We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"The most valuable feature that Cisco Firepower NGFW provides for us is the Intrusion policy."
"When it comes to the integration among Cisco tools, we find it easy. It's a very practical integration with other components as well."
"Web filtering is a big improvement for us. The previous version we used, the AC520, did not have that feature included. It was not very easy for us, especially because the environment had to be isolated and we needed to get updates from outside, such as Windows patches. That feature has really helped us when we are going outside to pull those patches."
"It is one of the fastest solutions, if not the fastest, in the security technology space. This gives us peace of mind knowing that as soon as a new attack comes online that we will be protected in short order. From that perspective, no one really comes close now to Firepower, which is hugely valuable to us from an upcoming new attack prevention perspective."
"The most valuable features of this solution are the integrations and IPS throughput."
"Another benefit has been user integration. We try to integrate our policies so that we can create policies based on active users. We can create policies based on who is accessing a resource instead of just IP addresses and ports."
"The feature set is fine and is rarely a problem."
"Feature-wise, we mostly use IPS because it is a security requirement to protect against attacks from outside and inside. This is where IPS helps us out a bunch."
"Completely integrates branch offices with perimeter security."
"The capabilities for scalability with this product are huge"
"The technical is excellent."
"The product is easy to use."
"One of the main features is that the hardware is extremely reliable."
"The hardware is pretty stable. It's also a very good product performance-wise. Initially, it wasn't mature like a firewall and there were other leaders, but now they have included almost all the features of next-generation security. Basically, it's a good product to work with."
"Cisco is head-and-shoulders above all of the competition when it comes to technical support."
"It covers everything we need it to without looking to secondary solutions."
"I especially like the VPN part. It works like a charm."
"The solution is very easy to use and configure."
"The built-in open VPN and the VPN Client Export are the solution's most valuable aspects."
"The concurrent users are perfect for us."
"The initial setup is easy."
"We've found the stability to be very good overall."
"I have found the most valuable features to be antivirus and malware protection."
"A free firewall that is a good network security appliance."
"Cisco makes horrible UIs, so the interface is something that should be improved."
"I would like it to have faster deployment times. A typical deployment could take two to three minutes. Sometimes, it depends on the situation. It is better than it was in the past, but it could always use improvement."
"Web filtering needs improvement because sometimes the URL is miscategorized."
"The initial setup can be a bit complex for those unfamiliar with the solution."
"The visibility for VPN is one big part. The policy administration could be improved in terms of customizations and flexibility for changing it to our needs."
"FlexConfig is there as a bridge for features that are not yet natively integrated into Firepower. It is a way of allowing you to be able to configure things that wouldn't otherwise be possible until the development team can add them into Firepower's native capability. There is still some work that needs to be done around FlexConfig. There are still quite a few complex things, like policy-based routing, that have to be done in FlexConfig, and it doesn't always work perfectly. Sometimes, there are some glitches. It is recommended that you configure FlexConfig policies with Cisco TAC. It would be good to see Cisco accelerate some of those configurations that you can only do in FlexConfig into the platform, so that they are there natively."
"Its interface is sometimes is a little bit slow, and it can be improved. When you need to put your appliance in failover mode, it is a little difficult to do it remotely because you need to turn off the appliance in Cisco mode. In terms of new features, it would be good to have AnyConnect VPN with Firepower. I am not sure if it is available at the moment."
"Implementations require the use of a console. It would help if the console was embedded."
"The configuration should be easier in the solution."
"With respect to user-friendliness, it is a command-line interface and those with such experience will get along just fine, whereas others may struggle."
"The user interface needs to be improved."
"The pricing is the only con for this product."
"It would be ideal if the solution had more capacity."
"I think they should bring back remote VPN for users."
"There could be a bit more functions on offer that could make it easier to use."
"Signatures and other critical definitions need to be updated more frequently."
"If you want to take advantage of all of the solution's options, you need to have a bit of a technical background. It's not for a layperson."
"Could be simplified for new users."
"Many people have problems setting up the web cache for the web system."
"They can improve the dynamic of the input of IPs from outside."
"The security could be improved."
"The router monitoring needs improvement when compared with Sonicwall."
"Web interface could be enhanced and more user friendly."
"The usage reports can be better."
"When we purchased the firewall, we had to take the security license for IPS, malware protection, and VPN. If we are using high availability, we have to take a license for that. We also have to pay for hardware support and technical support. Its licensing is on a yearly basis."
"Its price is in the middle range. Both Firepower and FortiGate are not cheap. Palo Alto and Check Point are the cheapest ones. I don't remember any costs in addition to the standard licensing fees."
"For me, personally, as an individual, Cisco Firepower NGFW Firewall is expensive."
"This product requires licenses for advanced features including Snort, IPS, and malware detection."
"Cisco, as we all know, is expensive, but for the money you are paying, you know that you are also getting top-notch documentation as well as support if needed."
"This solution is expensive and other solutions, such as FortiGate, are cheaper."
"The solution was chosen because of its price compared to other similar solutions."
"This product is expensive."
"Palo Alto networks are more expensive than this solution and this is why you will see more products like this one in Mexico."
"The pricing is okay. It is competitive. It costs more when you need get more features."
"Price is certainly something that the IOS technology has fallen behind the competition on."
"The price of the solution should be cheaper, and the license is purchase annually."
"It is necessary to pay for a license in order to use the solution. It is on a yearly basis and the price is high."
"It is an expensive solution."
"There is an open-source community version that is available."
"I like the fact that it is open-source."
"The pricing is lower than some of its competitors."
"We are using the open-source version which is free. We are testing the solution to see if we are going to go to the enterprise version which requires a license and is not free."
"It has almost zero cost, and it is open to us. It runs on a small appliance just for a couple of 100 bucks, and I've never had an appliance burn out on me yet."
"I would recommend it for a small business or a startup as a starting point. It's also good for companies that are on a tight budget."
"Our customers must pay for an annual license."
"I am using the community version of the solution and it is priced well. There is a cost of learning how to use the solution, if it was free it would be better."
Cisco NGFW firewalls deliver advanced threat defense capabilities to meet diverse needs, from
small/branch offices to high performance data centers and service providers. Available in a wide
range of models, Cisco NGFW can be deployed as a physical or virtual appliance. Advanced threat
defense capabilities include Next-generation IPS (NGIPS), Security Intelligence (SI), Advanced
Malware Protection (AMP), URL filtering, Application Visibility and Control (AVC), and flexible VPN
features. Inspect encrypted traffic and enjoy automated risk ranking and impact flags to reduce event
volume so you can quickly prioritize threats. Cisco NGFW firewalls are also available with clustering
for increased performance, high availability configurations, and more.
Cisco Firepower NGFWv is the virtualized version of Cisco's Firepower NGFW firewall. Widely
deployed in leading private and public clouds, Cisco NGFWv automatically scales up/down to meet
the needs of dynamic cloud environments and high availability provides resilience. Also, Cisco NGFWv
can deliver micro-segmentation to protect east-west network traffic.
Cisco firewalls provide consistent security policies, enforcement, and protection across all your
environments. Unified management for Cisco ASA and FTD/NGFW physical and virtual firewalls is
delivered by Cisco Defense Orchestrator (CDO), with cloud logging also available. And with Cisco
SecureX included with every Cisco firewall, you gain a cloud-native platform experience that enables
greater simplicity, visibility, and efficiency.
Learn more about Cisco’s firewall solutions, including virtual appliances for public and private cloud.
Cisco IOS Security is ranked 19th in Firewalls with 10 reviews while pfSense is ranked 3rd in Firewalls with 54 reviews. Cisco IOS Security is rated 7.8, while pfSense is rated 8.6. The top reviewer of Cisco IOS Security writes "Prevent unauthorized use of network resources and integrate branch offices with reliability". On the other hand, the top reviewer of pfSense writes "Feature-rich, well documented, and there is good support available online". Cisco IOS Security is most compared with Zyxel Unified Security Gateway, Cisco ASA Firewall, Fortinet FortiGate, Kerio Control and Fortinet FortiManager, whereas pfSense is most compared with OPNsense, Fortinet FortiGate, Sophos UTM, Sophos XG and Zyxel Unified Security Gateway. See our Cisco IOS Security vs. pfSense report.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.