We compared Cisco Secure Firewall and Azure Firewall based on our users' reviews across several parameters.
Cisco Secure Firewall is regarded highly for its strong security features, user-friendly interface, and seamless integration within Cisco's security ecosystem. Customers appreciate the value they receive for the price paid and the efficient deployment process. Azure Firewall is praised for its competitive pricing, centralized network security management, and high performance in managing traffic. Users find the setup process straightforward, although some face challenges with customization and integration with other services. Both products receive positive feedback on customer service and support.
Features: Cisco Secure Firewall stands out for its robust intrusion detection and prevention system, seamless integration with Cisco's security ecosystem, and powerful threat intelligence capabilities. On the other hand, Azure Firewall is commended for its centralized network security management, seamless integration with Azure services, and high performance in handling large traffic volumes.
Pricing and ROI: Cisco Secure Firewall's setup cost is praised for its straightforwardness, offering users value for money. In comparison, Azure Firewall's competitive pricing and reasonable setup cost are highlighted, with flexible licensing options catering to diverse organizational needs. Cisco Secure Firewall offers a higher ROI with its strong security features and user-friendly interface. Azure Firewall, although cost-effective, lags in advanced security measures and comprehensive features.
Room for Improvement: Cisco Secure Firewall offers enhanced user-friendliness, efficient traffic handling, improved visibility, better integration with security solutions, regular updates, enhanced reporting, and scalability. Azure Firewall needs improvement in setup difficulty, protocol support, rule customization, logging, and integration with Azure services.
Deployment and customer support: Users found Cisco Secure Firewall to have a quicker setup process, emphasizing efficient deployment. Azure Firewall was noted for a longer implementation phase, causing frustration among users and highlighting the delay in establishing the new tech solution. Cisco Secure Firewall boasts efficient and reliable customer service, with users praising the support team's helpfulness and responsiveness. Azure Firewall customers appreciate the team's efficiency and effectiveness in addressing issues.
The summary above is based on 123 interviews we conducted recently with Cisco Secure Firewall and Azure Firewall users. To access the review's full transcripts, download our report.
"I really like the captive portal feature for our guest network. It has nice VLAN features in terms of separating our network. The anti-virus is also good."
"Security management tool that's easy to integrate and easy to work with. No issues found with its stability and scalability."
"The SD-WAN is the most valuable feature."
"The solution is extremely reliable."
"I like that you are able to manage FortiGate from the FortiManager to create a more centralized environment."
"The solution is highly scalable because they have devices that can handle a large amount of traffic."
"The ease of setting the solution up is a valuable aspect for us."
"This is an easy solution to deploy."
"Network filtering is valuable. The scalability capability from the cloud-native service helps us a lot because it simplifies our day-to-day maintenance activity."
"Among the most valuable features are the DDoS protection that protects your virtual machines, the threat intelligence, and traffic filtering."
"Azure's cost-effectiveness is its major advantage."
"One of the notable advantages of Azure Firewall is its user-friendly interface, which closely resembles or shares similarities with other Azure components."
"I can easily configure it."
"I like its order management feature. It doesn't have the kind of threat intelligence that Palo Alto has, but the order management makes it much simpler to know the difference."
"The solution is stable."
"The solution can autoscale."
"It's protecting the organization against the impact of cyber threats and cybersecurity. We run manufacturing plants that have hazardous material, and we don't want that manufacturing process to be impacted by break-in exposure, cyber threats, or any other similar thing."
"The most important feature is the intensive way you can troubleshoot Cisco Firepower Firewalls. You can go to the bit level to see why traffic is not handled in the correct way, and the majority of the time it's a networking issue and not a firewall issue. You can solve any problem without Cisco TAC help, because you can go very deeply under the hood to find out how traffic is flowing and whether it is not flowing as expected. That is something I have never seen with other brands."
"The Adversity Malware Protection (AMP) feature is the most valuable. It is also very easy to use. Every technical user can operate this solution without any difficulty. The dashboard of Cisco Firepower has every tool that a security operator needs. You can find every resource that you need to operate through this dashboard."
"I like its integration with the AnyConnect client. I also like how modular it is. For example, I can easily integrate the Umbrella add-on into it. We are planning on adding Umbrella. We haven't added it yet, but we have researched."
"I have experience with URL filtering, and it is very good for URL filtering. You can filter URLs based on the categories, and it does a good job. It can also do deep packet inspection."
"The most important features are the intrusion prevention engine and the application visibility and control. The Snort feature in Firepower is also valuable."
"Valuable features include DMZ segmentation, and IDS and IPS."
"One of the most valuable features of Firepower 7.0 is the "live log" type feature called Unified Event Viewer. That view has been really good in helping me get to data faster, decreasing the amount of time it takes to find information, and allowing me to fix problems faster. I've found that to be incredibly valuable because it's a lot easier to get to some points of data now."
"With the addition of some features, it is possible that FortiGate can be used in all verticals."
"The visibility of the network can be better. The GUI can be improved for better visibility of the network flow. Other solutions have better GUI in terms of network visibility."
"FortiLink is the interface on the firewall that allows you to extend switch management across all of your switches in the network. The problem with it is that you can't use multiple interfaces unless you set them up in a lag. Only then you can run them. So, it forces you to use a core type of switch to propagate that management out to the rest of the switches, and then it is running the case at 200. It leaves you with 18 ports on the firewall because it is also a layer-three router that could also be used as a switch, but as soon as you do that, you can't really use them. They could do a little bit more clean up in the way the stacking interface works. Some use cases and the documentation on the FortiLink checking interface are a little outdated. I can find stuff on version 5 or more, but it is hard to find information on some of the newer firmware. The biggest thing I would like to see is some improvement in the switch management feature. I would like to be able to relegate some of the ports, which are on the firewall itself, to act as a switch to take advantage of those ports. Some of these firewalls have clarity ports on them. If I can use those, it would mean that I need to buy two less switches, which saves time. I get why they don't, but I would still like to see it because it would save a little bit of space in the server rack."
"Due to its higher cost, Fortinet FortiGate can lead to increased operational expenses."
"The ease of use could be improved."
"The solution lacks multi-language support."
"Scalability for Fortinet FortiGate needs to be improved. SD-WAN security for this solution also needs some improvement."
"We sometimes have issues with FortiGate's routing table in the latest firmware update. We had to downgrade the device because our customers complained about bugs."
"There should be better monitoring and logging. Currently, it is put in Sentinel. It should be more seamless and from the interface."
"Azure Firewall definitely needs a broader feature base. It should be able to go all the way up to layer 7 when looking at applications and things like that."
"For larger enterprises, they need to adjust the scalability."
"Right now, with Azure Firewall, we cannot have a normal inbound traffic flow. For inbound, Microsoft suggests using application gateways, so the options are very limited. I cannot use this firewall as an intermediate firewall because of the limitations, and I cannot point routing to another firewall. So if I want to use back-to-back firewall architecture in my environment, I cannot use Azure Firewall for that type of configuration either."
"An Azure firewall is not a real firewall."
"It's a little heavy compared to a FortiGate or other firewalls."
"There is room for further integration of AI into the system."
"Azure should be able to work better as a balancer also, instead of just being a firewall. It should have a wider mandate."
"There is no support here in Georgia. If something goes wrong, support is not always very helpful with the other firewalls or other products."
"Cisco Secure Firewall’s customer support could be improved."
"The throughput highlighted on the datasheet (10Gbps) should be reviewed. This throughput is only for a UDP running environment, which you will never find in the real world. Rather consider a multiprotocol throughput."
"Integration aspects and traffic shaping need improvement."
"The relatively new Firepower Threat Defense image (mix of ASA and Sourcefire network security) fills a lot of gaps and features that were missing on ASA."
"Setting firewall network rules should be more straightforward with a clearer graphical representation. The rule-setting method seems old-fashioned. The firewall and network rules are separate from the Firepower and web access rules."
"Other products are becoming easier to access and configure. They are providing UI interfaces to configure, take backup, synchronize redundant machines, and so on. It is very easy to take backup and upgrade the images in those products. Cisco ASA should have such features. If one redundant machine is getting upgraded, the technology and support should be there to upgrade other redundant machines. In a single window, we should be able to do more in terms of backups, restores, and upgrades."
"In today's world, cyberattacks have become a common occurrence. However, so far, we have not faced any issues with our systems. I hope the situation remains the same in the future. If Cisco introduces even more advanced security measures, it would be beneficial."
Azure Firewall is ranked 21st in Firewalls with 33 reviews while Cisco Secure Firewall is ranked 4th in Firewalls with 404 reviews. Azure Firewall is rated 7.2, while Cisco Secure Firewall is rated 8.2. The top reviewer of Azure Firewall writes "Easy to use and configure but could be more robust". On the other hand, the top reviewer of Cisco Secure Firewall writes "Highlights and helps us catch Zero-day vulnerabilities traveling across our network". Azure Firewall is most compared with Fortinet FortiGate-VM, Palo Alto Networks NG Firewalls, Microsoft Defender for Cloud, Palo Alto Networks VM-Series and Netgate pfSense, whereas Cisco Secure Firewall is most compared with Palo Alto Networks WildFire, Netgate pfSense, Meraki MX, Sophos XG and WatchGuard Firebox. See our Azure Firewall vs. Cisco Secure Firewall report.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.