Compare Cisco Adaptive Security Appliance (ASA) Firewall vs. Meraki MX

Cancel
You must select at least 2 products to compare!
Most Helpful Review
Find out what your peers are saying about Cisco Adaptive Security Appliance (ASA) Firewall vs. Meraki MX and other solutions. Updated: March 2020.
437,168 professionals have used our research since 2012.
Quotes From Members

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:

Pros
Unfortunately in Cisco, only the hardware was good.The traffic inspection and the Firepower engine are the most valuable features. It gives you full details, application details, traffic monitoring, and the threats. It gives you all the containers the user is using, especially at the application level. The solution also provides application visibility and control.If we look at the Cisco ASA without Firepower, then one of the most valuable features is the URL filtering.It's easy to integrate ASA with other Cisco security products. When you understand the technology, it's not a big deal. It's very simple.The benefits we see from the ASA are connected to teleworking as well as, of course, having the basic functionality of a firewall in place and the prevention of attacks.On the network side, where you create your rules for allowing traffic — what can come inside and what can go out — that works perfectly, if you know what you want to achieve. It protects you.If you have a solution that is creating a script and you need to deploy many implementations, you can create a script in the device and it will be the same for all. After that, you just have to do the fine tuning.They provide DDoS protection and multi-factor authentication. That is a good option as it enables work-from-home functionality.

More Cisco Adaptive Security Appliance (ASA) Firewall Pros »

It has the most advanced security features, for example, layer 3 and layer 7 firewall capabilities and the end team and IPS protection. It also has IPS, and it has very good functioning of cloning services. You don't actually have to touch the device. If you have multiple companies in different countries, you don't really require this device to be touched. You can get it delivered directly to any office of a country, and then you can simply put your configuration over the cloud. It's very simplified and easy to manage. It gives a very good granular visibility about your network. Earlier, a lot of things were lacking in the network. We were unable to identify where the problem was, but after implementing Meraki MX, we are able to dig down and identify where is the problem. We can easily and quickly identify the sources and the root causes of the issues.We've had no issues with the scalability or the stability of this solutionThe most valuable feature is that we didn't have any problems with Meraki MX.Point-to-point VPNs can dynamically follow IP changes with no need for static IPs.Dual WAN connections are greatly simplified and point-to-point VPNs automatically connect regardless of what WAN connection is active.I like the automatic firmware updates. We use the Active Directory to authenticate VPN users.I use Meraki in my POCs and with my customers as well.The internet traffic shaping has been very valuable.

More Meraki MX Pros »

Cons
In NGFW, Cisco should be aligned with the new technology and inspection intelligence because Cisco is far behind in this pipeline.Security generally requires integration with many devices, and the management side of that process could be enhanced somewhat. It would help if there was a clear view of the integrations and what the easiest way to do them is.One area where the ASA could be improved is that it doesn't have AMP. When you get an ASA with the Firepower model, ASA with FTD, then you have advanced malware protection.If I want to activate IPS features on it, I have to buy another license. If I want Cisco AnyConnect, I have to buy another license. That's where we have challenges.Cisco missed the mark with all the configuration steps. They are a pain and, when doing them, it looks as if we're using a very old technology — yet the technology itself is not old, it's very good. But the front-end configuration is very tough.Cisco provides us with application visibility and control, although it's not a complete solution compared to other vendors. Cisco needs to work on the application behavior side of things, in particular when it comes to the behavior of SSL traffic.It is expensive.We were also not too thrilled when Cisco announced that in the upcoming new-gen ASA, iOS was not going to be supported, or if you install them, they will not be able to be managed through the Sourcefire. However, it seems like Cisco is moving away from the ASA iOS to the Sourcefire FireSIGHT firmware for the ASA. We haven't had a chance to test it out.

More Cisco Adaptive Security Appliance (ASA) Firewall Cons »

From the improvement perspective, we need more monitoring capabilities. We want to have full-based access visibility, such as, what is happening when something is trying to reach and it is denying. We cannot see some parts of it. The integration of active directory with this product is not very fruitful. It has some bugs or lacks in the functionality of active directory integration. We are unable to identify where exactly and whether it has really applied our policy.The security is not as strong as it could beManagement can be improved in Meraki MX.Meraki tech support staff have a lot more visibility into your network than you do, which is frustrating at times. I understand the approach is to keep the dashboard easier to understand. This will frustrate more advanced users at times.​Expensive licensing and firewall stops immediately working if the license is not renewed at expiration date.I need more UTM protection security features.The IPS, the Intrusion Prevention System, can be improved.Load balancing options and ability to manage a couple of Internet connections.

More Meraki MX Cons »

Pricing and Cost Advice
Always consider what you might need to reduce your wasted time and invest it in other solutions.There is room for improvement in the pricing when compared to the market. Although, when you compare the benefits of support from Cisco, you can adjust the value and it becomes comparable, because you usually need very good support. So you gain value there with this device.When it comes to Cisco, the price of everything is higher. Cisco firewalls are expensive, but we get support from Cisco, and that support is very active.It's a brilliant firewall, and the fact that it comes with a perpetual license really does go far in terms of helping the organization in not having to deal with those costs on an annual basis. That is a pain point when it comes to services like the ones we have on Fortigate. That's where we really give Cisco firewalls the thumbs up.Cisco is expensive, but you do get benefits for the price.In terms of costs, other solutions are more expensive than Cisco. Palo Alto is more expensive than Cisco.Pricing varies on the model and the features we are using. It could be anywhere from $600 to $1000 to up to $7,000 per year, depending on what model and what feature sets are available to us.We used Check Point and the two are comparable. Cost was really what put us onto the ASAs... the price tag for Check Point was exorbitantly more than what it is for the ASA solution.

More Cisco Adaptive Security Appliance (ASA) Firewall Pricing and Cost Advice »

The license cost depends on the box. We acquired a different product line. We are dealing with MX appliance now, that is, MX6, MX54, MX100, MX250, MX450. Every box has got an identity, and it has got its own specification. Every box has got a different license fee. We deployed Meraki MX in UAE when it was not a mature product. We took a risk, but we were successful. We saved a huge amount of money after implementing and removing all the MPLS and leased lines. We got a broadband connection because Meraki MX could work on a broadband connection. We have drastically saved a very good amount of money, which was one of the successful things apart from the successful solution.The price varies depending on the hardware platform as well as the type of license and whether you're adding security or not.​Other content filtering solutions that I have used had more bells and whistles, but given the cost, complexity, and management overhead, I am very pleased with Meraki’s solution.Meraki is also expensive, but it's a little bit less expensive and it's easier to configure than Cisco ASA.Pricing varies as per the type of license.

More Meraki MX Pricing and Cost Advice »

report
Use our free recommendation engine to learn which Firewalls solutions are best for your needs.
437,168 professionals have used our research since 2012.
Questions from the Community
Top Answer: Fortinet FGs: Great devices, relatively easy to deploy and maintain. Cheaper than most devices of their kind. If you're looking for a lot of features at a relatively low price point this is the way to… more »
Top Answer: They provide DDoS protection and multi-factor authentication. That is a good option as it enables work-from-home functionality.
Top Answer: In terms of costs, other solutions are more expensive than Cisco. Palo Alto is more expensive than Cisco.
Top Answer: I presume the topic is UTM appliances (as Meraki and Sophos have many products). Any physical site connected to the Internet needs some kind of a firewall, yes? That firewall should be at the site… more »
Top Answer: We have Meraki Mx devices now, we are looking to replace them. But that is because the Meraki MX platform lacks SSL Inspection, Granular Firewall rules (Block only, no allow setting), client vpn… more »
Ranking
2nd
out of 55 in Firewalls
Views
67,223
Comparisons
50,354
Reviews
41
Average Words per Review
613
Avg. Rating
7.9
Views
47,313
Comparisons
37,471
Reviews
16
Average Words per Review
513
Avg. Rating
8.2
Popular Comparisons
Compared 35% of the time.
Compared 7% of the time.
Compared 7% of the time.
Compared 6% of the time.
Also Known As
Cisco ASA Firewall, Cisco ASA NGFW, Cisco ASA, Adaptive Security Appliance, ASA, Cisco Sourcefire FirewallsMX64, MX64W, MX84, MX100, MX400, MX600
Learn
Cisco
Cisco
Overview

Cisco ASA firewalls deliver enterprise-class firewall functionality with highly scalable and flexible VPN capabilities to meet diverse needs, from small/branch offices to high performance data centers and service providers. Available in a wide range of models, Cisco ASA can be deployed as a physical or virtual appliance. Flexible VPN capabilities include support for remote access, site-to-site, and clientless VPN. Also, select appliances support clustering for increased performance, VPN load balancing to optimize available resources, advanced high availability configurations, and more.

Cisco ASAv is the virtualized version of the Cisco ASA firewall. Widely deployed in leading private and public clouds, Cisco ASAv is ideal for remote worker and multi-tenant environments. The solution scales up/down to meet performance requirements and high availability provides resilience. Also, Cisco ASAv can deliver micro-segmentation to protect east-west network traffic.

Cisco firewalls provide consistent security policies, enforcement, and protection across all your environments. Unified management for Cisco ASA and FTD/NGFW physical and virtual firewalls is delivered by Cisco Defense Orchestrator (CDO), with cloud logging also available. And with Cisco SecureX included with every Cisco firewall, you gain a cloud-native platform experience that enables greater simplicity, visibility, and efficiency.

Learn more about Cisco’s firewall solutions, including virtual appliances for public and private cloud.

With the proliferation of modern applications and mixed-use networks, host and port based security is no longer sufficient. Cisco Meraki's layer 7 "next generation" firewall, included in MX security appliances and every wireless AP, gives administrators complete control over the users, content, and applications on their network.
Offer
Learn more about Cisco Adaptive Security Appliance (ASA) Firewall
Learn more about Meraki MX
Sample Customers
There are more than one million Adaptive Security Appliances deployed globally. Top customers include First American Financial Corp., Genzyme, Frankfurt Airport, Hansgrohe SE, Rio Olympics, The French Laundry, Rackspace, and City of Tomorrow.Hyatt, ONS
Top Industries
REVIEWERS
Financial Services Firm20%
Manufacturing Company10%
Comms Service Provider9%
University8%
VISITORS READING REVIEWS
Computer Software Company28%
Comms Service Provider22%
Media Company6%
Government5%
REVIEWERS
Comms Service Provider27%
Financial Services Firm18%
Consumer Goods Company9%
Logistics Company9%
VISITORS READING REVIEWS
Computer Software Company24%
Comms Service Provider21%
Construction Company7%
Retailer5%
Company Size
REVIEWERS
Small Business35%
Midsize Enterprise25%
Large Enterprise40%
VISITORS READING REVIEWS
Small Business32%
Midsize Enterprise23%
Large Enterprise45%
REVIEWERS
Small Business50%
Midsize Enterprise27%
Large Enterprise23%
VISITORS READING REVIEWS
Small Business40%
Midsize Enterprise27%
Large Enterprise33%
Find out what your peers are saying about Cisco Adaptive Security Appliance (ASA) Firewall vs. Meraki MX and other solutions. Updated: March 2020.
437,168 professionals have used our research since 2012.
Cisco Adaptive Security Appliance (ASA) Firewall is ranked 2nd in Firewalls with 45 reviews while Meraki MX is ranked 3rd in Unified Threat Management (UTM) with 16 reviews. Cisco Adaptive Security Appliance (ASA) Firewall is rated 7.8, while Meraki MX is rated 8.2. The top reviewer of Cisco Adaptive Security Appliance (ASA) Firewall writes "Gives us visibility into potential outbreaks as well as malicious users trying to access the site". On the other hand, the top reviewer of Meraki MX writes "Cost-effective, simplified, easy to manage, and reliable with advanced security features and granular visibility". Cisco Adaptive Security Appliance (ASA) Firewall is most compared with Fortinet FortiGate, Cisco Firepower NGFW Firewall, SonicWall TZ, Palo Alto Networks WildFire and pfSense, whereas Meraki MX is most compared with Fortinet FortiGate, SonicWall NSA, SonicWall TZ, Cisco Firepower NGFW Firewall and Sophos XG. See our Cisco Adaptive Security Appliance (ASA) Firewall vs. Meraki MX report.

See our list of best Firewalls vendors.

We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.