Try our new research platform with insights from 80,000+ expert users
Group IT Manager at a manufacturing company with 1,001-5,000 employees
Real User
Behind in technology with lots of hidden costs
Pros and Cons
  • "Unfortunately in Cisco, only the hardware was good."
  • "In NGFW, Cisco should be aligned with the new technology and inspection intelligence because Cisco is far behind in this pipeline."

What is our primary use case?

The primary use case is to have full visibility over our Web & Application behavior on the local network and over the internet. On the other hand, reporting is one of the main needs so that we can monitor and evaluate our consumption and according to that, build up our policies and security.

How has it helped my organization?

Cisco NGFW had the needs that were required by us but unfortunately, was very primitive.

There was no added value and every feature requires license thus extra HIDDEN cost despite a large number of renewals. Paying that much compared to what other vendors can give is out of the negotiation. For this reason we dropped it.

What is most valuable?

Unfortunately in Cisco, only the hardware was good. As for the features and services it was less than the others. Having all of the features means higher specs of hardware and intelligence processing so that it can handle all the logs proactively. Now, what is needed from the Information security, is to be proactively aware of any threat that might expose our data and at the same time have full visibility over our information sharing endpoints.

What needs improvement?

In NGFW, Cisco should be aligned with the new technology and inspection intelligence because Cisco is far behind in this pipeline. Nowadays IoT, Big Data, AI, Robotics, etc. are all evolving and shifting from automatic to intelligent. All brands that do not follow will be extinct.

Buyer's Guide
Cisco Secure Firewall
November 2024
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,562 professionals have used our research since 2012.

For how long have I used the solution?

I have been using this solution for three years.

How are customer service and support?

good

Which solution did I use previously and why did I switch?

I was using a different solution prior to this one. I shifted because I found that it can heal my pain at least partially. By the end, it did the job and more.

How was the initial setup?

Not that simple, but anyone who have the knowledge can configure it.

What about the implementation team?

Through a vendor and they have good tech

What's my experience with pricing, setup cost, and licensing?

Always look for the history of the products and their evolution, as this will reflect their prices. As for the licenses, be smart and choose the ones you are going to use AS PER YOUR NEED.

More features=More Licenses=More work time=Increase in Cost.

Always consider what you might need to reduce your wasted time and invest it in other solutions (i.e. "If it takes you three hours to do an analysis report and the solution you are getting has this feature to reduce your time to five minutes then you can consider this license. But, if there is a feature where you can have access to the machine from the cloud and you are always connected to the company by VPN, there is no need to buy this license").

Which other solutions did I evaluate?

Whenever I go for a new solution, I test many leaders "NOT RELYING ON GARTNER", yet going for sites that are related to technical evaluations and real case studies. The vendors were Sophos Cyberoam, Barracuda, FortiGate, Websense, & Check Point.

What other advice do I have?

Think before you buy, as this solution can be your success or failure. Always work with professionals and not promoters.

Which deployment model are you using for this solution?

On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
reviewer1357989 - PeerSpot reviewer
Cisco Security Specialist at a tech services company with 10,001+ employees
Real User
Robust solution that integrates well with both Cisco products and products from other vendors
Pros and Cons
  • "If you have a solution that is creating a script and you need to deploy many implementations, you can create a script in the device and it will be the same for all. After that, you just have to do the fine tuning."
  • "Cisco missed the mark with all the configuration steps. They are a pain and, when doing them, it looks as if we're using a very old technology — yet the technology itself is not old, it's very good. But the front-end configuration is very tough."

What is our primary use case?

The ASAs are a defense solution for companies. Many of them use the AnyConnect or the VPN licenses. They also use it to have a next-generation firewall and to be compliant with GDPR.

The majority of our usage of the solution is on-prem or hybrid. The culture, here in Portugal — even knowing that the future is full cloud, in my opinion — is to only be on the way to full cloud.

What is most valuable?

All the features are very valuable. 

Among them is the integration for remote users, with AnyConnect, to the infrastructure. All the security through that is wonderful and it's very easy. You connect and you are inside your company network via VPN. Everything is encrypted and it's a very good solution. This is a wonderful feature. You need to make sure your machine has the profile requested by the company. That means having the patches updated. Optionally, you should have the antivirus updated, but you can decide whatever you would like in order to enable acceptance of the end-device in the enterprise network. That can be done with AnyConnect for remote/satellite users, or with ISE for local users.

The intrusion prevention system, the intrusion detection, is perfect. But you can also integrate Cisco with an IPS solution from another vendor, and just use the ASA with AnyConnect and as a firewall. You can choose from among many other vendors' products that the ASA will integrate with. Now, with Cisco SecureX, it's much easier than before. Cisco used to be completely blocked from other vendors but with SecureX they are open to other vendors. That was a massive improvement that Cisco probably should have made 10 years ago or seven years ago. They only released SecureX three or four months ago. 

Cisco ASA also provides application control. You can block or prevent people from going to certain applications or certain content. But the ASA only acts as a "bodyguard." It doesn't provide full visibility of the network. For that, there are other solutions from Cisco, such as ISE, although that is more for identity. Stealthwatch or TrustSec is what you need for visibility. They are both for monitoring and providing full visibility of the network, and they integrate with ASA.

Also, all of Cisco's security products are supported with Talos. Talos is in the background, handling all the improvements, all the updates. If something happens in Australia, for example, Talos will be aware of it and it will update the worldwide Talos network for all Cisco products. Within two minutes or three minutes, worldwide, Cisco products will be aware of that threat. Talos belongs to Cisco. It's like a Cisco research center.

What needs improvement?

My concern in the 21st century, with ASA, is the front-end. I think Cisco missed the mark with all the configuration steps. They are a pain and, when doing them, it looks as if we're using a very old technology — yet the technology itself is not old, it's very good. But the front-end configuration is very tough. They probably still make a good profit even with the front-end being difficult, but it's not easy. It's not user-friendly. All the configuration procedures are not user-friendly.

Also, they launched the 1000 series for SMBs. They have all the same features as the enterprise solutions, but the throughput is less and, obviously, the price is less as well. It's a very nice appliance. However, imagine you buy one, take it out of the box to connect it and the device needs one hour or two hours to start up. That is a pain and that is not appropriate for the 21st century. They should solve that issue.

Another issue is that when you integrate different Cisco solutions with each other, there is an overlap of features and you need to turn some of them off, and that is not very good.  If you don't, and you have overlap, you will have problems. Disabling the overlap can be done manually or the solution can identify that there is already a process running, and will tell you to please disable that function.

For today's threats, for today's reality, you need to add solutions to the ASA, either from Cisco or from other vendors, to have a full security solution in an enterprise company.

For how long have I used the solution?

I've been using Cisco ASA NGFW for almost two years.

What do I think about the stability of the solution?

The stability of the ASA is perfect. There is no downtime. And you can have redundancy as well. You can have two ASAs working in Active-Passive or load balancing. If the product needs a restart, you don't have downtime because you use the other one. From that point of view it's very robust.

What do I think about the scalability of the solution?

You can go for other models for scalability and sort it out that way.

My suggestion is to think about scalability and about your tomorrow — whether you'll increase or not — and already think about the next step from the beginning.

How are customer service and technical support?

Cisco's technical support for ASA is very good. I have dealt with them many times. They are very well prepared. If you have a Smart Account, they will change your device by the next business day. That is a very good point about Cisco. You have to pay for a Smart Account, but it's very useful.

How was the initial setup?

The initial setup is very complex. You need to set a load of settings, whether from the CLI or the GUI. It's not an easy process and it should be. That is one of the reasons why many retailers don't go for Cisco. They know Cisco is very good. They know Cisco does ensure security, that it is one of the top-three security vendors, but because of the work involved in the implementation, they decide to go with other solutions.

There are two possibilities in terms of deployment. If we go to a client who is the ASA purchaser and they give us all their policies, all their permissions, and everything is organized, we can deploy, with testing, in one full day. But many times they don't know the policies or what they would like to allow and block. In that scenario, it will take ages. That's not from the Cisco side but because of the customer.

One person, who knows the solutions well, is enough for an ASA deployment. I have done it alone many times. After it's deployed, the number of people needed to maintain the solution depends on their expertise. One expert could do everything involved with the maintenance.

What's my experience with pricing, setup cost, and licensing?

When it comes to security, pricing should not be an issue, but we know, of course, that it is. Why is an Aston Martin or a Rolls Royce very expensive? It's expensive because the support is there at all times. Replacement parts are available at all times. They offer a lot of opportunities and customer services that others don't come close to offering. 

Cisco is expensive but it's a highly rated company. It's one of the top-three security companies worldwide.

Which other solutions did I evaluate?

I can see the differences between Cisco and Check Point. 

Cisco has a solution called Umbrella which was called OpenDNS before, and from my point of view, Umbrella can reduce 60 percent of the attack surface because it checks the validity of the DNS. It will check all the links you click on to see if they are real or fake, using the signature link. If any of them are unknown, they will go straight to the sandbox. Those features do not exist with Check Point.

What other advice do I have?

Cisco ASA is a very robust solution. It does its job and it has all the top features. If you have a solution that is creating a script and you need to deploy many implementations, you can create a script in the device and it will be the same for all. After that, you just have to do the fine tuning. It lacks when it comes to the configuration steps and the pain that that process is. You need to spend loads of time with it at setup. Overall, it does everything they say it does.

It's a very good solution but don't only go with the ASA. Go for Cisco Umbrella and join them together. If you have remote employees, go for AnyConnect to be more than secure in your infrastructure.

You cannot do everything with Cisco Defense Orchestrator. You have a few options with it but cannot do everything from the cloud if you are connected with the console of a device. You don't have all the same options, you only have some options with it. For example, you can manage the security policies, all of them, from the cloud. However, not all the settings and all the things you can do when in front of the device are available with CDO. What you see is what you get.

Most companies using ASA are big companies. They are not SMB companies. There are very few SMB companies using it. There are the banks and consulting companies, the huge ones. Usually the ASAs are for massive companies.

Our reality in Portugal is a little different. I was at a Cisco conference here in Lisbon and the guy said, "Oh, we have this solution," — it was for multi-factor authentication — "and we have different licenses. We have a license for 40,000 and for 20,000 users. And I was thinking, "This guy doesn't know Portuguese reality. There are no companies in Portugal with 40,000 employees."

Large companies who do use ASA use various security tools like IPS and Layer 7 control. From my experience, and from common sense, it's best to have solutions from different vendors joining together. The majority have defense products for the deterrent capacities they need to achieve security. Our clients also often have Cisco ISE, Identity Service Engine. It's a NAC solution that integrates perfectly with ASA and with AnyConnect as well.

As for future-proofing your security strategy, ASA is the perfect solution if you integrate other Cisco solutions. But the ASA alone will not do it because it does not handle some of the core issues, like full visibility of the network, the users, the machines, the procedures, and the applications, in my opinion.

Disclosure: My company has a business relationship with this vendor other than being a customer: Partner.
PeerSpot user
Buyer's Guide
Cisco Secure Firewall
November 2024
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,562 professionals have used our research since 2012.
IT Consultant at MOD
Consultant
Protects our network from external threats and has good stability
Pros and Cons
  • "The most valuable feature is that it has the ability to divide the network into three parts; internal, external, and DMZ."
  • "I would like for the user interface to be easier for the admin and network admin. I would also like to be able to access everything from the GUI interface. The way it is now, it needs somebody experience in iOS to be able to operate it. I would like to have a GUI interface."

What is our primary use case?

Our primary use case is to protect our network from external threats. We need to keep our portal safe. 

We use the public cloud model of this solution. 

What is most valuable?

The most valuable feature is that it has the ability to divide the network into three parts; internal, external, and DMZ. 

What needs improvement?

I would like for the user interface to be easier for the admin and network admin. I would also like to be able to access everything from the GUI interface. The way it is now, it needs somebody experience in iOS to be able to operate it. I would like to have a GUI interface. 

It should have integrated licenses with our other products. There should be a license bundle, like for firewalls and iOS. It would be better if it was a bundled license. 

For how long have I used the solution?

We have been using this solution for ten years.

What do I think about the stability of the solution?

It's very stable.

What do I think about the scalability of the solution?

The scalability is good. We have around 1,500 users. The users are regular end-users, network admins, technicians, etc. 

We require three admins for this solution. We require five staff members for the deployment and maintenance. 

It is used weekly. We do plan to increase the users.

How are customer service and technical support?

Their technical support is good. We have a maintenance contract with them for two years and we plan to renew the contract. 

How was the initial setup?

The initial setup was straightforward. It took around two to three days to implement. 

What about the implementation team?

We used a Cisco partner for the implementation. They were knowledgable and did a good job. 

What's my experience with pricing, setup cost, and licensing?

There are no additional costs to the standard licensing fees. 

Which other solutions did I evaluate?

We don't evaluate different solutions because our infrastructure is Cisco-based. We wanted it to be homogeneous with our infrastructure. 

What other advice do I have?

I would advise someone considering this solution to have a technical support or maintenance contract with the vendor or a third-party to help maintain the product. Without help with maintenance, there is no value to the product.

You should have a good technician and admin support for all this product in order to maximize the value and benefits. 

I would rate it an eight out of ten. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Team Leader, Information Risk Engineer at National Bank of Egypt
Real User
Data protection is a big benefit we see but some of their features need to be improved
Pros and Cons
  • "Its ability to discover attacks is a valuable feature. All of the other features that have to do with security are good."
  • "Some of the features, like the stability, need to be improved."

What is our primary use case?

Our primary use case is for security. We are a bank in India and the data is very important for us. We use ASA for our security and protection.

How has it helped my organization?

Data protection is a big benefit we see from this solution. It protects our customers, our customer's accounts, and money, as we are one of the biggest banks in Egypt and the Middle East.

What is most valuable?

Its ability to discover attacks is a valuable feature. All of the other features that have to do with security are good.

What needs improvement?

Some of the features, like the stability, need to be improved. 

For how long have I used the solution?

More than five years.

What do I think about the scalability of the solution?

The scalability is good. 

How are customer service and technical support?

Their support is good and helpful but sometimes it takes them a while to respond. We have been stuck in critical situations so we opened a critical ticket but it took them a while to respond. 

How was the initial setup?

The initial setup is easy. If we have an issue we contact their support. 

What about the implementation team?

We implemented ourselves. 

What other advice do I have?

I would rate it a seven out of ten. I would recommend this solution to a colleague. No product will give you 100% of what you're looking for but this solution is close. 

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Data Center Architect at Fronius International
Real User
Has the full package that we're looking for but the features aren't stable enough for us to use
Pros and Cons
  • "We chose Cisco because it had the full package that we were looking for."
  • "The stability and the product features have to really be worked on."

What is our primary use case?

Our primary use case of this solution is for firewalling. 

How has it helped my organization?

We have been using Cisco for a long time, and we use Firepower to replace other systems. It hasn't really been an improvement, but there are many features we want to use in the future. We haven't seen much improvement because we only installed it a short while ago. 

What is most valuable?

It has many features but not all of them work. The features aren't stable enough for us to use them. The most valuable features are the firewalling and the deep inspection. 

What needs improvement?

The stability and the product features have to really be worked on.

For how long have I used the solution?

One to three years.

What do I think about the stability of the solution?

The stability is getting better but we had some firmware issues. 

What do I think about the scalability of the solution?

The scalability is good. We have scaled it but at a normal gross so it's not very high. We have designed it for our use case and we have the option to scale but we don't use it at the moment.

Which solution did I use previously and why did I switch?

We chose Cisco because it had the full package that we were looking for. 

How was the initial setup?

The initial setup was of normal complexity. It's not straightforward, and because we started so early, the migration tools were not so good at the beginning.

What about the implementation team?

We implemented through our partner and had a good experience with them. 

What other advice do I have?

Customers should take note that the migrations steps are not easy. The tools cannot solve all configurations and handle all configurations directly so you will have to do some coding by yourself. The solution is not complete at the moment but it will get better.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Technical Services Manager at a comms service provider with 10,001+ employees
Real User
They have the integrated ITS/IPS source powered modules. This is a new screen for us, and it is also very useful.
Pros and Cons
  • "It protects our network."
  • "The stability of the product is good."
  • "The pricing is a bit high."

What is our primary use case?

I have been using this product for over ten years. Most of the features fulfill my requirements. It protects our network.

What is most valuable?

The most valuable feature is the section payover. But, I think that kind of function may also come from similar products. In addition, they have the integrated IDS/IPS source powered modules. This is a new screen for us, and it is also very useful.

For how long have I used the solution?

More than five years.

What do I think about the stability of the solution?

The stability of the product is good.

What do I think about the scalability of the solution?

The scalability of the solution is OK for me. It basically fulfills my requirement.

How are customer service and technical support?

I would rate the technical support a rating of seven out of ten.

What about the implementation team?

I always consider the stability and scalability of a product when choosing a vendor.

What's my experience with pricing, setup cost, and licensing?

The cost is a bit high compared to other solutions in the market.

Which other solutions did I evaluate?

We have looked at Juniper, Palo Alto and other brands.

What other advice do I have?

We like that Cisco has a lot of experience on the market trends.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
IT Manager at a manufacturing company with 51-200 employees
Real User
It is a very secure product. But, it has limitations.
Pros and Cons
  • "It is a secure product."
  • "It is not easy to configure."
  • "The scalability is a bit limiting, to be honest. In terms of when you look to changing landscape in terms of threats, I think to me, my personal it's a bit limiting."

What is our primary use case?

Our primary use case is to use it as a firewall.

What is most valuable?

I find that the product is a very good, and secure firewall. The benefits of this product is that it is a strong firewall solution. 

What needs improvement?

It is a secure product. But, it is not very easy to configure. You need to be knowledgeable to be able to manage it. 

In addition, due to changes in management, we found Cisco slightly behind some of the competitors in the market. Furthermore, the internet protection system seems to be lacking, in comparison to some of the competitors. This is why we are currently looking at other possible solutions.

For how long have I used the solution?

Three to five years.

What do I think about the stability of the solution?

It is a stable solution.

What do I think about the scalability of the solution?

The scalability is a bit limiting, to be honest. In terms of when you look to changing landscape in terms of threats, I think to me, my personal it's a bit limiting.

How is customer service and technical support?

I have not used the technical support for Cisco ASA.

How was the initial setup?

It was a bit complex to setup this solution. When we used the command line, it was not easy to implement. We needed Cisco technical knowledge to be able to manage the implementation.

What's my experience with pricing, setup cost, and licensing?

The cost is a bit higher than other competitive solutions on the market.

What other advice do I have?

Yes, it's a good provider when it comes to firewall solution, but maybe limiting when you are looking at the wall UTM management. It's delayed behind some of the competitors.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
PeerSpot user
IT System Administrator at PFW HAVACILIK
Real User
Creates a unified strategy for event logging and correlation
Pros and Cons
  • "Beats sophisticated cyber attacks with a superior security appliance."
  • "The Cisco ASA device needs overall improvement, as configurations alone do not completely secure my network."

What is our primary use case?

IT landscape is dynamic, requiring security policy, controls, and visibility to be better than ever. 

  • 1Gbps
  • Multi-service
  • Beats sophisticated cyber attacks with a superior security appliance.
  • IT landscape is dynamic.
  • Requires security policy, controls, and visibility to be better than ever. 

This applies to all ASA-related Management/to-the-box traffic, like SNMP, SSH, etc., with Firepower services combined with our proven network firewall along with the industry’s most effective next-generation IPS and advanced malware protection. Therefore, you can get more visibility, be more flexible, save more, and protect better.

How has it helped my organization?

Historic events related to security incidents. My organization must have a unified strategy for event logging and correlation.

What is most valuable?

The Cisco Product Security Incident Response creates and maintains publications, commonly referred to as PSIRT Advisories, for security-related issues in Cisco ASA.

What needs improvement?

The Cisco ASA device needs overall improvement, as configurations alone do not completely secure my network. The operational procedures in use on the network contribute as much to security as the configuration on devices.

For how long have I used the solution?

Still implementing.

How are customer service and technical support?

There is 24/7 support anytime, anywhere.

Which solution did I use previously and why did I switch?

Before, I did not manage my private network well (or professionally). For this reason, I have been updating products.

What's my experience with pricing, setup cost, and licensing?

Commercial leasing is the best option.         

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.
Updated: November 2024
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.