The most valuable features are the IPS and Botnet software modules. These security features, working in tandem, truly provide a peace-of-mind against all levels of cyber-attacks.
Network Consultant at a tech consulting company with 51-200 employees
I'd like the ability to use IPS & CX modules simultaneously but overall it provides peace-of-mind against cyber-attacks.
What is most valuable?
How has it helped my organization?
Since the 5512-x is software license based, there is no need to purchase additional hardware to enable much needed features.
What needs improvement?
Since most features are license based and some licenses are time-based, there should be a way for the device to alert via SNMP that licenses are about to expire. Also, I would like to be able to use both the IPS and CX modules simultaneously, instead of one or the other.
For how long have I used the solution?
I have been using the 5512-x for almost one year now.
Buyer's Guide
Cisco Secure Firewall
November 2024
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
What was my experience with deployment of the solution?
Deployment of the 5512-x is very simple. The main issue I found was in deploying the firewall using the "new" style of configuring NAT statements.
What do I think about the stability of the solution?
I have not encountered any stability issues with the IOS version or the IPS version. I am currently running IOS 9.3.2 and IPS version 7.3(2)E4.
What do I think about the scalability of the solution?
The 5512-x with a BASE license does not have many options for scalability. However, the Security Plus option allows multiple contexts and ACTIVE/ACTIVE fail-over options. I currently do not use those features, but I can definitely see the need for both of these options.
How are customer service and support?
Customer Service:
Cisco customer services have always been excellent. I have never had any issues with them.
Technical Support:Cisco TAC is always hit-or-miss. You either get a guru or a newbie, and there is nothing in between.
Which solution did I use previously and why did I switch?
The previous firewall was a Cisco SA520W. This device was great as it was a firewall, IPS and WLC all in one. I switched due to this device being EOL/EOS. Also, the main complaint about this device was that with the IPS enabled all traffic was slowed to a crawl. I would rate the SA520W as 3/10.
How was the initial setup?
The SA520W was a simple setup. There is no CLI option; it is all done within a straightforward GUI.
What about the implementation team?
All solutions are designed, configured, and maintained by me.
What was our ROI?
The ROI on the SA520W is 0. As this device is EOL/EOS.
What's my experience with pricing, setup cost, and licensing?
The original setup cost of the SA520W was approx. US$500. The setup for the 5512-x was approx. US$3000. For the 5512-x, additional costs were endured for the IPS and Botnet licenses approx. an additional US$1000/year. As for day-to-day costs, the 5512-x self-updates the security modules, so there is little interaction that I need to perform.
Which other solutions did I evaluate?
I was considering going to the ISA550W (the replacement for the SA520W) or a 5505. I ultimately went with the 5512-x due to its speed and software licensing model.
What other advice do I have?
The next-gen firewalls are a great solution. Be aware of the additional hardware costs (120GB SSD) that are needed to implement some features like the CX module. Also, if you do not need ACTIVE/ACTIVE fail-over there is no real need for the Security plus license. And finally, understand the true speed of the model you choose with and without the IPS module enabled before making a final decision.
Disclosure: My company has a business relationship with this vendor other than being a customer: My company is a Cisco re-seller.
Cybersecurity Architect at a financial services firm with 5,001-10,000 employees
Provides our organization with a sense of security, reliability, and trustworthiness
Pros and Cons
- "The most valuable feature would be the IP blocking. It gets rid of things that you don't need in your environment."
- "The solution is overcomplicated in some senses. Simplifying it would be an improvement."
What is our primary use case?
It has been great for blocking incoming bad actors. The new Firepower modules have been a welcome additive to that.
How has it helped my organization?
Cybersecurity resilience has helped us be able to react and respond in a quick fashion to anything that may be happening or any anomalies within the environment.
The solution has provided us a sense of security, reliability, and trustworthiness.
What is most valuable?
The most valuable feature would be the IP blocking. It gets rid of things that you don't need in your environment.
Its resilience helps offer being able to react and self-heal.
What needs improvement?
The solution is overcomplicated in some senses. Simplifying it would be an improvement.
For how long have I used the solution?
I have used the ASA solutions for a better part of 10 years.
What do I think about the stability of the solution?
The stability is unparalleled.
All solutions require maintenance, and we do that routinely. Anywhere from three to four people from the network teams to application owners are involved in the maintenance. This is a firewall in production, so we need to do maintenances after hours, but it would be nice if we didn't need to do it after hours
What do I think about the scalability of the solution?
Scalability is unparalleled. It is easy to scale.
We don't have plans to increase our usage at this time.
How are customer service and support?
In previous years, Cisco's tech support has been great. Although, I have seen it declining. I would rate their support as seven out of 10.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We have used the Check Point firewalls as well as several different vendors.
What was our ROI?
It secures the network. The ROI is really incalculable at this point as keeping our data secure is keeping the company's assets secure.
Which other solutions did I evaluate?
We did evaluate other vendors.
What other advice do I have?
You need to be always looking ahead and proactively developing to build resilience.
I would rate the solution as eight out of 10. It is a world-class firewall.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Cisco Secure Firewall
November 2024
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
Director of network ops at a non-profit with 51-200 employees
Protects our network and gives us visibility into traffic
Pros and Cons
- "The fact that we can use Firepower Management Center gives us visibility. It allows us to see and manage the traffic that is going through the network."
- "Nowadays, nobody is in the office, so I need to figure out how to put the firewall outside. If I could have a centralized firewall that also receives information from external locations, like peoples' home offices, that would help us consolidate everything into one appliance."
What is our primary use case?
The use case is protecting our building. We have one office and we use it to protect the network.
What is most valuable?
The fact that we can use Firepower Management Center gives us visibility. It allows us to see and manage the traffic that is going through the network.
What needs improvement?
We have an older version of the ASA and there are always improvements that could be made. Nowadays, nobody is in the office, so I need to figure out how to put the firewall outside. If I could have a centralized firewall that also receives information from external locations, like peoples' home offices, that would help us consolidate everything into one appliance.
For how long have I used the solution?
I have been using Cisco ASA Firewalls for over 10 years.
What do I think about the stability of the solution?
We've had issues with it because we always run it in pairs for high availability. We've had issues with the unit, but not in the last five or six years. It's pretty, pretty stable.
What do I think about the scalability of the solution?
The product we have has some limitations when it comes to scalability. That's one of the things we're looking to address with a new solution.
How are customer service and support?
Technical support was good when I used it, but I haven't needed support for the solution lately. I know people complain about support, but I don't have experience with it for this device because I haven't needed support recently.
We do pay the annual fee for support and I expect them to be there in four hours with a new device, if we need one, as they've done in the past.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We didn't have a previous solution.
How was the initial setup?
My system engineer did the initial setup and he's the person who manages it, day in and day out.
What was our ROI?
I don't think we've tracked enough data points to see ROI data points, but the value comes from the fact that it's still running and that we are still happy with it. That is definitely a good return on our investment.
What's my experience with pricing, setup cost, and licensing?
The pricing is too high and the licensing is too confusing.
What other advice do I have?
Go for it.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Enterprise Architect at a tech services company with 51-200 employees
We don't have to worry when something goes down because of its automatic failovers and built-in redundancy
Pros and Cons
- "I like the ASDM for the firewall because it is visual. With the command line, it is harder to visualize what is going on. A picture is worth a thousand words."
- "Sometimes, it is not easy to troubleshoot. You need to know where to go. It took me quite awhile. It's like, "Okay, if it doesn't go smoothly here, then go find the documentation." Once you do it, it is not so bad. However, it is sometimes a steep learning curve on the troubleshooting part of it."
What is our primary use case?
We mainly use it for site-to-site VPNs, connecting to other businesses. I work in manufacturing and hospitals.
We connect to remote networks: manufacturing-to-businesses and hospital-to-hospital.
It was deployed in our data center across multiple sites. At the hospital where I last worked, it was deployed at 18 sites, then we did VPNs between our hospital and clinics.
How has it helped my organization?
We don't have to worry about when something goes down. Instead of saying, "Oh my gosh, this went down and now we have a gap here," it has automatic failovers and built-in redundancy. So, it says, "I don't have a gap anymore." This is one less thing to worry about, which was a big benefit for me. If our security group comes back, and says, "Hey, this is down." Then, it is like, "Yeah, we got it covered."
Our security groups are always very adamant that things stay up. If something went down, they say, "Why did it go down? How do we prevent it?" Since resiliency is already built-in on its initial design, we don't have to go back in every time, and say, "Here, this is what we did. This is why it was done like this." Instead, it is just, "Yes, they blessed it, and it's approved," and we don't have to go back and keep reinventing the wheel every time.
What is most valuable?
I like the ASDM for the firewall because it is visual. With the command line, it is harder to visualize what is going on. A picture is worth a thousand words.
What needs improvement?
Sometimes, it is not easy to troubleshoot. You need to know where to go. It took me quite awhile. It's like, "Okay, if it doesn't go smoothly here, then go find the documentation." Once you do it, it is not so bad. However, it is sometimes a steep learning curve on the troubleshooting part of it.
For how long have I used the solution?
I have been using this solution for more than 20 years.
What do I think about the stability of the solution?
I have never had any problems with stability. In the 20-plus years that I have used them, I don't think I have ever had a failure on them. They have always been rock-solid.
What do I think about the scalability of the solution?
We haven't done much with scalability. We have always just done active standby. However, it scales once you figure out how to do it. If there are site-to-site VPNs within your own location, it is easier because there is a template, where it is, "Here, change this IP address. Change this IP address. There, it's done."
Third-parties weren't bad. Once my side was done, then we could easily cut and paste it, and say, "Okay, here's what my side's configured for. If you have something that is not working, then you can tell me what it is and I will help you." However, we never really had anything that we couldn't fix. It was also possible to scale on the other side.
How are customer service and support?
I haven't called tech support very often. When I did call them, they could tell me what the problem was. That is where I started learning, "Here are the commands that you should be using to debug this." They have been very helpful. I would rate them as nine out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I have used Palo Alto and Fortinet. We switched mainly because we were trying to unify all our products. Instead of using multiple systems, everything with the Cisco solution is end-to-end with different views of security. Some of them wanted to be diverse, keeping things separate. For others, it was easier if everything was just with one vendor. Also, if you are Cisco-centric, it is also easier.
Since I have been using this solution, I have seen it grow. When they first started doing it, it was more like, "Here's the command line. Here's what you got to do." Now, it's easier for a new engineer to come on, and say, "Okay. Here, you are going to start supporting this, and here is how you do it," which has made life easier. Since it is a repeatable thing, no matter which company you go to, it is the same. If you get somebody who is doing it on the other side of the VPN, it is a lot easier. So, I like the Cisco product. I have used several different ones, and it's like, "Well, this is the easiest one." It might be just the easiest one because I have used it long enough, but it is also a good product. It just helps us be consistent.
How was the initial setup?
We did a lot of site-to-site VPNs. We also did a third-party, which is Palo Alto or something. Though, some of them were SonicWall. It is like, "Okay, I don't know how the site is configured, then I spend hours trying to troubleshoot a VPN." The more you use it, the easier it gets. It used to take days to do it. Whereas, the last one that I built took about 30 minutes. The more we use it, the better the outcome is and the faster we can do it. Now, I am not spending days building a VPN, which should only take 10 to 15 minutes.
What was our ROI?
There is ROI when you use it more.
What's my experience with pricing, setup cost, and licensing?
Once you know what the product is, it is not that bad. Yes, it is expensive. When you try to get a license, it is like, "Well, I don't know which one of these I need. And, if I don't buy it now, then I will probably be back later. Now, I have to justify the money." Typically, you end up just buying everything that you don't use most of the time. It is one of those solutions where you get what you pay for. If you don't know what you need, just buy everything. We have additional licenses that we don't use.
What other advice do I have?
Take your time with it. Actually, read the documentation. Don't just assume you know what stuff means since that will sometimes come back and bite you. I have done that too many times. If you go from version to version, it changes a little bit, and so it is like, "Well I don't know why it doesn't work." Then, you go read the notes, "Oh, yeah. This changed and it is done over here now."
Building more resiliency should be a priority, and it's going to take money to do that. So, you need to actually believe and invest in it. Otherwise, it's an idea. It's great, because we all want redundancy, but nobody typically wants to spend the money to do it. Or, they want to do it as cheaply as possible. It's like, "Okay, I can do that," but you're going to have more gaps. Then, it is not really worth it. Therefore, invest the money the first time and do it right.
I would rate it as nine out of 10.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Helps protect servers from hackers but doesn't have all the next-generation features we need
Pros and Cons
- "The most valuable feature is the Intrusion Prevention System."
- "Most of the features don't work well, and some features are missing as well."
What is our primary use case?
We use it as a next-generation firewall for the perimeter. I generally use it on-premises.
How has it helped my organization?
It helps protect my servers from hackers.
What is most valuable?
The most valuable feature is the Intrusion Prevention System.
What needs improvement?
Most of the features don't work well, and some features are missing as well. The completeness of the solution is most important for me. It should be complete, but some parts are missing. Cisco should improve it.
Every part of the features should be developed. That includes the next-generation firewall parts, such as application recognition.
For how long have I used the solution?
I have been using Cisco Firepower NGFW Firewalls for about five years. I am an integrator and reseller of multiple vendors' products.
What do I think about the stability of the solution?
The stability is getting better day by day, but I would expect a more stable solution, to be honest. It is stable now, but we have solutions that are more stable.
How are customer service and support?
Technical support is nice, but most of the limitations or problems are caused by the product itself. There's nothing that a technical engineer can do about them.
What's my experience with pricing, setup cost, and licensing?
The licensing package is good, but the licensing fee should be decreased.
Which other solutions did I evaluate?
I have used CheckPoint, Palo Alto, Juniper, and FortiGate. The Palo Alto solution is complete.
If I choose Cisco Firepower it is mostly because of its integration with other solutions. When the customer has several Cisco solutions, I put Cisco Firepower on top of them. But if the customer has a complex environment, I generally prefer other solutions.
What other advice do I have?
For specific needs, like VPN, you can use Cisco Firepower. But our expectation is for a next-generation Firewall or UTM solution that includes all the features. I cannot recommend Firepower to others, at the moment, as a unified threat management solution.
Generally, if the customer's number of users is greater than 100, that's when the Cisco solution is more likely to be effective.
Maintenance of the solution requires one or two people.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Security Engineer at Cielo
Great for blocking attacks, best support, and very easy to use
Pros and Cons
- "The Adversity Malware Protection (AMP) feature is the most valuable. It is also very easy to use. Every technical user can operate this solution without any difficulty. The dashboard of Cisco Firepower has every tool that a security operator needs. You can find every resource that you need to operate through this dashboard."
- "Its interface is sometimes is a little bit slow, and it can be improved. When you need to put your appliance in failover mode, it is a little difficult to do it remotely because you need to turn off the appliance in Cisco mode. In terms of new features, it would be good to have AnyConnect VPN with Firepower. I am not sure if it is available at the moment."
What is our primary use case?
I use it to protect my DMZ from external attacks.
How has it helped my organization?
Last year, we received a lot of linear service attacks in our environment during the Black Friday season. Cisco Firepower blocked every attack.
What is most valuable?
The Adversity Malware Protection (AMP) feature is the most valuable.
It is also very easy to use. Every technical user can operate this solution without any difficulty. The dashboard of Cisco Firepower has every tool that a security operator needs. You can find every resource that you need to operate through this dashboard.
What needs improvement?
Its interface is sometimes is a little bit slow, and it can be improved.
When you need to put your appliance in failover mode, it is a little difficult to do it remotely because you need to turn off the appliance in Cisco mode.
In terms of new features, it would be good to have AnyConnect VPN with Firepower. I am not sure if it is available at the moment.
For how long have I used the solution?
I have been using Cisco Firepower for two years.
What do I think about the scalability of the solution?
We use it specifically for DMZ, so we don't need it to scale it up. Because we are using this solution for a specific environment, we don't plan to increase its usage.
We have a few teams who use this solution. We have the information security team for reading the logs and policies. We have administrators, and we also have contractors for the network operation center to analyze some logs and reports.
How are customer service and technical support?
We have used their technical support. They are amazing. Cisco's technical support is the best.
Which solution did I use previously and why did I switch?
We have used Check Point and one more solution. The main difference is in the IPS signatures. Cisco Firepower has precise and most updated IPS signatures.
How was the initial setup?
The initial setup is easy. The deployment took two months because we didn't have Firepower previously, and it took us some time to plan and implement.
What about the implementation team?
We used our reseller and contractor to deploy Cisco Firepower. They were good.
What other advice do I have?
I would recommend this solution. I would rate Cisco Firepower a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Network Administrator at a construction company with 1,001-5,000 employees
Good signature detection, intrusion detection, IDS, and IPS
Pros and Cons
- "The stability of the solution is very good. We can see that it gets even better with every release."
- "It will be nice if they had what you traditionally would use a web application scanner for. If the solution could take a deeper look into HTTP and HTTPS traffic, that would be nice."
What is our primary use case?
We primarily use the solution for internet access firewalls.
How has it helped my organization?
The solution allows you to be more agile and react faster.
What is most valuable?
The Sourcefire stuff itself is the most valuable feature. Signature detection, intrusion detection, IDS, and IPS are all very good. AMP is very useful. I like that you can put it onto devices as well. The aggregated views in FMC that you get when you're a global shop which is centralized, and then offers gateways per region. In Europe, America and APAC, you have all the data coming together in the FMC. That's quite nice.
What needs improvement?
The FMC could be a little bit faster.
It will be nice if they had what you traditionally would use a web application scanner for. If the solution could take a deeper look into HTTP and HTTPS traffic, that would be nice.
For how long have I used the solution?
I've been using the solution for 1.5 years.
What do I think about the stability of the solution?
The stability of the solution is very good. We can see that it gets even better with every release.
What do I think about the scalability of the solution?
For us, the scalability is good, because we sized everything right, right from the beginning. If you size it right, it's very good. We don't plan on adding more firewalls, unless we suddenly grow exponentially, which we're not expecting to do at this point.
How are customer service and technical support?
We only contacted technical support during initial implementation and that was all handled by the consultant. I have a lot of other Cisco related tickets open, so we're used to the process.
I would say, however, that we're also using Meraki, and the Meraki support is way better, in my opinion.
Cisco support tends to take longer, and I mean really long given the fact that subject matter is sometimes also more complicated, so it really depends. When you compare that directly to Meraki, Meraki answers the same day, and I cannot say that about the legacy Cisco support items. I can understand that the market for the legacy service is so much bigger for Cisco, so I can see why it takes longer.
How was the initial setup?
The initial setup was complex because we had to migrate old ASA firewalls. The ACLs, or rather the policies, are very different now, and way more elaborate, so that that took some tweaking, and some consulting and some time.
Deployment took two months. We had to make sure that our old ACL base settings from the ASAs were correctly translated and implemented into the new FTD setups.
What about the implementation team?
We used a consultant to assist with implementation.
Which other solutions did I evaluate?
We've looked at a few options, but we have an internal policy that says, unless noted otherwise, network equipment has to be Cisco based. We had to go with a Cisco product.
What other advice do I have?
We are using the on-premises deployment model.
My advice for those considering the solution is this: if you want to migrate something, plan enough time for testing before you come over to the solution. You should also watch as many webinars as you can about that solution, or get a consultant and do a proper lab set up and go through the whole thing with them. It's is definitely worthwhile, given the complexity of the whole product.
I would rate the solution nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Engineer at a construction company with 1,001-5,000 employees
Is reliable, enhances cybersecurity resilience, and provides visibility into our network
Pros and Cons
- "Cisco Secure Firewall is reliable, which is why we opted for it during the pandemic for our remote users."
- "The cloud does not precisely mimic what is on-premises."
What is our primary use case?
We use Cisco Secure Firewall for remote VPN.
How has it helped my organization?
Cisco Secure Firewall played a crucial role in enabling all our users to establish remote connections from their homes.
Cisco Secure Firewalls' application visibility and control are beneficial because they provide a management console that allows us to view logging and sessions.
It enhances our organization's cybersecurity resilience by enabling us to deploy multiple instances of it both in Azure and on-premises. This redundancy ensures that in the event of an outage or any other issues, we can seamlessly switch to alternative locations.
What is most valuable?
Cisco Secure Firewall is reliable, which is why we opted for it during the pandemic for our remote users.
What needs improvement?
The cloud does not precisely mimic what is on-premises. There are some new challenges with the features in Azure. Due to Azure limitations, we cannot synchronize configurations between an active standby. This aspect makes it difficult to perform such tasks in the cloud, requiring manual intervention.
For how long have I used the solution?
I have been using Cisco Secure Firewall ASA for ten years.
What do I think about the stability of the solution?
In my current role, I have not encountered any stability issues.
What do I think about the scalability of the solution?
Cisco Secure Firewall is scalable.
How are customer service and support?
Cisco's technical support is excellent, and its personnel are knowledgeable. I consistently receive prompt and satisfactory responses from them. However, there are occasions when we need to reach out to them for feedback follow-up.
How would you rate customer service and support?
Positive
How was the initial setup?
We encountered some issues with the deployment because we run on Azure now.
What's my experience with pricing, setup cost, and licensing?
Although I am not directly involved in dealing with the pricing aspect of the Cisco Secure Firewall, I know that the licensing has improved over the years.
What other advice do I have?
I rate Cisco Secure Firewall a nine out of ten.
The Cisco Secure Firewall is not a remediation tool but rather designed for secure remote sessions.
We use the same ASAs for firewall functionality as we do for VPN functionality.
Our organization is currently considering Palo Alto as an alternative to Cisco. However, I am not involved in the decision-making process.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Microsoft Azure
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Palo Alto Networks NG Firewalls
Azure Firewall
Check Point NGFW
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Untangle NG Firewall
Fortinet FortiGate-VM
SonicWall NSa
Sophos XGS
Fortinet FortiOS
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?