We use it for remote access VPN. That means the folks at home can work from home using AnyConnect.
Network Automation Engineer at a financial services firm with 1,001-5,000 employees
Remote access VPN enables our employees to work from home
Pros and Cons
- "For our very specific use case, for remote access for VPN, ASAs are very good."
- "Cisco wasn't first-to-market with NGFWs... they should look at what other vendors are doing and try not only to be on the same wavelength but a little bit better."
What is our primary use case?
What is most valuable?
For our very specific use case, for remote access for VPN, ASAs are very good.
Cisco also introduces new features and new encryption techniques.
What needs improvement?
Cisco wasn't first-to-market with NGFWs. That is one of the options now. They did make an acquisition, but other vendors got into that space first. I would tell Cisco to move faster, but everything moves at the speed of light and it's hard to move faster than that. But they should look at what other vendors are doing and try not only to be on the same wavelength but a little bit better. It's hard to be critical of Cisco given that they pave the way a lot, but they should see what their peers are doing and try to emulate that.
In terms of additional features, perhaps there could be some form of integration with the cloud. I don't know how much appetite we would have for that given the principle of keeping a lot of the sensitive data on-prem. But some integration with the cloud might be useful, given that the cloud is everything you see these days. We have our on-premises devices, but maybe they could provide an option where it fails over to a cloud in a worst-case scenario.
For how long have I used the solution?
I've been using Cisco ASA Firewalls from the time I was in school. I learned it when I was in the academic setting. I joined Cisco and worked there for six years there as a sales engineer before joining my current company.
Buyer's Guide
Cisco Secure Firewall
November 2024
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
What do I think about the stability of the solution?
The stability of the solution is a 10 out of 10.
What do I think about the scalability of the solution?
Scalability is probably a 10 out of 10 for what we're looking at.
How are customer service and support?
Their technical support is very good. Maybe I view them with rose-colored glasses since I was there for six years, but they really do try hard. Cisco cracks the whip on them. They do a lot of work. There's no downtime.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
The challenge we wanted to address was scale. We're growing and we needed something a little more robust, something that could hold a big boy. We've got a lot more employees and we were using an older version of the hardware, so we upgraded to the newest version of the hardware, given that we're familiar with it. It solves our use case of allowing employees to work from home.
How was the initial setup?
I was involved in the design, deployment, and operations. Our team is very special in the fact that we don't delegate to other folks. We're responsible for what we eat and what we design. We actually do the hands-on work and then we maintain it. We tend not to hire out because they come, they wash their hands clean of it, leave, and then there's all this stuff that needs fixing. If we get paged at 3:00 AM it might be our fault, and the lessons are learned.
Our network engineering team consists of about 12 people.
What's my experience with pricing, setup cost, and licensing?
The pricing is fair.
What other advice do I have?
My advice to others would be to design it well and get it validated by the Cisco team or by a consulting company. Don't be afraid of the solution because they have skin in the game. It's been in the market for so long, it's like buying a Corolla, as odd as that sounds. If you have a use case for your car where you're just driving from A to B, then get that Corolla and it will suit you well. It will last you 100 million miles.
Cyber security resilience is super important. We have super important data and we need to secure it. We're regulated and audited by the government and we're audited all the time. I get audited when I breathe. We have to make sure everything is super transparent and make sure that we have all of the fail-safes in place and done well. We have to be very accountable so that there are no "gotchas."
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Admin Network Engineer at Grupo xcaret
Offers more security and flexibility for VPNs
Pros and Cons
- "It helped us a lot with our VPNs for the home office during COVID. There has been more security and flexibility for VPNs and other applications."
- "I would like more features in conjunction with other solutions, like Fortinet."
What is our primary use case?
It is for our VPNs and filters out websites.
How has it helped my organization?
It helped us a lot with our VPNs for the home office during COVID. There has been more security and flexibility for VPNs and other applications.
What is most valuable?
Its security is easy to use.
What needs improvement?
I would like more features in conjunction with other solutions, like Fortinet.
For how long have I used the solution?
I have been using it for five years.
What do I think about the stability of the solution?
It has very good stability.
What do I think about the scalability of the solution?
It has really good scalability.
How are customer service and support?
The customer service and technical support are good. I would rate them as nine out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We were previously using Fortinet. We switched to ASA and Firepower when our contract with Fortinet ended. Now, we are only using ASA.
How was the initial setup?
The deployment was simple.
What was our ROI?
The ROI is good. Using ASA, we have saved 10% to 20% on our costs.
What's my experience with pricing, setup cost, and licensing?
The pricing is fine. It is not too bad.
What other advice do I have?
We had it integrated with the Umbrella solution a few years ago.
I would rate this solution as nine out of 10.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Cisco Secure Firewall
November 2024
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,406 professionals have used our research since 2012.
Network analysis at a government with 1,001-5,000 employees
Is fast and makes us very responsive when any of the visualized logs are blocked in real-time
Pros and Cons
- "The most valuable feature would be ASDM. The ability to go in, visualize and see the world base in a clear and consistent manner is very powerful."
- "The ability to better integrate with other tools would be an improvement."
What is our primary use case?
We use it for our data center. We have clusters of the solution to protect the equipment in our data center. We also use it for site-to-site VPN hubs.
How has it helped my organization?
Cisco Firepower NGFW Firewall made our firewall response much faster when trying to respond to any services or networks that stand out. It makes us very responsive when any of the visualized logs are blocked in real-time.
What is most valuable?
The most valuable feature would be ASDM. The ability to go in, visualize and see the world base in a clear and consistent manner is very powerful.
What needs improvement?
The ability to better integrate with other tools would be an improvement.
For how long have I used the solution?
I have been using this solution for six years.
What do I think about the stability of the solution?
It is highly stable.
What do I think about the scalability of the solution?
It is highly scalable. It has some limitations, but for medium to large-sized deployments, it is excellent.
How are customer service and support?
Technical support is outstanding. You can get same-day support.
Which solution did I use previously and why did I switch?
We previously used Juniper SRX. We switched because we have a contract with Cisco. This was the cheaper option and was faster.
What was our ROI?
We have very much seen an ROI in terms of the saving on man time and the costs of standing up new equipment. Compared to what we had before, Cisco Firepower NGFW Firewall is faster.
What other advice do I have?
I would rate this solution a nine on a scale from one to ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Principal Network Security Manager at a tech vendor with 10,001+ employees
Provides stability and ease of firewall management
Pros and Cons
- "Firepower has reduced our firewall operational costs by about 25 percent."
- "One of my colleagues is using the firewall as an IPS, but he is worried about Firepower's performance... With the 10 Gb devices, when it gets to 5 Gbps, the CPU usage goes up a lot and he cannot manage the IPS."
What is our primary use case?
This product protects our computer systems. I use it as a traditional firewall service. I don't have any special use cases for it.
How has it helped my organization?
Firepower has reduced our firewall operational costs by about 25 percent.
What needs improvement?
Sometimes there is a lack of performance. One of my colleagues is using the firewall as an IPS, but he is worried about Firepower's performance. It is much lower than we expected. They need to improve the performance a lot. With the 10 Gb devices, when it gets to 5 Gbps, the CPU usage goes up a lot and he cannot manage the IPS.
For how long have I used the solution?
I have been using Cisco Firepower NGFW Firewall for more than two years.
What do I think about the stability of the solution?
The most valuable property is the stability. It doesn't crash.
How are customer service and support?
When I have had issues with the software, I don't think they have given me the right answers. The support for the software isn't that good, but support for the hardware is very good.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
Although I work in Korea, I needed a means of deploying computer systems in other countries. Two or three years ago I was looking for a proper solution that would cover global sites. I chose Cisco products because Cisco has a very large presence all over the world.
How was the initial setup?
Once I got used to this product, it was easy to use other products, but it was not easy for me the first time.
What's my experience with pricing, setup cost, and licensing?
Firepower is a little bit expensive, although there are no additional costs beyond the standard ones.
Which other solutions did I evaluate?
We have several brands of firewalls in our organization. Compared to them, the ease of management of the Cisco firewalls is pretty good.
What other advice do I have?
When you calculate the capacity you need, you should add a buffer for performance.
There are 25 users of the solution on my team and they are all network security specialists.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
IT/Solutions Architect at a financial services firm with self employed
A reliable next-generation firewall solution with good support
Pros and Cons
- "I like that Cisco Firepower NGFW Firewall is reliable. Support is also good."
- "We only have an issue with time sync with Cisco ASA and NTP. If the time is out of sync, it will be a disaster for the failover."
What is our primary use case?
In the new design, I put Cisco Firepower NGFW Firewall as a LAN segment and as the data center firewall. In the old design, I just used FortiGate Firewall for configurations, and we are going to replace it. The complete solution will be replaced with a two-tiered data center.
What is most valuable?
I like that Cisco Firepower NGFW Firewall is reliable. Support is also good.
What needs improvement?
We only have an issue with time sync with Cisco ASA and NTP. If the time is out of sync, it will be a disaster for the failover.
For how long have I used the solution?
I have been using Cisco Firepower NGFW Firewall for about 11 years.
What do I think about the stability of the solution?
Cisco Firepower NGFW Firewall is a stable solution.
What do I think about the scalability of the solution?
Scalability is good, but just like the issue with Palo Alto and Fortigate, there is also an issue with Cisco Firepower NGFW Firewall. I can configure it easily because of my Cisco background, but others in my team aren't comfortable with it.
How are customer service and support?
Technical support is good. They were both fast and reliable and quick in making decisions. We faced specific issues, and tech support was efficient and provided an immediate solution. Other firewall vendors are slow to respond, and I'm not satisfied. It's also easy to Google and find solutions to our problems. We can't do that for other firewalls.
On a scale from one to five, I would give technical support a five.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We used FortiGate Firewall, but we are replacing it with Cisco Firepower NGFW Firewall because we had issues with HP solutions. We also switched because I am Cisco certified, and my background and expertise are in Cisco.
How was the initial setup?
The initial setup was straightforward.
What was our ROI?
We have seen a return on our investment.
What other advice do I have?
I will tell potential users that the data center firewall is a good solution. But most of the companies are using other firewalls like Palo Alto and FortiGate. Most of the design architects prefer the parameters of the firewalls like we prefer the data center firewall.
On a scale from one to ten, I would give Cisco Firepower NGFW Firewall a ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Chief Technology Officer at Future Point Technologies
Provides excellent integrations and reporting
Pros and Cons
- "Provides good integrations and reporting."
- "Deploying configurations takes longer than it should."
What is our primary use case?
Our primary use case is as a data center firewall for internet firewalls and also as a VPN concentrator. I'm the chief technology officer and we are partners of Cisco.
What is most valuable?
In terms of features there hasn't been much improvement but it's a very stable solution and a very good firewall with almost all of the features required for next generation firewall purposes. Almost all the firewalls on the market have the same features available, but if you take into account the integrations and reporting of Cisco, it's a little better than the others. In particular, the briefing reporting is better. With Fortinet we would probably have to use FortiAnalyzer as a separate reporting module for Fortinet, but here the reporting is good.
What needs improvement?
There needs to be an improvement in the time it takes to deploy the configurations. It normally takes two to four minutes and they need to reduce this. The deployment for any configuration should be minimal. It's possibly improved on the very latest version.
An additional feature I would like to have in Firepower would be for them to give us the data from the firewall - Cisco is probably working on that.
For how long have I used the solution?
I've been using this solution for close to five years.
What do I think about the scalability of the solution?
The scalability is very good.
How are customer service and technical support?
We generally provide support but if we're not able to resolve an issue, we escalate it to Cisco and they're great. They are one of the best support services I've used and it's one of the reasons Cisco is doing so well in the market.
Which solution did I use previously and why did I switch?
I also work with Fortinet and Palo Alto. Fortinet is also a really good product but Cisco is a leader in next generation firewalls and now that they are catching up to Fortinet, they have provided a lot of features and flexibility. I personally see Cisco as being good for large enterprise companies and Fortinet is better for families as well as small and medium size businesses. When it comes to Palo Alto, the high price point is one thing that is an issue, some companies are unable to afford it. Palo Alto is good but Cisco is catching up to them and I believe in a year or two, Cisco will probably match Palo Alto as well and be much better.
How was the initial setup?
The initial setup is not too complex, but as with Fortinet, they have some detailed steps required which adds to the flexibility also. With flexibility comes a bit of complexity, but it's not too bad. Deployment time takes a few minutes. I am responsible for implementation and maintenance for our clients. We were previously deploying only for medium or large enterprise companies but Cisco has come up with the 1000 and 1100 series firewalls for smaller companies which is pretty good. They're a cost-effective solution and competitive in the market.
What's my experience with pricing, setup cost, and licensing?
Cisco falls somewhere in the middle in terms of pricing, it's not very expensive and it's not very cheap. There is an additional accessory fee associated with Cisco but normally they have a separate subscription cost for different types of security to protect the firewall. There are separate bundles available inside the pricing and that's probably true for all of the firewalls.
What other advice do I have?
Cisco is a large, good and reliable firewall. They are working on advanced features and catching up with the leaders in the market. I believe that's a score for them. A yearly subscription is cheaper than Palo Alto and Fortinet offer. They provide good support and once it's loaded, it doesn't give a lot of problems, that's very important.
I would rate this solution an eight out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Consulting Engineer at IV4
Stable, good technical support, and the VPN feature works well
Pros and Cons
- "The most valuable features are the provision of internet access, AnyConnect, and VPN capabilities."
- "I have worked with the new FTD models and they have more features than the ASA line."
What is our primary use case?
Our company sells Cisco Firewalls and the ASA is one of the products that we implement for our clients. The primary use cases are internet access, AnyConnect, and VPN.
What is most valuable?
The most valuable features are the provision of internet access, AnyConnect, and VPN capabilities. Because I primarily deal with the VPN functionality, I don't get very deep into the IPS or other capabilities.
What needs improvement?
I have worked with the new FTD models and they have more features than the ASA line.
For how long have I used the solution?
We have been dealing with Cisco ASA since about 2002.
What do I think about the stability of the solution?
I am very happy with its stability and the product in general.
What do I think about the scalability of the solution?
In our organization, we only have one in our data center that all of our people pass through. However, I've got clients that have thousands running through large Cisco firewalls.
How are customer service and technical support?
Cisco's technical support has always been excellent. They have great support.
Which solution did I use previously and why did I switch?
I have dealt with four or five others, but so far, I have the most experience with Cisco.
Recently, I worked with the new FTD 1000 or 1100 series, and they do a lot.
How was the initial setup?
The complexity of the initial setup depends on the environment. Sometimes, it's brand new whereas other times, I install a replacement for an existing Cisco device or some other product.
What about the implementation team?
I am in charge of installing and configuring our Cisco Firewall solutions.
What other advice do I have?
I would rate this solution a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Senior Network Engineer at a consultancy with 1,001-5,000 employees
Notably reduced our time to root cause and MTTR
Pros and Cons
- "We can easily track unauthorized users and see where traffic is going."
- "We would like to see improvement in recovery. If there is an issue that forces us to do recovery, we have to restart or reboot. In addition, sometimes we have downtime during the maintenance windows. If Cisco could enhance this, so that upgrades would not necessarily require downtime, that would be helpful."
What is our primary use case?
The primary use case of for Cisco firewalls is to segment our network. We're using them on the perimeter network for traffic filtering. Since deploying them, we have seen a maturing of the security in our organization.
We're using both the FTD 2100 and 4100. We have about 40 sites that are using our approximately 80 FTDs. We have about 2,000 users.
How has it helped my organization?
It has helped us to solve some problems regarding auditor recommendations. We used to have some audit recommendations that we were not able to comply with. With FTD deployed we have been able to be in compliance around our 36 remote sites.
Before deploying them we had a lot of incidents of internet slowness and issues with site access, as well as computers that had vulnerabilities. But as soon as we deployed them we were able to track these things. It has helped the user-experience regarding connectivity and security.
In addition, it is giving us a better view regarding the traffic profile and traffic path. And we can categorize applications by utilization, by users, etc.
The solution has, overall, made us twice as productive and, in terms of response time for resolving issues or to identify root causes, we are three times more effective and efficient.
What is most valuable?
We can easily track unauthorized users and see where traffic is going. It is very useful.
FTD is also fully integrated with Talos. We are in the process of acquiring it and we will integrate it. That way we will have everything from Talos to do correlations.
What needs improvement?
We would like to see improvement in recovery. If there is an issue that forces us to do recovery, we have to restart or reboot. In addition, sometimes we have downtime during the maintenance windows. If Cisco could enhance this, so that upgrades would not necessarily require downtime, that would be helpful.
We would also like to have a solution on the cloud, where we could manage the configuration. CDO is in the ASA mode. If Cisco could do it in full FTD — the configuration, the administration, and everything — it would be very good, and easy.
What do I think about the stability of the solution?
The solution is stable. Last year, we deployed it in more 32 countries and it has been stable since the deployment. We haven't had any issues with the firewall. If we have any issues, it is usually due to the power. The solution itself is stable.
What do I think about the scalability of the solution?
It's scalable.
How are customer service and technical support?
Tech support is able to resolve 70 percent of the issues. In case of an emergency, we can open a case because we have a contract for Smart Net support on the devices. In case of an issue, we open a case and we get assistance.
Which solution did I use previously and why did I switch?
Before FirePOWER we were using the ASA.
How was the initial setup?
At the beginning, it was complex, but we were able to develop a step-by-step implementation. Now, we can deploy one in about two hours, including integration testing, physical testing, configuration, and applying the rules.
What about the implementation team?
We have in-house engineers for the deployment. We haven't used external, third-parties. We are a big institution, based in 36 countries. The team that is focused on this deployment is a team of five. The person who is handling the implementation will be in contact with a local engineer at the remote site, and will assist him, remotely, to do the testing and follow the steps to deploy.
What's my experience with pricing, setup cost, and licensing?
The one-time cost is affordable, but the maintenance cost and the Smart Net costs need to be reduced. They're too high. A company like ours, that has about 80 firewalls, has to multiple the maintenance cost per device by 80. Cisco should find a way to provide some kind of enterprise support. We don't want to buy support per unit of equipment. It would be easier for everybody.
What other advice do I have?
We are using about ten different security tools, including analytics, monitoring, threat management, and email security. What we have integrated is the ISE and FTD but the third-party solutions are not fully integrated.
Which deployment model are you using for this solution?
On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Palo Alto Networks NG Firewalls
Azure Firewall
Check Point NGFW
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Untangle NG Firewall
Fortinet FortiGate-VM
SonicWall NSa
Sophos XGS
Fortinet FortiOS
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?