"The solution offers very easy configurations."
"The most valuable feature is the access control list (ACL)."
"The feature set is fine and is rarely a problem."
"I like the firewall features, Snort, and the Intrusion Prevention System (IPS)."
"The most valuable feature that Cisco Firepower NGFW provides for us is the Intrusion policy."
"You do not have to do everything through a command line which makes it a lot easier to apply rules."
"Its Snort 3 IPS has better flexibility as far as being able to write rules. This gives me better granularity."
"Web filtering is a big improvement for us. The previous version we used, the AC520, did not have that feature included. It was not very easy for us, especially because the environment had to be isolated and we needed to get updates from outside, such as Windows patches. That feature has really helped us when we are going outside to pull those patches."
"I like them mostly because they don't break and they have great diagnostics."
"The remote access, VPN, and ACL features are valuable. We are using role-based access for individuals."
"The configuration was kind of straightforward from the command line and also from the ASDM. It was very easy to manage by using their software in Java."
"It's a flexible solution and is well-known in the community."
"Cisco ASA provides us with very good application visibility and control."
"It's very stable and mature."
"They provide DDoS protection and multi-factor authentication. That is a good option as it enables work-from-home functionality."
"Even in very big environments, Cisco comes in handy with configuration and offers reliability when it comes to managing multiple items on one platform."
"Firewall and overall management are valuable features."
"The user experience is great. The graphical user interface is also good."
"I have found the most valuable features to be the policies, cache, and the SD-WAN."
"Has a very simple OS and a good price point."
"There are a lot of features that we like within the solution. The resources or performance of the firewall is very good. However, the real selling point is the fact that the solution offers so many features, it gives our clients a lot of extras that they can work with. There's a lot on offer."
"There are many useful features, such as web security and advanced threat detection."
"I personally think the site-to-site VPN is the most useful feature. A lot of firewalls have that, but to me, that's one of the features that's essential."
"The technical support on offer has always been quite good."
"Deploying configurations takes longer than it should."
"The initial setup could be simplified, as it can be complex for new users."
"Implementations require the use of a console. It would help if the console was embedded."
"My team tells me that other solutions such as Fortinet and Palo Alto are easier to implement."
"An area of improvement for this solution is the console visualization."
"Report generation is an area that should be improved."
"FirePOWER does a good job when it comes to providing us with visibility into threats, but I would like to see a more proactive stance to it."
"The price and SD-WAN capabilities are the areas that need improvement."
"In NGFW, Cisco should be aligned with the new technology and inspection intelligence because Cisco is far behind in this pipeline."
"The configuration is an area that needs improvement."
"I would say that in inexperienced hands, the interface can be kind of overwhelming. There are just a lot of options. Too much, if you don't know what you are looking for or trying to do."
"I have used Fortinet, Palo Alto, and Check Point previously and I prefer the process of everything working together."
"They need a user-friendly interface that we could easily configure."
"We don't have any serious problems. The firewall models that we have are quite legacy, and they have slower performance. We are currently investigating the possibility of migrating to next-generation firewalls."
"We have more than one Cisco firewall and it is difficult for me to integrate both on the single UI."
"I think the ASA layer is thin. It's always Layer 3 or Layer 4 source controller and doesn't control the Layer 7 traffic. It's important, and you'll need an additional firewall."
"They're using a lot of application-specific IC, so that may be causing some performance issues. And whenever a Fortinet adds new features, it can affect performance."
"Right now, it's very trendy to integrate everything into the cloud. This solution would be more effective if they did more integration in that regard."
"Technical support could be better. Some competitors have much more responsive support teams."
"The technical support is good. However, during the holidays they can get a little slow to respond."
"It would be great if they can push the Microsoft updates through Fortinet OS and provide a centralized patch management system. They should also include the data loss prevention (DLP) and data leakage prevention features. They could also add network monitoring more effectively."
"The solution could improve the log retention and reports."
"The reporting and monitoring could improve, they have a lot of limitations. The monitoring is not easy compared to the other firewall."
"Fortinet FortiOS could improve by having better authentication methods with Microsoft or Google Services."
Cisco NGFW firewalls deliver advanced threat defense capabilities to meet diverse needs, from
small/branch offices to high performance data centers and service providers. Available in a wide
range of models, Cisco NGFW can be deployed as a physical or virtual appliance. Advanced threat
defense capabilities include Next-generation IPS (NGIPS), Security Intelligence (SI), Advanced
Malware Protection (AMP), URL filtering, Application Visibility and Control (AVC), and flexible VPN
features. Inspect encrypted traffic and enjoy automated risk ranking and impact flags to reduce event
volume so you can quickly prioritize threats. Cisco NGFW firewalls are also available with clustering
for increased performance, high availability configurations, and more.
Cisco Firepower NGFWv is the virtualized version of Cisco's Firepower NGFW firewall. Widely
deployed in leading private and public clouds, Cisco NGFWv automatically scales up/down to meet
the needs of dynamic cloud environments and high availability provides resilience. Also, Cisco NGFWv
can deliver micro-segmentation to protect east-west network traffic.
Cisco firewalls provide consistent security policies, enforcement, and protection across all your
environments. Unified management for Cisco ASA and FTD/NGFW physical and virtual firewalls is
delivered by Cisco Defense Orchestrator (CDO), with cloud logging also available. And with Cisco
SecureX included with every Cisco firewall, you gain a cloud-native platform experience that enables
greater simplicity, visibility, and efficiency.
Learn more about Cisco’s firewall solutions, including virtual appliances for public and private cloud.
Cisco ASA firewalls deliver enterprise-class firewall functionality with highly scalable and flexible VPN capabilities to meet diverse needs, from small/branch offices to high performance data centers and service providers. Available in a wide range of models, Cisco ASA can be deployed as a physical or virtual appliance. Flexible VPN capabilities include support for remote access, site-to-site, and clientless VPN. Also, select appliances support clustering for increased performance, VPN load balancing to optimize available resources, advanced high availability configurations, and more.
Cisco ASAv is the virtualized version of the Cisco ASA firewall. Widely deployed in leading private and public clouds, Cisco ASAv is ideal for remote worker and multi-tenant environments. The solution scales up/down to meet performance requirements and high availability provides resilience. Also, Cisco ASAv can deliver micro-segmentation to protect east-west network traffic.
Cisco firewalls provide consistent security policies, enforcement, and protection across all your environments. Unified management for Cisco ASA and FTD/NGFW physical and virtual firewalls is delivered by Cisco Defense Orchestrator (CDO), with cloud logging also available. And with Cisco SecureX included with every Cisco firewall, you gain a cloud-native platform experience that enables greater simplicity, visibility, and efficiency.
Control all the security and networking capabilities in all your FortiGates across your entire network with one intuitive operating system. Improve your protection and visibility while reducing operating expenses and saving time with a truly consolidated next generation enterprise firewall platform.
Cisco ASA Firewall is ranked 6th in Firewalls with 62 reviews while Fortinet FortiOS is ranked 18th in Firewalls with 18 reviews. Cisco ASA Firewall is rated 8.0, while Fortinet FortiOS is rated 8.4. The top reviewer of Cisco ASA Firewall writes "Robust solution that integrates well with both Cisco products and products from other vendors". On the other hand, the top reviewer of Fortinet FortiOS writes "Robust, scales well using FortiManager, and you have a choice of two different modes to run in". Cisco ASA Firewall is most compared with Fortinet FortiGate, Palo Alto Networks WildFire, Meraki MX, Juniper SRX and pfSense, whereas Fortinet FortiOS is most compared with Fortinet FortiWeb, Zyxel Unified Security Gateway, Azure Firewall, Darktrace and LiveAction LiveNX. See our Cisco ASA Firewall vs. Fortinet FortiOS report.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.