It is for our VPNs and filters out websites.
Admin Network Engineer at Grupo xcaret
Offers more security and flexibility for VPNs
Pros and Cons
- "It helped us a lot with our VPNs for the home office during COVID. There has been more security and flexibility for VPNs and other applications."
- "I would like more features in conjunction with other solutions, like Fortinet."
What is our primary use case?
How has it helped my organization?
It helped us a lot with our VPNs for the home office during COVID. There has been more security and flexibility for VPNs and other applications.
What is most valuable?
Its security is easy to use.
What needs improvement?
I would like more features in conjunction with other solutions, like Fortinet.
Buyer's Guide
Cisco Secure Firewall
July 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,524 professionals have used our research since 2012.
For how long have I used the solution?
I have been using it for five years.
What do I think about the stability of the solution?
It has very good stability.
What do I think about the scalability of the solution?
It has really good scalability.
How are customer service and support?
The customer service and technical support are good. I would rate them as nine out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We were previously using Fortinet. We switched to ASA and Firepower when our contract with Fortinet ended. Now, we are only using ASA.
How was the initial setup?
The deployment was simple.
What was our ROI?
The ROI is good. Using ASA, we have saved 10% to 20% on our costs.
What's my experience with pricing, setup cost, and licensing?
The pricing is fine. It is not too bad.
What other advice do I have?
We had it integrated with the Umbrella solution a few years ago.
I would rate this solution as nine out of 10.
Which deployment model are you using for this solution?
Hybrid Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Network Engineer at a computer software company with 201-500 employees
Gives us remote connectivity and helps workers connect remotely
Pros and Cons
- "It has definitely improved our organization. It gives us remote connectivity, helps workers connect remotely, and also gives us good connectivity to our other branches."
- "I would like it if there was a centralized way to manage policies, then sticking with the network functions on the actual devices. That is probably the thing that frustrates me the most. I want a way that you can manage multiple policies at several different locations, all at one site. You then don't have to worry about the connectivity piece, in case you are troubleshooting because connectivity is down."
What is our primary use case?
We use it for basic firewalling, building VPN tunnels, and for some remote VPN connections.
We have two ASAs servicing external remote connectivity sessions for about 300 users.
How has it helped my organization?
It has definitely improved our organization. It gives us remote connectivity, helps workers connect remotely, and also gives us good connectivity to our other branches.
What needs improvement?
It would be nice if it had the client to actually access the firewall. Though, web-based access over HTTPS is actually a lot nicer than having to put on a client just to access the device.
For Firepower Threat Defense and ASAs, I would like it if there was a centralized way to manage policies, then sticking with the network functions on the actual devices. That is probably the thing that frustrates me the most. I want a way that you can manage multiple policies at several different locations, all at one site. You then don't have to worry about the connectivity piece, in case you are troubleshooting because connectivity is down.
For how long have I used the solution?
I have been using ASA for about three years.
What do I think about the stability of the solution?
It is stable.
We just run updates on them. I don't know if we have had to do any hardware maintenance, which is good.
What do I think about the scalability of the solution?
We have been just using ASAs for a smaller environment.
I don't know if I have ever worked with ASA in a highly scalable environment.
How are customer service and support?
I haven't really gotten involved with the technical support for ASAs.
Which solution did I use previously and why did I switch?
I work with a lot of different companies and a number of different firewalls. A lot of times it is really about the price point and their specific needs.
This solution was present when I showed up.
What's my experience with pricing, setup cost, and licensing?
The pricing is pretty standard.
I wish there was an easier way to license the product in closed environments. I have worked in a number of closed environments, then it is a lot of head scratching. I know that we could put servers in these networks and that would help with the licensing. I have never been in a situation where we connected multiple networks, i.e., having an external network as well as an internal network, as those kinds of solutions are not always the best. I think licensing is always a headache for everyone, and I don't know if there is a simple solution.
Which other solutions did I evaluate?
We can build GRE tunnels. Whereas, Firepower can't route traffic nor do a bit more traffic engineering within the VPN tunnels. This is what I like about using ASAs over Firepower.
Firepower Threat Defense has a mode where you can manage multiple firewalls through a single device.
I really like how Palo Alto does a much better job separating the network functions from the firewalling functions.
I would consider if there is a need to centralize all the configurations. If you have many locations and want to centrally manage it, I would use the ASA to connect to a small number of occasions. As that grew, I would look for a solution where I could centrally manage the policies, then have a little more autonomous control over the networking piece of it.
What other advice do I have?
Know specifically what you want out of the firewall. If you are looking for something that will build the GRE tunnel so you can route between different sites, I would go with ASA over Firepower Threat Defense.
I like the ASA. I would probably rate it as eight or nine out of 10, as far as the firewalls that I have worked with.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Cisco Secure Firewall
July 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,524 professionals have used our research since 2012.
Cybersecurity Architect at a financial services firm with 5,001-10,000 employees
Provides our organization with a sense of security, reliability, and trustworthiness
Pros and Cons
- "The most valuable feature would be the IP blocking. It gets rid of things that you don't need in your environment."
- "The solution is overcomplicated in some senses. Simplifying it would be an improvement."
What is our primary use case?
It has been great for blocking incoming bad actors. The new Firepower modules have been a welcome additive to that.
How has it helped my organization?
Cybersecurity resilience has helped us be able to react and respond in a quick fashion to anything that may be happening or any anomalies within the environment.
The solution has provided us a sense of security, reliability, and trustworthiness.
What is most valuable?
The most valuable feature would be the IP blocking. It gets rid of things that you don't need in your environment.
Its resilience helps offer being able to react and self-heal.
What needs improvement?
The solution is overcomplicated in some senses. Simplifying it would be an improvement.
For how long have I used the solution?
I have used the ASA solutions for a better part of 10 years.
What do I think about the stability of the solution?
The stability is unparalleled.
All solutions require maintenance, and we do that routinely. Anywhere from three to four people from the network teams to application owners are involved in the maintenance. This is a firewall in production, so we need to do maintenances after hours, but it would be nice if we didn't need to do it after hours
What do I think about the scalability of the solution?
Scalability is unparalleled. It is easy to scale.
We don't have plans to increase our usage at this time.
How are customer service and support?
In previous years, Cisco's tech support has been great. Although, I have seen it declining. I would rate their support as seven out of 10.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We have used the Check Point firewalls as well as several different vendors.
What was our ROI?
It secures the network. The ROI is really incalculable at this point as keeping our data secure is keeping the company's assets secure.
Which other solutions did I evaluate?
We did evaluate other vendors.
What other advice do I have?
You need to be always looking ahead and proactively developing to build resilience.
I would rate the solution as eight out of 10. It is a world-class firewall.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Director of network ops at a non-profit with 51-200 employees
Protects our network and gives us visibility into traffic
Pros and Cons
- "The fact that we can use Firepower Management Center gives us visibility. It allows us to see and manage the traffic that is going through the network."
- "Nowadays, nobody is in the office, so I need to figure out how to put the firewall outside. If I could have a centralized firewall that also receives information from external locations, like peoples' home offices, that would help us consolidate everything into one appliance."
What is our primary use case?
The use case is protecting our building. We have one office and we use it to protect the network.
What is most valuable?
The fact that we can use Firepower Management Center gives us visibility. It allows us to see and manage the traffic that is going through the network.
What needs improvement?
We have an older version of the ASA and there are always improvements that could be made. Nowadays, nobody is in the office, so I need to figure out how to put the firewall outside. If I could have a centralized firewall that also receives information from external locations, like peoples' home offices, that would help us consolidate everything into one appliance.
For how long have I used the solution?
I have been using Cisco ASA Firewalls for over 10 years.
What do I think about the stability of the solution?
We've had issues with it because we always run it in pairs for high availability. We've had issues with the unit, but not in the last five or six years. It's pretty, pretty stable.
What do I think about the scalability of the solution?
The product we have has some limitations when it comes to scalability. That's one of the things we're looking to address with a new solution.
How are customer service and support?
Technical support was good when I used it, but I haven't needed support for the solution lately. I know people complain about support, but I don't have experience with it for this device because I haven't needed support recently.
We do pay the annual fee for support and I expect them to be there in four hours with a new device, if we need one, as they've done in the past.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We didn't have a previous solution.
How was the initial setup?
My system engineer did the initial setup and he's the person who manages it, day in and day out.
What was our ROI?
I don't think we've tracked enough data points to see ROI data points, but the value comes from the fact that it's still running and that we are still happy with it. That is definitely a good return on our investment.
What's my experience with pricing, setup cost, and licensing?
The pricing is too high and the licensing is too confusing.
What other advice do I have?
Go for it.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network engineer at a government with 10,001+ employees
Keeps the outsiders on the outside and enables us to monitor content going out
Pros and Cons
- "The ASDM (Adaptive Security Device Manager) which is the graphical user interface, works out, and Cisco keeps it current."
- "Cisco still has a lot of work to do. You can convert an ASA over to a Firepower, but the competitors, like Palo Alto and Juniper, are coming in. And believe it or not, they are a little bit more intuitive. Cisco has a little bit more work to do. They're playing catch up."
What is our primary use case?
We use it for content management and filtering. We wanted to separate DMZ traffic from normal customer traffic. We were also looking to set up portals for outside interests that needed to come in. We have our firewall set up for VPN and, with COVID breaking out, that became more important. We also use it for remote access control.
How has it helped my organization?
It improved our security. It keeps the outsiders on the outside and enables us to monitor the content that's going out from within the organization.
What is most valuable?
The ASDM (Adaptive Security Device Manager) which is the graphical user interface, works out, and Cisco keeps it current.
What needs improvement?
Cisco still has a lot of work to do. You can convert an ASA over to a Firepower, but the competitors, like Palo Alto and Juniper, are coming in. And believe it or not, they are a little bit more intuitive. Cisco has a little bit more work to do. They're playing catch up.
There is also content filtering. The bad actors are so smart nowadays, that they can masquerade as the data for a given port, and they can actually transfer data through that port. The only thing that the older firewalls know about is the port. They can't read the data going across it. That's where content filtering comes in, like Palo Alto has, with next-generation firewalls.
For how long have I used the solution?
I have been using Cisco ASA Firewalls from the beginning, when they moved over from the PIX.
What do I think about the stability of the solution?
They're pretty reliable. Even from a hardware perspective, we haven't lost any power supplies or the like. An ASA works until we remove it. The maintenance is very minimal.
What do I think about the scalability of the solution?
It's very scalable. Every organization sets it up differently, but we've been able to perform upgrades with minimal service disruption. We have ASAs in multiple locations.
How are customer service and support?
Being a government-supported organization, the technical support is great. They send us equipment. It's top-notch.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Cisco has been a leader in firewalls, and the US government primarily chooses Cisco first, before it chooses competitors.
Which other solutions did I evaluate?
We have a variety of providers from Juniper to Palo Alto, et cetera. But the Cisco GUI is pretty consistent, so most individuals catch on. But when it comes to the Firepower, we're going to need some more training on that, as we're upgrading and moving to the Firepower.
What other advice do I have?
I like the ASA product, maybe because I'm an old guy, more so than the transition to the Firepower. The ASAs have worked ever since the PIX days and they work very reliably. Even with the upgrades, your rules don't change. That's true even with a major OS upgrade.
Things are changing and the ASAs are becoming dated. People want content filtering and so on now.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Helps protect servers from hackers but doesn't have all the next-generation features we need
Pros and Cons
- "The most valuable feature is the Intrusion Prevention System."
- "Most of the features don't work well, and some features are missing as well."
What is our primary use case?
We use it as a next-generation firewall for the perimeter. I generally use it on-premises.
How has it helped my organization?
It helps protect my servers from hackers.
What is most valuable?
The most valuable feature is the Intrusion Prevention System.
What needs improvement?
Most of the features don't work well, and some features are missing as well. The completeness of the solution is most important for me. It should be complete, but some parts are missing. Cisco should improve it.
Every part of the features should be developed. That includes the next-generation firewall parts, such as application recognition.
For how long have I used the solution?
I have been using Cisco Firepower NGFW Firewalls for about five years. I am an integrator and reseller of multiple vendors' products.
What do I think about the stability of the solution?
The stability is getting better day by day, but I would expect a more stable solution, to be honest. It is stable now, but we have solutions that are more stable.
How are customer service and support?
Technical support is nice, but most of the limitations or problems are caused by the product itself. There's nothing that a technical engineer can do about them.
What's my experience with pricing, setup cost, and licensing?
The licensing package is good, but the licensing fee should be decreased.
Which other solutions did I evaluate?
I have used CheckPoint, Palo Alto, Juniper, and FortiGate. The Palo Alto solution is complete.
If I choose Cisco Firepower it is mostly because of its integration with other solutions. When the customer has several Cisco solutions, I put Cisco Firepower on top of them. But if the customer has a complex environment, I generally prefer other solutions.
What other advice do I have?
For specific needs, like VPN, you can use Cisco Firepower. But our expectation is for a next-generation Firewall or UTM solution that includes all the features. I cannot recommend Firepower to others, at the moment, as a unified threat management solution.
Generally, if the customer's number of users is greater than 100, that's when the Cisco solution is more likely to be effective.
Maintenance of the solution requires one or two people.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Network Architect at Prosperity247
Usability of the GUI front end helps admins get to a diagnosis quickly
Pros and Cons
- "One of the most valuable features is the GUI front end, which is very easy to use. But I'm also a command-line guy, and being able to access the device via command-line for advanced troubleshooting is quite important."
- "One area that could be improved is its logging functionality. Your logs are usually displayed on the screen, but if you want to go back one or two days, then you need another solution in place because those logs are overwritten within minutes."
What is our primary use case?
Typically, we use them on the internet edge for protecting customer networks from the internet. It's a delimiter between the local area network and the wider internet. Other use cases include securing data centers or protecting certain areas within a network. It's not particularly internet-based, but it gives you that added layer of security between networks or between VLANs and your network, rather than using a Layer 3 switch.
Ultimately, it's about securing data. Data is like your crown jewels and you need to be able to secure it from different user groups. Obviously, you need to protect your data from the internet and that's why we generally deploy Cisco ASAs.
How has it helped my organization?
The usability, with the GUI front end, certainly helps and it means you don't have to be a command-line person. We have to get away from that now because if you put the typical IT admin in front of a CLI they might struggle. Having something graphical, where they can click in logs to see what's going through the firewall— what's been denied, what's being allowed—very quickly, helps to get to a diagnosis or know something has been blocked. And when it comes to making changes within the environment, that can be done very quickly as well. I've seen something be blocked within a couple of minutes, and any IT admin can make a change through the GUI.
What is most valuable?
One of the most valuable features is the GUI front end, which is very easy to use. But I'm also a command-line guy, and being able to access the device via command-line for advanced troubleshooting is quite important.
What needs improvement?
One area that could be improved is its logging functionality. Your logs are usually displayed on the screen, but if you want to go back one or two days, then you need another solution in place because those logs are overwritten within minutes.
To have that kind of feature, it's more than likely there would need to be some kind of storage on the device, but those boxes were designed a number of years ago now. They weren't really designed to have that built-in. Having said that, if you do reflash into the FTD image, and you've got the Firepower Management Center to control those devices, then all that logging is kept within the Firepower Management Center.
For how long have I used the solution?
I've been using Cisco ASA Firewalls since they came out. Before ASA, I used Cisco PIX Firewalls. I've been using them since about 1999 or 2000.
I'm involved in the presale events as well as the implementation and post-sale support. We do everything. That is probably different from a lot of organizations. We are quite a small company, so we have to be involved at all levels. I see it from all angles.
How are customer service and support?
One of the reasons I've stuck with Cisco all these years is that you always get excellent support. If a network goes down due to major issues, I know I can raise a case with TAC and get through to subject matter experts very quickly.
Obviously, you need a SMARTnet contract. That means if a device has completely failed, you can get a box replaced according to the SLAs of that contract. That's very important for customers because if you have an internet edge failure and you just have a single device, you want to know that the replacement box is going to be onsite within four hours.
When a network goes down, you're going to know about it. You want to be safe in the knowledge that someone is going to be there for you and have your back. Cisco do have your back on those kinds of things.
Cisco support is a major selling point.
How would you rate customer service and support?
Positive
How was the initial setup?
In terms of deployment, a lot of organizations are moving to the cloud. People are looking at the ASAv image for deploying into the public cloud on Azure or AWS. But there are still a lot of organizations that use ASAs as their internet edge.
The on-prem and the cloud-based deployments are very similar. When you're designing a solution, you need to look at the customer's business requirements and what business outcomes they actually want from a solution. From there, you develop architecture. Then it's a matter of selecting the right kinds of kits to go into the architecture to deliver those business outcomes. We talk to customers to understand what they want and what they're trying to achieve, and we'll then develop a solution to hopefully exceed their requirements.
Once we've gotten that far, we're down to creating a low-level design and fitting the components that we're going to deploy into that design, including the ASA firewalls and the switches, et cetera. We then deploy it for the customer.
What was our ROI?
Your investments are protected because of the innovations over time and the fact that you're able to migrate to the latest and greatest technology, through Cisco.
There are also a lot of Cisco ASA skills out there in the marketplace, so if you have ASAs deployed and you get a new employee, it's more than likely they have had experience with ASAs and that means you're not having to retrain people.
Which other solutions did I evaluate?
We do deploy other manufacturers' equipment as well, but if I were to deploy a solution with firewalling, my number-one choice would probably be Cisco ASA or the FTD image or Cisco Meraki MX.
The flexibility you have in a Cisco ASA solution is generally much greater than that of others in the marketplace.
For any Cisco environment, we choose Cisco because it comes down to support. If the network is Cisco, then you have one throat to choke. If there is a network issue, there's no way that Cisco can say, "It's the HP switch you've got down in the access layer."
What other advice do I have?
ASA morphed from being just a traditional firewall, when they introduced the Firepower Next-Generation Firewall side. There has also been progress because you can reflash your old ASAs and turn them into an FTD (Firepower Threat Defense) solution. So you've got everything from your traditional ASA to an ASA with Firepower.
Cisco ASA has been improved over time, from what it was originally to what it is now. Your investments are being protected by Cisco because it has moved from a traditional firewall through to being a next-gen firewall. I'm a fan of ASA.
I think ASAs are coming towards the end of their lifespan and will be replaced by the FTDs. It's only a matter of time. But there are still a lot of Cisco customers who use ASAs, so migrating that same level of knowledge those customers have of the ASA platform across to the FPR/FTD image, will be a challenge and will require investment.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner/reseller
Coordinador de TecnologÃa at a tech vendor with 1,001-5,000 employees
Provides us visibility and information about our Internet usage. However, it is complex to operate the solution.
Pros and Cons
- "The most valuable feature is the anti-malware protection. It protects the endpoints on my network."
- "The ease of use needs improvement. It is complex to operate the solution. The user interface is not friendly."
What is our primary use case?
The primary use is as edge firewalls to the Internet.
We are only on-premise. There is still no cloud plan.
How has it helped my organization?
It provides visibility and information to the organization about what is being accessed on the Internet as well as the applications that it is protecting.
It is part of our security strategy.
What is most valuable?
- Anti-malware protection
- Web Filtering
- VPN Remote-Access
The most valuable feature is the anti-malware protection. It protects the endpoints on my network.
We use the application visibility and control feature of Cisco firewalls.
What needs improvement?
The ease of use needs improvement. It is complex to operate the solution. The user interface is not friendly.
For how long have I used the solution?
I have been using it for eight to 10 years.
What do I think about the scalability of the solution?
We have 200 users using this solution.
How are customer service and support?
The technical support is good, but it could be better. I would rate them as six out of 10.
How would you rate customer service and support?
Neutral
How was the initial setup?
The setup is not too complex. We implemented it on all our ports.
What about the implementation team?
We have five people on our cybersecurity team.
Which other solutions did I evaluate?
The solution's ability to provide visibility into threats is fine, but the Fortinet and Check Point solutions have better dashboards and information about visibility.
What other advice do I have?
We are also using Cisco AnyConnect, Umbrella (as a cloud proxy), and ISE. We have between five or six antivirus, proxy, anti-malware, data loss prevention, VPN client, and firewall tools.
I would rate this Cisco product as six out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner & Reseller

Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: July 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Cisco Umbrella
Cisco Identity Services Engine (ISE)
Palo Alto Networks NG Firewalls
Check Point NGFW
WatchGuard Firebox
Azure Firewall
SonicWall TZ
Cisco Secure Network Analytics
Juniper SRX Series Firewall
Sophos XGS
Fortinet FortiGate-VM
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?