Our primary use case for this solution is to use it as a firewall. This product secures the internet from internal and public users.
Founder CCIE
Adds value and helps organizations avoid problems and mistakes
Pros and Cons
- "What I found the most valuable about Cisco Secure Firewall is that if a client is educated about the solution, it can help him or her avoid many problems and mistakes."
- "Cisco's inspection visibility could be better."
What is our primary use case?
How has it helped my organization?
Cisco Secure Firewall helped add to my organization's value. It is a selling product for us here. They have great support and documentation, which makes the solution easy to sell to customers. The Cisco name has a lot of value and high brand awareness.
We are selected partners now but are looking to grow to become a primary partner for Egypt.
Cisco Secure Firewall definitely saved us time. However, security is never 100% with any product, even Cisco. So, you will have to spend some time securing your IT regardless of which solution you use.
I would say that it helped my company cut time by 50%.
The solution cautions us against threats via email notifications and internally in the web interface of the product itself on the dashboard.
What is most valuable?
What I found the most valuable about Cisco Secure Firewall is that if a client is educated about the solution, it can help him or her avoid many problems and mistakes.
What needs improvement?
I think Cisco would benefit from comparing its solutions to other products. There is a lot to learn from solutions like Palo Alto or FortiGate. These are top security products. For example, Palo Alto has better inspection visibility than Cisco. When we ask customers about Palo Alto, they say "I like Palo Alto. It helps me see problems on time. I can audit everything through it." Cisco could improve in this regard. Cisco's inspection visibility could be better.
Buyer's Guide
Cisco Secure Firewall
November 2025
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: November 2025.
872,846 professionals have used our research since 2012.
For how long have I used the solution?
I have been using this solution for a long time; since the PIX version in 2003. This adds up to almost 20 years now. I have had a plethora of experiences with this solution as both just an employee using it and also as the owner of a company. We also have a range of customers using the solution.
Which solution did I use previously and why did I switch?
We did not use any other solutions. Our strategy from the beginning has been to grow with Cisco. However, our customers have the final say in which solutions they choose and sometimes that's not Cisco. That has much to do with their previous beliefs and brand loyalty and trust. The customer's opinion matters and if the customer is loyal to Palo Alto, we are going to have a hard time getting them to make the switch.
How was the initial setup?
I am not involved in the deployment of the product. I have a sub that deploys Cisco Secure Firewall. I'm involved in guiding the deployment on the management side and making sure it's done in line with the customer's wishes.
Which other solutions did I evaluate?
I did evaluate other options but ultimately went with Cisco because of the support they offer. You can reach their tech support engineers at any time. That's important. Their documentation is great as well. Their site is wonderful.
What other advice do I have?
I rate the solution a seven out of ten.
Cisco Secure Firewall should be consolidated with routers, switches, or VOIP.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
System Administrator at a healthcare company with 501-1,000 employees
Robust, integrates well, and offers effective protection against internal risks
Pros and Cons
- "Collaboration with other Cisco products such as ISE and others is the most valuable feature."
- "While this applies to all vendors, pricing can be always lower. In my opinion, Cisco is the most expensive. The pricing can be reduced."
What is our primary use case?
The Cisco Secure Firewall is placed between the separate VLANs. It's a common and effective method of protecting VLANs against internal risks such as Checkpoints and external parameters.
How has it helped my organization?
It certainly saves time. You can detect anything if you have nothing. This is why, in the end, it saves time.
What is most valuable?
Collaboration with other Cisco products such as ISE and others is the most valuable feature.
What needs improvement?
it is difficult to say what it needs in terms of what needs to be improved. I don't work with it on a daily basis.
I haven't heard anything negative about it.
While this applies to all vendors, pricing can be always lower. In my opinion, Cisco is the most expensive.
The pricing can be reduced.
For how long have I used the solution?
Our organization has been working with Cisco Secure Firewall for three to five years.
What do I think about the stability of the solution?
There are no complaints about performance or stability.
What do I think about the scalability of the solution?
There are no issues with the scalability. It works fine.
It is simple to upgrade.
We only need one person to maintain the product.
How are customer service and support?
My colleague has experience with technical support. I'm not sure if it was with Cisco's technical support directly or through Conscia in between.
Which solution did I use previously and why did I switch?
This was the first solution we were using.
We are primarily Cisco housed, and I believe that practically everything is Cisco.
It might be part of the contract for a small fee. I don't think there's any particular reason.
I am familiar with CheckPoint, as well as Microsoft ISA.
How was the initial setup?
We have an implementation partner.
It's a hands-on job with a colleague of mine.
I don't know if it is particularly easy or not.
There was also some learning involved, such as knowing the traffic. This took some time. It took six months to deploy.
With the implementation partner, everything was written out. It was the best-case scenario for us.
We did not use the Cisco Firewall Migration tool.
What about the implementation team?
Conscia assisted us with implementation.
They are one of the best in the Netherlands.
What's my experience with pricing, setup cost, and licensing?
I am not aware of the pricing.
It's an all-in-one contract.
What other advice do I have?
I would rate Cisco Secure Firewall an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Cisco Secure Firewall
November 2025
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: November 2025.
872,846 professionals have used our research since 2012.
VSO at a computer software company with 501-1,000 employees
Good encryption and decryption with decent dashboards
Pros and Cons
- "We found the initial setup to be easy."
- "Maybe the dashboard could be a bit better."
What is our primary use case?
This is an SSL that can decrypt and encrypt SSL traffic.
What is most valuable?
The ability to encrypt and decrypt is great.
The dashboards are excellent.
We really like the reporting aspect of the product.
It is stable.
We found the initial setup to be easy.
What needs improvement?
Maybe the dashboard could be a bit better. There are some reports where we don't get it. We need a deep dive into a particular URL, however, it provides the URL and the IP address, and there is no more information that can show more details. Basically, the report models can be improved.
With their console, we have to build a separate VM. In some of the products, the management console comes along with the box itself. It'll be one solution to take the backup and keep it. Even if you want to build a DR, it'll be easy. However, the challenge we had is if that VM is down, my team may not able to access the Firepower remotely. Therefore, the management console itself should be built within the Firepower box itself, rather than expecting it to be built in a separate VM.
For how long have I used the solution?
I've been using the solution for more than four years.
What do I think about the stability of the solution?
We have not, as of now (touch wood) faced any issues. It's stable, and we don't face any performance issues as well. It's reliable. There are no bugs or glitches. It doesn't crash or freeze.
What do I think about the scalability of the solution?
At this moment, we have not thought through scaling. The model which we use is less than 60%. What I heard from them is you can cascade it to another box, and scaling can be done.
We have between 400 to 450 concurrent users on a daily basis accessing this box. Overall, we have 2,000 devices that could be easily communicated via Firepower.
How are customer service and support?
Technical support is good. We've found it to be quite good in general.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is great. It's very easy and quite straightforward. If you understand the process, it is very easy. I'd rate it a 4.5 out of five in terms of ease of implementation.
What's my experience with pricing, setup cost, and licensing?
I don't manage licensing. I can't speak to the actual cost of the product.
What other advice do I have?
We're a customer and end-user.
I'd recommend the solution to organizations that have around 1,500 people that need to access the solution.
I would rate the solution a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
UC Solutions Engineer at Diversified
Video Review
Enabled my client to have thousands of remote users connect seamlessly through VPN
Pros and Cons
- "You can also put everything into a nice, neat, little package, as far as configuration goes. I was formerly a command-line guy with the ASA, and I was a little nervous about dealing with a GUI interface versus a command line, but after I did my first deployment, I got a lot more comfortable with doing it GUI based."
- "I'm not a big fan of the FDM (Firepower Device Manager) that comes with Firepower. I found out that you need to use the Firepower Management Center, the FMC, to manage the firewalls a lot better. You can get a lot more granular with the configuration in the FMC, versus the FDM that comes out-of-the-box with it. FDM is like Firepower for dummies."
What is our primary use case?
I typically deploy firewalls to set up VPNs for remote users, and, in general, for security. I have a number of use cases.
With theUI basedpandemic, the customer really didn't have a VPN solution for their remote users, so we had to go in and deploy a high-availability cluster with Firepower. And I set up single sign-on with SAML authentication and multi-factor authentication.
How has it helped my organization?
We deploy for other organizations. I don't work on our own corporate firewalls, but I do believe we have some. But it definitely improved things. It enabled my clients to have remote users, thousands of them, and they're able to connect seamlessly. They don't have to come into the office. They can go home, connect to the VPN, log on, and do what they need to do.
What is most valuable?
I like that you can get really granular, as far as your access lists and access control go.
You can also put everything into a nice, neat, little package, as far as configuration goes. I was formerly a command-line guy with the ASA, and I was a little nervous about dealing with a GUI interface versus a command line, but after I did my first deployment, I got a lot more comfortable with doing it GUI-based.
What needs improvement?
I'm not a big fan of the FDM (Firepower Device Manager) that comes with Firepower. I found out that you need to use the Firepower Management Center, the FMC, to manage the firewalls a lot better. You can get a lot more granular with the configuration in the FMC, versus the FDM that comes out-of-the-box with it.
FDM is like Firepower for dummies. I found myself to be limited in what I can do configuration-wise, versus what I can do in the FMC. FMC is more when you have 100 firewalls to manage. They need to come out with something better to manage the firewall, versus the FDM that comes out-of-the-box with it, because that set me back about two weeks fooling around with it.
For how long have I used the solution?
I have been using Cisco Firepower NGFW Firewall for two or three years now.
What do I think about the stability of the solution?
It's good. It's stable. I haven't heard anything [from my customer]. No news is good news.
What do I think about the scalability of the solution?
It scales because you can deploy a cluster. You could have up to 16 Firepowers in a cluster, from the class I [was learning] in yesterday. I only had two in that particular cluster. It scales up to 16. If you have a multi-tenant situation, or if you're offering SaaS, or cloud-based firewall services, it's great that it can scale up to 16.
How are customer service and support?
They're always great to me. They're responsive, they're very knowledgeable. They offer suggestions, tell you what you need to do going forward, [and give you] a lot of helpful hints. It was good because I had to work with them a lot on this past deployment.
Now I can probably do it by myself, without TAC's help.
How would you rate customer service and support?
Positive
How was the initial setup?
The deployment was complex because that was my first time doing a Firepower. I did ASAs prior, no problem. I had to get used to the GUI and the different order of deploying things. I had to reset it to factory defaults several times because I messed something up. And then I had to get with Cisco TAC, for them to help me, and they said, "Okay, you need to default it and start over again".
But now, going forward, I know I need to deploy the FMC first, and then you deploy the Firepowers, and tell them where the FMC is, and then they connect, and then you can go in and configure it. I had it backward and it was a big thing. I had to keep resetting it. It was a good learning experience, though, and thankfully, I had a patient customer.
[In terms of maintenance] I've not heard anything back from my customer, so I'm assuming once it's in, it's in. It's not going to break. It's an HA pair. My customer doesn't really know too much about it. I don't know that they would know if one of them went down, because it fails over to the other one. I demonstrated to them, "Look, this is how it fails over. If I turn one off, it fails over." VPN doesn't disconnect, everything's good. Users don't know that the firewall failed over unless they're actually sitting there looking at AnyConnect. I don't think they know. So, I'll wait for them to call me and see if they know if something's broken or not.
What was our ROI?
As far as return on investment [goes], I would imagine there is some. For the users, as far as saving on commuting costs, they don't have to come into the office. They can stay home and work, and connect to the enterprise from anywhere in the world, essentially.
Which other solutions did I evaluate?
I've done a Palo Alto before, and a Juniper once, but mostly ASAs and Firepowers.
Naturally, I prefer Cisco stuff. [For the Palo Alto deployment] they just said, "Oh, you know, firewalls", and that's why the customer wanted Palos, so that's what I had to do. I had to figure it out. I learned something new, but my preference is Cisco firewalls.
I just like the granularity of the configuration [with Cisco]. I've never had any customers complain after I put it in, "Hey, we got hacked," or "There are some holes in the firewall," or any type of security vulnerabilities, malware, ransomware, or anything like that. You can tighten up the enterprise really well, security-wise.
Everything is GUI-based now, so to me, that's not really a difference. The Palos and the Junipers, I don't know what improvements they have made because [I worked on] those over five or six years ago. I can't even really speak to that.
What other advice do I have?
Because I don't like the management tool that comes out-of-the-box with it, the FDM, I'll give the Firepower an eight out of 10. That was a real pain dealing with, until they said, "Okay, let's get him an FMC." That was TAC's suggestion, actually. They said, "You really need FMC. The FDM is really trash."
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Network Support Engineer at a manufacturing company with 51-200 employees
Poor upgrade process can result in network failure, but the threat defense works well and it is scalable
Pros and Cons
- "Cisco's technical support is the best and that's why everybody implements their products."
- "The main problem we have is that things work okay until we upgrade the firmware, at which point, everything changes, and the net stops working."
What is our primary use case?
We primarily use this firewall for IPS, IAM, threat defense, and NAT.
I am from the networking department.
How has it helped my organization?
We are using the Firepower Management Center (FMS) and the management capabilities are okay. I would not say that they are good. The current version is okay but the earlier versions had many issues. The deployment also takes a long time. It takes us hours and in some cases, it took us days. The latest version 6.6.1, is okay and the deployment was quick.
I have tried to compare application visibility and control against Fortinet FortiGate, but so far, I don't see much difference. As I try to determine what is good and what is bad, I am seeking third-party opinions.
What is most valuable?
The most valuable feature is the threat defense. This product works well for threat defense but for everything else, we use Cisco ASA.
What needs improvement?
This product has a lot of issues with it. We are using it in a limited capacity, where it protects our DR site only. It is not used in full production.
The main problem we have is that things work okay until we upgrade the firmware, at which point, everything changes, and the net stops working. As a financial company, we have a lot of transactions and when the net suddenly stops working, it means that we lose transactions and it results in a huge loss.
We cannot research or test changes in advance because we don't have a spare firewall. If we had a spare then we would install the new firmware and test to see if it works, or not. The bottom line is that we shouldn't have to lose the network. If we upgrade the firmware then it should work but if you do upgrade it, some of the networks stop working.
For how long have I used the solution?
We have been using the Cisco Firepower NGFW Firewall for three years.
How are customer service and support?
Cisco's technical support is the best and that's why everybody implements their products. But, when it comes to Firepower, we have had many delays with their support. For all of the other Cisco products, things are solved immediately.
Nowadays, they're doing well for Firepower also, but initially, there was no answer for some time and they used to tell us that things would be fixed in the next version. That said, when comparing with other vendors, the support from Cisco is good.
Which solution did I use previously and why did I switch?
We use a variety of tools in the organization. There is a separate department for corporate security and they use tools such as RedSeal.
In the networking department, we use tools to analyze and report the details of the network. We also create dashboards that display things such as the UP/DOWN status.
We have also worked with Cisco ASA, and it is much better. Firepower has a lot of issues with it but ASA is a rock-solid platform. The reason we switched was that we needed to move to a next-generation firewall.
How was the initial setup?
The initial setup was not easy and we were struggling with it.
In 2017, we bought the Firepower 2100 Series firewalls, but for a year, there was nothing that we could do with them. In 2018, we were able to deploy something and we had a lot of difficulties with it.
Finally, we converted to Cisco ASA. When we loaded ASA, there was a great difference and we put it into production. At the time, we left Firepower in the testing phase. In December 2018, we were able to deploy Firepower Threat Defense in production, and it was used only in our DR site.
What about the implementation team?
We do our own maintenance and there are three or four of us that are responsible for it. I am one of the network administrators. We can also call Cisco if we need support.
What was our ROI?
From the perspective of return on investment, implementing the Firepower 2100 series is a bad decision.
What's my experience with pricing, setup cost, and licensing?
Firepower has a very high cost and you have to pay for the standby as well, meaning that the cost is doubled. When you compare Fortinet, it is a single cost only, so Fortinet is cheaper.
Which other solutions did I evaluate?
Prior to Firepower, we were Cisco customers and did not look to other vendors.
Given the problems that we have had with Cisco, we are moving away from them. We are now trying to implement FortiGate and have started working with it. One thing that we have found is that the Fortinet technical support is very bad.
What other advice do I have?
I would rate this solution a five out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security admin at a wholesaler/distributor with 10,001+ employees
Used to protect systems against various methods of intrusion
Pros and Cons
- "This solution helped us to identify the key areas where we need to focus to block traffic that is malicious to our organization."
- "The application detection feature of this solution could be improved as well as its integration with other solutions."
What is our primary use case?
This solution is a next-generation firewall. We use it to inspect our traffic going through the internet edges. This solution blocks Tor nodes or botnets that try to invade the system using various methods for intrusion.
How has it helped my organization?
This solution helped us to identify the key areas where we need to focus to block traffic that is malicious to our organization. We can complete a layer 7 inspection and take a deep dive into the packets and block the traffic accordingly.
It took approximately six months to a year to realize the benefits of deploying this solution. It's an arduous process that is still ongoing.
What is most valuable?
This tool offers great value with regard to cyber security due to its integration with different tools like Splunk and other cloud-based solutions.
Within an application, you can block traffic at a granular level instead of relying on HTTPS traffic.
What needs improvement?
The application detection feature of this solution could be improved as well as its integration with other solutions.
For how long have I used the solution?
I have been using this solution for five years.
What do I think about the stability of the solution?
There is room for improvement when it comes to stability. We have encountered a lot of bugs using this solution.
What do I think about the scalability of the solution?
This is a scalable solution.
How are customer service and support?
I would rate the customer support for this solution an eight out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously used Check Point. We had an option to connect all of our security products from the endpoint to the firewalls to SASE-based solutions. This is why we changed solutions.
How was the initial setup?
The initial setup is straightforward because it is supported by good documentation. We did not experience many issues and deployment took a couple of months.
We first deployed the solution in monitoring mode before moving into protection mode. We required four or five engineers for this. It takes a lot of time to do any maintenance or upgrades. This is one of my key pain points for this product.
Maintenance requires two people; one to focus on the upgrade and one to monitor the traffic.
What was our ROI?
We have experienced a return on investment in terms of security that has added value.
What's my experience with pricing, setup cost, and licensing?
This solution offers smart licensing that is comparable to other solutions on the market.
What other advice do I have?
I would rate this solution a seven out of ten.
There are multiple data planes that run within this solution. My advice is to unify those data planes into a single data plane, so that traffic is sectioned and can be handled effectively. If you need a next-generation firewall, this is a good product.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Security engineer at a energy/utilities company with 10,001+ employees
We have more control over things going in and out of our network
Pros and Cons
- "We definitely feel more secure. We have more control over things going in and out of our network."
- "Third-party integrations could be improved."
What is our primary use case?
We mainly use it for ICS security.
How has it helped my organization?
We definitely feel more secure. We have more control over things going in and out of our network.
Cybersecurity has been our top priority because of the last few attacks on our peers in the oil and gas industry.
What is most valuable?
The IPS solution helps us to not only navigate north-south traffic, but also east-west traffic.
What needs improvement?
Third-party integrations could be improved.
Not everything works out-of-the-box. Sometimes, you have to customize it to your needs.
For how long have I used the solution?
I have been using it for two years.
What do I think about the stability of the solution?
It is stable for the most part.
There is maintenance needed for software, firmware, and updates. Three or four people keep up with the updates, etc.
What do I think about the scalability of the solution?
It is pretty scalable. We can add as many devices as we want.
How are customer service and support?
The technical support is good. I would rate them as 10 out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously had a different platform. We wanted to converge multiple platforms into one.
I switched companies. So, I have more experience with Palo Alto.
What was our ROI?
We saw immediate benefits after deployment from having more control and visibility.
What's my experience with pricing, setup cost, and licensing?
Pretty much everything is included in the price for what we are using.
Which other solutions did I evaluate?
We looked at Check Point, Palo Alto, Fortinet, and a bunch of others. The management and support for the CIsco product is better.
What other advice do I have?
Listen to your customers and see what their needs are.
The whole stack provided by Cisco is a holistic solution for cybersecurity experts, like myself, and companies who are looking to secure their network.
You should partner up with a good team to view all products available, which cater and are customized to your needs.
We haven't found any gaps where it is lacking.
I would rate this product as eight or nine out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Automation Engineer at a financial services firm with 1,001-5,000 employees
Remote access VPN enables our employees to work from home
Pros and Cons
- "For our very specific use case, for remote access for VPN, ASAs are very good."
- "Cisco wasn't first-to-market with NGFWs... they should look at what other vendors are doing and try not only to be on the same wavelength but a little bit better."
What is our primary use case?
We use it for remote access VPN. That means the folks at home can work from home using AnyConnect.
What is most valuable?
For our very specific use case, for remote access for VPN, ASAs are very good.
Cisco also introduces new features and new encryption techniques.
What needs improvement?
Cisco wasn't first-to-market with NGFWs. That is one of the options now. They did make an acquisition, but other vendors got into that space first. I would tell Cisco to move faster, but everything moves at the speed of light and it's hard to move faster than that. But they should look at what other vendors are doing and try not only to be on the same wavelength but a little bit better. It's hard to be critical of Cisco given that they pave the way a lot, but they should see what their peers are doing and try to emulate that.
In terms of additional features, perhaps there could be some form of integration with the cloud. I don't know how much appetite we would have for that given the principle of keeping a lot of the sensitive data on-prem. But some integration with the cloud might be useful, given that the cloud is everything you see these days. We have our on-premises devices, but maybe they could provide an option where it fails over to a cloud in a worst-case scenario.
For how long have I used the solution?
I've been using Cisco ASA Firewalls from the time I was in school. I learned it when I was in the academic setting. I joined Cisco and worked there for six years there as a sales engineer before joining my current company.
What do I think about the stability of the solution?
The stability of the solution is a 10 out of 10.
What do I think about the scalability of the solution?
Scalability is probably a 10 out of 10 for what we're looking at.
How are customer service and support?
Their technical support is very good. Maybe I view them with rose-colored glasses since I was there for six years, but they really do try hard. Cisco cracks the whip on them. They do a lot of work. There's no downtime.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
The challenge we wanted to address was scale. We're growing and we needed something a little more robust, something that could hold a big boy. We've got a lot more employees and we were using an older version of the hardware, so we upgraded to the newest version of the hardware, given that we're familiar with it. It solves our use case of allowing employees to work from home.
How was the initial setup?
I was involved in the design, deployment, and operations. Our team is very special in the fact that we don't delegate to other folks. We're responsible for what we eat and what we design. We actually do the hands-on work and then we maintain it. We tend not to hire out because they come, they wash their hands clean of it, leave, and then there's all this stuff that needs fixing. If we get paged at 3:00 AM it might be our fault, and the lessons are learned.
Our network engineering team consists of about 12 people.
What's my experience with pricing, setup cost, and licensing?
The pricing is fair.
What other advice do I have?
My advice to others would be to design it well and get it validated by the Cisco team or by a consulting company. Don't be afraid of the solution because they have skin in the game. It's been in the market for so long, it's like buying a Corolla, as odd as that sounds. If you have a use case for your car where you're just driving from A to B, then get that Corolla and it will suit you well. It will last you 100 million miles.
Cyber security resilience is super important. We have super important data and we need to secure it. We're regulated and audited by the government and we're audited all the time. I get audited when I breathe. We have to make sure everything is super transparent and make sure that we have all of the fail-safes in place and done well. We have to be very accountable so that there are no "gotchas."
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Cisco Umbrella
Cisco Identity Services Engine (ISE)
Palo Alto Networks NG Firewalls
WatchGuard Firebox
Cisco Meraki MX
Check Point Quantum Force (NGFW)
Azure Firewall
SonicWall TZ
Sophos XGS
Cisco Secure Network Analytics
Fortinet FortiGate-VM
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?













