Most Helpful Review
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Unfortunately in Cisco, only the hardware was good.
For us, the most valuable features are the IPX and the Sourcefire Defense Center module. That gives us visibility into the traffic coming in and going out, and gives us the heads-up if there is a potential outbreak or potential malicious user who is trying to access the site. It also helps us see traffic generated by an end device trying to reach out to the world.
The information coming from Talos does a good job... I like the fact that Cisco is working with them and getting the information from them and updating the firewall.
The firepower sensors have been great; they do a good job of dropping unwanted traffic.
The most important point is the detection engine which is now part of the next-generation firewalls and which is supported by Cisco Talos.
The most valuable feature of this solution is AMP (Advanced Malware Protection), as this is really needed to protect against cyber threats.
I like the Cisco ASDM (Adaptive Security Device Manager), which is the configuration interface for the Cisco firewall.
The technical team is always available when we have problems.
Great security and connectivity.
The solution has many useful features. For example, the solution allows users to create virtual IP addresses.
Performance and stability are the key features of this product.
The solution is very stable. When comparing it to other environments, it's actually quite impressive.
The Layer four features are okay and meet my business needs.
The architecture of the OS in Juniper is very good. It's flexibility, scalability, and the technicality is also good.
There are a few valuable features that offer very good quality on the solution. Especially NetScreen. We used to use NetScreen for the the product line. It was a very mature solution, very robust, easy to configure, easy to manage, etc. It made it easy to do everything.
The initial setup was very straightforward. There was no problem. The initial deployment took about one hour.
It's much faster to deploy a power source. If you need to deploy a firewall in the cloud of software, it's much easier and much faster than deploying the office firewall in a rush.
The features we found most valuable are using the IDS and IPS during protection. The application filtering feature is great.
The authentication part is seamless and easy for people.
It is easy for me to go in and update settings, make changes, or add/remove rules or security.
The technical support has been good.
In NGFW, Cisco should be aligned with the new technology and inspection intelligence because Cisco is far behind in this pipeline.
We were also not too thrilled when Cisco announced that in the upcoming new-gen ASA, iOS was not going to be supported, or if you install them, they will not be able to be managed through the Sourcefire. However, it seems like Cisco is moving away from the ASA iOS to the Sourcefire FireSIGHT firmware for the ASA. We haven't had a chance to test it out.
Our latest experience with a code upgrade included a number of bugs and issues that we ran into. So more testing with their code, before it hits us, would help.
The software was very buggy, to the point it had to be removed.
Most users do not have awareness of this product's functionality and features. Cisco should do something to make them aware of them. That would be quite excellent and useful to organizations that are still using legacy data-center-security products.
I have found that Cisco reporting capabilities are not as rich as other products, so the reporting could be improved.
The Sandbox and the Web Censoring in this solution need to be improved.
It will be nice if they had what you traditionally would use a web application scanner for. If the solution could take a deeper look into HTTP and HTTPS traffic, that would be nice.
The interface could be improved, it's not very user friendly.
The solution doesn't offer the same capabilities of Fortinet. It should offer intrusion prevention and advance filtering. These are two very useful features offered on Fortinet that Azure lacks.
The product could be made more customizable.
We find it's different implementing it region-to-region. It might help if it was universal across all regions.
This solution is not mature when it comes to handling perimeter traffic like internet browsing.
In the next release, I would like to see improvements made to the GUI because it isn't very good.
We have some weird errors and some weird behavior on the solution occasionally. The device gets buggy without anyone touching it. It would work and then suddenly stop. Sometimes you need to just move the cards out and restart it again, and it will work. The solution itself, the hardware and the software, there must be some bugs that need to be dealt with.
I've talked to people that say Juniper now, as a device, can be a solution for a data center, but in the past, I have not seen this as being possible.
They really need to improve the GUI.
he stability could be improved.
The pricing still needs some improvement.
Right now, we are going through issues and problems where the product gets dropped with the connection or during the authentication initial phase. While it could be our problem, we would like to see more stability in this area.
The user interface could always be better. They could make it simpler and more intuitive.
Pricing and Cost Advice
Always consider what you might need to reduce your wasted time and invest it in other solutions.
Pricing varies on the model and the features we are using. It could be anywhere from $600 to $1000 to up to $7,000 per year, depending on what model and what feature sets are available to us.
We used Check Point and the two are comparable. Cost was really what put us onto the ASAs... the price tag for Check Point was exorbitantly more than what it is for the ASA solution.
We are in the process of renewing our three-year license, which costs approximately $24,000 USD for the thirty-six months.
The pricing for Cisco products is higher than others, but Cisco is a very good, strong, and stable technology.
The program is very expensive.
The cost of this solution is high.
Some of our customers would be more likely to standardize on Cisco equipment if the cost was lower because a lot of people install cheap equipment.
Information Not Available
After some research, I think that the cost of Juniper is more than Check Point, Palo Alto, and Fortinet.
It is not that costly.
Our experience purchasing the solution through the AWS Marketplace was good.
We like pricing through the AWS Marketplace.
Compared 38% of the time.
Compared 10% of the time.
Compared 10% of the time.
Compared 17% of the time.
Compared 16% of the time.
Compared 14% of the time.
Compared 100% of the time.
Also Known As
|Cisco ASA, Adaptive Security Appliance, ASA, Cisco Sourcefire Firewalls|
Adaptive Security Appliance (ASA) is Cisco's end-to-end software solution and core operating system that powers the Cisco ASA product series. This software solution provides enterprise-level firewall capabilities for all types of ASA products, including blades, standalone appliances and virtual devices. Adaptive Security Appliance provides protection to organizations of all sizes, and allows end-users to access information securely anywhere, at any time, and through any device.
Adaptive Security Appliance is also fully compatible with other key security technologies, and so provides organizations with an all-encompassing security solution.
Block more threats and quickly mitigate those that do breach your defenses with the industry’s first threat-focused NGFW.
Azure Firewall is a managed, cloud-based network security service that protects your Azure Virtual Network resources. It is a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability.
|The vSRX offers the same features as physical SRX Series firewalls but in a virtualized form factor for delivering security services that scale to match network demand. It offers the same features as the SRX appliance, including core firewall, robust networking, full next-gen capabilities, and automated life-cycle management. It handles speed up to 100 Gbps. It supports Juniper Contrail, OpenContrail, and third-party software-defined networking (SDN) solutions and integrates with cloud orchestration tools. Deployed in your private cloud, vSRX protects against the lateral spread of advanced threats between virtual machines within your network borders. It provides scalable application security for dynamic workloads and protects mission-critical applications from known and unknown threats. Also the vSRX virtual firewall helps you seamlessly extend your private cloud into public cloud environments, securely moving data and workloads with ease. As a VPN gateway, the vSRX provides remote users with safe access to their workloads. As a segmentation gateway, the vSRX protects public-cloud workloads by blocking lateral threats using application policies that help maintain security and compliance.|
Learn more about Cisco ASA NGFW
Learn more about Azure Firewall
Learn more about Juniper vSRX
|There are more than one million Adaptive Security Appliances deployed globally. Top customers include First American Financial Corp., Genzyme, Frankfurt Airport, Hansgrohe SE, Rio Olympics, The French Laundry, Rackspace, and City of Tomorrow.|
Information Not Available
|Expedient Data Centers|
Financial Services Firm19%
Comms Service Provider9%
Software R&D Company28%
Comms Service Provider19%
Software R&D Company42%
Comms Service Provider13%
Real Estate/Law Firm7%
No Data Available
No Data Available