We use it for malware and IPS.
Deputy Manager at a computer software company with 201-500 employees
Automated policy application and enforcement free up time for us
Pros and Cons
- "The dashboard is the most important thing. It provides good visibility and makes management easy. Firepower also provides us with good application visibility and control."
- "One issue with Firepower Management Center is deployment time. It takes seven to 10 minutes and that's a long time for deployment. In that amount of time, management or someone else can ask me to change something or to provide permissions, but during that time, doing so is not possible. It's a drawback with Cisco. Other vendors, like Palo Alto or Fortinet do not have this deployment time issue."
What is our primary use case?
How has it helped my organization?
The automated policy application and enforcement have freed up time for us, on the order of 30 percent.
Also if one Cisco antivirus implementation is the subject of an attack, all other Cisco implementations get that information rapidly, in real time. All the other firewalls are in sync when it comes to malware attacks, through the update of the database. That is good.
The visibility it provides into threats is good. Every day we find lots of malware attacks targeting our network, but they don't get through to the network.
What is most valuable?
The dashboard is the most important thing. It provides good visibility and makes management easy. Firepower also provides us with good application visibility and control.
Cisco Talos is well known around the world and everyone trusts Talos for malware intelligence. It is number one. It is also the most secure for Snort rules. It is more secure than others because its real-time analysis is better.
In addition, Firepower Management Center is helpful.
We also use Cisco ISE and the integration between it and Firepower is okay.
For how long have I used the solution?
I've been using Cisco Firepower NGFW Firewall for four or five years.
Buyer's Guide
Cisco Secure Firewall
January 2026
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,114 professionals have used our research since 2012.
What do I think about the stability of the solution?
It's a stable product.
What do I think about the scalability of the solution?
The scalability is good.
How are customer service and support?
Their technical support is good. When my NOC or my engineers have needed support the feedback I've had is that tech support has been good at critical moments. They have given us good service.
How was the initial setup?
There was no issue with the initial setup. It's straightforward because Cisco gives us lots of documentation. It's not a big deal, for me. In four or five years I have deployed 35 to 40 Firepowers for financial organizations and corporate offices.
Which other solutions did I evaluate?
We also use Palo Alto, Fortinet, Sophos, and Check Point.
One issue with Firepower Management Center is deployment time. It takes seven to 10 minutes and that's a long time for deployment. In that amount of time, management or someone else can ask me to change something or to provide permissions, but during that time, doing so is not possible. It's a drawback with Cisco. Other vendors, like Palo Alto or Fortinet do not have this deployment time issue.
The other issue is the upgrading process, with Cisco. Sometimes, if we use a standalone device we need to create maintenance windows at that time and we need to restart Firepower. But with other vendors, like Palo Alto, there is no need to update in that way.
If they mitigated these two things, Cisco would be number-one in the world in the security domain.
What other advice do I have?
We have not integrated Firepower with Cisco SecureX because it needs IOS 6.6. It's a limitation. If we have an external device, we would need downtime and in a financial organization, management will not allow us the downtime.
In my experience, the deployment procedure with Cisco is not the easiest, it's not plug-and-play. I hope that Cisco will give us that type of implementation.
Overall, I would rate Firepower at eight out of 10.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Senior Network Engineer at a leisure / travel company with 10,001+ employees
User friendly and easy to use GUI, but stability and scalability need improvement
Pros and Cons
- "If you compare the ASA and the FirePOWER, the best feature with FirePOWER is easy to use GUI. It has most of the same functionality in the Next-Generation FirePOWER, such as IPS, IPS policies, security intelligence, and integration and identification of all the devices or hardware you have in your network. Additionally, this solution is user-friendly."
- "We cannot have virtual domains, which we can create with FortiGate. This is something they should add in the future. Additionally, there is a connection limit and the FMC could improve."
What is our primary use case?
We are currently using this solution as a VPN and an internet firewall in some locations. In our data center, we are still using FortiGate as an internet firewall but we are evaluating other options.
What is most valuable?
If you compare the ASA and the FirePOWER, the best feature with FirePOWER is easy to use GUI. It has most of the same functionality in the Next-Generation FirePOWER, such as IPS, IPS policies, security intelligence, and integration and identification of all the devices or hardware you have in your network. Additionally, this solution is user-friendly.
What needs improvement?
We cannot have virtual domains, which we can create with FortiGate. This is something they should add in the future. Additionally, there is a connection limit and the FMC could improve.
For how long have I used the solution?
I have been using Cisco Firepower NGFW Firewall for approximately three years.
What do I think about the stability of the solution?
The solution is not stable. There seems to be always some issues. This is not ideal when you are running a system in a data center environment.
What do I think about the scalability of the solution?
There is room for improvement in the scalability of this solution.
How are customer service and technical support?
I was satisfied with the support we received.
How was the initial setup?
When I did the installation three or four years ago it was challenging.
What's my experience with pricing, setup cost, and licensing?
This solution is expensive and other solutions, such as FortiGate, are cheaper.
Which other solutions did I evaluate?
I have evaluated FortiGate firewalls and when comparing with this solution there is no clear better solution, they each have their pros and cons.
What other advice do I have?
I would recommend a Next-Generation firewall. FortiGate has a Next-Generation firewall but I have never used it. However, it would be similar to the Cisco Next-Generation FirePOWER, which has most of the capabilities, such as running all the BDP sessions and having security intelligence in one system.
I would recommend everyone to use this solution.
I rate Cisco Firepower NGFW Firewall a six out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Cisco Secure Firewall
January 2026
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: January 2026.
881,114 professionals have used our research since 2012.
Head of ICT Infrastructure and Security at a government with 501-1,000 employees
Stable and reliable, requiring very little support
Pros and Cons
- "The features that are most valuable within the firewall are the IPS as well as the Unified Communications. We also really like the dynamic grouping."
- "An area for improvement is the graphical user interface. That is something that is coming up now. They could make the product more user-friendly. A better GUI is something that would make life much easier."
What is our primary use case?
We use it for intrusion prevention and in our VPN that is connected to our head office. It provides protection and security and node clustering. It gives us all the security features that we need within our environment.
What is most valuable?
The features that are most valuable within the firewall are the IPS as well as the Unified Communications. We also really like the dynamic grouping.
What needs improvement?
An area for improvement is the graphical user interface. That is something that is coming up now. They could make the product more user-friendly. A better GUI is something that would make life much easier. Traditionally, Cisco products have been command-line-based.
For how long have I used the solution?
The Cisco ASA Firewall has been in our environment for the past seven years.
What do I think about the stability of the solution?
The product is very stable. We've not had any challenges with it in all this time. It performs very well.
What do I think about the scalability of the solution?
We have 2,000 users who connect through this product. We are planning to increase use as we go, toward the end of the year.
How are customer service and technical support?
The technical support has been excellent. When there have been any issues, they've always been there for us.
How was the initial setup?
The initial configurations were straightforward, not complex at all. It took us just two days to finalize things.
What about the implementation team?
We did most of the setup in-house, but we also had assistance from our partner.
What's my experience with pricing, setup cost, and licensing?
We pay annually and there are no costs in addition to the standard fees.
Which other solutions did I evaluate?
When you compare Cisco ASA Firewall with Sophos, they are more or less the same in terms of functionality.
What other advice do I have?
Cisco ASA Firewall is very stable and very reliable. It requires very minimal support, once you configure it and put it in your environment. You don't need to attend to faults or issues. Once you install it and plug it in, it is good to go.
We have been using the ASA Firewall for a long time, and it is an advanced product for our current use. In terms of improvement, there's not much that can be done to it. It is a solid product, very effective, and it does its job well.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Sr Technical Consultant at a tech services company with 51-200 employees
Best documentation, good price, and very reliable with useful remote VPN, site-to-site VPN, and clustering features
Pros and Cons
- "The remote VPN and IPsec VPN or site-to-site VPN features are valuable. The clustering feature is also valuable. We have two ISP links. Whenever there is a failover, users don't even get to know. The transition is very smooth, and the users don't notice any latency. So, remote VPN, site-to-site VPN, and failover are three very powerful features of Cisco ASA."
- "Cisco has the best documentation. You can easily find multiple documents by searching the web. Even a child can go online and find the required information."
- "There is huge scope for improvement in URL filtering. The database that they have is not accurate. Their content awareness and categorization for URL filtering are not that great. We faced many challenges with their categorization and content awareness. They should improve these categorization issues."
What is our primary use case?
We are using Cisco ASA Firewall 5525 for network security. We needed a network security solution that can take care of the network security and URL filtering. We also wanted to create site-to-site VPNs and have remote VPNs. For all these use cases, we got Cisco ASA, and we are pretty happy with it.
What is most valuable?
The remote VPN and IPsec VPN or site-to-site VPN features are valuable. The clustering feature is also valuable. We have two ISP links. Whenever there is a failover, users don't even get to know. The transition is very smooth, and the users don't notice any latency. So, remote VPN, site-to-site VPN, and failover are three very powerful features of Cisco ASA.
Cisco has the best documentation. You can easily find multiple documents by searching the web. Even a child can go online and find the required information.
What needs improvement?
There is huge scope for improvement in URL filtering. The database that they have is not accurate. Their content awareness and categorization for URL filtering are not that great. We faced many challenges with their categorization and content awareness. They should improve these categorization issues.
What do I think about the stability of the solution?
It is very reliable.
What do I think about the scalability of the solution?
It is scalable. Cisco is pretty popular with organizations, and many customers are using it. It is suitable for all kinds of customers. It can cater to small, medium, and large organizations.
How are customer service and technical support?
I have interacted with them many times. I have been on a call with their technical support continuously for 48 hours. They were very prompt. In terms of technical support and documentation for switching, firewall, and routing solutions, no one can match Cisco.
How was the initial setup?
Its initial setup was very straightforward. Its documentation is very easily available on the web, which is very useful.
What's my experience with pricing, setup cost, and licensing?
Their pricing is very aggressive and good. Even a small company can afford it. I am happy with its pricing. Its licensing is on a yearly basis.
What other advice do I have?
I would recommend this solution to others if they are not specifically looking for URL filtering and want to use it for their infrastructure. It is a perfect and very reliable solution, but it lacks when it comes to URL filtering.
I would rate Cisco ASA Firewall a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network security engineer at a tech services company with 1,001-5,000 employees
A simple and reliable firewall with best support and very good netting, routing, and VPN functionalities
Pros and Cons
- "Netting is one of the best features. We can modify it in different ways. Site-to-site VPN is also an awesome feature of Cisco ASA. The biggest advantage of Cisco products is technical support. They provide the best technical support."
- "Cisco should work on ASDM. One of the biggest drawbacks of Cisco ASA is ASDM GUI. Cisco should improve the ASDM GUI. The configuration through ASDM is really difficult as compared to CLI. Sometimes when you are doing the configuration in ASDM, it suddenly crashes. It also crashes while pushing a policy. Cisco should really work on this."
What is our primary use case?
I am using Cisco ASA 5525 for netting, routing, and site-to-site VPN. We have two sites. I am using Cisco ASA Firewall on one site and Check Point Next-Generation Firewall on another site.
How has it helped my organization?
We have integrated it with Cisco Anyconnect. This feature has been very good for us during the lockdown.
What is most valuable?
Netting is one of the best features. We can modify it in different ways. Site-to-site VPN is also an awesome feature of Cisco ASA.
The biggest advantage of Cisco products is technical support. They provide the best technical support.
What needs improvement?
Cisco should work on ASDM. One of the biggest drawbacks of Cisco ASA is ASDM GUI. Cisco should improve the ASDM GUI. The configuration through ASDM is really difficult as compared to CLI. Sometimes when you are doing the configuration in ASDM, it suddenly crashes. It also crashes while pushing a policy. Cisco should really work on this.
For how long have I used the solution?
We have been using this solution for one and a half years.
What do I think about the stability of the solution?
It is stable and reliable. If you are looking for security from Layer 1 to Layer 4, Cisco ASA is good, but if you are looking for Layer 7 security, deep security, and malware detection, this is not the right product. You have to use some other product.
What do I think about the scalability of the solution?
We have more than 400 employees. We are currently not thinking of increasing its usage because we need more security, and Cisco ASA is not good for Layer 5 to Layer 7 security.
How are customer service and technical support?
The biggest advantage of a Cisco product is technical support. They provide 24/7 support on 365 days. Their technical support is one of the best. I would rate them a ten out of ten.
How was the initial setup?
Cisco ASA is very not complex. It is a very simple firewall. If you are configuring it through CLI, it is easy. If you configuring it through ASDM, it will be more difficult for a beginner engineer.
It takes around two to three days to cover all the parameters. It is very easy to deploy in an existing network, which is one of the main advantages of Cisco ASA.
What's my experience with pricing, setup cost, and licensing?
We are happy with its price. Licensing is on a yearly basis for technical support. There is one license for technical support. There is another license for IP Version 2 VPN and IPS.
Which other solutions did I evaluate?
I considered pfSense, but when I checked the reviews, pfSense's reviews were really bad, so we purchased Cisco ASA.
What other advice do I have?
I am very happy with this product in terms of netting, routing, and VPN functionalities. If you are a small organization with around 100 people and you are not thinking of Layer 7 security, deep security, and malware detection, Cisco ASA would be very useful and cost-effective for you.
I would rate Cisco ASA Firewall an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Administrator at a tech services company with 1,001-5,000 employees
Useful VPN, overall user friendly, but becoming outdated
Pros and Cons
- "The most valuable feature we have found to be the VPN because we use it often."
- "The solution has not had any layer upgrades. It does not have layer five and upwards, it only has up to layer four. This has caused some problems for us."
What is our primary use case?
We currently have this solution hosted in a service provider's premises. They give us the link for our infrastructure and that is how we manage our equipment. We use the VPN feature to connect with our clients.
What is most valuable?
The most valuable feature we have found to be the VPN because we use it often. Additionally, overall the solution is user-friendly and especially the ASDM GUI.
What needs improvement?
The solution has not had any layer upgrades. It does not have layer five and upwards, it only has up to layer four. This has caused some problems for us.
In the future, it would be wonderful to have an antivirus, log analyzer, and PDF/Excel data exportation features build into the solution. The data export would be great to be able to look at the access list.
For how long have I used the solution?
I have been using the solution for four years.
What do I think about the stability of the solution?
The solution is stable up to a point. We have had some troubles making VPN connections with other technologies, such as Check Point. We have some of our clients that have Check Point equipment on their side, and sometimes the traffic ceases. We then are forced to reset the tunnel in order to get the traffic back.
What do I think about the scalability of the solution?
Currently, we have approximately 20 site-to-site VPNs operations.
How are customer service and technical support?
We have had no issues with technical support.
Which solution did I use previously and why did I switch?
We are currently using a Check Point solution because this solution lacks by not having an application layer.
How was the initial setup?
The initial setup is can be complicated if you are not familiar with the command line. There is documentation available by Cisco and once you are trained it is not difficult at all.
What about the implementation team?
We use implementation consultants for the full deployment and it took approximately two weeks to complete.
What other advice do I have?
My advice to those wanting to implement the solution would be that implementations sometimes do not go as planned. You need to do your research to be prepared.
We are evaluating other solutions because this one is getting close to its expiration. There are no other technologies out there that offer better features than this ASA solution.
I rate Cisco ASA Firewall a six out of ten.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at a healthcare company with 1,001-5,000 employees
Very reliable, with good security and a straightforward setup
Pros and Cons
- "Even in very big environments, Cisco comes in handy with configuration and offers reliability when it comes to managing multiple items on one platform."
- "We have more than one Cisco firewall and it is difficult for me to integrate both on the single UI."
What is our primary use case?
We primarily use the solution to operate that LAN environment over the internet and use the public and private networks separately. It's a very good firewall in terms of security, in terms of certain scenarios, and also from an ethical hacking point of view. Both are available in our environment. Both are doing great.
What is most valuable?
Cisco, obviously, gives you a great amount of reliability which comes in handy. The brand is recognized as being strong.
Even in very big environments, Cisco comes in handy with configuration and offers reliability when it comes to managing multiple items on one platform. You are able to integrate Firepower and all AMP. With so many items to configure, I haven't yet done them all, however, I hope to.
It's great for securing the network. You learn a lot.
The initial setup is straightforward.
The solution is very stable.
The scalability of the solution is very good.
What needs improvement?
Most of the firewalls almost 90%, 95% of the firewalls will move to GUI. This is the area which needs to be improved. The graphical interface and the monitoring level of the firewall need to be worked on.
Most of us are using the monitoring software where we get the alarm, then details of the servers, et cetera. This aspect needs to be much updated.
From just the security point of view, in the security, it needs to be updated every day and every week. It is getting better day by day, however, from a monitoring point of view is not the same view as we have on the different monitoring servers or monitoring software, such as PRTG and Solarwinds. It needs to be changed and improved.
Cisco has launched its multiple products separately. Where there's a new version of the hardware, there is Firepower in it. However, there must be a solution for an integrated version that includes everything in your network and your firewall as well so that you can manage and integrate from the same web portal without going to every device and just configuring it and just doing everything separately.
It would be ideal if a solution can be configured separately and then managed centrally on one end.
We have more than one Cisco firewall and it is difficult for me to integrate both on the single UI. If I have three firewalls and one is a normal firewall, I need to configure everything separately. I can't have it on the same port or integrated on the same single IP or bind it something like it.
For how long have I used the solution?
We've mostly used Cisco solutions for two or three years at this point. Our old Cisco devices were due to be changed, and we moved over to ASA.
What do I think about the stability of the solution?
The firewall is stable, however, every two, three, or four years, you have to change the hardware and therefore get an updated version of the firewall.
This is something which companies have been doing for the sake of a new product and launching a new device. Yet, the stability needs to be considered where you have to upgrade for every two, three, four years and change the product and go for the new updated version. What I mean is that there is stability, however, obviously, it's not long-term.
What do I think about the scalability of the solution?
The firewall is very scalable. Most contact versions are available depending upon the organization you have. It works for very large organizations. They are scalable for many scenarios. The scalability obviously is there for sure.
How are customer service and technical support?
Cisco technical support is one of the best around. They have the most advanced and most experienced level of tech support I've been in contact with. Whether it is a hardware or software issue, the tech team can support you and help. They are very helpful and knowledgeable. We are quite satisfied with the level of support on offer.
Which solution did I use previously and why did I switch?
We also have experience using FortiGate.
How was the initial setup?
The Cisco firewall is straightforward. It isn't a complex implementation. Obviously, you have to bind your IP on the port and then you must go on to configure for security and something like that. It's easy for me to configure a firewall at such a level.
What's my experience with pricing, setup cost, and licensing?
If you pay for the hardware, you get the Firepower and if you don't, then you get the Cisco Firewall.
What other advice do I have?
We are just a customer and an end-user.
I'd rate the solution at an eight out of ten.
Obviously, you need to have one tech person on your online when you are configuring it, or just implementing when you are integrating with your live environment and organization. My advice is that the configuration is easy when a network engineer like myself handles it. A trained person is more than capable of the task. Other than configuring, a less technical person can manage the solution.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Networking Specialist at a healthcare company with 1,001-5,000 employees
Blocks attacks by providing a security barrier
Pros and Cons
- "I have access to the web version of Cisco Talos to see the reputation of IP addresses. I find this very helpful. It provides important information for my company to obtain the reputation of IP addresses. The information in Talos is quite complete."
- "The configuration in Firepower Management Center is very slow. Deployment takes two to three minutes. You spend a lot of time on modifications. Whereas, in FortiGate, you press a button, and it takes one second."
What is our primary use case?
We use it to configure the perimeter firewalls. In FireSIGHT, we have two firewalls in a cluster with high ability, then we have five firewalls in Offices. We use those firewalls as a perimeter for Offices.
We have all the devices in the Firepower Management Center system. We always work with Firepower devices in Firepower Management Center.
We have offices around the world. We are in Europe, the USA, and South America.
How has it helped my organization?
We have border security with Firepower. We try to curb security issues by using this Firepower firewall.
What is most valuable?
The solution provides us with good working application visibility and control.
I have access to the web version of Cisco Talos to see the reputation of IP addresses. I find this very helpful. It provides important information for my company to obtain the reputation of IP addresses. The information in Talos is quite complete.
What needs improvement?
The configuration in Firepower Management Center is very slow. Deployment takes two to three minutes. You spend a lot of time on modifications. Whereas, in FortiGate, you press a button, and it takes one second.
Three years ago, the Firepower Management Center was very slow. The solution has improved a lot in the last couple of years. It is now faster. I hope that continues to improve.
For how long have I used the solution?
I have been using it for three years.
What do I think about the stability of the solution?
We have five devices. In Rome, we don't have a technician and didn't work when we started using it. We had to send a technician to Rome to reboot the system. Now, it is stable with no problems. Also, we lost the link to the high availability firewall in our data center. We only had one device there, and Solutel had to solve this issue.
What do I think about the scalability of the solution?
The scalability is great.
We have five devices in four locations.
Three network administrators who work with Firepower, including myself.
How are customer service and technical support?
I usually create an issue with Solutel, then they create a case with Cisco Talos or the Cisco technicians. I am happy with Solutel's support.
How was the initial setup?
We deployed in several cities, but not the same day.
What about the implementation team?
The initial deployment was done by a Cisco partner, Solutel. Our experience with Solutel was fantastic. They are local partners for us and provided us with great service.
What was our ROI?
We realized that clearly we have issues of security with a lot of attacks. I don't know if it is because with the COVID-19 virus a lot of hackers are at home or working more hours. In the last year, we have seen attacks that are very big, and we need a barrier. So, we use a firewall to block these attacks.
What's my experience with pricing, setup cost, and licensing?
The price for Firepower is more expensive than FortiGate. The licensing is very complex. We usually ask for help from Solutel because of its complexity. I have a Cisco account where I can download the VPN client, then connect. Instead, I create an issue with Solutel, then Solutel solves the case.
Our license for Firepower is their best license.
Which other solutions did I evaluate?
We have FortiGate firewalls, the security of Office 365 from Microsoft, Cisco Umbrella, and Kaspersky Anti-virus. We are also using Cisco ASA, Meraki switches, and a router from Cisco.
The Firepower Management Center tool is very slow. We also have the FortiGate firewalls and these tools for configuring the firewall are faster.
We have to make a change to our devices in South America. We are currently evaluating Cisco Firepower Series 1000 versus FortiGate. Firepower is more powerful than FortiGate, but FortiGate is more flexible and easier to configure. Because of our last issues with Firepower, it is possible that FortiGate is more stable.
What other advice do I have?
It is a very powerful device. Firepower Management Center is a great tool, but it is a bit slow.
We don't have Cisco Umbrella integrated with Firepower. We tested Firepower's integration with Meraki Umbrella, but we don't use it because you need better firmware.
I would rate this solution as an eight (out of 10).
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: January 2026
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos Firewall
Cisco Umbrella
Cisco Identity Services Engine (ISE)
Palo Alto Networks NG Firewalls
WatchGuard Firebox
Cisco Meraki MX
Check Point Quantum Force (NGFW)
Azure Firewall
SonicWall TZ
Cisco Secure Network Analytics
Check Point Harmony SASE (formerly Perimeter 81)
Fortinet FortiGate-VM
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?











