Our use for Cisco Secure is for the firewall.
Senior Consultant at Velocis Systems
Enables us to have network segmentation
Pros and Cons
- "Network segmentation is the most valuable feature."
- "The dashboard can be improved."
What is our primary use case?
What is most valuable?
Network segmentation is the most valuable feature.
What needs improvement?
The dashboard can be improved.
For how long have I used the solution?
I have been using Cisco Secure Firewall for seven years.
Buyer's Guide
Cisco Secure Firewall
July 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,490 professionals have used our research since 2012.
What do I think about the stability of the solution?
It is stable.
What do I think about the scalability of the solution?
It is scalable. A thousand-plus users are using the solution in my company.
How was the initial setup?
The initial setup is straightforward.
What's my experience with pricing, setup cost, and licensing?
Pricing is high.
What other advice do I have?
Overall, I rate the product an eight out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Integrator

CTO at a government with 10,001+ employees
Does what we need to do and when we need to do it
Pros and Cons
- "Cisco Secure Firewall is robust and reliable."
- "The process of procuring modern-day technology within the DOD needs to improve."
What is our primary use case?
We use Cisco Secure Firewall for traditional firewall use cases, like VPN, segmenting of traffic, and creating PPSs.
How has it helped my organization?
We need reliable communication to do what we do, and that's very important. The solution does what we need to do and when we need to do it. It has a great reputation for the support that we need because if things don't work within the Department of Defense, people don't survive. Communication and keeping the adversary out are key components of our work. So we need a robust, reliable, and secure product, and that's what Cisco provides us.
What is most valuable?
Cisco Secure Firewall is robust and reliable.
What needs improvement?
The process of procuring modern-day technology within the DOD needs to improve.
For how long have I used the solution?
I've spent quite a few years with Cisco Secure Firewall.
What do I think about the stability of the solution?
Cisco Secure Firewall is a very stable solution.
What do I think about the scalability of the solution?
Cisco Secure Firewall is a very scalable solution.
How are customer service and support?
Cisco Secure Firewall's technical support is great, reliable, and responsive.
How would you rate customer service and support?
Positive
What was our ROI?
We have seen a return on investment from using Cisco Secure Firewall. From the DOD's perspective, we need a reliable and robust solution that has to be reliable in real-time. Cisco Secure Firewall is a reliable solution that works when needed.
What other advice do I have?
Cisco Secure Firewall is a great scalable, secure, and robust product.
There is a dedicated team designed to handle firewalls.
I have a good impression of Cisco Talos and its effects on our security operations. They have a great reputation for doing a lot of great things.
Cisco Secure Firewall has helped our organization improve its cybersecurity resilience.
Overall, I rate Cisco Secure Firewall nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Cisco Secure Firewall
July 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,490 professionals have used our research since 2012.
Systems Engineer at a engineering company with 5,001-10,000 employees
A ubiquitous and easy-to-deploy product with a good support team
Pros and Cons
- "The solution is pretty easy to deploy."
- "I would like to see an IE version of the solution where it is ruggedized."
What is our primary use case?
I'm a design consultant. We primarily use the product to secure various client networks, major infrastructure, highways, and urban surveillance.
What is most valuable?
The solution is pretty easy to deploy. It is pretty ubiquitous too, so it is easy to get. It pretty much does the job we need it to do.
What needs improvement?
I would like to see an IE version of the solution where it is ruggedized. Most of what we do is infrastructure based on highways. Now that the product has a hardened switch, the only thing left in our hubs that isn't hardened is probably the firewall. It would be nice to pull the air conditioners out of the hubs.
For how long have I used the solution?
I have been using the solution for 20 years.
What do I think about the stability of the solution?
I've never had a stability problem with firewalls.
What do I think about the scalability of the solution?
The solution seems to be very scalable. I probably don't have much experience with scalability because, by the nature of how our networks work, we don't scale them; we just add another one.
How are customer service and support?
Support is very good. I've never had a problem with any form of support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used only a couple of other products over the years due to client preference. In general, Cisco Secure Firewall is easier to deploy mostly because of the depth of personnel trained in it. Every other product seems to be a niche thing that two people know, but Cisco once again seems ubiquitous throughout the industry. Our customers choose Cisco for various reasons, from cost to a preference for Cisco. It meets the task that they need to meet. It's really the spectrum.
How was the initial setup?
The deployment is pretty straightforward. It's the same as deploying any other Cisco equipment. If you know what you're doing, it's not a huge deal.
What was our ROI?
I believe our clients have seen an ROI. Their networks are more secure. Various agencies have tested a few of them to prove it, and they've proven okay. Since they weren't attacked, they have received an ROI.
What's my experience with pricing, setup cost, and licensing?
The licensing is not so bad. The solution’s pricing could be lower. It's not horrible, though.
What other advice do I have?
The application visibility and control are pretty good. It seems to do everything we've ever needed it to do. I've never asked the product to do something that it couldn't do. The solution has been pretty successful at securing our infrastructure from end to end. Most of our client’s staff have reported that the product is not as maintenance intensive as they would like. They never had to deal with maintenance before, but now they do. We deploy new systems for our clients.
I haven't had much experience with Cisco Talos directly. I know it's there, but I haven't really been involved. I haven't experienced it, which I believe is a good thing. It's doing its job if I don't have to get involved with it. The product has definitely helped improve our organization’s cybersecurity resilience. We weren't secure at all before, and we are a known target since we’re based in infrastructure. The solution has been very helpful in providing security.
It is a good product. I would definitely look into it. There is great value in going to a partner to a reseller to deploy the product. They understand the equipment and have expertise. Normally, they're local, so local knowledge is always useful. They have done deployments before, so sometimes they know tips or tricks that aren't in the manuals.
People evaluating the solution should give it a look. Definitely, it is worth taking a look at it.
Overall, I rate the product a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Global Network Architect at a agriculture with 10,001+ employees
Secures our infrastructure and the OT network very well, and meets our scalability requirements
Pros and Cons
- "It's protecting the organization against the impact of cyber threats and cybersecurity. We run manufacturing plants that have hazardous material, and we don't want that manufacturing process to be impacted by break-in exposure, cyber threats, or any other similar thing."
- "We would like to be able to manage a set of firewalls rather than individual firewalls. We haven't really looked into it or yet implemented it, but a single pane of glass would be helpful. We also use another vendor's firewalls, and they have a centralized management infrastructure that we have implemented, which makes it a little bit easier when you're managing lots of firewalls."
What is our primary use case?
The primary use case is as one-layer protection of our OT network. The way we're set up is that we have our OT network behind the commercial network, and we do dual firewalls. We've Cisco firewalls on the commercial network side and a different vendor and a different management group on the OT network side.
How has it helped my organization?
It's a good solution. It's in some ways a reactive solution where we have it sitting in a whitelist mode rather than a blacklist mode. So, we are blocking everything and permitting specific things, and it seems to work fairly well for us.
It hasn't necessarily freed up the time, but it has helped in securing the infrastructure and the OT network behind it. The intent of this particular solution is not time-saving. It's not a cost solution. It's meant to isolate and control access to and from a specific set of infrastructure.
It allows us to get access. We're seeing more and more that business systems like SAP are looking to get access to OT systems, and this is how our systems get that.
What is most valuable?
It's protecting the organization against the impact of cyber threats and cybersecurity. We run manufacturing plants that have hazardous material, and we don't want that manufacturing process to be impacted by break-in exposure, cyber threats, or any other similar thing.
What needs improvement?
We would like to be able to manage a set of firewalls rather than individual firewalls. We haven't really looked into it or yet implemented it, but a single pane of glass would be helpful. We also use another vendor's firewalls, and they have a centralized management infrastructure that we have implemented, which makes it a little bit easier when you're managing lots of firewalls.
For how long have I used the solution?
We've been using Cisco firewalls for 10 years or more.
What do I think about the stability of the solution?
It has been a very stable solution. If you keep it up to date and do sensible management on it, it's a very stable solution.
What do I think about the scalability of the solution?
So far, in this use case, it has met our scalability requirements in terms of traffic and management.
How are customer service and support?
We have an excellent account team, and they go to bat for us inside of Cisco. We also have access to TAC and things like Smart Net, and all that seems to go very well. It's a good team. I'd rate them a nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We weren't using anything similar in this particular use case. We chose Cisco because they originally came on the recommendation of our networking partner. They came in with a strong recommendation from a strong partner.
How was the initial setup?
I wasn't involved in its deployment. That was before I started working in this space.
What was our ROI?
In this specific use case, the biggest return on investment is that we do not have incidents, and this ultimately, in some of our factories, ends up being a health and human-safety use case.
What's my experience with pricing, setup cost, and licensing?
We've gone to all smart licensing, so that works well.
What other advice do I have?
Understand what you're trying to protect and what you're trying to protect it from, and then also understand how the solution is managed.
I'd rate Cisco Secure Firewall a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Solution Architect at Dimension Data
Excellent support, seamless integration, and great intelligence for security insights
Pros and Cons
- "It integrates with various Cisco security portfolios and products, and there is an easy and seamless integration for building a complete security framework for our customers."
- "We see a lot of vendors in the market with a lot of niche products. I understand that it's difficult to cover everything, but making it more open for integration with other vendors would be a value add for Cisco."
What is our primary use case?
We have consulting engineers at the backend. We have our own SOC. We leverage Cisco solutions, and we add our services on top of them.
We also sell FTDs and Cisco firewalls ranging from the old models to the new models. We have Firepower from series 1000 to 4000.
A client of ours has a campus network. They're running all of their offices, branches, and multiple sites. They are managing all of their traffic through one point, and that point is secured.
How has it helped my organization?
It integrates with various Cisco security portfolios and products, and there is an easy and seamless integration for building a complete security framework for our customers.
It's a great intelligent platform where we can pull all the security insights.
What is most valuable?
The technology is evolving, and it's no more a stateful firewall, which is only for blocking certain ports. A lot of features, such as anti-malware protection and URL filtering, have been integrated into the firewall and extended to the network.
What needs improvement?
We see a lot of vendors in the market with a lot of niche products. I understand that it's difficult to cover everything, but making it more open for integration with other vendors would be a value add for Cisco. Usually, the case I see with my customers is that they always have a multi-vendor setup for security. They have many products. When they have multiple products, each product does something very specific standalone, but there is always a challenge in how to correlate all these solutions or make them as one framework for securing the network.
How are customer service and support?
Their support is perfect. When I used to be an engineer, Cisco's tech support was such a great help. Everything is well-defined in terms of services and SLAs as compared to other vendors. Cisco is doing a great job across all portfolios. This is what makes Cisco stand out as a vendor as compared to the rest. I'd rate their support a nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We had another product previously. All the vendors are doing a great job in security, but Cisco has such a big portfolio, and as a reseller, it's easy for us to be a one-stop shop for the customer covering wired and wireless networks, endpoint security, and so on. That's the main advantage of Cisco nowadays.
How was the initial setup?
These firewalls are deployed on-premises. We offer all the latest versions. We always advise customers to be updated with the latest technology. That's the aim of our business, but I have not been a part of the deployment.
What was our ROI?
My role is mainly technical, but on the business side, there would be an ROI in terms of seeing the clients happy.
Our clients are happy. They always get an update about the roadmap and the features that Cisco is releasing down the road. Cisco is always ahead of others not only in terms of security but also in terms of portfolio.
What's my experience with pricing, setup cost, and licensing?
Everything comes with a price. Security is something on which you cannot compromise because the loss could be massive. I see CTOs and CSOs spending a lot on that. Cisco is not really cheap, but there is great technology behind it.
What other advice do I have?
The main value we add as Cisco resellers is our consulting services. We have consulting engineers on the backend and we have our own SOC. We leverage Cisco, and on top of that, we add our services, which makes it a great collaboration between every successful system integrator, reseller, and vendor.
I'd advise asking for a demo and getting involved or engaged with the product to see its value. Don't just read about it.
Overall, I'd rate Cisco Secure Firewall a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Head of IT Network Fixed & Mobile at OTE Group
Provides valuable exportability and smooth migrations
Pros and Cons
- "The feature my customers find the most valuable is the exportability."
- "We have seen some bugs come up with Cisco Secure Firewall in terms of high availability. The solution should be improved to avoid these bugs."
What is our primary use case?
Our customers for the most part use this solution in data centers.
What is most valuable?
The feature my customers find the most valuable is the exportability. They also appreciate that the IPS features are easily migrated from Cisco SA to FTDs.
What needs improvement?
We have seen some bugs come up with Cisco Secure Firewall in terms of high availability. The solution should be improved to avoid these bugs.
For how long have I used the solution?
We have been using Cisco Secure Firewall for almost a decade.
How are customer service and support?
Cisco's support is much better than other vendors' support. In my opinion, this is a big advantage for Cisco. The support Cisco offers is upper-level.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We previously sold Fortinet devices. However, many of our clients switched over to Cisco because of the price as they are quite cheap.
How was the initial setup?
We are in the middle of a migration plan to Cisco right now in our company. I am not directly involved. We are working with a Cisco partner but I have been communicating our needs to them. However, I believe the migration process will be smooth for our company. It is crucial to have a solid migration plan in place because we are a core data center, so we have to be careful.
What about the implementation team?
We are deploying with the help of a partner.
What was our ROI?
We do see a lot of ROI from Cisco Secure Firewall. We are in the process of migrating a lot of end-of-support devices with some new ones and the return on investment is there.
What's my experience with pricing, setup cost, and licensing?
Price is a big selling point for Cisco Secure Firewall. They are quite affordable and many clients chose them precisely for this reason.
What other advice do I have?
This solution helped my clients save money and time. My clients save 50% on time thanks to automation and processing brought on by this solution.
I have only good things to say about Cisco Talos. It has been quite helpful to our customers.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
VSO at a computer software company with 501-1,000 employees
Good encryption and decryption with decent dashboards
Pros and Cons
- "We found the initial setup to be easy."
- "Maybe the dashboard could be a bit better."
What is our primary use case?
This is an SSL that can decrypt and encrypt SSL traffic.
What is most valuable?
The ability to encrypt and decrypt is great.
The dashboards are excellent.
We really like the reporting aspect of the product.
It is stable.
We found the initial setup to be easy.
What needs improvement?
Maybe the dashboard could be a bit better. There are some reports where we don't get it. We need a deep dive into a particular URL, however, it provides the URL and the IP address, and there is no more information that can show more details. Basically, the report models can be improved.
With their console, we have to build a separate VM. In some of the products, the management console comes along with the box itself. It'll be one solution to take the backup and keep it. Even if you want to build a DR, it'll be easy. However, the challenge we had is if that VM is down, my team may not able to access the Firepower remotely. Therefore, the management console itself should be built within the Firepower box itself, rather than expecting it to be built in a separate VM.
For how long have I used the solution?
I've been using the solution for more than four years.
What do I think about the stability of the solution?
We have not, as of now (touch wood) faced any issues. It's stable, and we don't face any performance issues as well. It's reliable. There are no bugs or glitches. It doesn't crash or freeze.
What do I think about the scalability of the solution?
At this moment, we have not thought through scaling. The model which we use is less than 60%. What I heard from them is you can cascade it to another box, and scaling can be done.
We have between 400 to 450 concurrent users on a daily basis accessing this box. Overall, we have 2,000 devices that could be easily communicated via Firepower.
How are customer service and support?
Technical support is good. We've found it to be quite good in general.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is great. It's very easy and quite straightforward. If you understand the process, it is very easy. I'd rate it a 4.5 out of five in terms of ease of implementation.
What's my experience with pricing, setup cost, and licensing?
I don't manage licensing. I can't speak to the actual cost of the product.
What other advice do I have?
We're a customer and end-user.
I'd recommend the solution to organizations that have around 1,500 people that need to access the solution.
I would rate the solution a nine out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network Support Engineer at a manufacturing company with 51-200 employees
Poor upgrade process can result in network failure, but the threat defense works well and it is scalable
Pros and Cons
- "Cisco's technical support is the best and that's why everybody implements their products."
- "The main problem we have is that things work okay until we upgrade the firmware, at which point, everything changes, and the net stops working."
What is our primary use case?
We primarily use this firewall for IPS, IAM, threat defense, and NAT.
I am from the networking department.
How has it helped my organization?
We are using the Firepower Management Center (FMS) and the management capabilities are okay. I would not say that they are good. The current version is okay but the earlier versions had many issues. The deployment also takes a long time. It takes us hours and in some cases, it took us days. The latest version 6.6.1, is okay and the deployment was quick.
I have tried to compare application visibility and control against Fortinet FortiGate, but so far, I don't see much difference. As I try to determine what is good and what is bad, I am seeking third-party opinions.
What is most valuable?
The most valuable feature is the threat defense. This product works well for threat defense but for everything else, we use Cisco ASA.
What needs improvement?
This product has a lot of issues with it. We are using it in a limited capacity, where it protects our DR site only. It is not used in full production.
The main problem we have is that things work okay until we upgrade the firmware, at which point, everything changes, and the net stops working. As a financial company, we have a lot of transactions and when the net suddenly stops working, it means that we lose transactions and it results in a huge loss.
We cannot research or test changes in advance because we don't have a spare firewall. If we had a spare then we would install the new firmware and test to see if it works, or not. The bottom line is that we shouldn't have to lose the network. If we upgrade the firmware then it should work but if you do upgrade it, some of the networks stop working.
For how long have I used the solution?
We have been using the Cisco Firepower NGFW Firewall for three years.
How are customer service and support?
Cisco's technical support is the best and that's why everybody implements their products. But, when it comes to Firepower, we have had many delays with their support. For all of the other Cisco products, things are solved immediately.
Nowadays, they're doing well for Firepower also, but initially, there was no answer for some time and they used to tell us that things would be fixed in the next version. That said, when comparing with other vendors, the support from Cisco is good.
Which solution did I use previously and why did I switch?
We use a variety of tools in the organization. There is a separate department for corporate security and they use tools such as RedSeal.
In the networking department, we use tools to analyze and report the details of the network. We also create dashboards that display things such as the UP/DOWN status.
We have also worked with Cisco ASA, and it is much better. Firepower has a lot of issues with it but ASA is a rock-solid platform. The reason we switched was that we needed to move to a next-generation firewall.
How was the initial setup?
The initial setup was not easy and we were struggling with it.
In 2017, we bought the Firepower 2100 Series firewalls, but for a year, there was nothing that we could do with them. In 2018, we were able to deploy something and we had a lot of difficulties with it.
Finally, we converted to Cisco ASA. When we loaded ASA, there was a great difference and we put it into production. At the time, we left Firepower in the testing phase. In December 2018, we were able to deploy Firepower Threat Defense in production, and it was used only in our DR site.
What about the implementation team?
We do our own maintenance and there are three or four of us that are responsible for it. I am one of the network administrators. We can also call Cisco if we need support.
What was our ROI?
From the perspective of return on investment, implementing the Firepower 2100 series is a bad decision.
What's my experience with pricing, setup cost, and licensing?
Firepower has a very high cost and you have to pay for the standby as well, meaning that the cost is doubled. When you compare Fortinet, it is a single cost only, so Fortinet is cheaper.
Which other solutions did I evaluate?
Prior to Firepower, we were Cisco customers and did not look to other vendors.
Given the problems that we have had with Cisco, we are moving away from them. We are now trying to implement FortiGate and have started working with it. One thing that we have found is that the Fortinet technical support is very bad.
What other advice do I have?
I would rate this solution a five out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: July 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Cisco Umbrella
Cisco Identity Services Engine (ISE)
Palo Alto Networks NG Firewalls
Check Point NGFW
WatchGuard Firebox
Azure Firewall
SonicWall TZ
Cisco Secure Network Analytics
Juniper SRX Series Firewall
Sophos XGS
Fortinet FortiGate-VM
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?