We are using Cisco ASA Firewall 5525 for network security. We needed a network security solution that can take care of the network security and URL filtering. We also wanted to create site-to-site VPNs and have remote VPNs. For all these use cases, we got Cisco ASA, and we are pretty happy with it.
Sr Technical Consultant at a tech services company with 51-200 employees
Best documentation, good price, and very reliable with useful remote VPN, site-to-site VPN, and clustering features
Pros and Cons
- "The remote VPN and IPsec VPN or site-to-site VPN features are valuable. The clustering feature is also valuable. We have two ISP links. Whenever there is a failover, users don't even get to know. The transition is very smooth, and the users don't notice any latency. So, remote VPN, site-to-site VPN, and failover are three very powerful features of Cisco ASA."
- "Cisco has the best documentation. You can easily find multiple documents by searching the web. Even a child can go online and find the required information."
- "There is huge scope for improvement in URL filtering. The database that they have is not accurate. Their content awareness and categorization for URL filtering are not that great. We faced many challenges with their categorization and content awareness. They should improve these categorization issues."
What is our primary use case?
What is most valuable?
The remote VPN and IPsec VPN or site-to-site VPN features are valuable. The clustering feature is also valuable. We have two ISP links. Whenever there is a failover, users don't even get to know. The transition is very smooth, and the users don't notice any latency. So, remote VPN, site-to-site VPN, and failover are three very powerful features of Cisco ASA.
Cisco has the best documentation. You can easily find multiple documents by searching the web. Even a child can go online and find the required information.
What needs improvement?
There is huge scope for improvement in URL filtering. The database that they have is not accurate. Their content awareness and categorization for URL filtering are not that great. We faced many challenges with their categorization and content awareness. They should improve these categorization issues.
What do I think about the stability of the solution?
It is very reliable.
Buyer's Guide
Cisco Secure Firewall
July 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,524 professionals have used our research since 2012.
What do I think about the scalability of the solution?
It is scalable. Cisco is pretty popular with organizations, and many customers are using it. It is suitable for all kinds of customers. It can cater to small, medium, and large organizations.
How are customer service and support?
I have interacted with them many times. I have been on a call with their technical support continuously for 48 hours. They were very prompt. In terms of technical support and documentation for switching, firewall, and routing solutions, no one can match Cisco.
How was the initial setup?
Its initial setup was very straightforward. Its documentation is very easily available on the web, which is very useful.
What's my experience with pricing, setup cost, and licensing?
Their pricing is very aggressive and good. Even a small company can afford it. I am happy with its pricing. Its licensing is on a yearly basis.
What other advice do I have?
I would recommend this solution to others if they are not specifically looking for URL filtering and want to use it for their infrastructure. It is a perfect and very reliable solution, but it lacks when it comes to URL filtering.
I would rate Cisco ASA Firewall a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Network security engineer at a tech services company with 1,001-5,000 employees
A simple and reliable firewall with best support and very good netting, routing, and VPN functionalities
Pros and Cons
- "Netting is one of the best features. We can modify it in different ways. Site-to-site VPN is also an awesome feature of Cisco ASA. The biggest advantage of Cisco products is technical support. They provide the best technical support."
- "Cisco should work on ASDM. One of the biggest drawbacks of Cisco ASA is ASDM GUI. Cisco should improve the ASDM GUI. The configuration through ASDM is really difficult as compared to CLI. Sometimes when you are doing the configuration in ASDM, it suddenly crashes. It also crashes while pushing a policy. Cisco should really work on this."
What is our primary use case?
I am using Cisco ASA 5525 for netting, routing, and site-to-site VPN. We have two sites. I am using Cisco ASA Firewall on one site and Check Point Next-Generation Firewall on another site.
How has it helped my organization?
We have integrated it with Cisco Anyconnect. This feature has been very good for us during the lockdown.
What is most valuable?
Netting is one of the best features. We can modify it in different ways. Site-to-site VPN is also an awesome feature of Cisco ASA.
The biggest advantage of Cisco products is technical support. They provide the best technical support.
What needs improvement?
Cisco should work on ASDM. One of the biggest drawbacks of Cisco ASA is ASDM GUI. Cisco should improve the ASDM GUI. The configuration through ASDM is really difficult as compared to CLI. Sometimes when you are doing the configuration in ASDM, it suddenly crashes. It also crashes while pushing a policy. Cisco should really work on this.
For how long have I used the solution?
We have been using this solution for one and a half years.
What do I think about the stability of the solution?
It is stable and reliable. If you are looking for security from Layer 1 to Layer 4, Cisco ASA is good, but if you are looking for Layer 7 security, deep security, and malware detection, this is not the right product. You have to use some other product.
What do I think about the scalability of the solution?
We have more than 400 employees. We are currently not thinking of increasing its usage because we need more security, and Cisco ASA is not good for Layer 5 to Layer 7 security.
How are customer service and technical support?
The biggest advantage of a Cisco product is technical support. They provide 24/7 support on 365 days. Their technical support is one of the best. I would rate them a ten out of ten.
How was the initial setup?
Cisco ASA is very not complex. It is a very simple firewall. If you are configuring it through CLI, it is easy. If you configuring it through ASDM, it will be more difficult for a beginner engineer.
It takes around two to three days to cover all the parameters. It is very easy to deploy in an existing network, which is one of the main advantages of Cisco ASA.
What's my experience with pricing, setup cost, and licensing?
We are happy with its price. Licensing is on a yearly basis for technical support. There is one license for technical support. There is another license for IP Version 2 VPN and IPS.
Which other solutions did I evaluate?
I considered pfSense, but when I checked the reviews, pfSense's reviews were really bad, so we purchased Cisco ASA.
What other advice do I have?
I am very happy with this product in terms of netting, routing, and VPN functionalities. If you are a small organization with around 100 people and you are not thinking of Layer 7 security, deep security, and malware detection, Cisco ASA would be very useful and cost-effective for you.
I would rate Cisco ASA Firewall an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Cisco Secure Firewall
July 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,524 professionals have used our research since 2012.
Network Administrator at Bodiva
Useful VPN, overall user friendly, but becoming outdated
Pros and Cons
- "The most valuable feature we have found to be the VPN because we use it often."
- "The solution has not had any layer upgrades. It does not have layer five and upwards, it only has up to layer four. This has caused some problems for us."
What is our primary use case?
We currently have this solution hosted in a service provider's premises. They give us the link for our infrastructure and that is how we manage our equipment. We use the VPN feature to connect with our clients.
What is most valuable?
The most valuable feature we have found to be the VPN because we use it often. Additionally, overall the solution is user-friendly and especially the ASDM GUI.
What needs improvement?
The solution has not had any layer upgrades. It does not have layer five and upwards, it only has up to layer four. This has caused some problems for us.
In the future, it would be wonderful to have an antivirus, log analyzer, and PDF/Excel data exportation features build into the solution. The data export would be great to be able to look at the access list.
For how long have I used the solution?
I have been using the solution for four years.
What do I think about the stability of the solution?
The solution is stable up to a point. We have had some troubles making VPN connections with other technologies, such as Check Point. We have some of our clients that have Check Point equipment on their side, and sometimes the traffic ceases. We then are forced to reset the tunnel in order to get the traffic back.
What do I think about the scalability of the solution?
Currently, we have approximately 20 site-to-site VPNs operations.
How are customer service and technical support?
We have had no issues with technical support.
Which solution did I use previously and why did I switch?
We are currently using a Check Point solution because this solution lacks by not having an application layer.
How was the initial setup?
The initial setup is can be complicated if you are not familiar with the command line. There is documentation available by Cisco and once you are trained it is not difficult at all.
What about the implementation team?
We use implementation consultants for the full deployment and it took approximately two weeks to complete.
What other advice do I have?
My advice to those wanting to implement the solution would be that implementations sometimes do not go as planned. You need to do your research to be prepared.
We are evaluating other solutions because this one is getting close to its expiration. There are no other technologies out there that offer better features than this ASA solution.
I rate Cisco ASA Firewall a six out of ten.
Which deployment model are you using for this solution?
Private Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Engineer at LIAQUAT NATIONAL HOSPITAL & MEDIACAL COLLEGE
Very reliable, with good security and a straightforward setup
Pros and Cons
- "Even in very big environments, Cisco comes in handy with configuration and offers reliability when it comes to managing multiple items on one platform."
- "We have more than one Cisco firewall and it is difficult for me to integrate both on the single UI."
What is our primary use case?
We primarily use the solution to operate that LAN environment over the internet and use the public and private networks separately. It's a very good firewall in terms of security, in terms of certain scenarios, and also from an ethical hacking point of view. Both are available in our environment. Both are doing great.
What is most valuable?
Cisco, obviously, gives you a great amount of reliability which comes in handy. The brand is recognized as being strong.
Even in very big environments, Cisco comes in handy with configuration and offers reliability when it comes to managing multiple items on one platform. You are able to integrate Firepower and all AMP. With so many items to configure, I haven't yet done them all, however, I hope to.
It's great for securing the network. You learn a lot.
The initial setup is straightforward.
The solution is very stable.
The scalability of the solution is very good.
What needs improvement?
Most of the firewalls almost 90%, 95% of the firewalls will move to GUI. This is the area which needs to be improved. The graphical interface and the monitoring level of the firewall need to be worked on.
Most of us are using the monitoring software where we get the alarm, then details of the servers, et cetera. This aspect needs to be much updated.
From just the security point of view, in the security, it needs to be updated every day and every week. It is getting better day by day, however, from a monitoring point of view is not the same view as we have on the different monitoring servers or monitoring software, such as PRTG and Solarwinds. It needs to be changed and improved.
Cisco has launched its multiple products separately. Where there's a new version of the hardware, there is Firepower in it. However, there must be a solution for an integrated version that includes everything in your network and your firewall as well so that you can manage and integrate from the same web portal without going to every device and just configuring it and just doing everything separately.
It would be ideal if a solution can be configured separately and then managed centrally on one end.
We have more than one Cisco firewall and it is difficult for me to integrate both on the single UI. If I have three firewalls and one is a normal firewall, I need to configure everything separately. I can't have it on the same port or integrated on the same single IP or bind it something like it.
For how long have I used the solution?
We've mostly used Cisco solutions for two or three years at this point. Our old Cisco devices were due to be changed, and we moved over to ASA.
What do I think about the stability of the solution?
The firewall is stable, however, every two, three, or four years, you have to change the hardware and therefore get an updated version of the firewall.
This is something which companies have been doing for the sake of a new product and launching a new device. Yet, the stability needs to be considered where you have to upgrade for every two, three, four years and change the product and go for the new updated version. What I mean is that there is stability, however, obviously, it's not long-term.
What do I think about the scalability of the solution?
The firewall is very scalable. Most contact versions are available depending upon the organization you have. It works for very large organizations. They are scalable for many scenarios. The scalability obviously is there for sure.
How are customer service and technical support?
Cisco technical support is one of the best around. They have the most advanced and most experienced level of tech support I've been in contact with. Whether it is a hardware or software issue, the tech team can support you and help. They are very helpful and knowledgeable. We are quite satisfied with the level of support on offer.
Which solution did I use previously and why did I switch?
We also have experience using FortiGate.
How was the initial setup?
The Cisco firewall is straightforward. It isn't a complex implementation. Obviously, you have to bind your IP on the port and then you must go on to configure for security and something like that. It's easy for me to configure a firewall at such a level.
What's my experience with pricing, setup cost, and licensing?
If you pay for the hardware, you get the Firepower and if you don't, then you get the Cisco Firewall.
What other advice do I have?
We are just a customer and an end-user.
I'd rate the solution at an eight out of ten.
Obviously, you need to have one tech person on your online when you are configuring it, or just implementing when you are integrating with your live environment and organization. My advice is that the configuration is easy when a network engineer like myself handles it. A trained person is more than capable of the task. Other than configuring, a less technical person can manage the solution.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Networking Specialist at a healthcare company with 1,001-5,000 employees
Blocks attacks by providing a security barrier
Pros and Cons
- "I have access to the web version of Cisco Talos to see the reputation of IP addresses. I find this very helpful. It provides important information for my company to obtain the reputation of IP addresses. The information in Talos is quite complete."
- "The configuration in Firepower Management Center is very slow. Deployment takes two to three minutes. You spend a lot of time on modifications. Whereas, in FortiGate, you press a button, and it takes one second."
What is our primary use case?
We use it to configure the perimeter firewalls. In FireSIGHT, we have two firewalls in a cluster with high ability, then we have five firewalls in Offices. We use those firewalls as a perimeter for Offices.
We have all the devices in the Firepower Management Center system. We always work with Firepower devices in Firepower Management Center.
We have offices around the world. We are in Europe, the USA, and South America.
How has it helped my organization?
We have border security with Firepower. We try to curb security issues by using this Firepower firewall.
What is most valuable?
The solution provides us with good working application visibility and control.
I have access to the web version of Cisco Talos to see the reputation of IP addresses. I find this very helpful. It provides important information for my company to obtain the reputation of IP addresses. The information in Talos is quite complete.
What needs improvement?
The configuration in Firepower Management Center is very slow. Deployment takes two to three minutes. You spend a lot of time on modifications. Whereas, in FortiGate, you press a button, and it takes one second.
Three years ago, the Firepower Management Center was very slow. The solution has improved a lot in the last couple of years. It is now faster. I hope that continues to improve.
For how long have I used the solution?
I have been using it for three years.
What do I think about the stability of the solution?
We have five devices. In Rome, we don't have a technician and didn't work when we started using it. We had to send a technician to Rome to reboot the system. Now, it is stable with no problems. Also, we lost the link to the high availability firewall in our data center. We only had one device there, and Solutel had to solve this issue.
What do I think about the scalability of the solution?
The scalability is great.
We have five devices in four locations.
Three network administrators who work with Firepower, including myself.
How are customer service and technical support?
I usually create an issue with Solutel, then they create a case with Cisco Talos or the Cisco technicians. I am happy with Solutel's support.
How was the initial setup?
We deployed in several cities, but not the same day.
What about the implementation team?
The initial deployment was done by a Cisco partner, Solutel. Our experience with Solutel was fantastic. They are local partners for us and provided us with great service.
What was our ROI?
We realized that clearly we have issues of security with a lot of attacks. I don't know if it is because with the COVID-19 virus a lot of hackers are at home or working more hours. In the last year, we have seen attacks that are very big, and we need a barrier. So, we use a firewall to block these attacks.
What's my experience with pricing, setup cost, and licensing?
The price for Firepower is more expensive than FortiGate. The licensing is very complex. We usually ask for help from Solutel because of its complexity. I have a Cisco account where I can download the VPN client, then connect. Instead, I create an issue with Solutel, then Solutel solves the case.
Our license for Firepower is their best license.
Which other solutions did I evaluate?
We have FortiGate firewalls, the security of Office 365 from Microsoft, Cisco Umbrella, and Kaspersky Anti-virus. We are also using Cisco ASA, Meraki switches, and a router from Cisco.
The Firepower Management Center tool is very slow. We also have the FortiGate firewalls and these tools for configuring the firewall are faster.
We have to make a change to our devices in South America. We are currently evaluating Cisco Firepower Series 1000 versus FortiGate. Firepower is more powerful than FortiGate, but FortiGate is more flexible and easier to configure. Because of our last issues with Firepower, it is possible that FortiGate is more stable.
What other advice do I have?
It is a very powerful device. Firepower Management Center is a great tool, but it is a bit slow.
We don't have Cisco Umbrella integrated with Firepower. We tested Firepower's integration with Meraki Umbrella, but we don't use it because you need better firmware.
I would rate this solution as an eight (out of 10).
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
Senior Network And Security Engineer at a pharma/biotech company with 201-500 employees
Protects your system against threats and advanced malware
Pros and Cons
- "If configured, Firepower provides us with application visibility and control."
- "FirePOWER does a good job when it comes to providing us with visibility into threats, but I would like to see a more proactive stance to it."
What is our primary use case?
We use it for the actual firewall and also site-to-site VPN.
Our company is always growing. Every day's a new day and there is always something new to learn. We are a mature organization, but we can never sit still. We have two company locations and we use Cisco Firepower as our main firewall at both locations.
Overall, for security, we use about seven tools.
Within our company, there are just two people that maintain this solution. Myself and the IT manager. I'm the network administrator.
How has it helped my organization?
We were the subject of a ransomware attack a little over a year ago. Due to our console, we're able to easily see where the threat came from, all the while being able to shut down the network but maintain our network on the other side — or the other side of the site-to-site VPN. Then we could fix what we needed to be fixed here, and then subsequently correct the issues on the other side.
What is most valuable?
The manageability through the FMC is superb. I have a single dashboard that I can manage my firewalls from. I can see and manage all of my objects and control all my policies. I can look at all my logs and control my whole network from one dashboard.
What needs improvement?
FirePOWER does a good job when it comes to providing us with visibility into threats, but I would like to see a more proactive stance to it. Maybe more of an IDS approach. I don't know a better way to say it, but more of a heavier proactive approach rather than a reactive one.
For how long have I used the solution?
I have been using Cisco Firepower NGFW Firewall for two years.
What do I think about the stability of the solution?
I have had little to no issues except with the first version that we had. There was a known issue with Cisco in the first version. When I went to do a restore, there was a known issue with something with the Linux kernel. It took us about two weeks to get the restore working. It was a scary moment for us, but we worked through it, and ever since we've had no issues, stability-wise.
How are customer service and technical support?
I have contacted support multiple times and I have no problems with them. I think they do the best with what they have — especially with the pandemic this year. I think they've done everything they can do with what they have. They don't stop. They don't give up until the issue is resolved. They're really good with following-up too, making sure that the issue hasn't come back.
Which solution did I use previously and why did I switch?
We have another product that monitors all traffic. It just sits back and idols in the background — It integrates, but it doesn't if you know what I mean. It's a separate dashboard, but it alerts us. We can control the security — level zero through one hundred. If a threat registers above 54% (we have the limit set at 51) it alerts us. If it's a specific threat, it can shut down services, ports, machines, authentication, and so on and so forth.
We also use AMP, Umbrella, SecureX, and Duo. They're pretty easy to integrate. I wouldn't say beginner level, but if you have a working knowledge of networks and security, you can easily get them integrated. Also, if you need help, Cisco's always there to assist.
We use Firepower Management Center — it's a wonderful tool. It has an awesome all-in-one pane of glass dashboard so you can manage multiple devices from one dashboard. It's also very easy to set up.
We used to use SonicWall. Cisco was purchased right before I came on board, but from my knowledge, we had issues with the licensing of SonicWall. We are a Cisco shop. Both my manager and I prefer Cisco over other vendors. We have more experience with Cisco and their customer support and the products themselves are just better in our experience.
How was the initial setup?
The deployment was with all new networks, so the architecture was with a peer. We first sat down and discussed or laid out our network and what it would look like through IP schemes and everything else in that sense. We then figured out how many users we would have and decide what size of hardware we would need. We decided on what type of VPN connection and what certificates we would need. After that, once we were able to secure those tunnels and get communication going between our two locations, we then started tightening down our two networks as we have multiple networks within each location.
We had to decide what all needed to communicate with one another. Not every network needed to touch the outside world.
What about the implementation team?
From start to finish, including production rollout for other areas, deployment took roughly one month. We did it all in-house.
Some maintenance is required involving security patches. Cisco is really good at deploying those or not deploying those, but putting those out and having release notes and upgrade paths and just the information behind all of their patches. Cisco does a really good job with that.
What's my experience with pricing, setup cost, and licensing?
With any solution from anybody, I always think that licensing is a little high — but it's comparable to other companies. It definitely competes with the other vendors in the market.
What other advice do I have?
If configured, Firepower provides us with application visibility and control.
The ability to futureproof our security strategy is definitely there. There are a lot of functions that we don't yet use. When I say we don't use a function, I mean that the functionality or the ability is not turned on yet simply because we have not gotten around to it. The ability is there, the capability is there. That also goes into the reasoning behind why we chose it.
Do your research, know your skillset, be comfortable with your skillset, and don't be afraid to challenge yourself.
Overall, on a scale from one to ten, I would give this solution a rating of eight.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor.
SOC & SECURITY SERVICES DIRECTOR at BESTEL
Filtering, IPS, and the A&P on small operations are all great features
Pros and Cons
- "A good intrusion prevention system and filtering."
- "Implementations require the use of a console. It would help if the console was embedded."
What is our primary use case?
We use the platform to provide secure perimeter internet access for customers and also to provide secure networks or secure SANs for customers. We have a global partnership with Cisco and I'm a re-sales and security manager of IT services.
What is most valuable?
The top features for me are the filtering, the intrusion prevention system, and the AMP on small operations.
What needs improvement?
To configure the FirePower it is required an external console. It would be nice to have the console embedded in the Firewall so you don't require an extra device. I'd like to see some kind of SD-WAN included as a feature.
For how long have I used the solution?
I've been using this solution for six years.
What do I think about the stability of the solution?
The solution is very stable and we feel very secure with it.
What do I think about the scalability of the solution?
The scalability is no problem.
How are customer service and technical support?
The technical support is excellent.
How was the initial setup?
The initial setup is quite straightforward. I think someone who knows the iOS platform and knows about firewalls can setup the device. If you don't have experience, it will be somewhat complicated. If you know the platform, implementation is very quick. We've installed over 1,000 firewalls for different customers.
What other advice do I have?
This is a very stable platform, and you can adjust the engine for malware protection. It is one of the best and a very reliable solution.
I would rate this solution a 10 out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Security Consultant at IKUSI
Good integration with helpful technical support and very good administration capabilities
Pros and Cons
- "The solution offers very easy configurations."
- "The initial setup can be a bit complex for those unfamiliar with the solution."
What is our primary use case?
I often work with financial sector companies such as banks as well as retail organizations.
What is most valuable?
The solution offers very easy configurations.
The administration of the solution is very good.
The product integrates well with other products.
What needs improvement?
The initial setup can be a bit complex for those unfamiliar with the solution.
There are better solutions in terms of border security. Palo Alto, for example, seems to be a bit more advanced.
The cost of the solution is very high. Fortinet, as an example, has good pricing, whereas Cisco has very high costs in comparison.
For how long have I used the solution?
We've used the solution recently. We've used it at least over the last 12 months or so.
What do I think about the stability of the solution?
The stability of the solution is pretty good. I don't recall having issues with this aspect of the solution.
What do I think about the scalability of the solution?
This particular product does not have high availability and therefore scalability is limited.
You need a pretty sizable solution for a center.
We have about 300 clients using this solution, and therefore the amount of people on the solution is very high, however, I don't have the exact number of users across all clients. For solutions providers, we have IT solutions for maybe around 5,000 users.
How are customer service and technical support?
I have experience working with technical support from Cisco. It's very easy to contact them and talk with them. There were times we worked using email, for example, for communication. We also worked with Cisco engineers in Mexico directly. We're very satisfied with the level of service so far.
Which solution did I use previously and why did I switch?
We also work with Fortinet and Palo Alto, for example. As a reseller, we work with many solutions.
How was the initial setup?
I did not directly implement the solution. I don't have the right type of expertise. You need to know a bit about what you are doing, otherwise, the initial setup is a bit complex.
You may need, for example, a separate management device for this kind of solution. It's quite difficult to handle if you don't have in-depth knowledge.
What's my experience with pricing, setup cost, and licensing?
The cost of the solution is quite high. It's very expensive compared to other options. For example, Fortinet is much more reasonably priced.
What other advice do I have?
I am working for a Cisco seller in Mexico, and we have a relationship with Cisco. We are a gold partner. We ensure that the development is of the proper sizing for our clients.
I would rate the solution at a nine out of ten. We've had a very good experience so far. The only downside is that it's not as advanced as, for example, Palo Alto. That said, if you have the right skills to manipulate the configuration capabilities, Cisco is quite good.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: July 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Cisco Umbrella
Cisco Identity Services Engine (ISE)
Palo Alto Networks NG Firewalls
Check Point NGFW
WatchGuard Firebox
Azure Firewall
SonicWall TZ
Cisco Secure Network Analytics
Juniper SRX Series Firewall
Sophos XGS
Fortinet FortiGate-VM
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?