We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Feature-wise, we mostly use IPS because it is a security requirement to protect against attacks from outside and inside. This is where IPS helps us out a bunch."
"The dashboard is the most important thing. It provides good visibility and makes management easy. Firepower also provides us with good application visibility and control."
"Its Snort 3 IPS has better flexibility as far as being able to write rules. This gives me better granularity."
"One of the most valuable features is the AMP. It's very good and very reliable when it comes to malicious activities, websites, and viruses."
"I have integrated it for incidence response. If there is a security event, the Cisco firewall will automatically block the traffic, which is valuable."
"The customer service/technical support is very good with this solution."
"I have experience with URL filtering, and it is very good for URL filtering. You can filter URLs based on the categories, and it does a good job. It can also do deep packet inspection."
"Firepower NGFW has improved my organization in several ways. Before, we were trying to stamp out security threats and issues, it was a one-off type of way to attack it. I spent a lot of manpower trying to track down the individual issues or flare-ups that we would see. With Cisco's Firepower Management, we're able to have that push up to basically one monitor and one UI and be able to track that and stop threats immediately. It also gives us a little more granularity on what those threats might be."
"It allows us to block applications, i.e., websites by application type category. It is far more capable than content filtering alone."
"The functionality is the same whether it is on hardware or a virtual appliance. The interface is the same. It's nice that it's standardized."
"I like the solution's configuration, interfaces, and user guides."
"The stability is better than other products."
"The most valuable features are the VPN, SSL VPN, and IPSec VPN."
"It is able to fulfill my requirements. It protects our network environment. It has control over IPS, signatures, and it can also manage bandwidth and mapping. It is also stable and has good support."
"We like the features, but the main thing is from a commercial and cost perspective it is very good."
"User friendly and intuitive."
"The most valuable features are unified threat management which provides security intelligence and the VPN for both site-to-site and remote access."
"The most valuable feature is the user-friendly navigation."
"Ease of management and the VPN integration."
"Its user interface and simplicity are the most favorite parts for our clients. They find it stable and easy to use. Its performance is also good."
"It lets me monitor in live time if someone is 'hogging' bandwidth."
"Most of the features are useful. It is easy to configure and easy to troubleshoot. I can see the utilization of different networks, and there are also App control features."
"Technical support is good."
"The best thing about the product is the very good threat prevention output."
"Its interface is sometimes is a little bit slow, and it can be improved. When you need to put your appliance in failover mode, it is a little difficult to do it remotely because you need to turn off the appliance in Cisco mode. In terms of new features, it would be good to have AnyConnect VPN with Firepower. I am not sure if it is available at the moment."
"They need a VTI. I know it's going to be available in the next software version, which is the 6.7 version. However, the problem with that is that the 6.7 is going to deprecate all the older IKEv1 deployment tunnels. Therefore, the problem is that we have a lot of customers which are using older encryptions. If I do that, update it, it's not going to work for me."
"It would be great if some of the load times were faster."
"Deploying configurations takes longer than it should."
"One feature I would like to see, that Firepower doesn't have, is email security. Perhaps in the future, Cisco will integrate Cisco Umbrella with Firepower. I don't see why we should have to pay for two separate products when both could be integrated in one box."
"I would like it to have faster deployment times. A typical deployment could take two to three minutes. Sometimes, it depends on the situation. It is better than it was in the past, but it could always use improvement."
"This product is managed using the Firepower Management Center (FMC), but it would be better if it also supported the command-line interface (CLI)."
"There is limited data storage on the appliance itself. So, you need to ship it out elsewhere in order for you to store it. The only point of consideration is around that area, basically limited storage on the machine and appliance. Consider logging it elsewhere or pushing it out to a SIEM to get better controls and manipulation over the data to generate additional metrics and visibility."
"The filter settings are confusing and overly complicated. The user interface can be improved."
"The content ID needs to be improved."
"Sometimes I found the GUI and some of the features a little bit hard to navigate, as opposed to Fortigate, which is much more user-friendly."
"I would like U.S.-based technical support."
"Potential improvement around the associated VPN cost"
"Do not even consider NetExtender - probably one of the most horrific, nightmare grade Java-based VPN clients. We have but all given up trying to make it work reliably."
"There are a few areas that need improvement including the VPN, user management, and reporting."
"They are not ready for managed security services. Their Cloud GMS product is weak, barely out of beta (buggy)."
"Its pricing can be better. It is very expensive."
"We have experienced some issues with SonicWall TZ and they are lacking some advanced features other vendors have."
"The dashboard needs to be improved."
"Sonic Analyzer could be improved. It's difficult to manage and not very intuitive."
"The solution should provide some additional ports."
"GUI interface could be improved."
"In general, the company needs to think contingently and integrate more security options."
"The VPN that is available in the new version is a bit bulky and slower in speed."
"Cisco pricing is premium. However, they gave us a 50 to 60 percent discount."
"The solution was chosen because of its price compared to other similar solutions."
"Its price is in the middle range. Both Firepower and FortiGate are not cheap. Palo Alto and Check Point are the cheapest ones. I don't remember any costs in addition to the standard licensing fees."
"Its pricing is good and competitive. There is a maintenance cost. It includes SecureX that makes it cost-effective as compared to the other solutions where you have to pay for XDR and SOAR capabilities."
"The price is comparable."
"It definitely competes with the other vendors in the market."
"This product is expensive."
"The price of Firepower is not bad compared to other products."
"SonicWall is a one-time purchase and there is no renewal license."
"It would be better if it has a better price, but its price is okay considering the benefits that you receive."
"Its price is okay."
"When implemented properly, the total cost of operation is very low."
"If you want to connect more than five concurrent users by VPN then you have to pay an additional fee."
"SonicWall is not an expensive solution."
"Licensed features provide application control, content filtering, antivirus, and anti-malware all in a single appliance."
"SonicWall still is only a dollar or Euro per gigabit. This means, of the IPsec, it's the cheapest solution."
"Its price is very high, which makes it difficult to convince the clients to buy this solution."
"Its pricing is okay as compared to other solutions."
"The price is fair."
"The price is high compared to some other solutions."
"The price is fair for the solution for the quality you receive."
"It has a yearly subscription."
"The license that we purchased is good for three years."
"You need to purchase multiple licenses to manage multiple devices which is cost-prohibitive for the value you would receive."
Cisco NGFW firewalls deliver advanced threat defense capabilities to meet diverse needs, from
small/branch offices to high performance data centers and service providers. Available in a wide
range of models, Cisco NGFW can be deployed as a physical or virtual appliance. Advanced threat
defense capabilities include Next-generation IPS (NGIPS), Security Intelligence (SI), Advanced
Malware Protection (AMP), URL filtering, Application Visibility and Control (AVC), and flexible VPN
features. Inspect encrypted traffic and enjoy automated risk ranking and impact flags to reduce event
volume so you can quickly prioritize threats. Cisco NGFW firewalls are also available with clustering
for increased performance, high availability configurations, and more.
Cisco Firepower NGFWv is the virtualized version of Cisco's Firepower NGFW firewall. Widely
deployed in leading private and public clouds, Cisco NGFWv automatically scales up/down to meet
the needs of dynamic cloud environments and high availability provides resilience. Also, Cisco NGFWv
can deliver micro-segmentation to protect east-west network traffic.
Cisco firewalls provide consistent security policies, enforcement, and protection across all your
environments. Unified management for Cisco ASA and FTD/NGFW physical and virtual firewalls is
delivered by Cisco Defense Orchestrator (CDO), with cloud logging also available. And with Cisco
SecureX included with every Cisco firewall, you gain a cloud-native platform experience that enables
greater simplicity, visibility, and efficiency.
Learn more about Cisco’s firewall solutions, including virtual appliances for public and private cloud.
SonicWall NSa is ranked 16th in Firewalls with 35 reviews while SonicWall TZ is ranked 10th in Firewalls with 31 reviews. SonicWall NSa is rated 7.6, while SonicWall TZ is rated 8.4. The top reviewer of SonicWall NSa writes "A rugged solution capable of defeating advanced threats". On the other hand, the top reviewer of SonicWall TZ writes "Easy to implement, fairly stable, and supports SSL-DPI". SonicWall NSa is most compared with Meraki MX, Fortinet FortiGate, WatchGuard Firebox, Cisco ASA Firewall and Palo Alto Networks NG Firewalls, whereas SonicWall TZ is most compared with Fortinet FortiGate, Cisco ASA Firewall, Sophos XG and Meraki MX. See our SonicWall NSa vs. SonicWall TZ report.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.