We performed a comparison between Cisco Secure Firewall and McAfee Firewall Enterprise MFE [EOL] based on real PeerSpot user reviews.
Find out what your peers are saying about Netgate, Fortinet, OPNsense and others in Firewalls."The most valuable feature is the SSL VPN, as it allows us to connect and it separates this product from other firewalls."
"Provides good firewall security and has great VPN features."
"The payment function for applications is good."
"It is a safe product."
"Its user interface is good, and it is always working fine."
"Fortinet FortiGate's most valuable features are ease of use, flexibility, and most of the configuration we can be done using the GUI. When we compare Fortinet FortiGate with other solutions the firewall policy are very easy to understand."
"I think that the UTM features are the most value, as it truly protects my infrastructure."
"Customers are more inclined towards FortiGate because of application control, web filtering, and anti-spam features. The support from the FortiGate team is good, and price-wise, it is affordable."
"Clustering architecture which offers zero downtime upgrades, keeping uptime close to 99.999%."
"We can shift traffic, block certain content, or redirect policies."
"I like that Cisco Firepower NGFW Firewall is reliable. Support is also good."
"Basic firewalling is obviously the most valuable. In addition to that, secure access and remote access are also very useful for us."
"With Cisco, there are a lot of features such as the network map. Cisco builds the whole network map of the machines you have behind your firewall and gives you insight into the vulnerabilities and attributes that the host has. Checkpoint and Fortinet don't have that functionality directly on the firewall."
"The greatest benefit for the organization is the confidence that we are secured."
"The IP filter configuration for specific political and Static NAT has been most valuable."
"The most valuable feature of the Firepower solution is FireSIGHT, which can be easily managed and is user-friendly."
"It does give certain protection for everything that is well configured on our McAfee server. We have good protection with it. If we could find a feature and make it work, it would work perfectly, there would be no bugs, and it would be really good."
"There aren't really any negative aspects to discuss."
"There is one big configuration file with no separations for the unique VDOMs. Maybe they could separate individual VDOM configuration files with the root VDOM configuration file referencing the individual VDOM config files."
"Currently, FortiGate is providing SSL VPN. But they're missing some features that are available in Palo Alto's SSL VPN."
"FortiGate is really good. We have been using it for quite some time. Initially, when we started off, we had around 70 plus devices of FortiGate, but then Check Point and Palo Alto took over the place. From the product perspective, there are no issues, but from the account perspective, we have had issues. Fortinet's presence in our company is very less. I don't see any Fortinet account managers talking to us, and that presence has diluted in the last two and a half or three years. We have close to 1,500 firewalls. Out of these, 60% of firewalls are from Palo Alto, and a few firewalls are from Check Point. FortiGate firewalls are very less now. It is not because of the product; it is because of the relationship. I don't think they had a good relationship with us, and there was some kind of disconnect for a very long time. The relationship between their accounts team and my leadership team seems to be the reason for phasing out FortiGate."
"The debugging and troubleshooting has room for improvement."
"The support costs and licensing are sometimes so expensive."
"It claims it does DLP, but the degree and level of controls are very basic."
"There could be more integration between the logging and analytical platforms to make it more seamless and integrated."
"The only con that I have really seen with it is the reporting structure. FirePOWER is good. It has been a great help because, before that, it was not good at all."
"Changes you make in the GUI sometimes do not reflect in the command line and vice versa."
"The inclusion of an autofill feature would improve the ease of commands."
"If I want to activate IPS features on it, I have to buy another license. If I want Cisco AnyConnect, I have to buy another license. That's where we have challenges."
"Even on a smaller scale, people are finding you need HA pairs, and there's no way that the ASA can do that, at least in the virtual version."
"I would like it if they made the newer generation a bit simpler. You can do ASA code and FXOS. It is just a bit confusing with the newer generational equipment on what it can do."
"I believe that the current feature set of the device is very good and the only thing that Cisco should work on is improving the user experience with the device."
"Cisco Secure Firewall should be easier to handle. It uses ASDM, which is not easy to understand. It would be better if there was direct access via HTTPS."
"Customer support and AV are both lacking and are really hard to come to you when the product is installed. Those are the two major points that they need to work on."
Earn 20 points
Cisco Secure Firewall is ranked 4th in Firewalls with 404 reviews while McAfee Firewall Enterprise MFE [EOL] doesn't meet the minimum requirements to be ranked in Firewalls. Cisco Secure Firewall is rated 8.2, while McAfee Firewall Enterprise MFE [EOL] is rated 7.0. The top reviewer of Cisco Secure Firewall writes "Highlights and helps us catch Zero-day vulnerabilities traveling across our network". On the other hand, the top reviewer of McAfee Firewall Enterprise MFE [EOL] writes "For managing multiple MFE firewalls it is incredibly handy but it could be easier for customers to migrate from one version to another. ". Cisco Secure Firewall is most compared with Palo Alto Networks WildFire, Netgate pfSense, Meraki MX, Sophos XG and Juniper SRX Series Firewall, whereas McAfee Firewall Enterprise MFE [EOL] is most compared with .
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.