Cisco Secure Firewall Previous Solutions

RV
Principal Network Engineer at a retailer with 10,001+ employees

We used Cisco ASAs, and they were all individually managed. We went from individually managed IDS and Firepower IDS solutions to this consolidated single management platform.

We chose Cisco Firewall over competing solutions because what you see is what you get. We liked that the changes are immediate. The way the logs come into our Splunk system gives us a good feeling about the stability and performance of Cisco products.

View full review »
Daniel Going - PeerSpot reviewer
Managing architect at Capgemini

We used Check Point previously, and the reason we switched to Firepower was that it would be a common vendor and a commonly supported solution by our team. The consistency with Cisco is why we went with Firepower.

View full review »
Josh Schmookler - PeerSpot reviewer
Network Engineer at Aton Computing

I've used a number of other competitive devices. I've customers running SonicWall, I've customers running Palo Alto, and I've customers running Fortinet. Cisco Secure Firewalls are excellent.

Cisco is at a really good place, especially with a lot of the recent updates that have happened. Compared to Palo Alto and Fortinet specifically, I find FMC is way easier to use. Specifically in the realm of cybersecurity resilience, it's for sure a much more effective tool than Palo Alto. Having come from Palo Alto, the way FMC surfaces threats and enables response to set threats is vastly easier for me and my team to work with, so we're seeing a lot more resiliency. We're seeing a lot quicker response to threats. We're seeing a lot quicker identification of threats. From that perspective, it's far and away better.

Cisco Secure Firewall is the best in the market right now. Palo Alto is okay, but Cisco is better. In terms of resiliency and providing actionable intelligence to a security team, I find Cisco products to be way better. Fortinet is also fairly easy to use. They have a lot of the same strengths. However, Fortinet's technical support is terrible. Cisco has a nice package of devices. It's easy to use. It's easy to integrate for the security team. It gives you a lot of actionable intelligence in your network. Having that kind of company and technical support to be able to back that up and be able to support the customers is very useful.

View full review »
Buyer's Guide
Cisco Secure Firewall
April 2024
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,995 professionals have used our research since 2012.
EV
IT Technical Manager at Adventist Health

Prior to actually using Firepower, we were still a Cisco shop. We used Cisco ASA exclusively, and it was fantastic. But with the advent of Firepower, being able to manage, monitor, and upgrade has really cut back our time on those processes by less than half of what we had before. We were using the good old ASA for many years.

View full review »
James-Buchanan - PeerSpot reviewer
Infrastructure Architect at a healthcare company with 10,001+ employees

I don't believe so. We've used Cisco, at least for this specific use case, for a long time.

View full review »
Robert LaCroix - PeerSpot reviewer
Network Engineer at Red River

Palo Alto seems clumsy to me. I don't like it. It shouldn't be a guessing game to know where stuff is. Cisco is laid out in front of you with your devices, your policies, and logging. You point and click and you are where you need to be. 

I haven't used Check Point in a while. It's been some time but it's an okay product.

View full review »
DonaldFitzai - PeerSpot reviewer
Network Administrator at Cluj County Council

Previously, I used some Linux Servers with a software firewall for 20 years.
It was a Microsoft firewall, but I don't remember the name. It was a server that I had to install on the gateway.

View full review »
PS
System Engineer at Telekom Deutschland GmbH

For more security, we sometimes have two firewalls. We have other vendors in place, such as FortiGate or Palo Alto. We have Cisco at the front or at the end, and another vendor on the other side so that there is more security, and if there is a security breach in one solution, we still have the other one. These firewalls differ mostly in administration and how you configure things but not so much in terms of features. They may differ in small things, but in the end, they are all doing the same things.

View full review »
Ahmet Orkun Kenber - PeerSpot reviewer
Technical Network Expert at NXP Semiconductors Netherlands B.V. Internet EMEA

I've used different concepts of solutions before Cisco. Cisco is much better than Juniper, Brocade, or Foundry, as it is much easier to use and get directions from. It is also easier to integrate Cisco if you compare it with other customer concepts, such as Juniper, Brocade, or Aruba.

View full review »
Joseph Lofaso - PeerSpot reviewer
Senior Network Engineer at Pinellas County Government

Before I started, they also had Juniper SRXs. The big issue with them was the logging. It wasn't as good. We switched to ASAs for better stability, better management, and easier logging.

View full review »
Fredrik Vikstrom - PeerSpot reviewer
IT Architect at Skellefteå Kommun

We haven't used any other solution for a long time. We have been a Cisco customer for a long period.

View full review »
Mohamed Al Maawali - PeerSpot reviewer
Infrastructure Planner at Petroleum Development Oman

For the data center, we didn't have a security zone previously. It was one of the key requirements to come up with the security zone. We chose Cisco firewalls because we were implementing ACI in the data center, and we thought that having one vendor for both activities will reduce our time of implementation, which didn't turn out to be true.

View full review »
Chuck Holley - PeerSpot reviewer
Director of Networking at Albemarle Corporation

We had previously used Check Point but decided to switch to Cisco Secure Firewall. The reason for this switch was the lower cost and our company's desire to remove Check Point from our environment. It was an excellent deal, and the technology was on par. We did not lose any functionality or experience any drawbacks by choosing Cisco over Check Point. In fact, I believe we gained additional features, and Cisco is more widely adopted and supported compared to Check Point. Therefore, I am confident that we made the right decision.

View full review »
Ahmed Alsharafi - PeerSpot reviewer
Solution Architect at Dimension Data

We had another product previously. All the vendors are doing a great job in security, but Cisco has such a big portfolio, and as a reseller, it's easy for us to be a one-stop shop for the customer covering wired and wireless networks, endpoint security, and so on. That's the main advantage of Cisco nowadays.

View full review »
MR
Security Officer at a government

We were using multiple products in the past. Now, we have it all centralized on one product. We can do our content filtering and our firewall functions in the same place. The ASAs replaced two of the security tools we used to use. One was Barracuda and the other was the because of tools built into the ASAs, with IPX, etc.

When we switched from the Barracuda, familiarity was one of the biggest reasons. The other organizations I've worked in were pretty much doing Cisco. I'm not going to deride the Barracuda. I found it to be pretty close, performance-wise. In some cases, it was pretty simple to use versus the Sourcefire management console. However, when you went into the nitty gritty of things, getting down to the micro level, Sourcefire was far ahead of Barracuda.

View full review »
BB
Cybersecurity Designer at a financial services firm with 1,001-5,000 employees

Prior to using the Cisco Secure Firewall, we were using another vendor. The Secure Firewall was a big change for us. The legacy firewalls were very old and not particularly usable. We do still use another vendor's products as well. We believe in in-depth defense. 

Our perimeter firewall controls are a different vendor, and then our internal networks are the Cisco Secure Firewall. 

Comparing Cisco Secure Firewall to some other vendors, I would say that because we use a lot of other Cisco technologies, the integration piece is very good. We can get end-to-end visibility in terms of security. In terms of the cons, it can be quite difficult to manage firewall changes using the Cisco standard tools. So we do rely on third-party tools to manage that process for us. 

View full review »
DavidMayer - PeerSpot reviewer
Solution Architect at a energy/utilities company with 1,001-5,000 employees

We have a multi-vendor strategy for the firewall so that if there is some security issue in the software or something like that, you are not directly impacted, and there is another vendor in between. If I compare Cisco Secure Firewall with the other vendor that we have in place, the pro for Cisco Secure Firewall is that detection is better with the database of Talos. The con that comes to my mind is the deployment time when you deploy a change. With the other vendor, the change is more or less deployed immediately, whereas, with Cisco Secure Firewall, you have to wait for a few minutes until the change is deployed. This is one of the biggest cons on this side because if there's a misconfiguration, you are not able to correct the issue as fast as with the other vendor.

View full review »
FH
Product Owner at a manufacturing company with 10,001+ employees

That was long ago, but we had Blue Coat proxies before. We switched because of our strategy to go for Cisco as an ecosystem.

We chose Cisco products because we have a Cisco-first strategy. We typically check first with the Cisco product portfolio and then make up our minds. Historically speaking, it serves our interests best.

View full review »
Paul Nduati - PeerSpot reviewer
Assistant Ict Manager at a transportation company with 51-200 employees

Prior to my joining the organization, there was a ransomware attack that encrypted data. It necessitated management to invest in network security.

When I joined the project to upgrade the network security infrastructure in our organization, I found that there was a legacy ASA that had been decommissioned, and was being replaced by the 5516. Being a type-for-type, it was easy to pick up the configs and apply them to the new one.

View full review »
Augustus Herriot - PeerSpot reviewer
Senior Infrastructure Engineer at a insurance company with 10,001+ employees

We were previously using a Cisco product. We replaced them awhile back when I first started, and we have been working with ASAs ever since.

We did have Junipers in our environment, then we transitioned. We still have a mix because some of our contracts have to be split between vendors and different tiers. Now, we mostly have Apollos and ASAs in our environment.

View full review »
reviewer1448693099 - PeerSpot reviewer
Senior Network Engineer at a comms service provider with 1-10 employees

We have had clients who switched to Cisco Secure Firewall from Check Point, Palo Alto, and WatchGuard due to the features and support that Cisco offers.

View full review »
NH
Network Engineer at a healthcare company with 10,001+ employees

I've worked with Check Point's firewall, and I've worked with Palo Alto's firewall. Things like packet capturing and packet tracing that I can manipulate to pretend I'm doing traffic through the firewall are a lot easier to do with ASAs than with other products.

We have other firewalls in our environment. We still use Palo Alto. We do have a little bit of a mix with Palo Alto in our environment, but in terms of VPN specifically, the way that Palo Alto does route-based VPN by default doesn't flow well with most people out there. It works great with cloud providers. Cisco can do route-based VPNs too. We have a route-based VPN solution with Cisco as well. We just use an ISR for that instead of a firewall.

View full review »
Orla Larsen - PeerSpot reviewer
Network specialist at a retailer with 10,001+ employees

While I have not personally utilized other security products, our organization also employs FortiGate devices and applications for security purposes alongside Cisco Secure Firewall.

View full review »
FC
Global Network Architect at a agriculture with 10,001+ employees

We weren't using anything similar in this particular use case. We chose Cisco because they originally came on the recommendation of our networking partner. They came in with a strong recommendation from a strong partner.

View full review »
Ramish Ali - PeerSpot reviewer
Assistant Director IT at Punjab Education Foundation

I have not used other firewalls.

View full review »
BW
Network Security Team Lead at a government with 10,001+ employees

I have previously used Juniper. Our company decided to go with Cisco Secure Firewall because of the cost and ease of use. Also, the people in our team knew Cisco versus other solutions.

View full review »
ZK
Sr. NetOps Engineer at Smart Cities

In our business, we have implemented a number of Cisco Secure products in our network infrastructure, including Cisco ISE as a AAA server, Cisco FMC Management Center for our firewalls, and Cisco FTD for Firepower Threat Defenses. We also use a TACACS+ server for our hardware. Cisco products make up the entirety of our infrastructure, including Cisco Nexus Switches, Cisco ACI fabric for our data centers, Cisco ASR Routers, and Cisco Wireless Solutions, which include WLC controllers, access points, and other relevant hardware. In our organization, Cisco is strongly preferred.

View full review »
FC
Global Network Architect at a agriculture with 10,001+ employees

We did not previously use a different solution for this particular use case. 

View full review »
KB
CTO at Intelcom

We work with different vendors based on customer needs. We have a specification that we need to have a combination of different vendors, which is the best practice in the data center architecture and design. We cannot have one vendor at all levels, and we should have a combination. 

As a vendor, Cisco has a complete range of products to handle all the security aspects. When I look at the architecture design, the implementation of Cisco firewalls is the best. We have data centers based on Nexus for instance. We have routing components. All the compliance and architectural design requirements are met, and we can meet the customer needs according to the Cisco design guide and validation guide. When we look at the security aspect and the guidelines in terms of next-generation firewalls, in terms of redundancy on both sites or multi-sites, we have better performance with Cisco than other vendors in some cases.

View full review »
Samson Belete - PeerSpot reviewer
Network Engineer at a financial services firm with 5,001-10,000 employees

We were previously using Cisco ASA for eight years. Now, we are using Firepower NGFW. We hope to continue using this product in the future, as long as there are no discouraging issues.

We are also using Check Point in conjunction with Cisco. We use Checkpoint for our internal networks and Secure Firewall for our outside network.

View full review »
DC
Senior Network Security Engineer at a tech services company with 11-50 employees

I have used this solution to replace different vendors, usually Cisco ASA that is reaching end of life.

View full review »
MK
IT Administrator / Security Analyst at a healthcare company with 11-50 employees

The big three solutions, Cisco, Fortinet, and Palo Alto, are all really good but I tend to lean on Cisco versus the others because one of their strengths, in general, is threat intelligence. When you put a bunch of security people in a room then you have a lot of consensuses, but like anything, you'll have a lot of disagreements, too.

Each of these products has its strengths and weaknesses. However, when you factor in AnyConnect, which most people will agree is state-of-the-art from a security standpoint in terms of VPN technology, especially when it's integrated with Umbrella, it plays into the firewall. But, it always comes back to configuration. Often, when you read about somebody having an attack, it's probably because they didn't set things up properly.

If you're a mom-and-pop shop, maybe you can get by with a pfSense or something like that, which I have in my house. But again, if you're in a regulated environment, you're looking at not just a firewall, you're looking at all sorts of things. The reality is, security is complicated.

View full review »
AI
Head of Technology at Computer Services Ltd.

We previously used Cisco ASA as a firewall.

View full review »
Ryan Page - PeerSpot reviewer
IT Network Manager at MLSE

We were just looking for a different feature set. We found that ASA was rock-solid as a VPN piece. We wanted to separate the VPN from our firewall policy management, so we just moved it over to VPN as a solution.

We had a partnership with Cisco. They came in and redid the entire environment. Before that, there was no Cisco environment whatsoever. So, they came in with the Nexus switching and Catalyst Wireless solution, then the VPN came with that as well as the ASA.

View full review »
JATINNAGPAL - PeerSpot reviewer
Manager/Security Operations Center Manager at RailTel Corporation of India Ltd

Earlier we used the Cisco ASA Firewall. Now, it has been phased out. Firepower is categorized as the next-generation firewall, however, we haven't found the utility of that level in this product. It lacks maturity at many levels.

View full review »
ArunSingh7 - PeerSpot reviewer
Computer Operator at a retailer with 5,001-10,000 employees

I work with Palo Alto, Fortinet, and Check Point for different parts of our IT environment.

View full review »
CW
Security Engineer at a government with 501-1,000 employees

In my previous jobs, I used Palo Alto and Fortinet. My current organization chose Cisco Secure Firewall because we use Cisco for the rest of our network, and it just made sense.

View full review »
Rene Geiss - PeerSpot reviewer
Network Engineer at a computer software company with 51-200 employees

We have a Palo Alto core firewall, and we handle threat detection and intrusion prevention on that device. We don't use Cisco ASA for detecting or remediating threats.

Compared to other systems that I have used in the past, Cisco ASA is reliable, and it's not a very big hassle to set up. It's very good, and it just does its job. 

View full review »
JP
Network Engineer at Ulta Beauty

They had this firewall when I joined the company.

We also have Palo Alto that we use as a firewall for Layer 2.

View full review »
HP
Senior Solutions Consultant at a comms service provider with 10,001+ employees

I also have experience with Fortinet and Check Point.

View full review »
PC
Security Architect

In our company, we have used another firewall which we developed based on FreeBSD.

I, personally, used to work with Juniper, Check Point, and Fortinet. I used Fortinet a lot in the past. If you use the device only for pure firewall, up to Layer 4, not as an application or next-gen firewall, Fortinet is a good and cheaper option. But when it comes to a UTM or next-gen, Cisco is better, in my opinion. FortiGate can do everything, but I'm not sure they do any one thing well. At least with Cisco, when you use the IPS feature, it's very good.

View full review »
FS
Security engineer at a energy/utilities company with 10,001+ employees

We previously had a different platform. We wanted to converge multiple platforms into one.

I switched companies. So, I have more experience with Palo Alto.

View full review »
PR
Senior Network Engineer at a manufacturing company with 1,001-5,000 employees

The VPN solution works much better than our previous solutions.

We previously used Palo Alto. The switch was driven by Cisco's pitch.

View full review »
it_user68991 - PeerSpot reviewer
Manager of Engineering with 1,001-5,000 employees

I previously used Check Point. Check Point relied on a thick, Windows-based client and, at the time, did not support transparent contexts. However, Check Point has a solid management platform, which is something Cisco should take some pointers from.

View full review »
TO
Solutions Architect at Acacia Group Company

We also use Aruba in our organization. We never have to factor in extra development time when we go to a new major version of Cisco. With Aruba, we have a pretty drawn-out development timeline for any upgrades or software improvements. Aruba and Cisco Secure Firewall are very different in their implementation and development.

View full review »
KH
Systems Engineer at a engineering company with 5,001-10,000 employees

I used only a couple of other products over the years due to client preference. In general, Cisco Secure Firewall is easier to deploy mostly because of the depth of personnel trained in it. Every other product seems to be a niche thing that two people know, but Cisco once again seems ubiquitous throughout the industry. Our customers choose Cisco for various reasons, from cost to a preference for Cisco. It meets the task that they need to meet. It's really the spectrum.

View full review »
FS
Networking Project Management Specialist at Bran for Programming and Information Technology

As a system integrator, our primary focus is not on selling products, but rather on providing comprehensive solutions to our customers, starting from scratch and ensuring everything runs smoothly. In this regard, we rely heavily on Cisco devices, including switches, routers, code devices, NK, Nexus, 7000, and 9000. We also use other Cisco products, such as IP phones and access points. In Saudi Arabia, Cisco is the most popular brand in the market, but its popularity is declining due to prolonged delivery times. Customers cannot afford to wait a year, and this is the primary reason for the decline in demand.

View full review »
MW
Executive Vice President, Head of Global Internet Network (GIN) at a tech services company with 10,001+ employees

We are also selling Fortinet, Palo Alto, and Check Point. We sell all solutions, but I'm quite focused on Cisco. It's mostly because I have the most expertise and experience with it over the years. I've been working with Cisco security solutions for 15 to 20 years. That's where my expertise is, and with Cisco, you have a solution for everything. It's not always the best of breed, but in the overall solution frame, you have something for everything, and they interact nicely with each other, which is great.

View full review »
MK
Security admin at a wholesaler/distributor with 10,001+ employees

We previously used Check Point. We had an option to connect all of our security products from the endpoint to the firewalls to SASE-based solutions. This is why we changed solutions.

View full review »
MB
Director IT Security at a wellness & fitness company with 5,001-10,000 employees

We started with Firepower. It was one of the first products that helped secure our organization. We are close to sort of an advanced maturity, primarily compliance-driven. We are not there yet, but we are close to it. We are somewhere sort of in the high to middle area. We have sort of a high compliance-driven security and close to the compliance-driven area, but still slightly below it. We are still fine-tuning and implementing some security technologies. Then, within a year's time, these will be simply managed and audited.

View full review »
MS
VSO at Navitas Life Sciences

We used Fortinet and that product was coming to end of life. We had been using it continuously for seven years, then we started to experience maintenance issues.

Also, we previously struggled to determine who were all our active users, especially since many were VPN users. We would have to manually determine who was an inactive user, where now the process is more automated. It also had difficult handling our load.

View full review »
Akshit Chhokar - PeerSpot reviewer
Technical Solutions Specialist - Networking at Google

I have experience with Sophos.

View full review »
Achilleas Katsaros - PeerSpot reviewer
Head of IT Network Fixed & Mobile at OTE Group

We previously sold Fortinet devices. However, many of our clients switched over to Cisco because of the price as they are quite cheap. 

View full review »
CT
Analytical Engineer at a pharma/biotech company with 10,001+ employees

We have used Check Point and Palo Alto. We are still using those but for more internal stuff. For external use, we are using the Cisco client.

View full review »
LS
Network Administrator at Bodiva

We are currently using a Check Point solution because this solution lacks by not having an application layer.

View full review »
BG
System Administrator at ISET

We had the old version of the Kerio firewall, but because in our country, there is no official dealer for Kerio, we moved to the Cisco ASA NGFW. This is the main reason why we moved to the Cisco firewall.

View full review »
TI
Senior Network Consultant at a healthcare company with 1,001-5,000 employees

We decided to go for Firepower because we needed to expand, and we have a large installation of Cisco devices in our environment. It's 70% Cisco. We have one location where they are using Extreme equipment, but in that location also, we have Cisco firewalls. Having one vendor leads to ease of management. It's also easy in terms of competence. We have good knowledge of Cisco, so it's easy to maintain and operate a Cisco platform.

For network security, we have a central hub for all the external traffic. That is a huge load of traffic. On those applications, we are using Palo Alto. We have a mixed combination of Cisco and Palo Alto in our central locations.

Using Cisco firewalls has helped to eliminate or consolidate some of the tools and applications. We have some installations of AlgoSec to see what's going on or how the performance is, but we have, more or less, decided that we don't need them now because there is so much information that we can pull from CSM or FMC.

View full review »
RW
System Administrator at a healthcare company with 501-1,000 employees

This was the first solution we were using.

We are primarily Cisco housed, and I believe that practically everything is Cisco. 

It might be part of the contract for a small fee. I don't think there's any particular reason.

I am familiar with CheckPoint, as well as Microsoft ISA.

View full review »
PC
Senior Engineer at Teracai Corporation

For me, there wasn't a previous solution here. I inherited the solution when I came in.

View full review »
AE
Technical Consultant at Zak Solutions for Computer Systems

I also work with Fortinet, and it's my sense that, while Fortinet is getting easier to use, Cisco is getting harder to deal with.

View full review »
IK
Network Engineer at a tech services company with 5,001-10,000 employees

Years ago, I used different firewalls like Juniper, but mostly, it's been fixed to ASA and FTD. We switched to Cisco because our customers were using Cisco.

View full review »
MZ
Senior Network Administrator at a comms service provider with 201-500 employees

We have been using different Cisco firewalls for a long time. We are currently using Cisco Firepower and Cisco ASA. Cisco Firepower is better than Cisco ASA, but stability is an issue.

View full review »
Francisco Gaytan Magana - PeerSpot reviewer
Network Architecture Design Engineer at a comms service provider with 10,001+ employees

We previously used Palo Alto, Fortinet, and Cisco Firepower. We switched because Cisco is more stable and offers easy deployment for the platform.

View full review »
Tim Maina - PeerSpot reviewer
Network Engineer at a tech vendor with 5,001-10,000 employees

In the old days, we used Check Point. We did an evaluation of the Cisco ASA and we liked it and we brought it on board.

At that time, it was easy for our junior operations engineers to learn about it because they were already familiar with Cisco's other products. It was easier to bring it in and fit it in without a lot of training. Also, the security features that we got were very good.

View full review »
AlexEng - PeerSpot reviewer
Systems Engineer at a healthcare company with 201-500 employees

We made a gradual transition from ASA to Firepower because they first had this as Sourcefire services. That is what we used to install first for our customer base. Then Firepower defense appliances and firmware came out. It was a natural process.

View full review »
RG
Network & Security Engineer at Oman LNG L.L.C.

For the past four to five years, we have only had Cisco firewalls. However, for some of the branches, we are using Palo Alto firewalls. It depends on a client's requirements, applications, security, etc.

View full review »
MB
Voice and data infrastructure specialist at a tech services company with 1,001-5,000 employees

We previously used Fortigate.

View full review »
RF
Data Analyst at a hospitality company with 201-500 employees

In the past, I've worked with Check Point and Fortinet as well.

View full review »
Vinay-Singh - PeerSpot reviewer
Manager IT & Security at mCarbon Tech Innovations Pvt., Ltd.

I was using Dell SonicWall before Cisco ASA Firewall.

View full review »
DJ
IT Consultant at ACP IT Solutions AG

We used to sell Palo Alto firewalls and switched to Cisco because it was more cost-effective for clients.

As a Cisco reseller, I try to give our customers the best possible solutions for their problems.

View full review »
MC
System programmer 2 at a government with 10,001+ employees

We previously used CheckPoint and Fortinet. We switched from CheckPoint because it was unsupported, and we wanted to move to a next-generation firewall.

We went to Fortinet, and when we switched over, it caused a huge network outage. The Cisco engineers helped fish us out of that. Our GM at the time preferred Cisco, and we switched to Cisco Firepower NGFW Firewall.

View full review »
AS
Senior Network Architect at a tech services company with 10,001+ employees

I didn't use another solution previously.

View full review »
CE
Network engineer at a government with 10,001+ employees

Cisco has been a leader in firewalls, and the US government primarily chooses Cisco first, before it chooses competitors.

View full review »
ZK
Lead Network Security Engineer at TechnoCore LTD

Cisco ASA and Firepower NGFW is the first firewall solution that I have and am still using.

View full review »
HG
Daglig leder at a tech services company with 1-10 employees

We have firewalls from other vendors, but we will be moving over to Cisco. When we have the same vendor, it would take less time to train people to do their job because there is one technology rather than four or five different ones.

View full review »
JK
Specialist WINTEL Services at Descon Engineering Limited

In the last 10 years, we were using the Barracuda Web Security. Compared with that product, I would give this solution six or seven out of 10 when compared to Barracuda. Barracuda has one of the best web security features, giving access to users by deploying a web agent on client computers at different sites. 

Barracuda Web Security's hardware was obsolete so our management never tried to renew its license. That is why we are trying to use the Cisco Firepower module. We want to understand their web security gateways, web security logs, what it provides, and the kind of reporting it has. We are currently doing research and development regarding what features and facilities it provides us compared to our requirements.

View full review »
Imran Rashid - PeerSpot reviewer
IT/Solutions Architect at a financial services firm with self employed

We used FortiGate Firewall, but we are replacing it with Cisco Firepower NGFW Firewall because we had issues with HP solutions. We also switched because I am Cisco certified, and my background and expertise are in Cisco.

View full review »
AM
Network Engineer at LEPL Smart Logic

I have had experience with the Fortinet FortiGate firewall. It is very easy, and it does its job very well. Both Firepower and FortiGate do their job very well, but I like the Palo Alto Networks firewall the most. I have not experienced it in a real environment. I have placed it in my lab. It is a very complex firewall, and you need to know how to configure it, but it is the best firewall that I have seen in my life.

As compare to the Palo Alto Networks firewall, both Firepower and FortiGate are simpler. You can just learn which button to use and how to write rules, policies, etc. In Palo Alto, you can not guess this. You should know where each button is, how it works, and what it does. If you don't know, you cannot get the performance you want from Palo Alto. So, Firepower and FortiGate are easier to learn.

Firepower is very good for a small implementation. If you are doing a Cisco setup, you can place kind of 16 devices in one cluster. When it comes to the real environment, you need to have maybe three devices in one cluster. If two of them are in one data center and the third one is in another data center, the third firewall does not work very well when it comes to traffic flow because of the MAC address. When you want to implement Firepower in small infrastructures, it is very good, but in big infrastructures, you would have some problems with it. So, I won't use it in a large environment with five gigabits per second traffic. I will use the Palo Alto firewall for a large environment.

View full review »
EH
CEO at NPI Technology Management

We did use Juniper's NetScreen product on and off for a while. We stopped using it about ten years ago now.

We had previous experience with the Cisco gear, so we were comfortable with it, and Juniper bought the NetScreen product and sunsetted it. You had to move into a different firewall product that was based on their equivalent of IOS, something called Juno OS, and we didn't like those products. Therefore, when they sunsetted the Juniper products, we looked around and settled on Cisco.

View full review »
EV
IT Infrastructure Specialist at RANDON S.A

For our remote sites we didn't use a specific security platform. We had the Cisco router itself and the protection that the Cisco router offers. But of course you can't compare that with a next-gen firewall. But here in our headquarters, we currently use Palo Alto for our main firewall solution. And before Palo Alto, we used Check Point.

The decision to use Cisco was because Cisco could offer us an integrated platform. We could have only one router at our remote sites which could support switch routing with acceleration, for IP telephony and for security. In the future we also intend to use SD-WAN in the same Cisco box. So the main advantage of using Cisco, aside from the fact that Cisco is, course, well-positioned between the most important players in this segment, is that Cisco could offer this solution in a single box. For us, not having IT resources at those remote sites, it was important to have a simple solution, meaning we don't have several boxes at the site. Once we can converge to a single box to support several features, including security, it's better for us.

The main aspect here is that if we had Fortinet or Check Point or Palo Alto, we would need another appliance just to manage security, and it wouldn't be integrated with what we have. Things like that would make the remote site more complex.

We don't currently have a big Cisco firewall to compare to our Palo Alto. But one thing that is totally different is the fact that Cisco can coexist with the router we have.

View full review »
LF
Security Governance at a comms service provider with 1,001-5,000 employees

We were using Juniper SRX5600. The switch was more a strategic decision than a technical one.

We are also using a 5520 for seven years in our datacenter and we are satisfied by this version.

View full review »
Sergiy Ovsyannyk - PeerSpot reviewer
VP Network Engineering at a computer software company with 501-1,000 employees

We're a multi-vendor shop when it comes to firewalls, and we use Check Point and Palo Alto in addition to Cisco. We used to have Fortinet but that amounted to too many vendors.

When the Cisco product changed from legacy traffic inspection to the new Firepower it became a next-generation firewall. It was just a new product. That's why we decided to try it and stay with Cisco. It's like two different products: the legacy product and the new one. The legacy product was much simpler and the new one is, obviously, more complex.

View full review »
VW
Network Engineer at a computer software company with 201-500 employees

I work with a lot of different companies and a number of different firewalls. A lot of times it is really about the price point and their specific needs. 

This solution was present when I showed up.

View full review »
Michael Mitchell - PeerSpot reviewer
Network Engineer at Utah broadband

We haven't really used anything different. The only thing that we run inline with Cisco ASAs is Barracuda Networks. We kind of run that in tandem with this firewall, and it works really well.

View full review »
VG
Co-Founder at Multitechservers

We did not previously use a different solution. When the office was launched we implemented Cisco as a fresh product.

We are using a Cisco ASA Firewall, as well as Sophos at the remote sites. We are using another product is for log collecting. There are three solutions that basically cover us for security purposes. Those, at least, are the physical devices we are using as of now. The rest are cloud solutions such as Nexus. 

That said, I personally, have used Sophos XG as a firewall in the past. Sophos is good in terms of traffic blocking and identifying interruptions to the traffic. The features are better on Cisco's side. For example, there is two-factor authentication and a remote VPN. The only benefit I found in Sophos was the way it dealt with the traffic. 

View full review »
Heritier Daya - PeerSpot reviewer
Network Administrator at a financial services firm with 1,001-5,000 employees

We were using the SonicWall solution prior to this one, but it reached end-of-life because we had updated our architecture. This is why we migrated to a next-generation firewall. We had also been using Fortinet FortiGate.

View full review »
FL
Team leader at J.B. Hunt Transport Services, Inc.

We have always been using this same solution, but previous versions. We update them in trying to keep up with the amount of data coming through, such as more streaming.

View full review »
MD
Network & Security Administrator at Diamond Bank Plc

I didn't use a different solution in my bank, but on some other enterprise jobs, I used some unique firewall solutions. 

Since I have been at the bank, only Cisco ASA has been deployed. We just added two new modules. In the bank, we only use Cisco ASA solutions.

View full review »
MF
Network Engineer at a financial services firm with 10,001+ employees

We have other firewalls, and it hasn't helped to consolidate other solutions. We have to use the Cisco firewall and other vendors because of internal law. We have to use two firewalls, one from vendor A and the other one from vendor B.

We went for Cisco because it's affordable. It's something you can trust. It's something you know. It's a valued product. 

View full review »
SG
Network Automation Engineer at a financial services firm with 1,001-5,000 employees

The challenge we wanted to address was scale. We're growing and we needed something a little more robust, something that could hold a big boy. We've got a lot more employees and we were using an older version of the hardware, so we upgraded to the newest version of the hardware, given that we're familiar with it. It solves our use case of allowing employees to work from home.

View full review »
BB
Network Engineer at a university with 1,001-5,000 employees

We have always had ASA since I have been at the company. The ASAs were in place and we have upgraded to newer ASA Next-Generation Firewalls.

View full review »
JM
Head of Information Communication Technology at National Building Society

We went with Cisco because it's a reputable brand and we also have CCNP engineers in our team as well. It's the brand of choice. We were also familiar with it from our past jobs.

View full review »
YP
Principal Network Security Manager at a tech vendor with 10,001+ employees

Although I work in Korea, I needed a means of deploying computer systems in other countries. Two or three years ago I was looking for a proper solution that would cover global sites. I chose Cisco products because Cisco has a very large presence all over the world.

View full review »
AN
Network Engineer at LIAQUAT NATIONAL HOSPITAL & MEDIACAL COLLEGE

We also have experience using FortiGate.

View full review »
DC
Network Engineer at CoVantage Credit Union

We've been with Cisco and haven't had anything else yet. We haven't had a desire to move in a different direction. We've stayed with it because of how good it is.

We were initially introduced to Firepower by a consultant. At that time, it was for the web filtering because the web filtering we had was awful. We were using Sophos. Without getting too derogatory, it was just awful. There was no alerting and it was very hard to manage, whereas this is really easy to manage. With Cisco, it was very easy to set up content groups, to allow some users to get to some stuff and other users to not get to it. That's where it really started. There weren't any pros to Sophos that weren't in Firepower. We got rid of Sophos.

View full review »
AG
Consultant at HCL Technologies

Since I have worked in this organization, Cisco has been the primary product that has been deployed.

View full review »
it_user212682 - PeerSpot reviewer
Network Consultant at a tech consulting company with 51-200 employees

The previous firewall was a Cisco SA520W. This device was great as it was a firewall, IPS and WLC all in one. I switched due to this device being EOL/EOS. Also, the main complaint about this device was that with the IPS enabled all traffic was slowed to a crawl. I would rate the SA520W as 3/10.

View full review »
SV
Network Support Engineer at a manufacturing company with 51-200 employees

We use a variety of tools in the organization. There is a separate department for corporate security and they use tools such as RedSeal.

In the networking department, we use tools to analyze and report the details of the network. We also create dashboards that display things such as the UP/DOWN status.

We have also worked with Cisco ASA, and it is much better. Firepower has a lot of issues with it but ASA is a rock-solid platform. The reason we switched was that we needed to move to a next-generation firewall.

View full review »
GD
Cybersecurity Architect at a financial services firm with 5,001-10,000 employees

We have used the Check Point firewalls as well as several different vendors.

View full review »
HR
Director of network ops at a non-profit with 51-200 employees

We didn't have a previous solution.

View full review »
BL
Enterprise Architect at a tech services company with 51-200 employees

I have used Palo Alto and Fortinet. We switched mainly because we were trying to unify all our products. Instead of using multiple systems, everything with the Cisco solution is end-to-end with different views of security. Some of them wanted to be diverse, keeping things separate. For others, it was easier if everything was just with one vendor. Also, if you are Cisco-centric, it is also easier.

Since I have been using this solution, I have seen it grow. When they first started doing it, it was more like, "Here's the command line. Here's what you got to do." Now, it's easier for a new engineer to come on, and say, "Okay. Here, you are going to start supporting this, and here is how you do it," which has made life easier. Since it is a repeatable thing, no matter which company you go to, it is the same. If you get somebody who is doing it on the other side of the VPN, it is a lot easier. So, I like the Cisco product. I have used several different ones, and it's like, "Well, this is the easiest one." It might be just the easiest one because I have used it long enough, but it is also a good product. It just helps us be consistent.

View full review »
WS
IT Consultant at Hostlink IT Solutions

I have also worked with Fortigate.

View full review »
EL
Technical Specialist, consultant at a computer software company with 10,001+ employees

I have also used other solutions like Palo Alto. The capabilities are pretty much the same. It is just a matter of how they integrate with the overall landscape of the customers. Palo Alto seems to be the top end firewall these days, but the customers might have purchased Cisco in the past or have a DNA subscription using which they could probably take advantage of the security landscape that Cisco offers. It is more about what is the overall benefit rather than just the appliance.

View full review »
Cassio Maciel - PeerSpot reviewer
Network Security Engineer at Cielo

We have used Check Point and one more solution. The main difference is in the IPS signatures. Cisco Firepower has precise and most updated IPS signatures.

View full review »
DJ
Network Systems Manager at a computer software company with 5,001-10,000 employees

We did not have a previous solution.

View full review »
MS
Senior Systems Engineer at a tech services company with 201-500 employees

Most of our clients were on Cisco ASA.

View full review »
JV
Project Engineer at Telindus B.V.

Most of the time we replace Sophos, Check Point, SonicWall, and Fortinet firewalls with Cisco firewalls. Customers really like the overall integration with SecureX. They see the advantage of having more security products from Cisco to get more visibility into their security. We also replace old, non-next-generation firewalls from Cisco; old ASAs.

View full review »
HP
Technical Consulting Manager at a consultancy with 10,001+ employees

We also use Palo Alto, Check Point, Fortinet, Juniper, and Microsoft. 

Cisco came into firewalls much later. I would say they're top ten but they're not number one yet. They need to do more work. Cisco does better than the smaller players. 

The best firewall option is Palo Alto. 

Considering the expertise and the way they detect an advanced attack, Palo Alto is better than Cisco. 

View full review »
MM
Founder CCIE

We did not use any other solutions. Our strategy from the beginning has been to grow with Cisco. However, our customers have the final say in which solutions they choose and sometimes that's not Cisco. That has much to do with their previous beliefs and brand loyalty and trust. The customer's opinion matters and if the customer is loyal to Palo Alto, we are going to have a hard time getting them to make the switch. 

View full review »
MH
Security architect at a computer software company with 51-200 employees

We sell a lot of different firewall varieties including SonicWall, Cisco ASA, and FTD. 

View full review »
TG
Lead Network Administrator at a financial services firm with 201-500 employees

The previous usage was with an ASA that had FirePOWER services installed.

View full review »
it_user221862 - PeerSpot reviewer
Cloud Engineer at a tech services company with 1,001-5,000 employees

No previous solution was used.

View full review »
FV
Admin Network Engineer at Grupo xcaret

We were previously using Fortinet. We switched to ASA and Firepower when our contract with Fortinet ended. Now, we are only using ASA.

View full review »
BW
Network analysis at a government with 1,001-5,000 employees

We previously used Juniper SRX. We switched because we have a contract with Cisco. This was the cheaper option and was faster.

View full review »
Javed Hashmi - PeerSpot reviewer
Chief Technology Officer at Future Point Technologies

I also work with Fortinet and Palo Alto. Fortinet is also a really good product but Cisco is a leader in next generation firewalls and now that they are catching up to Fortinet, they have provided a lot of features and flexibility. I personally see Cisco as being good for large enterprise companies and Fortinet is better for families as well as small and medium size businesses. When it comes to Palo Alto, the high price point is one thing that is an issue, some companies are unable to afford it. Palo Alto is good but Cisco is catching up to them and I believe in a year or two, Cisco will probably match Palo Alto as well and be much better. 

View full review »
WM
Consulting Engineer at IV4

I have dealt with four or five others, but so far, I have the most experience with Cisco.

Recently, I worked with the new FTD 1000 or 1100 series, and they do a lot.

View full review »
SA
Senior Network Engineer at a consultancy with 1,001-5,000 employees

Before FirePOWER we were using the ASA.

View full review »
MC
Senior System Engineer at a tech services company with 11-50 employees

I previously used Juniper before Cisco, but only for one year. I switched because my company only used Cisco.

View full review »
NJ
CTO at a tech vendor with 1-10 employees

Previously, we sold Check Point and Palo Alto.

We choose to sell Cisco because it has been approved by NATO. Our clients use a strictly offline infrastructure, and there were significant issues with Check Point. In addition, we have good support from the local Cisco office, and they also suggested that the end user goes with Cisco.

As a Cisco Secure Firewall reseller, the value we bring is very good support. You will not get the same level of support from some other vendors. For instance,  Palo Alto and Check Point don't have direct support like Cisco. They have third-party support. Thus, you may get a response only when you escalate the issue to the third tier of the service level. With Cisco, everything is resolved within a day.

View full review »
RM
Network Engineer at a tech services company with 51-200 employees

Our bandwidth was increasing, and the number of services that we were hosting was increasing. Our old solutions couldn't catch up with that. We had some really old D-link firewalls. They were not enterprise-level firewalls.

After our IPS subscription ended, we couldn't renew it because Cisco was moving to the next-generation firewall platform. They didn't provide us with the new license. Therefore, we decided to move to Palo Alto. The procurement process is taking time, and we are waiting for them to arrive.

View full review »
PW
Senior Network And Security Engineer at a pharma/biotech company with 201-500 employees

We have another product that monitors all traffic. It just sits back and idols in the background — It integrates, but it doesn't if you know what I mean. It's a separate dashboard, but it alerts us. We can control the security — level zero through one hundred. If a threat registers above 54% (we have the limit set at 51) it alerts us. If it's a specific threat, it can shut down services, ports, machines, authentication, and so on and so forth.

We also use AMP, Umbrella, SecureX, and Duo. They're pretty easy to integrate. I wouldn't say beginner level, but if you have a working knowledge of networks and security, you can easily get them integrated. Also, if you need help, Cisco's always there to assist.

We use Firepower Management Center — it's a wonderful tool. It has an awesome all-in-one pane of glass dashboard so you can manage multiple devices from one dashboard. It's also very easy to set up.

We used to use SonicWall. Cisco was purchased right before I came on board, but from my knowledge, we had issues with the licensing of SonicWall. We are a Cisco shop. Both my manager and I prefer Cisco over other vendors. We have more experience with Cisco and their customer support and the products themselves are just better in our experience.

View full review »
JW
Acting Director, Office of Talent Management at a government with 10,001+ employees

I work with a lot of different IT products including three different firewall solutions in the past 12 months.

View full review »
SZ
General Manager at MS Solutions Ltd.

We were using the ASA 5505 and our network is faster now, so we are now in the process of upgrading our network to the 5506 model. The 5505 is a 100 megabit product, which is very low.

View full review »
TH
President at a tech vendor with 11-50 employees

We've been with Cisco for a long time. We've used their routers and gadgets for years and years.

View full review »
it_user861456 - PeerSpot reviewer
Senior Information Security Engineer at a financial services firm with 501-1,000 employees

I had not previously used another solution.

View full review »
WB
Network Engineer at a comms service provider with 1,001-5,000 employees

About one-and-a-half years ago we implemented a different solution to handle certain situations like BGP. But when we upgraded our Cisco devices just few months ago, we could have BGP on ASA. Now our devices from Cisco have enhanced capability, not just something new and maybe less dependable. Implementing BGP on ASA was a late addition. It had been tested, the bugs were worked out and engineers wanted the solution. The stability of ASA as an older solution is what is important.

View full review »
MT
Information Security Administrator at Bank of Namibia

We have only been using Cisco solutions.

View full review »
NP
CEO at Synergy IT

We were previously using Sophos firewall but it had a lot of issues. 

View full review »
it_user244500 - PeerSpot reviewer
Constructor of the computer systems at a security firm with 51-200 employees

We use MySQL and Nagios devices alongside the ASA as our network infrastructure needs expanding and required more serious hardware solutions.

View full review »
GS
Information Security and Compliance Manager at RSwitch

We migrated from Cisco AC520 to the Cisco NGFW. We have also used HPE and IBM switches, as well as FortiGate firewalls. We are now completely Cisco.

Previously, we were also using AlienVault and it was easy to integrate with Cisco devices.

View full review »
FB
Sr Network Administrator at Orient Petroleum Inc

This is the first product of this nature that we have implemented. We didn't previously use a different solution.

View full review »
DS
IT Specialist at a government with 1,001-5,000 employees

We previously used an ASA 5500, and it was simply time to upgrade it. We used this solution as a direct replacement.

View full review »
BS
IT Administrator at Vegol

We didn't previously use a different solution.

View full review »
NA
IT Infrastructure Manager at Beltone Securities Brokerage S.A.E.

Our company has used various other solutions in the past. We've decided to also install Cisco ASAv to add extra features to our system.

View full review »
AA
Technical Manager at a comms service provider with 1,001-5,000 employees

We were previously using Cisco ASA without Firepower. We switched to Cisco Firepower because Firepower has more features, like malware inspection, and more possibilities with identity management.

View full review »
FT
IT Adviser/Manager with 51-200 employees

I usually have to take what is there. If I had a choice, I would now take something newer.

View full review »
it_user398799 - PeerSpot reviewer
Sr. Security Analyst with 1,001-5,000 employees

Previously, I used ASAs without FirePower; and unsure what my company used prior to that.

View full review »
LA
Lead Network Engineer

I have used Fortinet, Check Point, and Palo Alto firewalls. Most of those solutions have everything integrated into them so you don't need multiple appliances. You get a single solution for your network. It would be better to have a centralized firewall, from Cisco, that can do everything.

View full review »
JJ
Network Engineer at a computer software company with 51-200 employees

I have hands-on experience in both Fortinet and Palo Alto. So if I were to compare this to Palo Alto, for example, I would say that the user interface in Palo Alto is a lot better. But the reason that I'm working with Firepower is that we have a Cisco network as well, and Cisco ISE. We're trying to integrate different Cisco solutions. We're trying to utilize the ecosystem benefits where I can connect my Cisco Firepower to ISE and have it talk to the App Cloud. There's a benefit of utilizing Cisco Firepower in conjunction with our other Cisco solutions.

Ease of management is similar with Cisco and Fortinet, I would say similar, but it's easier in Palo Alto.

View full review »
JG
Gerente de Unidad at Redescomm, C.A.

I also have experience with pfSense.

View full review »
SA
IT Infrastructure Engineer at Atlas Group

Before the Firepower I was using a traditional firewall, the ASA 5510. We went to the Firepower because the 5510 did not have port security, anti-malware protection, or IDS/IPS.

I have seen a lot of events using the Firepower: vulnerability events, countries, and IPs. As a result, I feel I am secure when compared with other firewalls. With my previous firewall, I didn't have the option of blocking a country, website, or IP.

View full review »
DC
Senior Network Administrator at a financial services firm with 1,001-5,000 employees

Previous to this we had just a normal firewall that I didn't like. It didn't provide enough.

View full review »
DF
LAN admin at Cluj County Council

I used a different solution before. I used Meraki and it was a little simpler to use. However, currently, I only have Cisco routers.

View full review »
PR
Information Systems Manager at a non-profit with 1-10 employees

We were using SonicWall before.

View full review »
PD
IT Manager at a construction company with 11-50 employees

When selecting a vendor, the most important criteria include:

  • Security - the ability of the technology from a security perspective.
  • The ability of the company to support the technology - knowledge of the product by the company. It may sound really silly to say that, but you'd be surprised how poor some companies' technical support is.
  • The financial stability of the company.
View full review »
it_user560229 - PeerSpot reviewer
Security Engineer at a healthcare company with 1,001-5,000 employees

We did not use a previous solution. FireMon was implemented as part of a security mandate and we chose this product over its competitors.

View full review »
SA
Senior Solution Architect at a tech services company with 51-200 employees

I did use and deploy different firewall solutions for various customers. But every customer has his own pain points. For example, for one of the customers, he was purely looking for URL filtering. We went with Sangfor IAM in that case. They have a very strong focus on application and URL filtering and user behavior management. Plus, reporting was very extensive. 

View full review »
RO
CEO at a security firm with 1-10 employees

I didn't previously use a different solution. We used Cisco and then we upgraded to ASA. 

View full review »
GK
IT Manager

I previously used SonicWall. I'm not the one who decided to switch, I just know that previously we used SonicWall.

View full review »
RM
Technical Specialist with 5,001-10,000 employees

I used to work with most of the hardware firewalls, Cisco ASA is reliable and few technologies are good enough to compete for the market (VPN, Modular policy framework, NAT, etc.).

View full review »
it_user700158 - PeerSpot reviewer
Senior Network Security Engineer at a university

Not in my current organization.

View full review »
it_user391305 - PeerSpot reviewer
Member of the Board of Directors at a tech services company with 1,001-5,000 employees

I have used both ASA and PAN. Different strokes for different folks.

View full review »
it_user579180 - PeerSpot reviewer
Networking Specialist at a insurance company with 1,001-5,000 employees

We chose FortiGate from Fortinet as our Next Gen Firewall solution because of the higher value for our money.

View full review »
it_user264462 - PeerSpot reviewer
Technolgy Analyst/Lead at a tech services company with 10,001+ employees

I have migrated some set-ups from Cisco to Juniper, but not from Juniper to Cisco.

View full review »
GF
Security Consultant at IKUSI

We also work with Fortinet and Palo Alto, for example. As a reseller, we work with many solutions.

View full review »
MA
Network Security Engineer at qicard

I don't know the exact product they were using before but I think it was just proxy. When I came to the company, the Cisco solution had already been installed, so I don't know the exact product from before.

I think the main reason why they would have switched is the stability and possibilities are better than just proxy. Cisco is very different and more powerful than the other simple products. It's very stable.

View full review »
CS
Information Security Manager at a financial services firm with 501-1,000 employees

We used Fortinet FortiGate, but as an early gen "NGFW" it was outdated. We have issues we don't believe would be resolved with their latest offering, so we didn't even evaluate it.

View full review »
IY
Assistant Manager (Infrastructure) at SISTIC
SC
ICT Manager at a aerospace/defense firm

We previously used Checkpoint, and I switched because Checkpoint was expensive but now it looks like Cisco is following the same route.

View full review »
DH
Network Administrator at a transportation company with 201-500 employees

I have previously used Fortinet firewalls that I have found to be better.

View full review »
AA
Sr. Network Engineer at a construction company with 10,001+ employees

We are also using Palo Alto. It's very easy to manage, especially the UI system. You can do anything you want.

View full review »
IA
Group IT Manager at a manufacturing company with 1,001-5,000 employees

I was using a different solution prior to this one. I shifted because I found that it can heal my pain at least partially. By the end, it did the job and more.

View full review »
GZ
Data Center Architect at Fronius International

We chose Cisco because it had the full package that we were looking for. 

View full review »
EE
Senior Data Scientist & Analytics at a tech services company with 11-50 employees

We previously used ASA, which is a regular firewall. We switched to Firepower because it has a lot of features. It is one of the best firewalls in the world so we shifted to Firepower.

View full review »
BY
IT System Administrator at PFW HAVACILIK

Before, I did not manage my private network well (or professionally). For this reason, I have been updating products.

View full review »
SC
IT SecOps Manager at a computer software company with 1,001-5,000 employees

Some of my customers switched from ZyXel to Cisco and this is an obvious decision for me. It will be much harder to imagine a customer replacing Check Point or Fortinet with Cisco.

View full review »
AK
Senior IT Networking and Security Manager at a tech services company with 10,001+ employees

I used to work with open source solutions, but the support and complication behind them was definitely not OK. If you want to have flexibility and stability, you have to move on to something that receives more development in that specific area.

View full review »
GS
Security Consultant at a tech services company with 501-1,000 employees

As a Cisco Gold Partner, we always proposed Cisco firewalls for our clients.

View full review »
it_user216468 - PeerSpot reviewer
Consulting Engineer at a tech services company with 5,001-10,000 employees

I've used Palo Alto's FW/IPS offerings and Cisco's older IPS platform on the ASA. Usually, I don't decide what organizations purchase, but I am impressed with SourceFire's capabilities over the latter.

View full review »
OB
Principal Network Engineer at a manufacturing company with 501-1,000 employees

I was not consulting with this client when they implemented the Cisco ASA.

This is a hardware-based device, versus a virtual one, so it's maxed out.

View full review »
TR
Tier 2 Network Engineer at a comms service provider with 1,001-5,000 employees

This was the first firewall solution that I worked with.

View full review »
GV
Architect - Cloud Serviced at a comms service provider with 10,001+ employees

We did previously use a different solution. They had two different solutions. One was Cisco ASA itself and before that, they used Check Point.

We are a Cisco company and that's the reason they are moving from one Cisco product to another Cisco product, which was better than the previous one. So, that was a major reason for the switch. I would say the other vendors are improving. This company was just Cisco oriented so they wanted something Cisco.

View full review »
it_user3483 - PeerSpot reviewer
Senior Consultant at Unify Square

The previous solution was based on software firewalls that where not able to perform as the Cisco ASA

View full review »
AM
IT Operation Manager

3Com TippingPoint as IPS, Zyxel ZyWALL ZyXEL ZyWALLas VPN server. Cisco has good documentation and it is easy for Cisco certificated engineers.

View full review »
AL
Network Security Coordinator at a energy/utilities company with 1,001-5,000 employees

We used to have a SonicWall and an older ASA 5510 platform. Both were replaced by a Cisco ASA cluster using a pair of 5525x.

View full review »
SI
Network and System Administrator at a pharma/biotech company with 501-1,000 employees

We implemented ASA after a complete redesign of our network, and we believe that Cisco ASA is the right solution for our needs.

View full review »
NJ
Administrator at a university with 1,001-5,000 employees

I have used other solutions in the past, such as Cisco Firepower. I find Cisco products to be superior.

View full review »
NJ
Administrator at a university with 1,001-5,000 employees

I used Cisco ASA Firewall, but in our specific environment and not for the whole network.

View full review »
YT
Information Security Manager at a financial services firm with 501-1,000 employees

Previously, we did not use any other solutions. Our company is almost 11 years old and have been using this solution for ten years. We have been using this solution from the beginning.

View full review »
JL
Ingénieur technico-commercial at ICBM

Before I used Fortinet FortiGate. But when I moved from the previous company to this company they had a different solution. That is why I switched.

View full review »
it_user1073460 - PeerSpot reviewer
Security Solution Architect at a financial services firm with 5,001-10,000 employees

We used to use Fortinet, but we switched because of the lack of integration.

View full review »
DA
Computer Networking Consultant and Contractor with 51-200 employees

I haven' t used another solution.

View full review »
RS
Network Security Consultant at a tech services company with 51-200 employees

Cisco ASA firewall is most reliable to protect the network, therefore I switched.

View full review »
it_user246819 - PeerSpot reviewer
Global Security Architect/Perimeter Systems Administration/Active Directory and System Administrator at a retailer with 1,001-5,000 employees

Checkpoint Firewalls - the primary reason we switched was cost and limited support options.

View full review »
PC
Network Security/Network Management at a educational organization with 201-500 employees

We did use another UTM solution before for firewall, URL and band management. We didn't switch, we just have two layers now. If we want to use Cisco for band management or URL safety, we have to pay a license fee and it is very expensive.

View full review »
DH
‎Senior Vice President at a transportation company with 51-200 employees

We've been using Cisco. Prior to this it was Cisco ASA. This was the next evolution.

When selecting a vendor it is important that they have positive industry feedback, that they are a visionary leader.

View full review »
it_user627855 - PeerSpot reviewer
Manager Network Security at a financial services firm with 5,001-10,000 employees

We have almost 99% Cisco based infrastructure.

View full review »
MS
Network Architect at a tech vendor with 10,001+ employees

We use this solution together with Palo Alto, depending on the use case. 

View full review »
BD
Solutions Architect at a manufacturing company with 10,001+ employees

Our implementation of this solution was driven by the customer.

View full review »
MK
Asst.Manager IT at a manufacturing company with 501-1,000 employees

We have been using Cisco for a long time, various models. We had PIX, then ASA. We were quite comfortable with the performance, it never failed. But our old solution was coming to end-of-life. Also, this is able to more block more threats from the application layer, etc.

The most important criteria when selecting a vendor are 

  • reputation
  • technology
  • features
  • cost.
View full review »
it_user698424 - PeerSpot reviewer
Network Engineer at a tech vendor with 10,001+ employees

We have only used Cisco security devices.

View full review »
it_user477366 - PeerSpot reviewer
Security Technical Architect at a tech services company with 10,001+ employees

We are part of the integrator space. When we changed products, it was to displace a product that no longer met the client’s requirements.

View full review »
MZ
Middle-Tier Admin Integrator at a tech services company with 51-200 employees

Not reliable for long term -- seem inferior quality

View full review »
it_user243897 - PeerSpot reviewer
Cisco Systems Engineer at a tech services company with 1,001-5,000 employees

We previously used Microsoft ISA and switched because it's no longer supported.

View full review »
JR
Enterprise Integration Architect at a insurance company with 10,001+ employees

Previously, we used other products. We used Fortinet and CheckPoint.

View full review »
PS
Executive Director at ict training and development center

We typically offer clients a few different solutions. For example, we may recommend Fortinet.

View full review »
it_user208356 - PeerSpot reviewer
Security Engineer at a tech services company with 201-500 employees

I was actually using ASA and I switched to another one.

View full review »
it_user242529 - PeerSpot reviewer
Network Consultant at a tech services company with 51-200 employees

Mainly customers switch from other vendor because of VPN features, ease-of-management, and good consultant/partner relationship.

View full review »
it_user234789 - PeerSpot reviewer
Chief Technical Officer at a comms service provider with 501-1,000 employees

No previous solution was used.

View full review »
SK
Senior MIS Manager at a tech company with 201-500 employees

I have knowledge of Palo Alto and Fortinet.

While those two are easier to set up and control, nothing compares to Cisco in terms of security. They're very strong in that regard. We also find Cisco to be more stable.

However, we only use Cisco firewalls in our organization. We don't use anything else.

View full review »
it_user637233 - PeerSpot reviewer
Presales Consultant at a tech services company with 51-200 employees

Old ASA 5500. Natural upgrade to next generation functions.

View full review »
AM
IT Operation Manager

We were using TippingPoint as an IPS and ZyXEL ZyWALL as a VPN server.
Cisco has good documentation and it is easy for Cisco certified engineers.

View full review »
it_user1307058 - PeerSpot reviewer
Network Consulting Engineer at a comms service provider with 201-500 employees

Prior to Cisco ASA, my client was using Fortinet FortiGate. They switched because there were complaints about the connection being slow.

View full review »
it_user654645 - PeerSpot reviewer
Senior Network Specialist

We did not use a previous solution.

View full review »
it_user341043 - PeerSpot reviewer
System and Network Administrator at a hospitality company with 501-1,000 employees

We moved our VPN termination from a Cisco ASR to an ASA. We switched because the ASR was not scalable and we realized it was a bad idea to use the same device for routing and VPN termination.

View full review »
it_user243879 - PeerSpot reviewer
Network Security Engineer at a tech services company with 1,001-5,000 employees

Mainly switching from the old Cisco PIX to a new Cisco ASA. The reason for switching is to get a higher throughput, and due to the fact the that the Cisco PIX went EoL.

View full review »
RM
Consultor at a government with 201-500 employees

I have used Fortinet, Palo Alto, and Check Point previously and I prefer the process of everything working together. We are in the process of moving on to Fortinet from this solution.

View full review »
it_user511224 - PeerSpot reviewer
IT Support Engineer

The previous product was limited in throughput and security.

View full review »
ED
Founder, CEO, & President at Krystal Sekurity

We were looking to upgrade to a comprehensive firewall solution that integrated Next Generation Prevention System (NGIPS).

View full review »
PT
Support Engineer at a tech services company with 51-200 employees

We started with Cisco Firepower.

View full review »
it_user850275 - PeerSpot reviewer
Pre-sales engineer with 51-200 employees
it_user590484 - PeerSpot reviewer
Sr Network Engineer at a tech services company with 501-1,000 employees

Version 5515 is better than 5510 or 5505.

View full review »
it_user293883 - PeerSpot reviewer
System/Network administrator at a computer software company with 501-1,000 employees

I used a Cisco 881 router as a firewall and VPN solution. ASA allows conformity and various amounts of functionality in work.

View full review »
it_user254346 - PeerSpot reviewer
Business Development Director with 51-200 employees

We previously used IPtables, and switched because there was a lack of technical support, RMA, etc.

View full review »
ME
Solution Architect at a tech services company with 11-50 employees

Prior to the Next Generation firewall, my clients were using Cisco ASA for more than 10 years.

View full review »
it_user793611 - PeerSpot reviewer
Account Manager

We switched from our previous solution because of scalability issues.

View full review »
it_user242523 - PeerSpot reviewer
Network Security Administrator at a tech company with 5,001-10,000 employees

I've only worked for integrator or ISP organizations. Over the years I’ve worked with multiple solutions offered by different vendors due to my customers’ budgets or preferences. What makes it the best of all the solutions I’ve worked on is the stability and its hardware.

View full review »
it_user241755 - PeerSpot reviewer
Senior Network and Security Engineer at a tech services company with 51-200 employees

I have migrated customers from Cisco's competitors to ASA's.

View full review »
KS
CEO & Co-Founder at a tech services company with 51-200 employees

Initially, we started with some open-source alternatives, like Opium, but eventually, we thought of moving towards a proven solution. We just did a study. We didn't put the open-source solution into production. One of our customers was basically suggesting us to go with this one, and we went for it. We did not get time to go through, study, and explore different options because we didn't have the bandwidth for testing the complete features of the open-source alternatives. Therefore, we thought of going for a commercial solution. A lot of alternatives are available right now for this solution.

View full review »
GS
Center for Creative Leadership at a training & coaching company with 501-1,000 employees

We did not previously use a different solution. 

View full review »
it_user682167 - PeerSpot reviewer
Network and System Engineer at a non-tech company with 201-500 employees

I worked with Cyberoam and Fortinet UTM at my previous job. When I joined my present company, they were already using the Cisco ASA solution. But my present company may switch to other vendors, especially Fortinet, because of the license renewal price.

View full review »
it_user470943 - PeerSpot reviewer
ICT Manager - Network Operations at a healthcare company

Watchguard Firewall. Switched due to license cost.

View full review »
it_user400626 - PeerSpot reviewer
Senior Network & Data Communication Engineer at a tech services company with 201-500 employees

Yes. We changed for no special reason, just to mix things up.

View full review »
it_user349320 - PeerSpot reviewer
Corporate Information Security Officer

We used Cisco PIX.

View full review »
it_user275442 - PeerSpot reviewer
Senior Presales Engineer at a tech services company with 501-1,000 employees
it_user237354 - PeerSpot reviewer
Sr. Network Engineer at a tech services company with 10,001+ employees

I previously used CheckPoint, and switched because of the UTM features.

View full review »
it_user212700 - PeerSpot reviewer
Senior Network Engineer at a aerospace/defense firm with 51-200 employees

Yes and we switched because we needed a fully redundant solution.

View full review »
HD
Network Engineer at a tech services company with 201-500 employees

We have some experience working with Palo Alto and Fortinet solutions as well.

View full review »
it_user346116 - PeerSpot reviewer
I.T Security Consultant

We’ve always used ASA from the get go. We added the UTM is to compliment it.

View full review »
it_user614874 - PeerSpot reviewer
Gerente de Telecomunicaciones at a financial services firm with 1,001-5,000 employees

We didn’t have a previous solution. I actually searched after another solution.

View full review »
it_user240063 - PeerSpot reviewer
Network Security Engineer at a manufacturing company with 10,001+ employees

Yes, I used a normal model of Cisco ASA and found it a  very successful experience. Therefore we have it to a more advanced ASA box for improved, and more advanced, security management.

View full review »
it_user430797 - PeerSpot reviewer
Network Engineer at a mining and metals company with 1,001-5,000 employees

We have used it from the beginning.

View full review »
it_user200313 - PeerSpot reviewer
Security Consultant at Accenture

No, I worked with this product by working for a client.

View full review »
it_user821520 - PeerSpot reviewer
Information Systems Manager at a manufacturing company with 201-500 employees

We have always been with Cisco.

View full review »
it_user697185 - PeerSpot reviewer
Consultant

Check Point. We moved to Firepower as an internal firewall to manage internal access and other network load.

View full review »
it_user387540 - PeerSpot reviewer
I.T. Security/Projects Specialist at a tech services company with 501-1,000 employees

There was no other solution in place.

View full review »
OC
Network Engineer at IT Security

I worked with Check Point, but Cisco Firepower is better. It was an easy transfer to this solution. We chose Cisco because of its trustworthy reputation. They're a big, recognized brand.  

The most important criteria that we consider when evaluating a solution are performance, administration, and price.

View full review »
it_user456837 - PeerSpot reviewer
Project Manager with 11-50 employees

I implement solutions on several clients, Redneet is a technology integration company and I prefer Cisco ASA for my security solutions.

View full review »
it_user242523 - PeerSpot reviewer
Network Security Administrator at a tech company with 5,001-10,000 employees

I previously used a Fortinet solution. I switched to Cisco because Fortinet lacked
stability and robust troubleshooting features.

View full review »
MS
Network Security Presales Engineer at a tech services company with 51-200 employees

Previously, I was working with Fortinet. I would most likely recommend Fortinet, because of the price and the security fabric integration with other products. It's scalable as well, and all of the FortiGate features are useful.

It's very easy to implement and it's very easy to administrate.

View full review »
it_user857937 - PeerSpot reviewer
ICT Manager with 1-10 employees

We just shortlisted Cisco and Fortinet.

View full review »
it_user674844 - PeerSpot reviewer
Executive Manager with 11-50 employees

I used Juniper Networks and I switched due to the lack of technical and sales support in Romania.

View full review »
it_user240570 - PeerSpot reviewer
Network, Unix and Security Engineer at a tech services company with 501-1,000 employees

Yes we previously used Linux and we moved because Cisco is great.

View full review »
it_user764139 - PeerSpot reviewer
Solutions Architect at a tech services company with 51-200 employees

No, Cisco was part of our solution from the start.

View full review »
BB
Security Consultant at a tech services company with 51-200 employees

I have not worked with equipment from OEMs other than Cisco. It's the only vendor I use.

View full review »
it_user570603 - PeerSpot reviewer
IT Manager at a manufacturing company

I couldn’t meet all my needs with the Cisco 5505 so I changed it with a next-generation firewall.

View full review »
it_user241743 - PeerSpot reviewer
Network System Engineer with 51-200 employees

Yes we did, but we switched due to Ciscos ASA's ability to support big data stream in some networks.

View full review »
Buyer's Guide
Cisco Secure Firewall
April 2024
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
767,995 professionals have used our research since 2012.