I'm in network security, so I care more about security than the network architecture. I mostly just pull all the data out and throw it into Splunk. I use threat intelligence and some of the integrations like Talos. My company uses the product for east-west traffic, data center, and Edge.
Security Engineer at a government with 501-1,000 employees
Helped us consolidate tools and applications and provides excellent documentation and support
Pros and Cons
- "The product is easy to manage and simple. It works with the rest of our Cisco products. You can drop in new ones if you need more performance. The training and documentation provided are good."
- "There's a little bit of a disconnect between Firepower’s management and the rest of the products, like DNA and Prime. The solution should have fewer admin portals for network, security, and firewalls."
What is our primary use case?
What is most valuable?
The product is easy to manage and simple. It works with the rest of our Cisco products. You can drop in new ones if you need more performance. The training and documentation provided are good.
What needs improvement?
There's a little bit of a disconnect between Firepower’s management and the rest of the products, like DNA and Prime. The solution should have fewer admin portals for network, security, and firewalls.
For how long have I used the solution?
I have been using the solution for a year and a half. My company has been using it for at least five years.
Buyer's Guide
Cisco Secure Firewall
April 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
847,772 professionals have used our research since 2012.
What do I think about the stability of the solution?
I haven’t had a product die. The products failover really fast, and we can cluster them. The product is definitely many nines of reliability.
How are customer service and support?
I have contacted support in my previous jobs for things beyond firewalls, like servers, switches, and call centers. It's always been pretty good. They know their stuff. Sometimes we have to have a few calls to get really deep down into the issue. Eventually, we’ll get an engineer who's a senior and knows how to fix it. They do a pretty good job finding a resource that can be helpful.
Which solution did I use previously and why did I switch?
In my previous jobs, I used Palo Alto and Fortinet. My current organization chose Cisco Secure Firewall because we use Cisco for the rest of our network, and it just made sense.
What was our ROI?
We have definitely seen a return on investment. It works pretty well. It is important to have everything work together. Our time is probably more valuable than our money. We're not going to go out and grab ten other network engineers to set up another complicated platform when we can just save the hassle.
What other advice do I have?
The solution has improved our organization. I think my company was using Check Point back in the day. My company has 12 Cisco products. We used Palo Alto in my old organization. It’s what I'm most familiar with.
The application visibility and control with Secure Firewall are not bad. The product’s alerting is pretty good. There were a couple of things that surprised me about the solution. It works really well because we use it with Secure Client and Secure Endpoint. Sometimes the solutions can cross-enrich each other, which we wouldn’t get with a dedicated, standalone firewall.
The solution has helped free up our IT staff for other projects. We don't even have a dedicated firewall person. I sometimes do some stuff. Mostly the dedicated network admins run it, and they have time to do the rest of their job. Our whole network infrastructure team's only five to six people, and they can manage multiple sites across all different firewalls. It's not unreasonable to demand at all.
The product has helped us consolidate tools and applications. If we were using another solution, we would have had their firewall, management plane, and other appliances to back that up. Having a product in the Cisco universe definitely does help. It's all right there when we're using Secure Client and Umbrella. I want more of what Cisco Identity Services Engine and DNA do. I don't like switching tabs in my browser.
We use a relatively basic subset of Cisco Talos for general threat intel. It's definitely helpful. It's mostly about just getting the Talos definitions into the firewall so it can do all the heavy lifting so we don't have to. Now that Cisco has the XDR product, it will probably make it even more useful because then we can combine the network side, the security operations, and the threat intelligence into one thing to work harder for us.
Cisco Secure Firewall has definitely helped our organization improve its cybersecurity resilience. I like the IDS a lot. The definitions work really well. Making custom ones is pretty trivial. We don't have to do complicated packet captures or anything of that kind.
My advice would be to lean really hard on your sales engineer to explain the stack to you. There's definitely a learning curve to it. Cisco does things in a very particular way that's maybe a little bit different than other firewall vendors. Generally, it's pretty helpful talking to post-sales about what you need because you're probably not going to be able to figure it out. It's definitely a pretty top-shelf tool. If an organization already uses Cisco, they probably want to invest in the solution.
Overall, I rate the solution an eight out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
CTO at a government with 10,001+ employees
Does what we need to do and when we need to do it
Pros and Cons
- "Cisco Secure Firewall is robust and reliable."
- "The process of procuring modern-day technology within the DOD needs to improve."
What is our primary use case?
We use Cisco Secure Firewall for traditional firewall use cases, like VPN, segmenting of traffic, and creating PPSs.
How has it helped my organization?
We need reliable communication to do what we do, and that's very important. The solution does what we need to do and when we need to do it. It has a great reputation for the support that we need because if things don't work within the Department of Defense, people don't survive. Communication and keeping the adversary out are key components of our work. So we need a robust, reliable, and secure product, and that's what Cisco provides us.
What is most valuable?
Cisco Secure Firewall is robust and reliable.
What needs improvement?
The process of procuring modern-day technology within the DOD needs to improve.
For how long have I used the solution?
I've spent quite a few years with Cisco Secure Firewall.
What do I think about the stability of the solution?
Cisco Secure Firewall is a very stable solution.
What do I think about the scalability of the solution?
Cisco Secure Firewall is a very scalable solution.
How are customer service and support?
Cisco Secure Firewall's technical support is great, reliable, and responsive.
How would you rate customer service and support?
Positive
What was our ROI?
We have seen a return on investment from using Cisco Secure Firewall. From the DOD's perspective, we need a reliable and robust solution that has to be reliable in real-time. Cisco Secure Firewall is a reliable solution that works when needed.
What other advice do I have?
Cisco Secure Firewall is a great scalable, secure, and robust product.
There is a dedicated team designed to handle firewalls.
I have a good impression of Cisco Talos and its effects on our security operations. They have a great reputation for doing a lot of great things.
Cisco Secure Firewall has helped our organization improve its cybersecurity resilience.
Overall, I rate Cisco Secure Firewall nine out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Cisco Secure Firewall
April 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: April 2025.
847,772 professionals have used our research since 2012.
Co-Founder at Multitechservers
Great remote VPN features, easy to set up, and offers 24/7 access to support
Pros and Cons
- "Cisco ASA provides us with very good application visibility and control."
- "If they want to add better features to the current Cisco ASA, they can start by increasing the encryption. That is the only thing they need to improve."
What is our primary use case?
We are primarily using the solution for VLAN implementations and also for remote VPN capability - basically it's used for connecting to remote offices securely.
How has it helped my organization?
After implementing tools, including Cisco ASA, unauthorized access comes down a lot. We are not facing asset issues as of now. We are not facing an issue related to malicious traffic or any bad activity in our network.
What is most valuable?
The solution can allow and block traffic over the VLANs.Some of the unauthorized actions and malicious traffic can also be blocked effectively, as we are following PCI DSS compliance. We are a card industry. We are using cards as a payment method, and therefore we need to follow the compliance over the PCI DSS. That's why we chose one of the best products. ASA Firewall is very secure.
It's always easy to integrate Cisco with the same company products. If you are using other CIsco products, there's always easy integration.
Cisco is one of the most popular brands, and therefore the documentation is easily available over the internet.
They are best-in-class.
The remote VPN feature is one of the best features we've found.
We like that there is two-factor authentication on offer. We can integrate a Google authenticator with Cisco ASA so that whenever a person is logging on to any network device, they need to enter the password as well as the security code that is integrated by Google. It's a nice added security feature.
Cisco ASA provides us with very good application visibility and control. The Cisco CLI command line is one of the easiest we found on the market due to the fact that the GUI and the user interface are very familiar. If you're a beginner, you can easily access it. There's no complicated UI.
When compared to other products available, the cost is pretty similar. There's no big gap when you compare Cisco pricing to other products.
There are multiple features in a single appliance, which is quite beneficial to us.
Support that is on offer 24/7. Whenever we face some technical issue, we can reach out to them easily.
We have not had any security breaches.
They provide a helpful feature that allows us to configure email.
We are getting a lot from the appliance in real-time.
What needs improvement?
There's an upgraded version of the 5500 that has come to the market. It offers the latest encryption that they have. If they want to add better features to the current Cisco ASA, they can start by increasing the encryption. That is the only thing they need to improve. The rest is good.
For how long have I used the solution?
We've been using the solution for about five or more years at this point. It's been a while.
What do I think about the stability of the solution?
The stability and availability are very good. there are no bugs or glitches. It doesn't crash or freeze. it's a reliable solution.
What do I think about the scalability of the solution?
We have it in our infrastructure for around 15 plus users, including Fortinet sites.
We have found that whenever the traffic spikes at peak times, the product automatically scales up to the requirement. We have also implemented the single sign-on it, and therefore, it automatically scales up. We haven't felt any limitations. Currently, we are using it for 1500 plus users. At any given time, there are around 700 plus users available in the office. It's a 24/7 infrastructure. We have tested it for up to 750 plus users, and it's perfectly fine.
How are customer service and technical support?
Technical support is excellent. they are always available, no matter the time of day, or day of the week. We are quite satisfied with their level of support. They are quite helpful and very responsive. I'd rate them at a ten out of ten. They deserve perfect marks.
Which solution did I use previously and why did I switch?
We did not previously use a different solution. When the office was launched we implemented Cisco as a fresh product.
We are using a Cisco ASA Firewall, as well as Sophos at the remote sites. We are using another product is for log collecting. There are three solutions that basically cover us for security purposes. Those, at least, are the physical devices we are using as of now. The rest are cloud solutions such as Nexus.
That said, I personally, have used Sophos XG as a firewall in the past. Sophos is good in terms of traffic blocking and identifying interruptions to the traffic. The features are better on Cisco's side. For example, there is two-factor authentication and a remote VPN. The only benefit I found in Sophos was the way it dealt with the traffic.
How was the initial setup?
The initial setup was not overly complex or difficult. It was quite straightforward and very easy to implement.
Deployment takes about 20 to 25 minutes.
In terms of the implementation strategy, at first, we put up the appliances in the data center. After that, we connected it with the console. After connecting the console, we had an in-house engineer that assisted. Cisco provided us onboarding help and they configured our device for us. We have just provided them the IP address and which port we wanted up. Our initial configuration has been done by them.
What about the implementation team?
While most of the setup was handled in-house, we did have Cisco help us with the initial configurations.
What was our ROI?
The ROI we are getting from Cisco ASA is higher availability, which we are getting all the time. On top of that, it's good at blocking traffic and protecting us from cyber-crime issues.
What's my experience with pricing, setup cost, and licensing?
The pricing is pretty reasonable. it's standard and comparable to other solutions. The maximum difference between products might be $20 to $40. It's not much of a difference.
Which other solutions did I evaluate?
We did not evaluate other solutions. We trust Cisco. It's a very good product and well known in the market.
What other advice do I have?
We are a customer and an end-user.
We are using physical Cisco appliances.
We use a lot of Cisco products, Cisco router (the 3900-series routers), and Cisco switches.
In the next quarter, we will implement SD-WAN. Once the SD-WAN is implemented, then we will go with an automated policy and DNS kinds of tools. We are in the process of upgrading to Cisco ASA Firepower in the next quarter. We have not integrated Cisco ASA with Cisco's SecureX solution.
I'd recommend the solution, especially for medium-sized or larger companies and those who are looking for long-term solutions (for example those with a user base of around 2,000 plus users in and around 20 plus applications). It's reliable and offers users a lot of features. This helps companies avoid having to rely on other third-party solutions.
If you are new to Cisco, you should take advantage of the education they have on offer. Cisco provides access to training and it's worth taking advantage of this.
Overall, I'd are the solution at a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Cosultant at Kadaster
Stable with a straightforward setup and good overall features
Pros and Cons
- "The implementation is pretty straightforward."
- "In a future release, it would be ideal if they could offer an open interface to other security products so that we could easily connect to our own open industry standard."
What is our primary use case?
The solution is primarily used for protecting the environment, or the cloud environments for our customers.
What is most valuable?
All the specific features you find within the NextGen firewall are quite useful. The touch intel feature is specifically useful to us. We deliberately choose this kind of product due to its set of features.
The implementation is pretty straightforward.
What needs improvement?
The security market is a fast-changing market. The solution needs to always check if the latest threats are covered under the solution.
It would always be helpful if the pricing was improved upon a bit.
In a future release, it would be ideal if they could offer an open interface to other security products so that we could easily connect to our own open industry standard.
For how long have I used the solution?
We've been using the solution for about five or more years at this point.
What do I think about the stability of the solution?
The solution is stable. It's very reliable. It doesn't crash or freeze and doesn't seem to be plagued by bugs or glitches.
What do I think about the scalability of the solution?
The solution can scale quite well. A company that needs to expand it can do so easily.
In our case, we have clients with anywhere between 1,000 and 10,000 users.
How are customer service and technical support?
We have our own in-house team that can assist our clients should they need technical support. They're quite knowledgeable and can handle any issues.
Which solution did I use previously and why did I switch?
I also have experience with Fortinet and Check Point.
How was the initial setup?
The implementation isn't complex. It's straightforward. However, it also depends on the specifications of the customer. Normally we check that out first and then we can make a judgment of how to best implement the solution.
Typically, the deployment takes about two days to complete.
In terms of maintenance, we have about five people, who are engineers, who can handle the job.
What about the implementation team?
We deliver the solution to our customers.
What's my experience with pricing, setup cost, and licensing?
You do need to pay for the software license. In general, it's a moderately expensive solution. It's not the cheapest on the market.
What other advice do I have?
We're a partner. We aren't an end-user. We are a managed security provider, and therefore we use this solution for our customers.
We always provide the latest version of the solution to our clients.
Typically, we use both cloud and on-premises deployment models.
I'd recommend the solution to others. It's quite good.
On a scale from one to ten, I would rate it at an eight.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Supervisor of Computer Operations at Neil McFadyen
Setting up rules for HTTPS and SSH access to the management interface are straightforward
Pros and Cons
- "I am used to the ASA syntax, therefore it is quite easy to make up new rules. I have found that DNS doctoring rules are useful."
- "I found that setting up rules for HTTPS and SSH access to the management interface are straightforward, including setting the cypher type."
- "10Gb interfaces should be available on more models."
- "It is surprising that you need to have a virtual appliance for the Firepower Management Center. It is not good if you have to setup a VMware server just for it."
- "It is confusing to have two management interfaces, e.g., ASDM and Firepower Management Center."
What is our primary use case?
We use it for our university department firewall. It replaced our 12-year-old Cisco ASA 5520, which used to protect web servers, mail servers, SVN repositories, office computers, research computers, and computer labs. It was used for blocking the internet for exams. It was not used for IPS, so we did not buy the new threat protection or malware license. We connected it to a Layer 3 switch for faster Inter-VLAN routing.
How has it helped my organization?
It works better through specs than our old ASA 5520. It seems to perform the same functionality unless you buy the additional threat protection licenses, so this is a disappointment. I found a bug where the ASDM could not be used with Windows 2016, but it did work with Windows 10.
What is most valuable?
- Most of same old ASA 5520 config could be used for the new 5516-X model. The ASDM interface is improved and can also be configured to the Firepower settings.
- I am used to the ASA syntax, therefore it is quite easy to make up new rules. I have found that DNS doctoring rules are useful, and I am not sure how other firewalls handle the issue of internal versus external DNS, so this was a reason to keep the same type of firewall.
- Customizing logging event of syslog to feed into Splunk is very useful for management and monitoring just for the importance events instead of a huge stream of thousands of unneeded events.
- I found it quite easy to block computers from the internet, e.g, in a computer lab with students doing an exam using software for the course when needed.
- I use access to a list to block IPs which have attacked our web servers on the outside interface, since I do not have IPS.
- I found that setting up rules for HTTPS and SSH access to the management interface are straightforward, including setting the cypher type.
- It is very useful to use the command line interface for modifying or adding to the config because sometimes the ASDM interface is hard to find when the setting is more complicated.
- The text config file is great to have, to know what is in the config, instead of having to check every setting in the GUI.
- While the CLI is used the most, sometimes the ASDM is faster and easier to use to set some settings.
What needs improvement?
- It is confusing to have two management interfaces, e.g., ASDM and Firepower Management Center. It would be nice to have a Windows program instead of a virtual appliance for the Firepower Management Center. The ASA and Firepower module seem redundant, not sure which one to set the rules in, but maybe that was for backward compatibility. I am not sure that is very useful.
- It is surprising that you need to have a virtual appliance for the Firepower Management Center. It is not good if you have to setup a VMware server just for it.
- 10Gb interfaces should be available on more models.
For how long have I used the solution?
Still implementing.
What's my experience with pricing, setup cost, and licensing?
ASA pricing seems high compared to other firewalls, such as the Sophos XG models.
The licensing features are getting more complicated. These should be simplified.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Systems Engineer at a engineering company with 5,001-10,000 employees
A ubiquitous and easy-to-deploy product with a good support team
Pros and Cons
- "The solution is pretty easy to deploy."
- "I would like to see an IE version of the solution where it is ruggedized."
What is our primary use case?
I'm a design consultant. We primarily use the product to secure various client networks, major infrastructure, highways, and urban surveillance.
What is most valuable?
The solution is pretty easy to deploy. It is pretty ubiquitous too, so it is easy to get. It pretty much does the job we need it to do.
What needs improvement?
I would like to see an IE version of the solution where it is ruggedized. Most of what we do is infrastructure based on highways. Now that the product has a hardened switch, the only thing left in our hubs that isn't hardened is probably the firewall. It would be nice to pull the air conditioners out of the hubs.
For how long have I used the solution?
I have been using the solution for 20 years.
What do I think about the stability of the solution?
I've never had a stability problem with firewalls.
What do I think about the scalability of the solution?
The solution seems to be very scalable. I probably don't have much experience with scalability because, by the nature of how our networks work, we don't scale them; we just add another one.
How are customer service and support?
Support is very good. I've never had a problem with any form of support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used only a couple of other products over the years due to client preference. In general, Cisco Secure Firewall is easier to deploy mostly because of the depth of personnel trained in it. Every other product seems to be a niche thing that two people know, but Cisco once again seems ubiquitous throughout the industry. Our customers choose Cisco for various reasons, from cost to a preference for Cisco. It meets the task that they need to meet. It's really the spectrum.
How was the initial setup?
The deployment is pretty straightforward. It's the same as deploying any other Cisco equipment. If you know what you're doing, it's not a huge deal.
What was our ROI?
I believe our clients have seen an ROI. Their networks are more secure. Various agencies have tested a few of them to prove it, and they've proven okay. Since they weren't attacked, they have received an ROI.
What's my experience with pricing, setup cost, and licensing?
The licensing is not so bad. The solution’s pricing could be lower. It's not horrible, though.
What other advice do I have?
The application visibility and control are pretty good. It seems to do everything we've ever needed it to do. I've never asked the product to do something that it couldn't do. The solution has been pretty successful at securing our infrastructure from end to end. Most of our client’s staff have reported that the product is not as maintenance intensive as they would like. They never had to deal with maintenance before, but now they do. We deploy new systems for our clients.
I haven't had much experience with Cisco Talos directly. I know it's there, but I haven't really been involved. I haven't experienced it, which I believe is a good thing. It's doing its job if I don't have to get involved with it. The product has definitely helped improve our organization’s cybersecurity resilience. We weren't secure at all before, and we are a known target since we’re based in infrastructure. The solution has been very helpful in providing security.
It is a good product. I would definitely look into it. There is great value in going to a partner to a reseller to deploy the product. They understand the equipment and have expertise. Normally, they're local, so local knowledge is always useful. They have done deployments before, so sometimes they know tips or tricks that aren't in the manuals.
People evaluating the solution should give it a look. Definitely, it is worth taking a look at it.
Overall, I rate the product a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Senior Network Architect at a tech services company with 10,001+ employees
A stable and secure solution that works well
Pros and Cons
- "Cisco tech is always good and helpful. I would rate them as 10 out of 10."
- "Cisco ASA is starting to get old and Firepower is taking over. All the good things happening are with Firepower."
What is our primary use case?
We are using it for security on everything from small customers to big data centers.
How has it helped my organization?
It is stable. We saw benefit from this in just a few days.
What is most valuable?
Cisco AnyConnect is my favorite. It is awesome. It also exists on Firepower and newer things.
What needs improvement?
Cisco ASA is starting to get old and Firepower is taking over. All the good things happening are with Firepower. Everything that I could wish for is in Firepower. We will probably not be doing too many new installations of ASAs since Firepower is mostly taking over.
For how long have I used the solution?
I have been using it for 15 to 20 years.
What do I think about the stability of the solution?
It is stable and secure. There are a few bugs, etc. Overall, we are very happy with it. We have never looked at anything else because it works so well. I would rate the stability as 10 out of 10. It is very good.
There is maintenance. We have to keep an eye out for software upgrades and forced changes to the configuration. We have a network operations team of 15 people who take care of these things from day to day.
What do I think about the scalability of the solution?
The solution's scalability is very good.
We use it on customers who have two employees up to customers with 5,000 employees. It is also used for customers who have one site or several sites. It is all over the place
How are customer service and support?
Cisco tech is always good and helpful. I would rate them as 10 out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I didn't use another solution previously.
How was the initial setup?
All our deployments have been different. Some have been really easy and others have been really complex. It could go either way: some are complex and some are easy. The complex solutions could take days or a couple of weeks to deploy. Easy solutions take a day.
If it was a big project, there would be a pre-project identifying what we were going to do and making a plan for it, then we would realize that plan. If it was a smaller thing, we would just jump into it.
What about the implementation team?
It was deployed in-house. Depending on the solution and its complexity, it could take a single person to a team of 20 people to deploy it.
What was our ROI?
Our return on investment is having a network that we don't need to think too much about. It works, and that is it.
What's my experience with pricing, setup cost, and licensing?
Cisco is always expensive, but you get what you pay for. It is expensive for a reason. It is a good solution, and good solutions cost money.
AnyConnect is an extra license. If you want the IDS/IPS things, those are usually extra too.
Which other solutions did I evaluate?
I evaluated Check Point, Palo Alto, and Fortinet, but Cisco won the race. Since we were already running most of our other networking with Cisco, it felt natural to land on Cisco.
What other advice do I have?
I would rate the solution as 10 out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Lead Network Engineer at a government with 1,001-5,000 employees
Stable and scalable with very responsive technical support
Pros and Cons
- "It's got the capabilities of amassing a lot of throughput with remote access and VPNs."
- "They need a VTI. I know it's going to be available in the next software version, which is the 6.7 version. However, the problem with that is that the 6.7 is going to deprecate all the older IKEv1 deployment tunnels. Therefore, the problem is that we have a lot of customers which are using older encryptions. If I do that, update it, it's not going to work for me."
What is our primary use case?
The way we've installed Firepower was for the migration process. For example, there was a data center consolidation, and therefore we had to move everything. We offer data center products to our customers across VPN funnels. We had to move away from older ASAs, so it's a lift and shift. We move older ASAs, which were dispersed in many sites, and we consolidated a couple of services in a single site. Firepower was left there in place. I came in and I took over the administration duties, and now I'm trying to put everything together in a way that it makes sense.
With Firepower, they have better hardware. It's fitted for more throughput, more load. I'm trying to centralize service delivery on this high-availability pair and move all the remote access to Firepower. Then, it's all part of a transition process from a hybrid cloud to a full cloud deployment on a cloud provider. It's mostly just a necessary pain, until we move away from our on-prem deployments. Currently, I'm working with Azure, etc. and I try to look at the main design of the whole process, even though it's going to take two years.
COVID has also made everything very, very slow for us as we try to move away from our initial plan.
What is most valuable?
The 2100 models are extremely useful for us.
It's got the capabilities of amassing a lot of throughput with remote access and VPNs.
What needs improvement?
They need a VTI. I know it's going to be available in the next software version, which is the 6.7 version. However, the problem with that is that the 6.7 is going to deprecate all the older IKEv1 deployment tunnels. Therefore, the problem is that we have a lot of customers which are using older encryptions. If I do that, update it, it's not going to work for me.
For how long have I used the solution?
We've been using the solution for about a year.
What do I think about the stability of the solution?
The solution is pretty solid in terms of stability, however, I prefer Palo Alto. For the enterprise world, it's better to have Palo Alto. For the service provider field, Firepower is quite well suited, I'd say. That said, Palo Alto, is definitely the enterprise way to go. For a smaller deployment, you can also go with FortiGate. It's simple, however, it works for smaller offices.
What do I think about the scalability of the solution?
The scalability of the product is pretty good. If you need to expand it, you can do so with relative ease.
How are customer service and technical support?
The technical support is amazing. They do reply quickly, and often within an hour. It's been great. I've worked at Cisco before, however, with the type of contract we are in, I find it super fast right now. We're quite satisfied with the level of support.
What's my experience with pricing, setup cost, and licensing?
I don't have any knowledge as to what the product costs. It's not part of the business I deal with.
Palo Alto, it's my understanding, is a little more expensive, however, it depends on the users and on the design. It always depends on the contract
What other advice do I have?
We're just customers. We don't have a business relationship with Cisco.
It's a solid, reliable product, however, if it's right for a company depends on the use case and the size of the organization. For a startup, this might not be a suitable option.
Overall, I'd rate this solution nine out of ten. As a comparison, if I was rating Palo Alto, I would give it a ten out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: April 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Palo Alto Networks NG Firewalls
Check Point NGFW
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Fortinet FortiGate-VM
SonicWall NSa
Sophos XGS
Untangle NG Firewall
Fortinet FortiOS
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?
Have you checked out Fortinet's Fortigate UTM appliances and Security Fabric? They wiill save you money and provide more security.