Most Helpful Review
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
The firepower sensors have been great; they do a good job of dropping unwanted traffic.
Unfortunately in Cisco, only the hardware was good.
The most important point is the detection engine which is now part of the next-generation firewalls and which is supported by Cisco Talos.
The most valuable features are the flexibility and level of security that this solution provides.
Integration with all the other Cisco tools is valuable.
We moved from a legacy firewall to the ASA with FirePOWER, increasing our Internet Edge defense dramatically.
Cisco ASA NGFW significantly improves our bank. It protects any high-value products that we use from hackers, viruses, malware, and script-bots. It gives us metrics on network traffic as well as what kind of attacks we are getting from the outside.
Right now, Cisco ASA NGFW has given us a lot of improvement. We are planning to move to a new facility and will be a much larger organization.
It handles our current load with ease, and I think it can handle a bit more. It definitely can handle a lot more capacity than we currently use.
It is very useful to make lists for rules and prepare firewall rules.
The customer care center of Fortinet is good. For all the requests that we have done, they work as fast as possible, so this is a good point for Fortinet.
There is an interesting possibility of building a tunnel to a firewall from access points. We use this feature for small branch offices with one to two employees with access to central RDP servers.
One top feature is the ability to use the appliance as a WLAN controller for up to 10 access points with the new 5.6 firmware.
A top feature is the really good web interface and the classic Fortinet features, such as IPS, IDS, AV scanner, and spam filter.
Initial setup was quite straightforward, as we can simply head to the required sections to apply the planned network.
We use it to ensure that our network is properly protected from viruses and malware.
I like the automatic firmware updates. We use the Active Directory to authenticate VPN users.
I use Meraki in my POCs and with my customers as well.
Point-to-point VPNs can dynamically follow IP changes with no need for static IPs.
Dual WAN connections are greatly simplified and point-to-point VPNs automatically connect regardless of what WAN connection is active.
The internet traffic shaping has been very valuable.
Deployment takes no more than one working day.
The initial setup for me was straightforward.
A strong, reliable solution for small companies with little or no dedicated IT department.
The software was very buggy, to the point it had to be removed.
In NGFW, Cisco should be aligned with the new technology and inspection intelligence because Cisco is far behind in this pipeline.
Most users do not have awareness of this product's functionality and features. Cisco should do something to make them aware of them. That would be quite excellent and useful to organizations that are still using legacy data-center-security products.
There was an error in the configuration, related to our uplink switches, that caused us to contact technical support, and it took a very long time to resolve the issue.
With regards to stability, we had a critical bug come out during our evaluation... not good.
The product would be improved if the GUI could be brought into the 21st Century.
Cisco should improve its user interface design. There is a deep learning curve to the product if you are a newcomer.
There is no support here in Georgia. If something goes wrong, support is not always very helpful with the other firewalls or other products.
The GUI could be improved.
The price is sometimes very expensive.
In the first two releases of FortiOS 5.6, we had some trouble with the SSL VPN service. Sometimes it stopped working, and the IPS daemon too.
Improvements are needed for the responsive UI and JIT traffic reporting.
The management tools should be more user-friendly.
We encountered scalability issues in IPSec Module. The tunnels freeze sometimes.
There were challenges during setup, and many of them were self-inflicted.
The user interface (UI) and the performance of interface both need improvement.
Expensive licensing and firewall stops immediately working if the license is not renewed at expiration date.
I need more UTM protection security features.
Meraki tech support staff have a lot more visibility into your network than you do, which is frustrating at times. I understand the approach is to keep the dashboard easier to understand. This will frustrate more advanced users at times.
The IPS, the Intrusion Prevention System, can be improved.
Load balancing options and ability to manage a couple of Internet connections.
Right now, you can postpone the update but eventually, if you don't do the update, it will install the updates automatically for you and that's something that is not working for me.
The client-side VPN is weak. The product could be improved with deployment templates.
The problem is that the two licenses do not currently integrate. We have to create separate companies and do an interconnection.
Pricing and Cost Advice
Always consider what you might need to reduce your wasted time and invest it in other solutions.
Watch out for hidden licensing and incredibly high annual maintenance costs.
We paid about $7,000 for the Cisco firewall, plus another small Cisco router and the lead switch. It was under the combined license. It's a final agreement.
The cost is a big factor for us. This is why we are using it only in our restricted area. They are very much higher than their competitors in the market.
Licensing is expensive compared to other solutions.
Pricing is high, but it is essentially a corporate decision.
The cost is a bit high compared to other solutions in the market.
Cisco recently has become very expensive.
The price: It is a bit higher than the other competitors. This is why I started to look at other brands.
The basic pricing in Austria is OK, but asking for special offers, e.g., NPOs, NGOs, trade up, and/or trade in, is always useful.
The price is expensive compared with other vendors, like Cisco and Huawei.
The best part of Fortinet is the license is bundled together, so it is easy to use and apply.
The pricing and licensing are not as expensive as its competitors.
It is on par with what you receive. It can be expensive upfront.
It would be nice to have the ability to extend FortiGuard subscriptions at a reasonable yearly cost versus a bulk three year pricing.
It is an expensive solution if you are migrating from an open source solution.
Other content filtering solutions that I have used had more bells and whistles, but given the cost, complexity, and management overhead, I am very pleased with Meraki’s solution.
Meraki is also expensive, but it's a little bit less expensive and it's easier to configure than Cisco ASA.
Pricing varies as per the type of license.
It is more expensive than other solutions, but it is a cloud-managed network solution and support is given at the moment you call. That give a very big plus.
The Meraki UTM is excellent when you buy the Advanced Security license. If you buy a different license you lost all the valuable functions.
It can always improve pricewise regarding throughput.
Compared 38% of the time.
Compared 11% of the time.
Compared 9% of the time.
Compared 28% of the time.
Compared 13% of the time.
Compared 13% of the time.
Compared 35% of the time.
Compared 16% of the time.
Compared 7% of the time.
Also Known As
|Cisco ASA, Adaptive Security Appliance, ASA||FortiGate Virtual Appliance||MX64, MX64W, MX84, MX100, MX400, MX600|
Adaptive Security Appliance (ASA) is Cisco's end-to-end software solution and core operating system that powers the Cisco ASA product series. This software solution provides enterprise-level firewall capabilities for all types of ASA products, including blades, standalone appliances and virtual devices. Adaptive Security Appliance provides protection to organizations of all sizes, and allows end-users to access information securely anywhere, at any time, and through any device.
Adaptive Security Appliance is also fully compatible with other key security technologies, and so provides organizations with an all-encompassing security solution.
Block more threats and quickly mitigate those that do breach your defenses with the industry’s first threat-focused NGFW.
FortiGate Virtual Appliances allow you to mitigate blind spots by implementing critical security controls within your virtual infrastructure. They also allow you to rapidly provision security infrastructure whenever and wherever it is needed. FortiGate virtual appliances feature all of the security and networking services common to traditional hardware-based FortiGate appliances. With the addition of virtual appliances from Fortinet, you can deploy a mix of hardware and virtual appliances, operating together and managed from a common centralized management platform.
|With the proliferation of modern applications and mixed-use networks, host and port based security is no longer sufficient. Cisco Meraki's layer 7 "next generation" firewall, included in MX security appliances and every wireless AP, gives administrators complete control over the users, content, and applications on their network.|
Learn more about Cisco ASA NGFW
Learn more about FortiGate-VM
Learn more about Meraki MX Firewalls
|There are more than one million Adaptive Security Appliances deployed globally. Top customers include First American Financial Corp., Genzyme, Frankfurt Airport, Hansgrohe SE, Rio Olympics, The French Laundry, Rackspace, and City of Tomorrow.||Security7 Networks, COOPENAE||Hyatt, ONS|
Financial Services Firm17%
Comms Service Provider11%
Software R&D Company28%
Comms Service Provider15%
No Data Available
Comms Service Provider22%
Non Tech Company11%
Software R&D Company20%
Comms Service Provider15%
No Data Available