We performed a comparison between Cisco IOS Security and Cisco Secure Firewall based on real PeerSpot user reviews.
Find out in this report how the two Firewalls solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI."Virtual Domains (VDOMs) are a feature that we found valuable."
"The technical support in our region is excellent."
"User-friendly and affordable security solution that's recommended for SMB customers. This solution has good technical support."
"UTM/NGFW features and FortiCloud for logs and backups are awesome."
"Fortinet FortiGate has many valuable features, such as IDS, and intrusion detection. It has security features that are in part with the technologies that are available in the market."
"The initial setup is straightforward."
"Fortinet FortiGate is user-friendly and affordable."
"FortiGate firewalls are easy to manage through a user-friendly web interface. They also have advanced features like DDoS and DLP. However, I wouldn't recommend enabling all of these features on one device because it can cause performance issues."
"The most valuable feature of Cisco IOS Security is posturing."
"Cisco IOS Security has many good features, but compared to other solutions, it has a more user-friendly interface with steps to apply and manage rules. Another good part of the solution is that it's more straightforward."
"The product has valuable features for business intelligence."
"What I have used the most and received the most benefit from is the IPsec technology."
"There is a positive impact on security, particularly the intrusion feature, which helps keep the solution concealed and secure."
"I've found their network routing to be very good."
"Cisco IOS Security is very robust and works very well."
"The hardware is pretty stable. It's also a very good product performance-wise. Initially, it wasn't mature like a firewall and there were other leaders, but now they have included almost all the features of next-generation security. Basically, it's a good product to work with."
"The architecture of FTD is great because it has an in-depth coverage and because it uses the AVC, (Application, Visibility, and Control) and also rate limits. Also, the architecture of fast paths is great."
"Very good as a stateful inspection firewall."
"It's a flexible solution."
"IPS and Snort are very important because they also differentiate Cisco from other vendors and competitors."
"A good intrusion prevention system and filtering."
"Strong in NAT and access-lists."
"The IP filter configuration for specific political and Static NAT has been most valuable."
"There are no issues that we are aware of. It does its job silently in the background."
"I think the only issue that needs improvement is the interface."
"In terms of what could be improved, the SD-WAN is quite difficult, because if you install the new box, 15 is okay, but if you change from an old configuration, if there is already configuration and a policy when you change to SD-WAN, you must change the whole policy that you see in the interface."
"The support is the main thing that needs to be improved."
"One area for improvement is the performance on bandwidth demands for smaller devices, as well as better web filtering."
"Scalability for Fortinet FortiGate needs to be improved. SD-WAN security for this solution also needs some improvement."
"Cisco Meraki products are rising very quickly in the cloud and the connected era. Meraki products offer much better ROI, upgradability, and manageability."
"The process of configuring firewall rules appears excessively complex."
"I think that the infrastructure for the VPN could be improved. The way that it is bundled also made it difficult to use and sell as it is too expensive."
"With respect to user-friendliness, it is a command-line interface and those with such experience will get along just fine, whereas others may struggle."
"The product's technical support services need improvement."
"If they could increase the performance a little better because the device sometimes gets slow."
"In the security portfolio from Cisco, the issue is marketing. Cisco is still seen primarily as an enterprise network player rather than being acknowledged as a security vendor."
"The user interface needs to be improved."
"The routers, don't have like long-term tendency features, or higher availability features available for the IOS. It could also use a better user interface."
"The solution is complex and can be more user-friendly."
"I would love it if it has a link-by-link feature, integration with Unified Threat Management (UTM), and load balancers. They haven't got any link-by-link feature right now, which can be a very attractive option. This link-by-link feature can also be made available for Cisco's UTM firewalls. The link-by-link feature is available in some of the other firewalls. Currently, integration with UTM is missing. Cisco IOS Security also doesn't have the load balancers and a few things that need to be done to get a good UTM firewall. Normally, other firewalls have UTM. As a next-generation firewall, it's good, but as a UTM, it has to do some work."
"The ability to better integrate with other tools would be an improvement."
"When we first got it, we were doing individual configuring. Now, there is a way to manage from one location."
"Security must be increased when a new user connects over the LAN and an alarm must be generated."
"Web filtering needs improvement because sometimes the URL is miscategorized."
"In Firepower, there is an ability to search and dig into a search, which is nice. However, I'm not a super fan of the way it scrolls. If you want to look at something live, it's a lot different. You're almost waiting. With the ASDM, where it just flows, you can really see it. The second someone clicks something or does something, you'll see it. The refresh rate on the events in Firepower is not as smooth."
"The artificial intelligence and machine learning (behavioral based threat detection), which I can this will be coming out in another year, these are what we need now."
"We don't have any serious problems. The firewall models that we have are quite legacy, and they have slower performance. We are currently investigating the possibility of migrating to next-generation firewalls."
"I think the ASA layer is thin. It's always Layer 3 or Layer 4 source controller and doesn't control the Layer 7 traffic. It's important, and you'll need an additional firewall."
Cisco IOS Security is ranked 22nd in Firewalls with 47 reviews while Cisco Secure Firewall is ranked 4th in Firewalls with 404 reviews. Cisco IOS Security is rated 8.0, while Cisco Secure Firewall is rated 8.2. The top reviewer of Cisco IOS Security writes "User-friendly and excels in documentation, making it easier to resolve issues". On the other hand, the top reviewer of Cisco Secure Firewall writes "Highlights and helps us catch Zero-day vulnerabilities traveling across our network". Cisco IOS Security is most compared with Meraki MX, Fortinet FortiOS, Netgate pfSense, OPNsense and Palo Alto Networks URL Filtering with PAN-DB, whereas Cisco Secure Firewall is most compared with Palo Alto Networks WildFire, Netgate pfSense, Meraki MX, Sophos XG and Palo Alto Networks NG Firewalls. See our Cisco IOS Security vs. Cisco Secure Firewall report.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.