MD.SIHAB TALUKDARSystem Engineer at a non-profit
Ramish AliAssistant Director IT at Punjab Education Foundation
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"I like the way Firepower presents the data. It gives you two classifications for the evidence, something based on the priority of the evidence and another classification based on the impact of the evidence in your environment. This makes it very easy to spot the evidence that is most impactful to my environment. Instead of having to go through all the evidence based on that priority, I can focus on the evidence that has the most impact on my environment."
"The most valuable feature of the Firepower solution is FireSIGHT, which can be easily managed and is user-friendly."
"Once you add Firepower onto to it and you start enabling some of its features, you get some IDS/IPS involved with it and you can even do web filtering."
"The most valuable features of Cisco firewalls are the IPS and IDS items. We find them very helpful. Those are the biggest things because we have some odd, custom-made products in our environment. What we've found through their IPS and IDS is that their vulnerability engines have caught things that are near-Zero-day items, inside of our network."
"The IPS, as well as the malware features, are the two things that we use the most and they're very valuable."
"The protection and security features, like URL filtering, the inspection, and the IPS feature, are also very valuable for us. We don't have IT staff at most of the sites so for us it's important to have a robust firewall at those sites"
"We can easily track unauthorized users and see where traffic is going."
"With the FMC and the FirePOWERs, the ability to quickly replace a piece of hardware without having to have a network outage is useful. Also, the ability to replace a piece of equipment and deploy the config that the previous piece of equipment had is pretty useful."
"The features I find most valuable is the VPN and the fact that we can apply our policies to the program."
"Scalability is good; the company wants to be able to handle large customers."
"Their GPS possibilities and the security that it has, especially the SD-WAN functionality, is very good."
"The interface is very user-friendly and it is quite easy to use."
"What I like best about this product are the support and the features."
"Ability to manage multiple firewalls."
"Good identity fire walling, malware protection and application control features."
"Its stability and SD-WAN features are the most valuable."
"The most valuable features are the flexibility and level of security that this solution provides."
"A powerful enterprise security solution that is dependible."
"The most valuable feature is that it has the ability to divide the network into three parts; internal, external, and DMZ."
"The technical team is always available when we have problems."
"The stability of the solution is very good. We can see that it gets even better with every release."
"I like the Cisco ASDM (Adaptive Security Device Manager), which is the configuration interface for the Cisco firewall."
"The most valuable feature of this solution is AMP (Advanced Malware Protection), as this is really needed to protect against cyber threats."
"The most important point is the detection engine which is now part of the next-generation firewalls and which is supported by Cisco Talos."
"Also, they have a Firepower source file that I can work on the ASA device and on Firepower devices. A problem here lies in the way that you manage these devices. Some devices do not support the FMC, and some devices have to be managed through ASDM, and others have to be managed through FMC."
"I would like to see the inclusion of more advanced antivirus features in the next release of this solution."
"In Firepower, there is an ability to search and dig into a search, which is nice. However, I'm not a super fan of the way it scrolls. If you want to look at something live, it's a lot different. You're almost waiting. With the ASDM, where it just flows, you can really see it. The second someone clicks something or does something, you'll see it. The refresh rate on the events in Firepower is not as smooth."
"The worst part of the entire solution, and this is kind of trivial at times, is that management of the solution is difficult. You manage FireSIGHT through an internet browser. I've had Cisco tell me to manage it through Firefox because that's how they develop it. The problem is, depending on the page you're on, they don't function in the same way. The pages can be very buggy, or you can't resize columns in this one, or you can't do certain things in that one. It causes a headache in managing it."
"For the new line of FTDs, the performance could be improved. We sometimes have issues with the 41 series, depending what we activate. If we activate too many intrusion policies, it affects the CPU."
"The user interface for the Firepower management console is a little bit different from traditional Cisco management tools. If you look at products we already use, like Cisco Prime or other products that are cloud-based, they have a more modern user interface for managing the products. For Firepower, the user interface is not very user-friendly. It's a little bit confusing sometimes."
"We would like to see improvement in recovery. If there is an issue that forces us to do recovery, we have to restart or reboot. In addition, sometimes we have downtime during the maintenance windows. If Cisco could enhance this, so that upgrades would not necessarily require downtime, that would be helpful."
"We had an event recently where we had inbound traffic for SIP and we experienced an attack against our SIP endpoint, such that they were able to successfully make calls out... Both CTR, which is gathering data from multiple solutions that the vendor provides, as well as the FMC events connection, did not show any of those connections because there was not a NAT inbound which said either allow it or deny it."
"I would like to see a more user-friendly dashboard and an easier interface."
"If you experience an attack it can take a very long time to find a solution."
"If you have another brand of VPN where you have to put an SSL VPN between two devices, Barracuda doesn't support that at a certain point. You can't actually build the VPN between Barracuda and a different device of a different brand."
"Technical support used to be at a very high level but it is now a bit less so."
"The interface should be more user-friendly and it should be easier to configure."
"Command line could be more user friendly."
"The analytics are weak."
"The administration UI could be better. It should also have better application detection policies."
"There was an error in the configuration, related to our uplink switches, that caused us to contact technical support, and it took a very long time to resolve the issue."
"The GUI interface could be improved when compared to other solutions."
"I would like for the user interface to be easier for the admin and network admin. I would also like to be able to access everything from the GUI interface. The way it is now, it needs somebody experience in iOS to be able to operate it. I would like to have a GUI interface."
"It will be nice if they had what you traditionally would use a web application scanner for. If the solution could take a deeper look into HTTP and HTTPS traffic, that would be nice."
"The Sandbox and the Web Censoring in this solution need to be improved."
"I have found that Cisco reporting capabilities are not as rich as other products, so the reporting could be improved."
"Most users do not have awareness of this product's functionality and features. Cisco should do something to make them aware of them. That would be quite excellent and useful to organizations that are still using legacy data-center-security products."
"The software was very buggy, to the point it had to be removed."
"The price of this solution is not good or bad."
"The Firepower series of appliances is not cheap. I just got a quote recently for six firewalls that was in the range of over half-a-million dollars. That's what could push us to look to other vendors..."
"Our subscription costs, just for the firewalls, is between $400,000 and $500,000 a year."
"Cisco's pricing is high, at times, for what they provide."
"The one-time cost is affordable, but the maintenance cost and the Smart Net costs need to be reduced. They're too high."
"We normally license on a yearly basis. The hardware procurement cost should be considered. If you're virtual maybe that cost is eradicated and just the licensing cost is applied. If you have hardware the cost must be covered by you. All the shipping charges will be paid by you also. I don't thing there are any other hidden charges though."
"Cisco pricing is premium. However, they gave us a 50 to 60 percent discount."
"There are additional implementation and validation costs."
"We pay around 150 to 200 Euros per year and there are no additional costs."
"The solution costs more than 800 Euros to purchase an F18, which is an entry model, and then another 500 Euros for instant replacement, and 500 Euros for energized updates. The total package would be around 1,900 Euros for five years license and all updates for an entry model."
"The 600 series is about USD $10,000 a year and the 80 is USD $400 a year."
"Its licensing is on a yearly basis. There is an upfront purchase price, and there is also an annual maintenance fee. There are no additional fees."
"The program is very expensive."
"The pricing for Cisco products is higher than others, but Cisco is a very good, strong, and stable technology."
"We are in the process of renewing our three-year license, which costs approximately $24,000 USD for the thirty-six months."
"We used Check Point and the two are comparable. Cost was really what put us onto the ASAs... the price tag for Check Point was exorbitantly more than what it is for the ASA solution."
"Pricing varies on the model and the features we are using. It could be anywhere from $600 to $1000 to up to $7,000 per year, depending on what model and what feature sets are available to us."
"In terms of costs, other solutions are more expensive than Cisco. Palo Alto is more expensive than Cisco."
"There is room for improvement in the pricing when compared to the market. Although, when you compare the benefits of support from Cisco, you can adjust the value and it becomes comparable, because you usually need very good support. So you gain value there with this device."
"When it comes to Cisco, the price of everything is higher. Cisco firewalls are expensive, but we get support from Cisco, and that support is very active."
Cisco NGFW firewalls deliver advanced threat defense capabilities to meet diverse needs, from
small/branch offices to high performance data centers and service providers. Available in a wide
range of models, Cisco NGFW can be deployed as a physical or virtual appliance. Advanced threat
defense capabilities include Next-generation IPS (NGIPS), Security Intelligence (SI), Advanced
Malware Protection (AMP), URL filtering, Application Visibility and Control (AVC), and flexible VPN
features. Inspect encrypted traffic and enjoy automated risk ranking and impact flags to reduce event
volume so you can quickly prioritize threats. Cisco NGFW firewalls are also available with clustering
for increased performance, high availability configurations, and more.
Cisco Firepower NGFWv is the virtualized version of Cisco's Firepower NGFW firewall. Widely
deployed in leading private and public clouds, Cisco NGFWv automatically scales up/down to meet
the needs of dynamic cloud environments and high availability provides resilience. Also, Cisco NGFWv
can deliver micro-segmentation to protect east-west network traffic.
Cisco firewalls provide consistent security policies, enforcement, and protection across all your
environments. Unified management for Cisco ASA and FTD/NGFW physical and virtual firewalls is
delivered by Cisco Defense Orchestrator (CDO), with cloud logging also available. And with Cisco
SecureX included with every Cisco firewall, you gain a cloud-native platform experience that enables
greater simplicity, visibility, and efficiency.
Learn more about Cisco’s firewall solutions, including virtual appliances for public and private cloud.
Barracuda's Cloud Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations and applications, connects on-premises and cloud infrastructures, and helps organizations transform their business.
Cisco ASA firewalls deliver enterprise-class firewall functionality with highly scalable and flexible VPN capabilities to meet diverse needs, from small/branch offices to high performance data centers and service providers. Available in a wide range of models, Cisco ASA can be deployed as a physical or virtual appliance. Flexible VPN capabilities include support for remote access, site-to-site, and clientless VPN. Also, select appliances support clustering for increased performance, VPN load balancing to optimize available resources, advanced high availability configurations, and more.
Cisco ASAv is the virtualized version of the Cisco ASA firewall. Widely deployed in leading private and public clouds, Cisco ASAv is ideal for remote worker and multi-tenant environments. The solution scales up/down to meet performance requirements and high availability provides resilience. Also, Cisco ASAv can deliver micro-segmentation to protect east-west network traffic.
Cisco firewalls provide consistent security policies, enforcement, and protection across all your environments. Unified management for Cisco ASA and FTD/NGFW physical and virtual firewalls is delivered by Cisco Defense Orchestrator (CDO), with cloud logging also available. And with Cisco SecureX included with every Cisco firewall, you gain a cloud-native platform experience that enables greater simplicity, visibility, and efficiency.
Barracuda CloudGen Firewall is ranked 24th in Firewalls with 9 reviews while Cisco ASA Firewall is ranked 3rd in Firewalls with 67 reviews. Barracuda CloudGen Firewall is rated 7.8, while Cisco ASA Firewall is rated 8.0. The top reviewer of Barracuda CloudGen Firewall writes "Good SIEM and a dynamic VPN with good scalability". On the other hand, the top reviewer of Cisco ASA Firewall writes "Gives us visibility into potential outbreaks as well as malicious users trying to access the site". Barracuda CloudGen Firewall is most compared with Fortinet FortiGate, Sophos XG, SonicWall TZ, Palo Alto Networks WildFire and Sophos UTM, whereas Cisco ASA Firewall is most compared with Fortinet FortiGate, Palo Alto Networks WildFire, Meraki MX and Juniper SRX. See our Barracuda CloudGen Firewall vs. Cisco ASA Firewall report.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.