Try our new research platform with insights from 80,000+ expert users
reviewer2211648 - PeerSpot reviewer
Network Security Team Lead at a government with 10,001+ employees
Real User
Secures our infrastructure from end to end
Pros and Cons
  • "The VPN is our most widely used feature for Cisco Secure Firewall. Since we were forced into a hybrid working situation by COVID a few years back, VPN is the widely used feature because everybody is working remotely for our agency. So it came in very handy."
  • "Cisco Secure Firewall’s customer support could be improved."

What is our primary use case?

We have some in our DMZ. We have some located in several locations throughout our state. Then we have our local Egress and VPN firewalls that we use.

What is most valuable?

The VPN is our most widely used feature for Cisco Secure Firewall. Since we were forced into a hybrid working situation by COVID a few years back, VPN is the widely used feature because everybody is working remotely for our agency. So it came in very handy.

What needs improvement?

Cisco Secure Firewall’s customer support could be improved.

For how long have I used the solution?

I have been using Cisco Secure Firewall for 20 years.

Buyer's Guide
Cisco Secure Firewall
March 2025
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,319 professionals have used our research since 2012.

What do I think about the stability of the solution?

Cisco Secure Firewall is a very stable solution.

What do I think about the scalability of the solution?

We bought scalable products, and we're in a good position.

How are customer service and support?

With Cisco Secure Firewall's technical support, it's always hard to get somebody that knows what they're doing on the line. However, when you finally get somebody on the line, it's pretty good. Having to deal with the licensing and be able to open a TAT case based on the serial numbers was very difficult. The individuals we get support from are pretty good, but the solution's support is two out of ten because of the process of having to get to that point to get support.

How would you rate customer service and support?

Negative

Which solution did I use previously and why did I switch?

I have previously used Juniper. Our company decided to go with Cisco Secure Firewall because of the cost and ease of use. Also, the people in our team knew Cisco versus other solutions.

How was the initial setup?

Cisco Secure Firewall's initial setup was pretty straightforward. They have a wizard, which helped in some instances, but there's also a lot of documentation online that helps a lot.

What about the implementation team?

We have a reseller that we go through, and they helped implement Cisco Secure Firewall for us.

What other advice do I have?

The application visibility and control with Cisco Secure Firewall is pretty great. We have the FTD, the firewall threat defense, and FMC, the management console we use, and we have great visibility using that product.

Cisco Secure Firewall's ability to secure our infrastructure from end to end is really good. We always find things and or block things before they even happen. So it's great, especially with Talos.

Cisco Secure Firewall has helped free up our IT staff for other projects to a certain degree. We still have to review logs in the firewall, and hopefully, someday, we'll have AI to help do that for us too. The solution has probably saved our organization about ten hours a week.

We use Talos, among other threat advice tools, and it's very good. Talos automatically updates us on the threats out there, and we can deploy those to our devices if we deem it fit to deploy them.

Cisco Secure Firewall has helped our organization improve its cybersecurity resilience. We've used Cisco for so long, and we've never had a data breach up to this point.

Overall, I rate Cisco Secure Firewall ten out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Orla Larsen - PeerSpot reviewer
Network specialist at a retailer with 10,001+ employees
Real User
Top 10
Useful firewall component package, effective third-party devices integration, but licensing could improve
Pros and Cons
  • "The most beneficial aspect of the Cisco Secure Firewall is the AnyConnect component within the firewall package, which we selected specifically for VPN usage due to its exceptional integration with various third-party devices and applications."
  • "The overall licensing structure could improve to make the solution better."

What is our primary use case?

We are currently utilizing the Cisco Secure Firewall, partially due to its historical relevance and partly because Cisco continues to maintain a prominent position in providing client VPN access.

We have employed Cisco Firepower and ASA on Firepower to facilitate client VPN access and to enforce fundamental layer four security policies.

We utilize security products in central locations to provide VPN access for clients throughout Europe.

How has it helped my organization?

The implementation of the Cisco Secure Firewall has had a positive impact on our organization, as evidenced by our ability to use our store apps on mobile devices through AnyConnect even when Wi-Fi is unavailable. This is made possible by the utilization of 3G, 4G, or 5G internet access while maintaining a secure connection on our mobile devices.

Cisco Secure has enabled my organization to save time, as demonstrated by our ability to swiftly open new stores by utilizing applications on mobile devices without having to establish the entire infrastructure at once. The amount of time saved varies depending on the country we are operating in, ranging from weeks to months.

What is most valuable?

The most beneficial aspect of the Cisco Secure Firewall is the AnyConnect component within the firewall package, which we selected specifically for VPN usage due to its exceptional integration with various third-party devices and applications.

What needs improvement?

The overall licensing structure could improve to make the solution better.

For how long have I used the solution?

I have been using Cisco Secure Firewall for approximately 15 years.

How are customer service and support?

My experiences with the Cisco Secure Firewall support have varied. Since we access it through a partner, some issues are quickly resolved, while others require more time and effort.

I rate the support from Cisco Secure Firewall a six out of ten.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

While I have not personally utilized other security products, our organization also employs FortiGate devices and applications for security purposes alongside Cisco Secure Firewall.

What's my experience with pricing, setup cost, and licensing?

Acquiring licensing for Cisco Secure Firewall can be a bit cumbersome, therefore a more straightforward licensing process would be preferable. 

The licensing process can be frustrating, as it requires selecting between on-box or per-client options and other related considerations. Simplifying this process would be beneficial.

What other advice do I have?

We are using access switches, routers, catalysts, and ISR products. Additionally, we are using Cisco as a platform, which is somewhat old, and Cisco ASA on Firepower devices.

I would advise others to thoroughly evaluate their requirements before selecting a security solution. While some products may seem like an obvious choice, it is important to take the time to assess the available options and determine which one best suits your specific needs. This approach is wise and can ultimately lead to a more effective security solution.

I rate Cisco Secure Firewall a seven out of ten.

Disclosure: I am a real user, and this review is based on my own experience and opinions.
PeerSpot user
Buyer's Guide
Cisco Secure Firewall
March 2025
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: March 2025.
839,319 professionals have used our research since 2012.
DavidMayer - PeerSpot reviewer
Solution Architect at a energy/utilities company with 1,001-5,000 employees
Video Review
Real User
Top 10
Best support and good detection capabilities, but needs improvement in stability and functionality
Pros and Cons
    • "The most valuable features of the product are the VPN and the NextGen firewall features such as application control, URL filtering, etc."
    • "There is room for improvement in the stability or software quality of the product. There were a few things in the past where we had a little bit of a problem with the product, so there is room for improvement."

    What is our primary use case?

    I'm working as a Solution Architect for an energy provider in Austria. We have approximately 1,500 people working in Austria and also in some neighboring countries.

    We are using Cisco Secure Firewall. We started with Cisco ASA long ago, and now, we have Cisco Firepower or Cisco Secure Firewall. We are using the product as a perimeter firewall and for remote access VPN and site-to-site VPN tunnels with other partner companies. So, the primary use case of Cisco Secure Firewall is to secure our perimeter, but it's also for the remote access VPN for employees in the home office or if they are outside the company.

    How has it helped my organization?

    The benefit of using Cisco Secure Firewall is that there is a lot of integration with other Cisco products like Cisco ISE or even with third-party systems. It's important to have these integrations with other systems. On one hand, you get more visibility, and on the other hand, you can also use the information that you have from the firewall in other systems, such as a SIEM or other similar things. You overall get better visibility and better security.

    In terms of securing our infrastructure from end to end so that we can detect and remediate threats. When it comes to detection, it's pretty good because you have the background of Cisco Talos. I can't say if it's the truth, but they probably are one of the top players in threat hunting, so it's pretty good at detecting known things that are outside.

    What is most valuable?

    The most valuable features of the product are the VPN and the NextGen firewall features such as application control, URL filtering, etc. These features are especially valuable because nowadays, it's not enough to just filter for source and destination IPs. You need more insights or visibility to see which applications are passing your perimeter, which applications you want to allow, and which ones you want to block. Without this visibility and these features, it's a little bit hard to secure your network.

    What needs improvement?

    There is room for improvement in the stability or software quality of the product. There were a few things in the past where we had a little bit of a problem with the product, so there is room for improvement. In the past, we had problems with new releases. 

    Also, from the beginning, some functionalities or features have not worked properly. There are bugs. Every product has such problems, but sometimes, there are more problems than other products, so it's definitely something that can be improved, but Cisco seems to be working on it.

    What do I think about the stability of the solution?

    There is room for improvement in the stability of the product.

    What do I think about the scalability of the solution?

    I know that there are several models for every type of scale that you need. For small branches up to the data center or even for the cloud, there are models, but so far, we only have one cluster. Among all these different types, we found the perfect matching size for our company.

    How are customer service and support?

    The Cisco support with Cisco TAC is pretty good. With the TAC Connect Bot that you have with WebEx, you can easily open a case or escalate the case through the WebEx app. That's pretty cool. Also, the engineers that are working for Cisco TAC are really good. Among all the vendors that we have in place, it's the best support that we have experienced. I'd rate them a 10 out of 10 because compared to the other vendors that we have in place, it's definitely the best support.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    We have a multi-vendor strategy for the firewall so that if there is some security issue in the software or something like that, you are not directly impacted, and there is another vendor in between. If I compare Cisco Secure Firewall with the other vendor that we have in place, the pro for Cisco Secure Firewall is that detection is better with the database of Talos. The con that comes to my mind is the deployment time when you deploy a change. With the other vendor, the change is more or less deployed immediately, whereas, with Cisco Secure Firewall, you have to wait for a few minutes until the change is deployed. This is one of the biggest cons on this side because if there's a misconfiguration, you are not able to correct the issue as fast as with the other vendor.

    How was the initial setup?

    We migrated from Cisco ASA to Cisco Firepower, and it was straightforward because there were some migration tools to export the old ASA rule set and import it into Cisco Secure Firewall. With these tools and the documentation that you find on Cisco's site, it was pretty straightforward, and we had nearly no problems with the migration to Cisco Secure Firewall.

    In terms of the deployment model, we have one high-availability cluster, and, of course, FMC to manage this cluster. These are physical clusters, and we have them on-prem in our data center.

    What about the implementation team?

    For deployment, we worked with our partner who helped us a little bit with the migration. Our partner's engineer had good knowledge and supported us when we had questions. When we didn't know how to do something, they helped us with that.

    What's my experience with pricing, setup cost, and licensing?

    The licensing models that are available for Cisco Secure Firewall are okay. You have nearly every option that you need. You can pick filtering, advanced malware protection, or all the available features. It's sufficient.

    In terms of pricing, there are, for sure, some cheaper vendors, but overall, it's nearly the same. It has a fair price.

    What other advice do I have?

    To those evaluating Cisco Secure Firewall, I'd advise thinking about what are your use cases and what's your goal to achieve with this product. It's also a good idea to talk to other customers or a partner and ask them what's their experience and what they think about it, and if it's suitable for this use case or not. And, of course, it's also a good idea to do a proof of concept or something like that.

    At the moment, I'd rate Cisco Secure Firewall a six out of ten. The reason for that is that we are having some problems with the stability and functionality of the product, but there are also features, such as VPN, that are working from day one without a problem. So, there are good parts, and there are parts that are not working as well as we would like them to, but we and Cisco TAC will solve this in the future, and then the rating will go up.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Product Owner at a manufacturing company with 10,001+ employees
    Real User
    Top 20
    Protects our landscape, secures segments, and has good support
    Pros and Cons
    • "Protecting our landscape in general and being able to see logging when things aren't going as set out in policies are valuable features. Our security department is keen on seeing the logging."
    • "The integration between the on-prem proxy world and the cloud proxy would benefit us. One single policy setting would make sense."

    What is our primary use case?

    We use WSA proxy and Cisco Firepowers with the FMC suite and Cisco Umbrella. We mainly use WSAP for on-premises data centers to get traffic outbound to the internet. Cisco Umbrella is for our endpoints, and Cisco firewalls are to protect our perimeter but also internal choke points to secure segments on our LAN.

    Currently, we don't have any integrations between the three of them. They all run in isolation. 

    How has it helped my organization?

    Our external partner does the day-to-day management. We are not using it on a day-to-day basis. We position the products from within my team, but the detection mechanism is different per platform. We mainly trust the policy, and our security department is checking logs for anomalies in the patterns.

    In terms of cost savings, we've been using this mechanism for years on end, so we haven't been able to see a real cost reduction between using our own personnel versus our external partner for management. It has been like that for 10 years or so.

    In terms of time savings, it doesn't put too much burden on day-to-day activities to go over the details. The policies are rather straightforward, and anything not configured is not allowed. In that sense, it's easy.

    What is most valuable?

    Protecting our landscape in general and being able to see logging when things aren't going as set out in policies are valuable features. Our security department is keen on seeing the logging. 

    What needs improvement?

    If WSAP remains to be an active product, it might be an idea to integrate the configuration policy logic between Umbrella and WSAP. There should be one platform to manage both.

    The integration between the on-prem proxy world and the cloud proxy would benefit us. One single policy setting would make sense.

    How are customer service and support?

    That's great. Sometimes, you need to be clear on the severity levels, but once determined, we have a good experience with tech support.

    How would you rate customer service and support?

    Positive

    Which solution did I use previously and why did I switch?

    That was long ago, but we had Blue Coat proxies before. We switched because of our strategy to go for Cisco as an ecosystem.

    We chose Cisco products because we have a Cisco-first strategy. We typically check first with the Cisco product portfolio and then make up our minds. Historically speaking, it serves our interests best.

    How was the initial setup?

    I am not involved firsthand in its deployment. We have an oversight role within our company, so we ask our external supplier to do the implementation, and when needed, to have it validated via Cisco, but I've no real hands-on experience.

    What was our ROI?

    I would expect that we have seen an ROI because our sourcing department would make sure we get the best price for the solution.

    What's my experience with pricing, setup cost, and licensing?

    Licensing is quite difficult to get your head around. My biggest challenge is to understand the details, the inner relations. Luckily, to some extent, we have enterprise agreements, but licensing for me is a real black box.

    What other advice do I have?

    I'd rate it an eight out of ten.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Ahmet Orkun Kenber - PeerSpot reviewer
    Technical Network Expert at NXP Semiconductors Netherlands B.V. Internet EMEA
    Real User
    Quality product with a well-suited to top-down architectural level
    Pros and Cons
    • "The features I have found most valuable are the ASA firewalls. I like to have features like most integrated systems in ACI."
    • "I think that the solution can be improved with the integration of application-centric infrastructure. It could be used to have better solutions in one box."

    What is our primary use case?

    As a manufacturing company, we have to use many different concepts of firewalls. That's one reason we had to use a trusted firewall for security and trust reasons.

    How has it helped my organization?

    We use a top-down architectural level mostly. For this reason, Cisco Secure Firewall is the top product for us.

    I would say that this solution has saved our organization's time because we are certified engineers and experts. It helps us to connect quite well with our customers on a professional level.

    What is most valuable?

    The features I have found most valuable are the ASA firewalls. I like to have features like most integrated systems in ACI.

    What needs improvement?

    I think that the solution can be improved with the integration of application-centric infrastructure. It could be used to have better solutions in one box.

    For how long have I used the solution?

    I have been using this solution for around seven or eight years.

    Which solution did I use previously and why did I switch?

    I've used different concepts of solutions before Cisco. Cisco is much better than Juniper, Brocade, or Foundry, as it is much easier to use and get directions from. It is also easier to integrate Cisco if you compare it with other customer concepts, such as Juniper, Brocade, or Aruba.

    How was the initial setup?

    I am not involved in all Cisco firewall deployments. We also have an architectural team. We deploy based on a top-down level architecture and implementation structure.

    What's my experience with pricing, setup cost, and licensing?

    When it comes to pricing, quality is important to us. When looking at products, we prefer quality over speed. Cisco is on that quality side mostly.

    What other advice do I have?

    We are currently using the Cisco Firepower firewall, which is dependent on the situations in the data center and regional data center concepts. 

    The way that this solution helps secure our infrastructure end-to-end is by enabling us to easily integrate all end-to-ends for monitoring.

    Whether this solution saves us time depends on the situation. We use highly secure networks on the national security level and that's why it helps to use different products as Cisco is one of the best.

    Overall, I would rate this solution a nine, on a scale from one to ten, with one being the worst and ten being the best.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    reviewer1667103 - PeerSpot reviewer
    Global Network Architect at a agriculture with 10,001+ employees
    Real User
    Prevents incidents and an average amount of maintenance required
    Pros and Cons
    • "Cisco Secure Firewall is a good solution. In some ways, it is a reactive solution and we have it sitting in a whitelist mode rather than a blacklist mode. It seems to work fairly well for us."
    • "It would be better if we could manage all of our firewalls as a set rather than individually. I would like to see a single pane of glass type of option. We also use another vendor's firewalls and they have a centralized management infrastructure that we have implemented. This infrastructure is a bit easier to manage."

    What is our primary use case?

    Our primary use case for Cisco Secure Firewall is protection in our OT network. We have our OT network behind the commercial network and we do dual firewalls. The Cisco Secure Firewall is on the commercial network side and a different vendor and management group are on the OT network side.

    How has it helped my organization?

    Cisco Secure Firewall has not necessarily improved our organization as much as it has protected it against the impact of cyber threats. Our organization runs manufacturing plants that have hazardous material and we don't want that manufacturing process to be impacted by break-in exposure and cyber threats.

    Cisco Secure Firewall is a good solution. In some ways, it is a reactive solution and we have it sitting in a whitelist mode rather than a blacklist mode. It seems to work fairly well for us.

    What needs improvement?

    It would be better if we could manage all of our firewalls as a set rather than individually. I would like to see a single pane of glass type of option. We also use another vendor's firewalls and they have a centralized management infrastructure that we have implemented. This infrastructure is a bit easier to manage.

    For how long have I used the solution?

    We have used Cisco Secure Firewall for probably 10 years.

    What do I think about the stability of the solution?

    Cisco Secure Firewall has been a very stable solution for us. In general, if you keep it up to date and do sensible management on it, it will be a very stable solution.

    What do I think about the scalability of the solution?

    Cisco Secure Firewall has met our scalability requirements as far as traffic and management goes.

    How are customer service and support?

    We have an excellent account team and they go to bat for us inside of Cisco. We have access to TAC and Smart Net and that all seems to be working out very well. Cisco has a good team in place.

    Which solution did I use previously and why did I switch?

    We did not previously use a different solution for this particular use case. 

    How was the initial setup?

    I was not involved in the initial deployment of the solution. 

    What was our ROI?

    In this specific use case, the biggest return on investment is that we do not have incidents. This ultimately – in some of our factories – ends up being a health and human-safety use case.

    What's my experience with pricing, setup cost, and licensing?

    We have all smart licensing and that works well. 

    Which other solutions did I evaluate?

    We ultimately chose Cisco Secure Firewall because it came with a strong recommendation from one of our strong partners.

    What other advice do I have?

    My advice to those evaluating the solution right now is this: understand what you're trying to protect and what you're trying to protect it from. Also, understand how the solution is managed.

    Cisco Secure Firewall has not necessarily freed up our staff's time as much as it has secured the infrastructure and the OT network behind it. Cisco Secure Firewall was not built as a time-saver. It is not a cost solution. It is a solution meant to isolate and control access to and from a specific set of infrastructure.

    Cisco Secure Firewall has not helped us consolidate tools and applications. It allows us to get access. What we're seeing more and more of is business systems like SAP looking to get access to OT systems and this is how our systems get that way.

    Cisco Secure Firewall requires the sort of maintenance that any software product would: updates, asset management, etc. Worldwide, we probably have 30 to 40 people managing the solution on the OT side on the various sites and then probably 10 to 15 people on our account team with our outside partner.

    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    reviewer1657845 - PeerSpot reviewer
    Senior Network Security Engineer at a tech services company with 11-50 employees
    Real User
    Its Snort 3 IPS gives us flexibility and more granular control of access
    Pros and Cons
    • "Its Snort 3 IPS has better flexibility as far as being able to write rules. This gives me better granularity."
    • "I would like it to have faster deployment times. A typical deployment could take two to three minutes. Sometimes, it depends on the situation. It is better than it was in the past, but it could always use improvement."

    What is our primary use case?

    We are using it for firewall and intrusion prevention.

    I have deployed it into different environments: retail, commercial, law, real estate, and the public sector. Retail is the biggest environment that I have deployed this firewall into, with 43 different sensors and a range up to 10 GbE throughput.

    I am using up to version 7.0 across the board as well as multiple models: 1000 Series or 2100 Series.

    How has it helped my organization?

    The integration of network and workload micro-segmentation help us provide unified segmentation policies across east-west and north-south traffic. It is important to have that visibility. If you can't detect it, then you can't protect it. That is the bottom line.

    The solution has enabled us to implement dynamic policies for dynamic environments. These are important because they give us flexibility and more granular control of access.

    What is most valuable?

    • Ease of operability
    • Security protection

    It is usually a central gateway into an organization. Trying to keep it as secure as possible and have easy to use operability is always good. That way, you can manage the device.

    The solution has very good visibility when doing deep packet inspection. It's great because I can get packet captures out of the device. Because if an intrusion fires, I can see the packet that it fired in. So, I can dive into it and look at what is going on, what fired it, or what caused it.

    Cisco Secure Firewall is fine and works when it comes to integration of network and workload micro-segmentation. 

    The integration of network and workload micro-segmentation is very good when it comes to visibility in our environment. It is about how you set it up and the options that you set it up for, e.g., you can be as detailed as you like or not at all, which is good.

    Its Snort 3 IPS has better flexibility as far as being able to write rules. This gives me better granularity.

    What needs improvement?

    It needs better patching and testing as well as less bugs. That would be nice.

    I would like it to have faster deployment times. A typical deployment could take two to three minutes. Sometimes, it depends on the situation. It is better than it was in the past, but it could always use improvement.

    For how long have I used the solution?

    I have been using it for seven years.

    What do I think about the stability of the solution?

    Stability has been good so far. It has been much better than in the past. In the past, there were times where there were known issues or bugs.

    What do I think about the scalability of the solution?

    Scalability has been fine. I haven't had an issue with it. I just haven't had a need to deal with scalability yet.

    How are customer service and technical support?

    I would rate Cisco's support for this solution as nine out of 10 for this solution. The support has been very good. We got the job done. Sometimes, why it wasn't perfect, the challenge was getting a hold of someone.

    Which solution did I use previously and why did I switch?

    I have used this solution to replace different vendors, usually Cisco ASA that is reaching end of life.

    How was the initial setup?

    The initial setup is straightforward for me at this point. That is just because of the experience that I have in dealing with it. for a new person, it would be a little bit more complex. They have gotten better with some of the wizards. However, if you are not familiar with it, then that makes it a little more challenging.

    What about the implementation team?

    Depending on the situation, we will go through the typical setups. We know what we want to configure and sort of follow a template.

    What was our ROI?

    We have seen ROI with a better, more secure environment. 

    Cisco Secure Firewall has helped us to reduce our firewall operational costs. This is based on the fact that the newer models, where we have been replacing older models, have better throughput, capacity, and performance overall.

    What's my experience with pricing, setup cost, and licensing?

    Pricing is the same as other competitors. It is comparable. The licensing has gotten better. It has been easier with Smart Licensing.

    There are additional costs, but that depends on the feature sets that you get. However, that is the same with any firewall vendor at this point.

    Which other solutions did I evaluate?

    I have also worked with Check Point and Palo Alto. The support is much better with Cisco than Check Point. Check Point had a little bit better of a central management station. Whereas, Cisco with the FMC is a little different as far as there are still some features that are being added to the FMC, which is good. As far as Palo Alto goes, they are quite comparable as far as their functionality and feature sets. Cisco wins for me because it has Snort, which is a known standard for IPS, which is good. Also, Cisco has the Talos group, which is the largest group out there for security hunting.

    Check Point was the easiest as far as user-friendliness and its GUI. After that, Cisco and Palo Alto would be kind of tied for ease of use.

    What other advice do I have?

    Definitely do your research, e.g., how you want to set it up and how deep you want to go in with it. This will actually help you more. When we say Cisco Secure Firewall, is it Next-Generation, running ASA, or running Firepower? Or, does Meraki actually fit in there? So, there are different scales based on what you are trying to look for and how deep security-wise you want to go into it.

    SecureX is a nice feature, but it has to be for the right environment. It is nice that we get it, but most people don't take advantage of it.

    The dynamic policy capabilities can enable tight integration with Secure Workload at the application workload level, but I am not using much with Secure Workload at this point.

    I would rate Cisco Secure Firewall as nine out of 10. I would not give it a 10 because of bugs.

    Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Partner
    PeerSpot user
    Ramish Ali - PeerSpot reviewer
    Assistant Director IT at a university with 51-200 employees
    Real User
    Top 10
    Scalable and fast but the initial setup could be easier
    Pros and Cons
    • "The product is quite robust and durable."
    • "The graphical interface could be improved. From what I have seen, Fortinet, for example, has a nicer GUI."

    What is our primary use case?

    We primarily use the solution as a firewall for our data centers. We have a medium-sized data center right now. It's about six or seven servers. We actually store the data for students and schools and need to protect it.

    What is most valuable?

    Overall, the solution works very well.

    The solution is quite fast. We found that the speed was good and the throughput was good.

    The stability has been very good.

    The solution can scale as necessary.

    The product is quite robust and durable. 

    What needs improvement?

    The solution lacks the abilities of an FTD type which are the abilities we need, and they are not in the firewall. We're looking for a next-generation firewall instead.

    The graphical interface could be improved. From what I have seen, Fortinet, for example, has a nicer GUI.

    The solution needs to be easier to use. Right now, it's overly complicated. 

    The initial setup is a bit complex. 

    The cost of the solution is very high.

    The product should add free URL filtering. It's another product, or part of another product, however, it should be available as part of this offering as well.

    For how long have I used the solution?

    I've been using this solution for about seven or eight years at this point. It's been a while. 

    What do I think about the stability of the solution?

    The stability is excellent and the performance is good. There are no bugs or glitches. It doesn't crash or freeze. It's reliable.

    What do I think about the scalability of the solution?

    The product can scale nicely. If a company would like to expand it, it can do so. 

    We have about 10,000 schools use the solution in general, and 1,000 to 2,000 that use it simultaneously daily. 

    How are customer service and technical support?

    I don't directly deal with technical support. Typically, that's something that others on the team deal with. We have our own team within the company that, if I run into issues, I would reach out to first. I can't speak to how helpful or responsive they are. I've never had a chance to contact them. 

    Which solution did I use previously and why did I switch?

    I have not used other firewalls.

    How was the initial setup?

    The initial setup is not easy or straightforward. It's a bit complex and a little difficult.

    We have three engineers on staff. They are capable of handling any maintenance.  

    What's my experience with pricing, setup cost, and licensing?

    The solution is quite expensive. Fortinet and other competitors are about half the price. Cisco is very expensive in comparison. They need to work to be more competitive.

    Which other solutions did I evaluate?

    We're currently looking into a new firewall - something that is Next Generation. We don't know what it will be yet, however, we are considering Cisco, Fortinet, or Palo Alto.

    It's my understanding that Fortinet is better in graphics and has a better user experience than Cisco, however, I haven't had a chance to test anything out.

    What other advice do I have?

    We're just a customer and an end-user. 

    We no longer have an SLA for this solution. We're potentially looking for something new.

    I'd recommend the solution to others. It works well. It's durable and fast and you don't have to check up on it daily as it is rather reliable. That said, it is pricey.

    In general, I would rate the solution at a seven out of ten.

    Which deployment model are you using for this solution?

    On-premises
    Disclosure: I am a real user, and this review is based on my own experience and opinions.
    PeerSpot user
    Buyer's Guide
    Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.
    Updated: March 2025
    Buyer's Guide
    Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.