Try our new research platform with insights from 80,000+ expert users
reviewer1208142 - PeerSpot reviewer
Senior Network Engineer at a consultancy with 1,001-5,000 employees
Real User
Notably reduced our time to root cause and MTTR
Pros and Cons
  • "We can easily track unauthorized users and see where traffic is going."
  • "We would like to see improvement in recovery. If there is an issue that forces us to do recovery, we have to restart or reboot. In addition, sometimes we have downtime during the maintenance windows. If Cisco could enhance this, so that upgrades would not necessarily require downtime, that would be helpful."

What is our primary use case?

The primary use case of for Cisco firewalls is to segment our network. We're using them on the perimeter network for traffic filtering. Since deploying them, we have seen a maturing of the security in our organization. 

We're using both the FTD 2100 and 4100. We have about 40 sites that are using our approximately 80 FTDs. We have about 2,000 users.

How has it helped my organization?

It has helped us to solve some problems regarding auditor recommendations. We used to have some audit recommendations that we were not able to comply with. With FTD deployed we have been able to be in compliance around our 36 remote sites.

Before deploying them we had a lot of incidents of internet slowness and issues with site access, as well as computers that had vulnerabilities. But as soon as we deployed them we were able to track these things. It has helped the user-experience regarding connectivity and security. 

In addition, it is giving us a better view regarding the traffic profile and traffic path. And we can categorize applications by utilization, by users, etc.

The solution has, overall, made us twice as productive and, in terms of response time for resolving issues or to identify root causes, we are three times more effective and efficient.

What is most valuable?

We can easily track unauthorized users and see where traffic is going. It is very useful.

FTD is also fully integrated with Talos. We are in the process of acquiring it and we will integrate it. That way we will have everything from Talos to do correlations.

What needs improvement?

We would like to see improvement in recovery. If there is an issue that forces us to do recovery, we have to restart or reboot. In addition, sometimes we have downtime during the maintenance windows. If Cisco could enhance this, so that upgrades would not necessarily require downtime, that would be helpful.

We would also like to have a solution on the cloud, where we could manage the configuration. CDO is in the ASA mode. If Cisco could do it in full FTD — the configuration, the administration, and everything — it would be very good, and easy.

Buyer's Guide
Cisco Secure Firewall
March 2025
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,422 professionals have used our research since 2012.

What do I think about the stability of the solution?

The solution is stable. Last year, we deployed it in more 32 countries and it has been stable since the deployment. We haven't had any issues with the firewall. If we have any issues, it is usually due to the power. The solution itself is stable.

What do I think about the scalability of the solution?

It's scalable.

How are customer service and support?

Tech support is able to resolve 70 percent of the issues. In case of an emergency, we can open a case because we have a contract for Smart Net support on the devices. In case of an issue, we open a case and we get assistance.

Which solution did I use previously and why did I switch?

Before FirePOWER we were using the ASA.

How was the initial setup?

At the beginning, it was complex, but we were able to develop a step-by-step implementation. Now, we can deploy one in about two hours, including integration testing, physical testing, configuration, and applying the rules.

What about the implementation team?

We have in-house engineers for the deployment. We haven't used external, third-parties. We are a big institution, based in 36 countries. The team that is focused on this deployment is a team of five. The person who is handling the implementation will be in contact with a local engineer at the remote site, and will assist him, remotely, to do the testing and follow the steps to deploy.

What's my experience with pricing, setup cost, and licensing?

The one-time cost is affordable, but the maintenance cost and the Smart Net costs need to be reduced. They're too high. A company like ours, that has about 80 firewalls, has to multiple the maintenance cost per device by 80. Cisco should find a way to provide some kind of enterprise support. We don't want to buy support per unit of equipment. It would be easier for everybody.

What other advice do I have?

We are using about ten different security tools, including analytics, monitoring, threat management, and email security. What we have integrated is the ISE and FTD but the third-party solutions are not fully integrated.

Which deployment model are you using for this solution?

On-premises
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
PeerSpot user
NGFW677 - PeerSpot reviewer
IT Specialist at a government with 1,001-5,000 employees
Real User
A flexible and easy to manage solution for segregating our servers from the rest of the environment
Pros and Cons
  • "The most valuable features are the flexibility and level of security that this solution provides."
  • "There was an error in the configuration, related to our uplink switches, that caused us to contact technical support, and it took a very long time to resolve the issue."

What is our primary use case?

We use this solution as a firewall and for the segregation of our servers from the rest of the environment.

How has it helped my organization?

Instead of using multiple firewalls, we only need to rely on this solution. It has a small footprint.

What is most valuable?

The most valuable features are the flexibility and level of security that this solution provides. 

What needs improvement?

There was an error in the configuration, related to our uplink switches, that caused us to contact technical support, and it took a very long time to resolve the issue.

Some of the features should be baked-in by default.

What do I think about the stability of the solution?

Stability has been pretty good, so far.

What do I think about the scalability of the solution?

This solution is very scalable.

How are customer service and technical support?

We have contacted technical support about an issue that we were having, and it took a very long time for them to figure it out. We were on the phone for six or seven hours with them.

Which solution did I use previously and why did I switch?

We previously used an ASA 5500, and it was simply time to upgrade it. We used this solution as a direct replacement.

How was the initial setup?

The initial setup of this solution is pretty straightforward.

Which other solutions did I evaluate?

We are not restricted to any one vendor, but this solution worked well as a direct replacement for our previous one. We considered both Juniper and FortiGate.

What other advice do I have?

This is a very straightforward firewall. There is a management platform with its own operating system. Just make sure that everything is set up properly for your uplink switches because that is an issue that we ran into.

I would rate this solution a nine out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Cisco Secure Firewall
March 2025
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,422 professionals have used our research since 2012.
Cloud Services Operation Engineer at Informatic Services Company (ISC)
Real User
The end-user VPN with ASA allows us to connect the firewall to edge servers for security
Pros and Cons
  • "We are using the Cisco AnyConnect for our end-user VPN with the ASA."
  • "I would like to see them release a patch for ASAv with cross-platform FirePower integration."

What is our primary use case?

We are using both Cisco ASAv and FTD (Firepower Threat Defense). FTD has a better interface, but we have both of them running.

We are using Cisco ASAv for the FirePower service. We use a custom interface for our firewall.

How has it helped my organization?

Cisco ASAv is part of our central solution. You can use the ASA family or go on the portal for normal ASAv. We use FirePower at the edge of the network. 

If you are working with cloud services, it's better to use the ASAv family or other Cisco solutions.

What is most valuable?

We are using the Cisco AnyConnect for our end-user VPN with the ASA. 

If a user wants to connect to our network, they access it via the Cisco intranet and connect to the firewall at the edge.

What needs improvement?

I don't have any experience with the price, but ASA is a comprehensive solution.

In the next update of the Cisco ASAv, I would like to see them release a patch for ASAv, i.e. to put the FirePower solution into the cross-platform integration.

For how long have I used the solution?

We are using the Cisco ASAv security solution in our company for three or four years.

What do I think about the stability of the solution?

Normally, in ASA, we have good stability.

What do I think about the scalability of the solution?

The scalability of ASAv we can easily manage. We can have good scalability in different times but we don't have HA in ASAv. Some features are removed in ASAv. 

If it's a normal ASA, i.e. a physical device, you have many more ways to scalability.

How are customer service and technical support?

For technical support, I have little experience with Cisco, unless they patch some issues. I raised a ticket and got the response immediately. They are very supportive.

How was the initial setup?

For me, ASA is easy. The deployment of ASAv is done in 20 minutes.

What about the implementation team?

We used both an integrator and reseller for the deployment. For the initialization, it was me for our company. If we have an issue, we can raise a ticket or call for a Cisco patch. 

For the Cisco ASAv installation, I did it myself.

What's my experience with pricing, setup cost, and licensing?

The pricing for Cisco ASAv depends on your license. With AnyConnect, it depends on your license. It depends on the number of concurrent users you want to connect.

Our license is for one year only, renewable at variable pricing.

What other advice do I have?

On a scale from one to ten, I would rate this product at nine. Cisco ASAv is good in many advanced networking features.

I'm working with Cisco. They have competition with many vendors.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
IT manager at IRPC PCL
Real User
Top 10
Very simple to deploy and stable
Pros and Cons
  • "Simple to deploy, stable."
  • "Technical support takes a long time to respond."

What is our primary use case?

Our primary use case of Cisco ASA Firewall is to protect our environment. We are customers of Cisco and I'm a network engineer. 

What is most valuable?

The solution is simple to deploy and stable. 

What needs improvement?

Technical support could be improved, they take a long time to respond. 

For how long have I used the solution?

I've been using this solution for 10 years. 

What do I think about the stability of the solution?

This is a stable solution. 

How was the initial setup?

Initial setup was relatively simple, it took around six months and I deployed myself. 

What other advice do I have?

I would rate this solution a nine out of 10. 

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Othniel Atseh - PeerSpot reviewer
Network Security Consultant at a consultancy with 1-10 employees
Consultant
URL filtering and easy integration with other Cisco products are key features for us
Pros and Cons
  • "If we look at the Cisco ASA without Firepower, then one of the most valuable features is the URL filtering."
  • "It's easy to integrate ASA with other Cisco security products. When you understand the technology, it's not a big deal. It's very simple."
  • "One area where the ASA could be improved is that it doesn't have AMP. When you get an ASA with the Firepower model, ASA with FTD, then you have advanced malware protection."

What is our primary use case?

The first time I deployed Cisco ASA was for one of our clients. This client had a Palo Alto firewall and he wanted to migrate. He bought an ASA 2505, and he wanted us to come in and deploy it and, after that, to put in high-availability. We deployed it and the high-availability means that in case one fails, there is a second one to take over.

I have deployed Cisco ISE and, in the same environment, we had a Cisco FTD. In that environment, we were using the ASA for VPN, and we were using the FTD like an edge device. The ASA was deployed as VPN facilitator and for the wireless part too, so that the wireless network was under the ASA firewall.

What is most valuable?

If we look at the Cisco ASA without Firepower, then one of the most valuable features is the URL filtering.

Also, it's easy to integrate ASA with other Cisco security products. When you understand the technology, it's not a big deal. It's very simple.

When it comes to threat visibility, the ASA is good. The ASA denies threats by using common ACLs. It can detect some DoS attacks and we can monitor suspicious ICMP packets using the ASA. It helps you know when an attack is detected.

Cisco Talos is good. It provides threat intelligence. It updates all the devices to be aware of the new threats and the new attacks out there, so that is a good thing. It's like having God update all the devices. For example, even if you have FTD in your company, malware can be very difficult to detect. There is a new type of malware called polymorphic malware. When it replicates, it changes its signature which makes it very difficult for a firewall to detect. So if your company encounters one type of malware, once, it is automatically updated in your environment. And when it is updated, Talos then updates every firewall in the world, so even if those other firewalls have not yet encountered those particular types of malware, because Talos automatically updates everything, they're able to block those types of malware as well. Talos is very beneficial.

When it comes to managing, with FMD (Firepower Management Device) you can only manage one device, but when you work with FMC (Firepower Management Center) you can manage a lot of sensors, meaning FTDs. You can have a lot of FTDs but you only have one management center and it can manage all those sensors in your company. It is very good.

What needs improvement?

One area where the ASA could be improved is that it doesn't have AMP. When you get an ASA with the Firepower model, ASA with FTD, then you have advanced malware protection. Right now, threats and attacks are becoming more and more intense, and I don't think that the ASA is enough. I think this is why they created FTD.

Also, Cisco is not so easy to configure.

For how long have I used the solution?

I have been using and deploying Cisco ASA for two to three years. 

What do I think about the stability of the solution?

Cisco ASA is stable.

What do I think about the scalability of the solution?

It's scalable. You can integrate AD, you can integrate Cisco NAC. You can integrate quite a lot of things so that makes it scalable.

How was the initial setup?

When you configure the ASA, there is already a basic setup there. Based on your environment, you need to customize it. If you understand security and firewalls very well, you can create your own setup.

For me, the initial setup is easy, but is it good? Because from a security perspective, you always need to customize the initial setup and come up with the setup that fits with your environment. So it's always easy to do the initial setup, but the initial setup is for kids in IT.

The time it takes to set up the ASA depends on your environment. For a smaller deployment, you just have the one interface to configure and to put some policies in place and that's all. If you are deploying the ASA for something like a bank, there are a lot of policies and there is a lot of testing to do, so that can take you all night. So the setup time really depends on your environment and on the size of the company as well.

What's my experience with pricing, setup cost, and licensing?

When it comes to Cisco, the price of everything is higher.

Cisco firewalls are expensive, but we get support from Cisco, and that support is very active. When I hit an issue when I was configuring an FTD, as soon as I raised a ticket the guy called me and supported me. Cisco is very proactive.

I had the same kind of issue when I was configuring a FortiGate, but those guys took two or three days to call me. I fixed the issue before they even called me.

Which other solutions did I evaluate?

I have used firewalls from Fortinet, Palo Alto, and Check Point. To configure an ASA for VPN, there are a lot of steps. When it comes to the FortiGate, it's just a few clicks. FortiGate also has built-in templates for configuring VPN. When you want to create a VPN between FortiGate and FortiGate, the template is already there. All you need to do is enter an IP address. When you want to configure a VPN with a third-party using the FortiGate, and say the third-party is Cisco, there is a VPN template for Cisco built into the FortiGate. So FortiGate is very easy to configure, compared to Cisco. But the Cisco firewall is powerful.

Check Point is something like Cisco but if I have to choose between Cisco and Check Point firewalls, I will choose Cisco because of all the features that Cisco has. With Cisco you can do a lot of things, when it comes to advanced malware protection and IPS. Check Point is very complicated to manage. They have recently come out with Infinity where there is a central point of management.

Palo Alto has a lot of functionality but I haven't worked on the newer models.

What other advice do I have?

Cisco firewalls are not for kids. They are for people who understand security. Now I know why people with Cisco training are very good, because they train you to be competent. They train you to have ability. And when you have ability, their firewall becomes very easy to configure.

When Cisco is teaching you, Cisco teaches you the concept. Cisco gives you a concept. They don't focus on how to configure the device. With Fortinet, for instance, Fortinet teaches you how to configure their device, without giving you the concepts. Cisco gives you the concepts about how the technology is working. And then they tell you how you are going to configure things on their box. When you are an engineer and you understand the technology from Cisco, it means that you can drive everything, because if you understand Cisco very well, you can work with FortiGate. If you understand security from Cisco, it means that you can configure everything, you can configure every firewall. This is why I like Cisco.

When it comes to other vendors, it's easy to understand and it's easy to configure, but you can configure without understanding. And when you configure without understanding, you can't troubleshoot. To troubleshoot, you need understanding. 

I'm a security analyst, so I deal with everything about firewalls. I'm talking about ASA firewalls, and I'm talking about ASA with Firepower, FTD, and Cisco Meraki MX. When it comes to security tools I am comfortable with Cisco and everything Cisco.

One of our clients was using Cisco ASA. They got attacked, but I don't think that this attack came from outside their company. They were managing their firewall and configuring everything well, but they were still getting attacks. One of their employees had been compromised and his laptop was infected. This laptop infected everything in the organization. So the weakest link can be your employees.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1348176 - PeerSpot reviewer
Network Specialist at a financial services firm with 501-1,000 employees
Real User
Automated policies save us time
Pros and Cons
  • "On the network side, where you create your rules for allowing traffic — what can come inside and what can go out — that works perfectly, if you know what you want to achieve. It protects you."

    What is our primary use case?

    Some are being used as edge firewalls and others are for our server-farm/data center. So some are being used as transparent firewalls and others are used as a break between the LAN and WAN.

    In addition to the firewalls, we have Mimecast for email security as we're using Office 365. We're also using IBM's QRadar for SIEM. For antivirus we're just using Microsoft Windows Defender. We also have an internet proxy for content and for that we're using NetScaler.

    How has it helped my organization?

    Automated policies definitely save us time. I would estimate on the order of two hours per day.

    What is most valuable?

    On the network side, where you create your rules for allowing traffic — what can come inside and what can go out — that works perfectly, if you know what you want to achieve. It protects you. Once you get all your rules in place, done correctly, you have some sort of security in terms of who can have access to your network and who has access to what, even internally. You're secure and your authorization is in place for who can access what. If someone who is trying to penetrate your network from the outside, you know what you've blocked and what you've allowed.

    It's not so difficult to pull out reports for what we need.

    It comes with IPS, the Intrusion Prevention System, and we're also using that.

    For how long have I used the solution?

    I've been using Cisco ASA NGFW for five years.

    What do I think about the stability of the solution?

    The stability is quite good. We haven't had issues. I've used them for five years now and I haven't seen any hardware failures or software issues. They've been running well. I would recommend them for their reliability.

    What do I think about the scalability of the solution?

    You can extend your network. They are cool. They are good for scalability.

    How are customer service and technical support?

    We have a Cisco partner we're working with. But if they're struggling to assist us then they can log a ticket for us. Our partner is always a 10 out of 10.

    What was our ROI?

    Given that we have been upgrading with Cisco firewalls, I would say that our company has seen a return on investment with Cisco. We would have changed to a different product if we were not happy.

    The response time from the tech and the support we get from our partner is quite good. We have never struggled with anything along those lines, even hardware RMAs. Cisco is always there to support its customers.

    What's my experience with pricing, setup cost, and licensing?

    The pricing is quite fair for what you get. If you're comparing with other products, Cisco is expensive, but you do get benefits for the price.

    Which other solutions did I evaluate?

    The firewall that I was exposed to before was Check Point.

    What other advice do I have?

    It's very good to get partner support if you're not very familiar with how Cisco works. Cisco Certified Partner support is a priority.

    For application visibility and control we're using a WAN optimizer called Silver Peak.

    To replace the firewalls within our data center we're planning to put in FMCs and FTDs. With the new FMCs what I like is that you don't need to log in to the firewalls directly. Whatever changes you do are done on your FMCs. That is a much needed improvement over the old ASAs. You can log in to the management center to make any configuration changes. 

    There are two of us managing the ASAs in our company, myself and a colleague, and we are both network specialists. We plan to increase usage. We're a company of 650 employees and we also have consultants who are coming from outside to gain access to certain services on our network. We need to make provisions on the firewall for them.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Managing Director at Fasp
    Real User
    User-friendly, easily managed, and scalable
    Pros and Cons
    • "The most valuable feature of the Firepower solution is FireSIGHT, which can be easily managed and is user-friendly."
    • "I would like to see the inclusion of more advanced antivirus features in the next release of this solution."

    What is our primary use case?

    We are a reseller and system integrator, and this is one of the solutions that we provide for our end users. We have experience with many firewall products from different vendors.

    The specific use case depends on the customer and their environment. They design the firewalls, and we supply the appropriate equipment.

    The majority of deployments are on private networks.

    What is most valuable?

    The most valuable feature of the Firepower solution is FireSIGHT, which can be easily managed and is user-friendly.

    What needs improvement?

    The performance and the level of throughput need to be improved. This would make things easier for us.

    I would like to see the inclusion of more advanced antivirus features in the next release of this solution.

    Adding internet accounting features would also be a good improvement.

    What do I think about the stability of the solution?

    This solution is completely stable, and we have not had any issues.

    What do I think about the scalability of the solution?

    Scalability of this solution is ok. They have the IPS (Intrusion Prevention System), online updates, and signature updates.

    One customer might have, for example, two hundred and fifty users, whereas another might have one hundred users. There are different models for different numbers of end-users.

    How are customer service and technical support?

    Technical support is ok, and we have had no problem with them.

    How was the initial setup?

    The initial setup of this solution is straightforward.

    What's my experience with pricing, setup cost, and licensing?

    The price of this solution is not good or bad. It is ok.

    What other advice do I have?

    This is a solution that I recommend.

    The biggest lesson that I have learned from working with this solution is to always update the firewall. If you do not have the latest updates then it will not function well, so always keep it up to date.

    I would rate this solution an eight out of ten.

    Disclosure: My company has a business relationship with this vendor other than being a customer: Reseller.
    PeerSpot user
    IT Consultant at MOD
    Consultant
    Protects our network from external threats and has good stability
    Pros and Cons
    • "The most valuable feature is that it has the ability to divide the network into three parts; internal, external, and DMZ."
    • "I would like for the user interface to be easier for the admin and network admin. I would also like to be able to access everything from the GUI interface. The way it is now, it needs somebody experience in iOS to be able to operate it. I would like to have a GUI interface."

    What is our primary use case?

    Our primary use case is to protect our network from external threats. We need to keep our portal safe. 

    We use the public cloud model of this solution. 

    What is most valuable?

    The most valuable feature is that it has the ability to divide the network into three parts; internal, external, and DMZ. 

    What needs improvement?

    I would like for the user interface to be easier for the admin and network admin. I would also like to be able to access everything from the GUI interface. The way it is now, it needs somebody experience in iOS to be able to operate it. I would like to have a GUI interface. 

    It should have integrated licenses with our other products. There should be a license bundle, like for firewalls and iOS. It would be better if it was a bundled license. 

    For how long have I used the solution?

    We have been using this solution for ten years.

    What do I think about the stability of the solution?

    It's very stable.

    What do I think about the scalability of the solution?

    The scalability is good. We have around 1,500 users. The users are regular end-users, network admins, technicians, etc. 

    We require three admins for this solution. We require five staff members for the deployment and maintenance. 

    It is used weekly. We do plan to increase the users.

    How are customer service and technical support?

    Their technical support is good. We have a maintenance contract with them for two years and we plan to renew the contract. 

    How was the initial setup?

    The initial setup was straightforward. It took around two to three days to implement. 

    What about the implementation team?

    We used a Cisco partner for the implementation. They were knowledgable and did a good job. 

    What's my experience with pricing, setup cost, and licensing?

    There are no additional costs to the standard licensing fees. 

    Which other solutions did I evaluate?

    We don't evaluate different solutions because our infrastructure is Cisco-based. We wanted it to be homogeneous with our infrastructure. 

    What other advice do I have?

    I would advise someone considering this solution to have a technical support or maintenance contract with the vendor or a third-party to help maintain the product. Without help with maintenance, there is no value to the product.

    You should have a good technician and admin support for all this product in order to maximize the value and benefits. 

    I would rate it an eight out of ten. 

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.
    Updated: March 2025
    Buyer's Guide
    Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.