We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"There are no issues that we are aware of. It does its job silently in the background."
"It's got the capabilities of amassing a lot of throughput with remote access and VPNs."
"If configured, Firepower provides us with application visibility and control."
"The feature set is fine and is rarely a problem."
"I have integrated it for incidence response. If there is a security event, the Cisco firewall will automatically block the traffic, which is valuable."
"The most valuable feature is the access control list (ACL)."
"When it comes to the integration among Cisco tools, we find it easy. It's a very practical integration with other components as well."
"One of the nice things about Firepower is that you can set it to discover the environment. If that is happening, then Firepower is learning about every device, software operating system, and application running inside or across your environment. Then, you can leverage the discovery intelligence to get Firepower to select the most appropriate intrusion prevention rules to use for your environment rather than picking one of the base policies that might have 50,000 IPS rules in it, which can put a lot of overhead on your firewall. If you choose the recommendations, as long as you update them regularly, you might be able to get your rule set down to only 1,000 or 1,500, which is a significant reduction in a base rule set. This means that the firewall will give you better performance because there are less rules being checked unnecessarily. That is really useful."
"The whole firewall functionality, including firewall policies and IPS policies, is valuable. It has all kinds of functionalities. It has IPS, VPN, and other features. They are doing quite a lot of stuff with their devices."
"The configuration support is very good. You can find a lot of configuration samples and troubleshooting tips on the internet, which is very good."
"I have not contacted technical support. There is a lot of information on the internet for troubleshooting. All you need to do is use a search engine and you will find the information you are looking for easily."
"It's pretty reliable and allows for isolation capabilities within the network."
"On the network side, where you create your rules for allowing traffic — what can come inside and what can go out — that works perfectly, if you know what you want to achieve. It protects you."
"The clusters in data centers are great."
"The product is quite robust and durable."
"Cisco ASA provides us with very good application visibility and control."
"Content filtering and application rules are the most valuable features. It is also easy to configure."
"We like their interface very much. It's pretty easy to use."
"The best thing about the product is the very good threat prevention output."
"We are able to block whatever we want to block by using this product. It provides all required security features, such as content filtering, VPN, in one box. Before switching to SonicWall, we had specified all required features."
"It's a very cost-effective solution."
"Ease of management and the VPN integration."
"The most valuable features are unified threat management which provides security intelligence and the VPN for both site-to-site and remote access."
"Offers the right amount of control without being incredibly convoluted and frustrating."
"I would like it to have faster deployment times. A typical deployment could take two to three minutes. Sometimes, it depends on the situation. It is better than it was in the past, but it could always use improvement."
"The intelligence has room for improvement. There are some hackers that we haven't seen before and its ability to detect those types of attacks needs to be improved."
"They need a VTI. I know it's going to be available in the next software version, which is the 6.7 version. However, the problem with that is that the 6.7 is going to deprecate all the older IKEv1 deployment tunnels. Therefore, the problem is that we have a lot of customers which are using older encryptions. If I do that, update it, it's not going to work for me."
"Implementations require the use of a console. It would help if the console was embedded."
"This product is managed using the Firepower Management Center (FMC), but it would be better if it also supported the command-line interface (CLI)."
"The initial setup can be a bit complex for those unfamiliar with the solution."
"The change-deployment time can always be improved. Even at 50 seconds, it's longer than some of its competitors. I would challenge Cisco to continue to improve in that area."
"The price and SD-WAN capabilities are the areas that need improvement."
"I would like to see the inclusion of a protocol that can be used to protect databases."
"They need a user-friendly interface that we could easily configure."
"Cisco should work on ASDM. One of the biggest drawbacks of Cisco ASA is ASDM GUI. Cisco should improve the ASDM GUI. The configuration through ASDM is really difficult as compared to CLI. Sometimes when you are doing the configuration in ASDM, it suddenly crashes. It also crashes while pushing a policy. Cisco should really work on this."
"Cisco ASA Firewall could improve by adding more advanced features such as web filtering, which is available in the next-generation firewalls. However, the Cisco ASA Firewall I am using could be old and these features have been updated."
"I don't have to see all the object groups that have been created on that firewall. That's just something that I would really appreciate on the CLA, even though it already exists on the GUI."
"If they want to add better features to the current Cisco ASA, they can start by increasing the encryption. That is the only thing they need to improve."
"If the implementation was easier, it would be a lot better for us."
"Cisco provides us with application visibility and control, although it's not a complete solution compared to other vendors. Cisco needs to work on the application behavior side of things, in particular when it comes to the behavior of SSL traffic."
"FortiGate has a client DNS in the firewall, but SonicWall doesn't have that. To create or configure a site-to-site VPN tunnel, we have to give a DNS name. Currently, we have to get the DNS name from a third party and then include it in SonicWall, whereas FortiGate has its own client DNS, so it provides a DNS name, and it does not require a third party. There should be a graphical option to view the network utilization and bandwidth usage."
"Its reporting can be improved. Currently, we cannot directly get the user names. It only shows the IP, which makes it a bit confusing because we need to use the IP to find the user. If we could directly get the name of the user, it would be better."
"GUI interface could be improved."
"I would like to see more integration with other platforms."
"Needs more robust self-help documentation along with examples and things to watch out for."
"The stability could be a lot better."
"The monitoring is a little bit confusing."
"We have been facing issues with reporting."
"It definitely competes with the other vendors in the market."
"For me, personally, as an individual, Cisco Firepower NGFW Firewall is expensive."
"Cisco, as we all know, is expensive, but for the money you are paying, you know that you are also getting top-notch documentation as well as support if needed."
"I like the Smart Licensing, because it is more dynamic and easier to keep track of where you are at. If we have a high availability firewall pair and they are deployed in active/standby rather than active/active, I would expect that we would only pay for one set of licenses because you are using only one firewall at any one time. The other is there just for resiliency. The licensing, from a Firepower perspective, still requires you to have two licenses, even if the firewalls are in active/standby, which means that you pay for the two licenses, even though you might only be using one firewall any one time. This is probably not the best way to do it and doesn't represent the best value for money. This could be looked at to see if it could be done in a fairer way."
"When we purchased the firewall, we had to take the security license for IPS, malware protection, and VPN. If we are using high availability, we have to take a license for that. We also have to pay for hardware support and technical support. Its licensing is on a yearly basis."
"Pricing is the same as other competitors. It is comparable. The licensing has gotten better. It has been easier with Smart Licensing."
"The price for Firepower is more expensive than FortiGate. The licensing is very complex. We usually ask for help from Solutel because of its complexity. I have a Cisco account where I can download the VPN client, then connect. Instead, I create an issue with Solutel, then Solutel solves the case."
"There are additional implementation and validation costs."
"Cisco ASA Firewall should be cheaper."
"When we bought it, it was really expensive. I'm not aware of the current pricing. We had problems with licensing. After our IPS subscription ended, we couldn't renew it because Cisco was moving to the next-generation firewall platform. So, they didn't provide us with the new license."
"We pay about $200 yearly and we have two firewalls."
"The product cost is a little high. It is a little bit on the high side, and it should be a little bit cost-friendly."
"We pay about €2,000 ($2,400 USD) per year for licensing."
"There is room for improvement in the pricing when compared to the market. Although, when you compare the benefits of support from Cisco, you can adjust the value and it becomes comparable, because you usually need very good support. So you gain value there with this device."
"We're using the smart license for this firewall. The models that we have require licensing for remote access."
"Cisco is expensive, but you do get benefits for the price."
"The license that we purchased is good for three years."
"It has a yearly subscription."
"Its pricing is okay as compared to other solutions."
"Its price is very high, which makes it difficult to convince the clients to buy this solution."
"It is a bit expensive. We have to purchase the license and the reporting part separately, which makes it a bit pricey. This is the main reason why we have thought of moving to another firewall. It would be good if they combine both of these."
"Customers are required to pay for a yearly subscription."
"You need to purchase multiple licenses to manage multiple devices which is cost-prohibitive for the value you would receive."
"The price is fair for the solution for the quality you receive."
Cisco NGFW firewalls deliver advanced threat defense capabilities to meet diverse needs, from
small/branch offices to high performance data centers and service providers. Available in a wide
range of models, Cisco NGFW can be deployed as a physical or virtual appliance. Advanced threat
defense capabilities include Next-generation IPS (NGIPS), Security Intelligence (SI), Advanced
Malware Protection (AMP), URL filtering, Application Visibility and Control (AVC), and flexible VPN
features. Inspect encrypted traffic and enjoy automated risk ranking and impact flags to reduce event
volume so you can quickly prioritize threats. Cisco NGFW firewalls are also available with clustering
for increased performance, high availability configurations, and more.
Cisco Firepower NGFWv is the virtualized version of Cisco's Firepower NGFW firewall. Widely
deployed in leading private and public clouds, Cisco NGFWv automatically scales up/down to meet
the needs of dynamic cloud environments and high availability provides resilience. Also, Cisco NGFWv
can deliver micro-segmentation to protect east-west network traffic.
Cisco firewalls provide consistent security policies, enforcement, and protection across all your
environments. Unified management for Cisco ASA and FTD/NGFW physical and virtual firewalls is
delivered by Cisco Defense Orchestrator (CDO), with cloud logging also available. And with Cisco
SecureX included with every Cisco firewall, you gain a cloud-native platform experience that enables
greater simplicity, visibility, and efficiency.
Learn more about Cisco’s firewall solutions, including virtual appliances for public and private cloud.
Cisco ASA firewalls deliver enterprise-class firewall functionality with highly scalable and flexible VPN capabilities to meet diverse needs, from small/branch offices to high performance data centers and service providers. Available in a wide range of models, Cisco ASA can be deployed as a physical or virtual appliance. Flexible VPN capabilities include support for remote access, site-to-site, and clientless VPN. Also, select appliances support clustering for increased performance, VPN load balancing to optimize available resources, advanced high availability configurations, and more.
Cisco ASAv is the virtualized version of the Cisco ASA firewall. Widely deployed in leading private and public clouds, Cisco ASAv is ideal for remote worker and multi-tenant environments. The solution scales up/down to meet performance requirements and high availability provides resilience. Also, Cisco ASAv can deliver micro-segmentation to protect east-west network traffic.
Cisco firewalls provide consistent security policies, enforcement, and protection across all your environments. Unified management for Cisco ASA and FTD/NGFW physical and virtual firewalls is delivered by Cisco Defense Orchestrator (CDO), with cloud logging also available. And with Cisco SecureX included with every Cisco firewall, you gain a cloud-native platform experience that enables greater simplicity, visibility, and efficiency.
Cisco ASA Firewall is ranked 6th in Firewalls with 62 reviews while SonicWall TZ is ranked 10th in Firewalls with 31 reviews. Cisco ASA Firewall is rated 8.0, while SonicWall TZ is rated 8.4. The top reviewer of Cisco ASA Firewall writes "Robust solution that integrates well with both Cisco products and products from other vendors". On the other hand, the top reviewer of SonicWall TZ writes "Easy to implement, fairly stable, and supports SSL-DPI". Cisco ASA Firewall is most compared with Fortinet FortiGate, Palo Alto Networks WildFire, Meraki MX, Juniper SRX and pfSense, whereas SonicWall TZ is most compared with Fortinet FortiGate, Sophos XG, Meraki MX and pfSense. See our Cisco ASA Firewall vs. SonicWall TZ report.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.