Malicious URLs are being blocked.
Account Manager
Blocks malicious URLs, but bandwidth allocation and detection of new bugs need work
Pros and Cons
- "Malicious URLs are being blocked."
- "Bandwidth allocation needs improvement."
- "Critical bugs need to be addressed before releasing the version."
- "Virtual patching would be helpful for servers that are not able to update patches due to compatibility issues."
How has it helped my organization?
What is most valuable?
Advanced malware protection, it blocks malicious attacks.
What needs improvement?
- Bandwidth allocation.
- SSL decryption (avoid installing the intermediate device certificate in the client) should happen from Firepower itself.
- Critical bugs need to be addressed before releasing the version.
- Need to reduce the time to for detection of new threats.
- Enable a feature for importing/exporting logs when required for analysis.
- Dynamic IP address in client systems mapping with respect to OS change or device change should be updated periodically in FireSIGHT management.
- Virtual patching would be helpful for servers that are not able to update patches due to compatibility issues.
For how long have I used the solution?
One to three years.
Buyer's Guide
Cisco Secure Firewall
November 2024
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,562 professionals have used our research since 2012.
What do I think about the stability of the solution?
Yes, there were stability issues due to memory issues in the cluster environment and Firepower misbehaved due to non-responding of service/process.
What do I think about the scalability of the solution?
No scalability issues.
How are customer service and support?
Good support.
Which solution did I use previously and why did I switch?
We switched from our previous solution because of scalability issues.
How was the initial setup?
It was straightforward, even though we migrated from a third-party to Cisco.
What's my experience with pricing, setup cost, and licensing?
Price should be judged based on the above answers, among the most capable vendors.
Which other solutions did I evaluate?
FortiGate.
What other advice do I have?
We are using ASA5585-X with Firepower SSP-20 (ASA version 9.6(1)3, Firepower version 6.1.0.5).
When looking at different solutions, take a deep look at the features.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Security Administrator at a tech company with 5,001-10,000 employees
It helped us and our customers to implement more granular and flexible connections to and from our/their environments.
Pros and Cons
- "The most valuables feature of this product are given by the comprehensive VPN solutions it offers and its tools for troubleshooting and debugging."
- "It should have an additional “operating mode”, like a “candidate configuration mode”, where you would have the possibility to test the changes you are going to implement and also the possibility to validate these changes."
How has it helped my organization?
It helped us and our customers implement more granular and flexible connections to and from our/their environments, building a trust relation between all of us, having the confidence that our exchanged information is occurring in a highly secure manner.
What is most valuable?
The most valuables feature of this product are given by the comprehensive VPN solutions it offers and its tools for troubleshooting and debugging. You can provide complex and flexible way to securely access private environments. And its troubleshooting and debugging tools allow you to identify, in the fastest time possible, where some potential issues could have been occurred.
What needs improvement?
It should have an additional “operating mode”, like a “candidate configuration mode”, where you would have the possibility to test the changes you are going to implement and also the possibility to validate these changes.
In addition, a "testing" feature should be performed to let you know what would be the consequences of applying these new changes. Only after you would see the tests’ results (if they do not create any unwanted effect) would you go and commit them.
What do I think about the stability of the solution?
There were some issues with stability prior to code version 9.2.x, more related to Clientless SSL and Client RA VPN solutions. Some bugs affected the integrity of these type of features.
What do I think about the scalability of the solution?
There were no problems in terms of scaling an existing solution, though very expensive.
How are customer service and technical support?
I would give a rating of eight out of 10, compared to others vendors. The technical support is much better than most vendors, but let's say not as good as F5 Networks technical support.
Which solution did I use previously and why did I switch?
I've only worked for integrator or ISP organizations. Over the years I’ve worked with multiple solutions offered by different vendors due to my customers’ budgets or preferences. What makes it the best of all the solutions I’ve worked on is the stability and its hardware.
How was the initial setup?
The initial setup configurations differ from customer to customer, from very simple to highly complex solutions. Depends on the customer’s needs.
What's my experience with pricing, setup cost, and licensing?
I have to admit that the price is high. But I think it's worth it if the stability of your solution counts for you.
What other advice do I have?
Choose it if you aim to have a stable environment.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Cisco Secure Firewall
November 2024
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
816,562 professionals have used our research since 2012.
Senior Network and Security Engineer at a tech services company with 51-200 employees
It has very good stability, but it took too much time to create ASA CX.
What is most valuable?
It was a valuable firewall some years ago but then Palo Alto created the next generation firewall and Cisco needed too much time to create ASA CX. At the moment it has, basically, the same features. In my opinion the most valuable features now are the layer seven capabilities and the new FirePOWER.
For how long have I used the solution?
I've used the devices for over 10 years.
What was my experience with deployment of the solution?
I have never had an issue with my deployments.
What do I think about the stability of the solution?
One of the best things about ASA's is that they are very stable.
What do I think about the scalability of the solution?
With ASA, you can scale to the largest deplyments. As an example, I have installed an ASA in an environment with 80.000 users.
How are customer service and technical support?
Customer Service:
Cisco Support is very good, you don't have problems using it.
Technical Support:10/10.
Which solution did I use previously and why did I switch?
I have migrated customers from Cisco's competitors to ASA's.
How was the initial setup?
Once you have the knowledge it is not complex to install an ASA, but it does depend on the network of the customer.
Which other solutions did I evaluate?
Our customers also evaluate PaloAlto.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partners
Programming Analyst at a tech services company with 201-500 employees
A stable, advanced threat detection solution with a straightforward setup, but with room for improvement on the console visualization
Pros and Cons
- "The customer service/technical support is very good with this solution."
- "An area of improvement for this solution is the console visualization."
What is most valuable?
The feature I have found most valuable is the IPS advanced threat detection for removing ransomware and malware.
What needs improvement?
An area of improvement for this solution is the console visualization.
For how long have I used the solution?
I have been using this solution for two months.
What do I think about the stability of the solution?
The solution is stable.
How are customer service and technical support?
The customer service/technical support is very good with this solution.
How was the initial setup?
The initial setup is straightforward and it took two weeks to deploy. Currently, 5000 employees use this solution in our company.
What's my experience with pricing, setup cost, and licensing?
The solution was chosen because of its price compared to other similar solutions.
What other advice do I have?
I would recommend this solution to other users.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Integrator
CEO & Co-Founder at a tech services company with 51-200 employees
Good configuration support but needs a few features and better pricing
Pros and Cons
- "The configuration support is very good. You can find a lot of configuration samples and troubleshooting tips on the internet, which is very good."
- "You need to have a little bit of knowledge to be able to configure it. Otherwise, it would be very difficult to configure because there is no GUI. The latest software available in the market has a GUI and probably zero-touch provisioning and auto-configuration. All these things are not available in our version. You need to manually go and configure everything in the switch. In terms of new features, we would definitely want to have URL-based filtering, traffic steering, and probably a little bit steering in the bandwidth based on the per-user level and per-user group. We will definitely need some of these features in the near future."
What is most valuable?
The configuration support is very good. You can find a lot of configuration samples and troubleshooting tips on the internet, which is very good.
What needs improvement?
You need to have a little bit of knowledge to be able to configure it. Otherwise, it would be very difficult to configure because there is no GUI. The latest software available in the market has a GUI and probably zero-touch provisioning and auto-configuration. All these things are not available in our version. You need to manually go and configure everything in the switch.
In terms of new features, we would definitely want to have URL-based filtering, traffic steering, and probably a little bit steering in the bandwidth based on the per-user level and per-user group. We will definitely need some of these features in the near future.
For how long have I used the solution?
I have been using this solution for the last one and a half years.
What do I think about the stability of the solution?
Stability-wise, it is pretty stable. It is probably not very feature-rich, but whatever features we are using, they are pretty stable.
What do I think about the scalability of the solution?
Scalability-wise, we did not have much problem because we have a single site. If we have two or more sites, and if we want to have a site-to-site VPN and more number of users, we are not sure about the scalability. We will have to go for an updated version of the new product line.
We have close to 80 plus users. We anticipate a huge increase in the number of users and plan to increase the usage of Cisco ASA Firewall. We may have to open a new center in a different city, which will lead to more sites, users, and usage.
How are customer service and technical support?
Their support is good, but the cost of support is very high. Next year onwards, we may not go for technical support because most of the time, they only do the configuration, and the configuration-related information is pretty much available on the internet.
Which solution did I use previously and why did I switch?
Initially, we started with some open-source alternatives, like Opium, but eventually, we thought of moving towards a proven solution. We just did a study. We didn't put the open-source solution into production. One of our customers was basically suggesting us to go with this one, and we went for it. We did not get time to go through, study, and explore different options because we didn't have the bandwidth for testing the complete features of the open-source alternatives. Therefore, we thought of going for a commercial solution. A lot of alternatives are available right now for this solution.
How was the initial setup?
The initial setup was not too complicated. It was good.
What about the implementation team?
We took the help of a reseller for the initial configuration.
What's my experience with pricing, setup cost, and licensing?
The product cost is a little high. It is a little bit on the high side, and it should be a little bit cost-friendly.
What other advice do I have?
I would rate Cisco ASA Firewall a seven out of ten. It needs improvement in terms of a few features and cost-friendliness.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Tier 2 Network Engineer at a comms service provider with 1,001-5,000 employees
A stable firewall that our customers use as their AnyConnect VPN solution
Pros and Cons
- "The most valuable feature must be AnyConnect. We have quite a few customers who use it. It is easy to use and the stablest thing that we have. We have experienced some issues on all our VPN clients, but AnyConnect has been the stablest one."
- "One of the problems that we have had is the solution requires Java to work. This has caused some problems with the application visibility and control. When the Java works, it is good, but Java wasn't a good choice. I don't like the Java implementation. It can be difficult to work with sometimes."
What is our primary use case?
We are an ISP, so it's primarily for customer firewalls that we help customers setup and maintain. While we do use Cisco ASA in our company, we mostly configure it for customers. Our customers use it as a company firewall and AnyConnect VPN solution.
How has it helped my organization?
A lot of people trust Cisco. Just by its name, they feel more secure. They know it's a quality solution, so they feel safer.
What is most valuable?
The most valuable feature must be AnyConnect. We have quite a few customers who use it. It is easy to use and the stablest thing that we have. We have experienced some issues on all our VPN clients, but AnyConnect has been the stablest one.
It is one of the easiest firewalls that I've worked with. Therefore, if you're not comfortable with command line, it probably is one of the best solutions on the market.
What needs improvement?
One of the problems that we have had is the solution requires Java to work. This has caused some problems with the application visibility and control. When the Java works, it is good, but Java wasn't a good choice. I don't like the Java implementation. It can be difficult to work with sometimes.
If you use Cisco ASDM with the command line configuration, it can look a bit messy. We have some people who use them both. If you use one, it's not a problem. If you use both, it can be an issue.
For how long have I used the solution?
For five or six years.
What do I think about the stability of the solution?
We haven't had any issues with the firewalls.
The maturity of our company's security implementation is good. We are very satisfied as long as we maintain the software. It has needed to be updated quite a few times.
What do I think about the scalability of the solution?
We don't have any firewalls that can handle more than a couple of gigabits, which is pretty small. I think the largest one we have is the 5525-X, though we haven't checked it for scalability.
In my company, there are probably 16 people (mostly network engineers) working with the solution: seven or eight from my group and the others from our IT department.
How are customer service and technical support?
I haven't worked with Cisco's technical support. We haven't had real issues with these firewalls.
Which solution did I use previously and why did I switch?
This was the first firewall solution that I worked with.
How was the initial setup?
The initial setup has been pretty straightforward. We have set up a lot of them. The solution works.
The deployment takes about half an hour. It takes a little longer than if we were using their virtual firewalls, which we could implement in a minute.
What about the implementation team?
We have a uniform implementation strategy for this solution. We made some basic configurations with a template which we just edited to fit a customer's needs.
What was our ROI?
We haven't notice any threats. The firewalls is doing its job because we haven't noticed any security issues.
What's my experience with pricing, setup cost, and licensing?
The licensing is a bit off because the physical firewall is cheaper than the virtual one. We only have the physical ones as they are cheaper than the virtual ones. We only use the physical firewalls because of the price difference.
Which other solutions did I evaluate?
Our company has five or six tools that it uses for security. For firewalls, we have Check Point, Palo Alto, Juniper SRX, and CIsco ASA. Those are the primary ones. I think it's good there is some diversity.
The GUI for Cisco ASA is the easiest one to use, if you get it to work. Also, Cisco ASA is stable and easy to use, which are the most important things.
What other advice do I have?
We use this solution with Cisco CPEs and background routers. These work well together.
We have some other VPN options and AnyConnect. We do have routers with firewalls integrated, using a lot of ISR 1100s. In the beginning, we had a few problems integrating them, but as the software got better, we have seen a lot of those problems disappear. The first software wasn't so good, but it is now.
We have disabled Firepower in all of our firewalls. We don't use Cisco Defense Orchestrator either. We have a pretty basic setup using Cisco ASDM or command line with integration to customers' AD.
I would rate the product as an eight (out of 10).
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Information Security Manager at Tactical Air Support
Easy to use and has helped to secure our Internet Edge
Pros and Cons
- "We moved from a legacy firewall to the ASA with FirePOWER, increasing our Internet Edge defense dramatically."
- "The product would be improved if the GUI could be brought into the 21st Century."
What is our primary use case?
Our primary use case for this solution is to protect the Internet Edge, and our VPN (Virtual Private Network).
How has it helped my organization?
We moved from a Legacy firewall to the ASA with Firepower, increasing our internet Edge defense dramatically.
What is most valuable?
The most valuable features for us are Firepower and the VPN concentration. These are easy to use and have good insights.
What needs improvement?
The product would be improved if the GUI could be brought into the 21st Century.
For how long have I used the solution?
One to three years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Center for Creative Leadership at a training & coaching company with 501-1,000 employees
Good scalability and good security features
Pros and Cons
- "This solution has good security, and it's a good product. You can trust Cisco, and there's support as well, which is really good."
- "The phishing emails could be improved."
What is most valuable?
Its security is the most valuable feature.
What needs improvement?
The phishing emails could be improved.
For how long have I used the solution?
More than five years.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
The scalability is good. I'm happy with the service. We are around twenty users. Some are in finance, some are in a mid-user roles, and some are in other official roles.
Which solution did I use previously and why did I switch?
We did not previously use a different solution.
How was the initial setup?
The initial setup was straightforward. Implementation took two days. We needed two people for the deployment.
What's my experience with pricing, setup cost, and licensing?
Pricing is high, but it is corporate's decision.
Which other solutions did I evaluate?
We didn't look at any other solutions. All of our campuses use Cisco products. This is why we chose this solution.
What other advice do I have?
This solution has good security and it's a good product. You can trust Cisco, and there's support as well, which is really good.
I would rate this solution an eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: November 2024
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Palo Alto Networks NG Firewalls
Azure Firewall
Check Point NGFW
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Untangle NG Firewall
Fortinet FortiGate-VM
SonicWall NSa
Sophos XGS
Fortinet FortiOS
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?
Cool review