Most Helpful Review
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Unfortunately in Cisco, only the hardware was good.
The traffic inspection and the Firepower engine are the most valuable features. It gives you full details, application details, traffic monitoring, and the threats. It gives you all the containers the user is using, especially at the application level. The solution also provides application visibility and control.
If we look at the Cisco ASA without Firepower, then one of the most valuable features is the URL filtering.
It's easy to integrate ASA with other Cisco security products. When you understand the technology, it's not a big deal. It's very simple.
The benefits we see from the ASA are connected to teleworking as well as, of course, having the basic functionality of a firewall in place and the prevention of attacks.
On the network side, where you create your rules for allowing traffic — what can come inside and what can go out — that works perfectly, if you know what you want to achieve. It protects you.
If you have a solution that is creating a script and you need to deploy many implementations, you can create a script in the device and it will be the same for all. After that, you just have to do the fine tuning.
They provide DDoS protection and multi-factor authentication. That is a good option as it enables work-from-home functionality.
The most valuable feature is the cloud-based protection against zero-day malware attacks.
What I like about Palo Alto is that it is a complete product, with everything in it.
The most valuable feature is the improved security that it offers.
The technical support is good.
For example, if a security Intel threat talks about an IOC. We can then go to our MSP and say, "Is there a signature for this particular type of malware that just came out?" And if they'll say yes, then we'll say, "Okay. Does it apply to these firewalls? And have we seen any hits on it?" There's absolutely value in it.
The most valuable feature for us is the VPN.
Using WildFire has reduced the number of viruses and the amount of malware that comes into our system, which means that I don't have to rely on the end-users to identify it.
The way that the solution quickly updates to adjust to threats is the solution's most valuable aspect. When there's a security attack, within five minutes, all Wildfire subscribers have access to updates so that all systems will be safe. Its threat prevention is way better than other vendor products.
In NGFW, Cisco should be aligned with the new technology and inspection intelligence because Cisco is far behind in this pipeline.
Security generally requires integration with many devices, and the management side of that process could be enhanced somewhat. It would help if there was a clear view of the integrations and what the easiest way to do them is.
One area where the ASA could be improved is that it doesn't have AMP. When you get an ASA with the Firepower model, ASA with FTD, then you have advanced malware protection.
If I want to activate IPS features on it, I have to buy another license. If I want Cisco AnyConnect, I have to buy another license. That's where we have challenges.
Cisco missed the mark with all the configuration steps. They are a pain and, when doing them, it looks as if we're using a very old technology — yet the technology itself is not old, it's very good. But the front-end configuration is very tough.
Cisco provides us with application visibility and control, although it's not a complete solution compared to other vendors. Cisco needs to work on the application behavior side of things, in particular when it comes to the behavior of SSL traffic.
It is expensive.
We were also not too thrilled when Cisco announced that in the upcoming new-gen ASA, iOS was not going to be supported, or if you install them, they will not be able to be managed through the Sourcefire. However, it seems like Cisco is moving away from the ASA iOS to the Sourcefire FireSIGHT firmware for the ASA. We haven't had a chance to test it out.
The only complaint that we receive from our customers is in regards to the price.
In the future, I would like to see more automation in the reporting.
The price of WildFire should be reduced in order to make it more affordable for our customers.
The deployment model could be better.
It's not really their problem, it's a problem across the board. There will always be problems with interrupted traffic. We have to set it up where we're playing a middle man game where we're stripping it out, looking at it, and then putting it back together and sending it on its way. That requires CPU cycles. And there's some overhead with that.
When you contact support, there is no guarantee that they will be available to help you tackle the issue that you are facing.
It would be nice if there was an easier way to install and deploy it, such as through the inclusion of wizards.
The size of Palo Alto's cloud is big but it could be easier to use from a product management perspective.
Pricing and Cost Advice
Always consider what you might need to reduce your wasted time and invest it in other solutions.
There is room for improvement in the pricing when compared to the market. Although, when you compare the benefits of support from Cisco, you can adjust the value and it becomes comparable, because you usually need very good support. So you gain value there with this device.
When it comes to Cisco, the price of everything is higher. Cisco firewalls are expensive, but we get support from Cisco, and that support is very active.
It's a brilliant firewall, and the fact that it comes with a perpetual license really does go far in terms of helping the organization in not having to deal with those costs on an annual basis. That is a pain point when it comes to services like the ones we have on Fortigate. That's where we really give Cisco firewalls the thumbs up.
Cisco is expensive, but you do get benefits for the price.
In terms of costs, other solutions are more expensive than Cisco. Palo Alto is more expensive than Cisco.
Pricing varies on the model and the features we are using. It could be anywhere from $600 to $1000 to up to $7,000 per year, depending on what model and what feature sets are available to us.
We used Check Point and the two are comparable. Cost was really what put us onto the ASAs... the price tag for Check Point was exorbitantly more than what it is for the ASA solution.
This is an expensive product and the market for Palo Alto in Poland could be much bigger if the pricing was comparable to Fortinet.
The pricing is highly expensive.
I think they should lower the price of this solution
This solution is very pricey and it depends on the package that you implement.
We pay between $3,000 and $4,000 CAD ($2,200 - $3,000 USD) per year to maintain this solution.
The licensing fees are on an annual basis, and there are no costs in addition to the standard fees.
It's pretty expensive but with respect to value for money, it's okay.
It is a reasonable price compared to other solutions on the market.
Questions from the Community
Top Answer: Fortinet FGs: Great devices, relatively easy to deploy and maintain. Cheaper than most devices of their kind. If you're looking for a lot of features at a relatively low price point this is the way to… more »
Top Answer: They provide DDoS protection and multi-factor authentication. That is a good option as it enables work-from-home functionality.
Top Answer: In terms of costs, other solutions are more expensive than Cisco. Palo Alto is more expensive than Cisco.
Top Answer: Palo Alto was the first company to tackle perimeter protection via applications instead of port blocking their install base is massive including the Fortune 50 Cisco is a household name but when it… more »
Top Answer: The way that the solution quickly updates to adjust to threats is the solution's most valuable aspect. When there's a security attack, within five minutes, all Wildfire subscribers have access to… more »
Top Answer: The pricing of the solution is a bit higher, but it's worth the extra money you will spend because of the protection that you get.
out of 55 in Firewalls
Average Words per Review
out of 25 in Advanced Threat Protection
Average Words per Review
Compared 36% of the time.
Compared 13% of the time.
Compared 9% of the time.
Compared 5% of the time.
Compared 4% of the time.
Compared 19% of the time.
Compared 12% of the time.
Compared 9% of the time.
Compared 7% of the time.
Compared 6% of the time.
Also Known As
|Cisco ASA Firewall, Cisco ASA NGFW, Cisco ASA, Adaptive Security Appliance, ASA, Cisco Sourcefire Firewalls|
|Cisco||Palo Alto Networks|
Cisco ASA firewalls deliver enterprise-class firewall functionality with highly scalable and flexible VPN capabilities to meet diverse needs, from small/branch offices to high performance data centers and service providers. Available in a wide range of models, Cisco ASA can be deployed as a physical or virtual appliance. Flexible VPN capabilities include support for remote access, site-to-site, and clientless VPN. Also, select appliances support clustering for increased performance, VPN load balancing to optimize available resources, advanced high availability configurations, and more.
Cisco ASAv is the virtualized version of the Cisco ASA firewall. Widely deployed in leading private and public clouds, Cisco ASAv is ideal for remote worker and multi-tenant environments. The solution scales up/down to meet performance requirements and high availability provides resilience. Also, Cisco ASAv can deliver micro-segmentation to protect east-west network traffic.
Cisco firewalls provide consistent security policies, enforcement, and protection across all your environments. Unified management for Cisco ASA and FTD/NGFW physical and virtual firewalls is delivered by Cisco Defense Orchestrator (CDO), with cloud logging also available. And with Cisco SecureX included with every Cisco firewall, you gain a cloud-native platform experience that enables greater simplicity, visibility, and efficiency.
|WildFire™ cloud-based threat analysis service is the industry’s most advanced analysis and prevention engine for highly evasive zero-day exploits and malware. The cloud-based service employs a unique multi-technique approach combining dynamic and static analysis, innovative machine learning techniques, and a groundbreaking bare metal analysis environment to detect and prevent even the most evasive threats.|
Learn more about Cisco Adaptive Security Appliance (ASA) Firewall
Learn more about Palo Alto Networks WildFire
|There are more than one million Adaptive Security Appliances deployed globally. Top customers include First American Financial Corp., Genzyme, Frankfurt Airport, Hansgrohe SE, Rio Olympics, The French Laundry, Rackspace, and City of Tomorrow.||Novamedia, Nexon Asia Pacific, Lenovo, Samsonite, IOOF, Sinogrid, SanDisk Corporation|
Financial Services Firm20%
Comms Service Provider9%
Computer Software Company28%
Comms Service Provider22%
Comms Service Provider15%
Computer Software Company31%
Comms Service Provider18%
See our list of .