with it.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1263240 - PeerSpot reviewer
Data Analyst at a hospitality company with 201-500 employees
Real User
User-friendly, provides good access, and is fairly easy to implement
Pros and Cons
  • "It is a very user-friendly product."
  • "I don't have to see all the object groups that have been created on that firewall. That's just something that I would really appreciate on the CLA, even though it already exists on the GUI."

What is our primary use case?

We primarily use the solution in order to create access rules. That's what I use it for mostly. Sometimes, if I need to do some mapping, I may also leverage this product.  

What is most valuable?

In terms of access, the solution is great at making sure that the firewall has the right IPs, or that the right IPs are passing through where they should be. 

The product does a good job of making sure that the connection is one that the user can trust. It keeps everything secure.

From what I've already done with ASA, I've noted that it's a very simple solution. 

It is a very user-friendly product. I started with the GUI version. There are different versions. You could have the CLA, and the GUI version if you like. Both are really user-friendly and they're easy to learn. 

What needs improvement?

We haven't been working with the product for too long, and therefore I haven't really found any features that are lacking. So far, it's been pretty solid.

One of the things that would make my life easier on ASA, especially for the CLA, is if it had an ASBN feature, specifically for the CLA. This would allow you to be able to see at once where a particular object group is being used without having to copy out all the object groups that have already been created.

I don't have to see all the object groups that have been created on that firewall. That's just something that I would really appreciate on the CLA, even though it already exists on the GUI.

For how long have I used the solution?

I've been using the solution for six months now. It's been less than a year. It hasn't been too long just yet.

What do I think about the stability of the solution?

The solution has been quite stable.

Most of the clients that we deal with use this solution. No one has ever complained about having a breach or anything, to the best of my knowledge, even though we see some people combine different firewalls together, and use them alongside Cisco ASA. So far, we've not had any issue with Cisco ASA. It's reliable and keeps our clients safe.

What do I think about the scalability of the solution?

I've never tried to scale the product. I haven't worked with it too long at this point. I wouldn't be able to comment on its scalability potential.

How are customer service and technical support?

I've never dealt with technical support yet. I can't speak to their level or response or their knowledge of the product.

Which solution did I use previously and why did I switch?

In the past, I've worked with Check Point and Fortinet as well.

How was the initial setup?

I've been handling the implementation. So far, it's been good, even with no prior knowledge of the solution itself. It's my first time working with it.

On my team, lots of people are working on different aspects, and most of the setup is being done by those that have more knowledge about the firewall than we have. We don't have anything to do with the setup, we just make sure that we implement whatever connections the clients already have. It's already broken down that way, just to avoid as many mistakes as possible.

We already have a process for implementation based on the number of connections. The maximum we normally work on each connection is maybe 20 to 30 minutes. However, the process could be as little as one minute. It depends on how many connections we want to add at a time.

What about the implementation team?

We're handing the implementation via our own in-house team.

What's my experience with pricing, setup cost, and licensing?

I'm just handling the implementation and therefore don't have any insights on the pricing aspect of the solution. I wouldn't be able to say how much the company pays or if the pricing is high or low.

That said, the pricing isn't an issue. It's more about what's best for the customer or the client. We want to give the client the best service, and very good protection. If a client begins to worry about pricing, we can't exactly guarantee the same level of safety.

What other advice do I have?

Our company has a partnership with Cisco.

We have different clients and therefore use different versions of the solution. Nobody wants to use an out-of-date version, and therefore, we work to keep everything updated.

Overall, I would rate the solution at a nine out of ten.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Vinay-Singh - PeerSpot reviewer
Manager IT & Security at mCarbon Tech Innovations Pvt., Ltd.
Real User
Feature-rich VPN connection, scalable, stable, and has perfect support
Pros and Cons
  • "I like all of the features."
  • "It is my understanding that they are in the process of discontinuing this device."

What is our primary use case?

We are using this solution for the site-to-site VPN tunnels and VPN Connections.

What is most valuable?

I like all of the features.

What needs improvement?

It is my understanding that they are in the process of discontinuing this device.

They are in the process of shutting down this ASA series and will continue with Firepower.

In the next release, it could be more secure.

For how long have I used the solution?

I have been using Cisco ASA Firewall for six years.

We are not using the latest version.

What do I think about the stability of the solution?

It's a stable solution. I have not had any issues.

What do I think about the scalability of the solution?

This product is scalable. We have 100 users in our organization.

We will not continue to use this solution. We will be upgrading to either Firepower or Check Point.

How are customer service and technical support?

Technical support is perfect.

Which solution did I use previously and why did I switch?

I was using Dell SonicWall before Cisco ASA Firewall.

How was the initial setup?

The initial setup was straightforward. 

It's easy to install and it doesn't take a lot of time for the initial configuration.

It took an hour to install.

What about the implementation team?

I completed the installation myself. We did not use a vendor or vendor team.

What's my experience with pricing, setup cost, and licensing?

There are licensing costs.

What other advice do I have?

I would not recommend this solution. The technology is old and they should move to Firepower or NextGen Firewall.

I would rate the Cisco ASA Firewall an eight out of ten.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
IT Manager at Citizens Bank
Real User
Streamlines lockdown and the management of that aspect of security
Pros and Cons
    • "The only con that I have really seen with it is the reporting structure. FirePOWER is good. It has been a great help because, before that, it was not good at all."

    What is our primary use case?

    The primary use is that it manages all of our incoming and outgoing VOIP transmissions as well as data transmissions between our branches and our third-party bank processor. It has performed well.

    How has it helped my organization?

    The ASAs are very stable firewalls, and they've been very good at protecting our assets here at the bank. They have done exactly what they were purchased for. They have done a great job.

    What is most valuable?

    I've always looked at Cisco products as being the industry standard. They're wonderful at being able to lockdown and manage that. 

    What needs improvement?

    The only con that I have really seen with it is the reporting structure. FirePOWER is good. It has been a great help because, before that, it was not good at all. 

    For how long have I used the solution?

    Three to five years.

    What do I think about the scalability of the solution?

    The scalability is very good. We use the 5600 models and the lower 5000s. We were able to upgrade as needed. We added a ton of VPN tunnels to them and they handled all that traffic quite well.

    How are customer service and technical support?

    Support has been very good, very professional, got right to the point. My third-party administrator got stuck on setting up some tunnels. We called ASA support and they walked him right through how to do it. That was good.

    How was the initial setup?

    The third-party did all of the setup. I told him what I wanted and he set everything up and got the tunnels for us as well.

    What's my experience with pricing, setup cost, and licensing?

    The cost of keeping the licensing up on the ASA is very expensive. It has a lot of positives, but the cost of going with it is really starting to be a major negative right now.

    What other advice do I have?

    Talk to your peers in the industry, find out what they use and why, and then look at exactly what you're using it for. We changed a great deal of our infrastructure, adding a lot of extra tunnels, so that made a complicated product even harder to manage. Look at what you're comfortable in managing with their interface.

    We start looking at upgrade cost, our constant licensing cost. I look at other products that rank very high in industry ratings. Now I'm looking at similar products that are a little bit easier to manage. That is another fault of the ASA. They're very complicated to manage, but that’s because they have so many features. It's a very feature-rich product.

    When selecting a vendor the most important factors are

    • Security - obviously that is number one because we are a financial institution
    • stability of the vendor
    • how the product is ranked in the market.

    In terms of security, right now is a really tough time for us because, even as a smaller community bank, we’re targeted. We have huge targets on us right now from hackers. I have to have a product that is stable, that will hold up, from a reputable company. I'm looking at companies that are top-tier.

    I would rate the ASA equipment itself a nine out of 10. The software and manageability would rate a seven and the reason for that is the complexity of it. It is extremely complicated, even for our Cisco-certified person who manages it for us.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    IT Service Technician at Scaltel AG
    Reseller
    Can easily segment the network but does not have direct access via web browsers
    Pros and Cons
    • "The most valuable feature for the customers is that they can control what communication is allowed and what is not allowed. That is, they can allow or deny client traffic."
    • "Cisco Secure Firewall should be easier to handle. It uses ASDM, which is not easy to understand. It would be better if there was direct access via HTTPS."

    What is our primary use case?

    We use Cisco Secure Firewall in our own company for site-to-site VPN to access our customers and provide remote support.

    We sell the solution to our customers as well. They use the ASA or FMC for dedicated networking, for example, the process network. That is, they dedicate the process network or ASA to the user network.

    As a Cisco Secure reseller, I add value with my professional background, for example, in Cisco TAC, to my customers. We choose to sell Cisco Secure Firewall because of our partner status with Cisco.

    What is most valuable?

    The most valuable feature for the customers is that they can control what communication is allowed and what is not allowed. That is, they can allow or deny client traffic.

    It also secures the internal network to allow specific client traffic or machine traffic.

    Cisco Secure Firewall helped reduce our clients' meantime to repair by 40%. This is because they can easily segment the network. It's easy to troubleshoot because of micro-segmentation.

    What needs improvement?

    Cisco Secure Firewall should be easier to handle. It uses ASDM, which is not easy to understand. It would be better if there was direct access via HTTPS.

    For how long have I used the solution?

    I have used this solution for around five years, but my company has been using it for 30 years.

    How are customer service and support?

    Cisco's technical support for security is good. The support staff are professional and know what to do. I would give them an eight out of ten.

    How would you rate customer service and support?

    Positive

    How was the initial setup?

    The deployment of the firewall is more difficult if you want to use all of the features. However, if you're using it only as a VPN, then it's a little bit easier to deploy.

    What other advice do I have?

    Compared to Cisco Secure Firewall, other firewall solutions are easier to handle because they do not use ASDM. They have direct access via web browsers.

    If you're considering Cisco Secure Firewall, take a look at what you want to use the firewall for and what kind of handling you prefer. If you prefer easy handling via browsers, then you may need to use another solution because ASDM is no longer the state of the art.

    Overall, I would rate Cisco Secure Firewall at seven on a scale from one to ten.

    The I add as a reseller is the professional background.

    Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
    PeerSpot user
    IT Consultant at ACP IT Solutions AG
    Reseller
    Is scalable, but firewall management needs improvement
    Pros and Cons
    • "Cisco Secure Firewall is a scalable solution."
    • "The management of the firewalls could be improved because there are a lot of bugs."

    What is our primary use case?

    Our clients use Cisco Secure Firewall to protect them from data breaches. They also use it for site-to-site VPN connections and remote access.

    What is most valuable?

    The most valuable features are remote access, site-to-site VPN, and next-generation features.

    What needs improvement?

    The management of the firewalls could be improved because there are a lot of bugs.

    For how long have I used the solution?

    I've been selling this solution for three years.

    Most of our clients have deployed the solution on-premises and are slowly migrating to hybrid and to SaaS models.

    What do I think about the stability of the solution?

    When you configure it, it's very stable.

    What do I think about the scalability of the solution?

    Cisco Secure Firewall is a scalable solution.

    How are customer service and support?

    Cisco's technical support is good.

    Which solution did I use previously and why did I switch?

    We used to sell Palo Alto firewalls and switched to Cisco because it was more cost-effective for clients.

    As a Cisco reseller, I try to give our customers the best possible solutions for their problems.

    How was the initial setup?

    The initial setup is straightforward for smaller organizations, but it can be complex when companies are larger.

    Migrating certain components of a client's previous firewall configurations to Cisco Secure Firewall with the migration tool is simple, easy, and quick. However, it would be really nice if we could migrate complete ASA configurations to FTD with the migration tool and not just the policies and objects.

    Maintenance-wise, we troubleshoot and make changes if required.

    What about the implementation team?

    I deployed it myself with, and perhaps with one person from the client's end.

    What other advice do I have?

    On a scale from one to ten, I would rate Cisco Secure Firewall at seven.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller
    PeerSpot user
    Buyer's Guide
    Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.
    Updated: November 2024
    Buyer's Guide
    Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.