Most Helpful Review
Researched Cisco ASA NGFW but chose FortiGate-VM: Good UTM to provide secure site-to-site connections, but new versions should be tested more thoroughly before release
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Unfortunately in Cisco, only the hardware was good.
For us, the most valuable features are the IPX and the Sourcefire Defense Center module. That gives us visibility into the traffic coming in and going out, and gives us the heads-up if there is a potential outbreak or potential malicious user who is trying to access the site. It also helps us see traffic generated by an end device trying to reach out to the world.
The information coming from Talos does a good job... I like the fact that Cisco is working with them and getting the information from them and updating the firewall.
The firepower sensors have been great; they do a good job of dropping unwanted traffic.
The most important point is the detection engine which is now part of the next-generation firewalls and which is supported by Cisco Talos.
The most valuable feature of this solution is AMP (Advanced Malware Protection), as this is really needed to protect against cyber threats.
I like the Cisco ASDM (Adaptive Security Device Manager), which is the configuration interface for the Cisco firewall.
The technical team is always available when we have problems.
The functionality provided is very good.
The most valuable features are the web proxy for protection and web gateway for deployment.
In terms of administration, it's perfect.
The most valuables features are the ease of use and deployment.
The stability of the solution is good. We haven't faced any issues at all while using the product.
The most valuable feature is the UTM, which gives them an advantage over other firewalls.
The most valuable features are site-to-site connections and UTM.
The standard features, including the filtering, are quite good. All the basic features are pretty useful for us.
In NGFW, Cisco should be aligned with the new technology and inspection intelligence because Cisco is far behind in this pipeline.
We were also not too thrilled when Cisco announced that in the upcoming new-gen ASA, iOS was not going to be supported, or if you install them, they will not be able to be managed through the Sourcefire. However, it seems like Cisco is moving away from the ASA iOS to the Sourcefire FireSIGHT firmware for the ASA. We haven't had a chance to test it out.
Our latest experience with a code upgrade included a number of bugs and issues that we ran into. So more testing with their code, before it hits us, would help.
The software was very buggy, to the point it had to be removed.
Most users do not have awareness of this product's functionality and features. Cisco should do something to make them aware of them. That would be quite excellent and useful to organizations that are still using legacy data-center-security products.
I have found that Cisco reporting capabilities are not as rich as other products, so the reporting could be improved.
The Sandbox and the Web Censoring in this solution need to be improved.
It will be nice if they had what you traditionally would use a web application scanner for. If the solution could take a deeper look into HTTP and HTTPS traffic, that would be nice.
The product may not be as robust as Palo Alto. However, unless you are a big bank, you probably won't need it to be.
In the next release, I would like to see integration capability with SIEM tools, such as QRadar, and LogRhythm.
The interface needs to be updated and simplified.
In the next release, we would like to see full integration with VMware NSX virtualized networks.
The user interface needs to be improved.
The reporting is not as good as it is with other firewalls and it should be improved.
When new versions are deployed they tend to be a little buggy, so they should be more fully tested before release.
We haven't attempted to scale the solution just yet. If we want to scale this solution we may have to look at other models. With certain requirements, we probably wouldn't be able to scale it so well as it is right now.
Pricing and Cost Advice
Always consider what you might need to reduce your wasted time and invest it in other solutions.
Pricing varies on the model and the features we are using. It could be anywhere from $600 to $1000 to up to $7,000 per year, depending on what model and what feature sets are available to us.
We used Check Point and the two are comparable. Cost was really what put us onto the ASAs... the price tag for Check Point was exorbitantly more than what it is for the ASA solution.
We are in the process of renewing our three-year license, which costs approximately $24,000 USD for the thirty-six months.
The pricing for Cisco products is higher than others, but Cisco is a very good, strong, and stable technology.
The program is very expensive.
The cost of this solution is high.
Some of our customers would be more likely to standardize on Cisco equipment if the cost was lower because a lot of people install cheap equipment.
The price is similar to Symantec Endpoint, but it's more expensive than Forcepoint solutions. Fortinet is better than Forcepoint.
This solution is very expensive.
There is a benefit in terms of the cost of using this solution because the price is very good.
The price of this product is great compared to others.
out of 50 in Firewalls
Average Words per Review
out of 50 in Firewalls
Average Words per Review
Compared 38% of the time.
Compared 11% of the time.
Compared 9% of the time.
Compared 31% of the time.
Compared 18% of the time.
Compared 12% of the time.
Also Known As
|Cisco ASA, Adaptive Security Appliance, ASA, Cisco Sourcefire Firewalls||FortiGate Virtual Appliance|
Adaptive Security Appliance (ASA) is Cisco's end-to-end software solution and core operating system that powers the Cisco ASA product series. This software solution provides enterprise-level firewall capabilities for all types of ASA products, including blades, standalone appliances and virtual devices. Adaptive Security Appliance provides protection to organizations of all sizes, and allows end-users to access information securely anywhere, at any time, and through any device.
Adaptive Security Appliance is also fully compatible with other key security technologies, and so provides organizations with an all-encompassing security solution.
Block more threats and quickly mitigate those that do breach your defenses with the industry’s first threat-focused NGFW.
FortiGate Virtual Appliances allow you to mitigate blind spots by implementing critical security controls within your virtual infrastructure. They also allow you to rapidly provision security infrastructure whenever and wherever it is needed. FortiGate virtual appliances feature all of the security and networking services common to traditional hardware-based FortiGate appliances. With the addition of virtual appliances from Fortinet, you can deploy a mix of hardware and virtual appliances, operating together and managed from a common centralized management platform.
Learn more about Cisco ASA NGFW
Learn more about FortiGate-VM
|There are more than one million Adaptive Security Appliances deployed globally. Top customers include First American Financial Corp., Genzyme, Frankfurt Airport, Hansgrohe SE, Rio Olympics, The French Laundry, Rackspace, and City of Tomorrow.||Security7 Networks, COOPENAE|
Financial Services Firm19%
Comms Service Provider9%
Software R&D Company28%
Comms Service Provider18%