Most Helpful Review
The integration between Nmap, the database and Metasploit saves a lot of time. The initial setup was a bit tricky.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
For us, the most valuable features are the IPX and the Sourcefire Defense Center module. That gives us visibility into the traffic coming in and going out, and gives us the heads-up if there is a potential outbreak or potential malicious user who is trying to access the site. It also helps us see traffic generated by an end device trying to reach out to the world.
The information coming from Talos does a good job... I like the fact that Cisco is working with them and getting the information from them and updating the firewall.
The firepower sensors have been great; they do a good job of dropping unwanted traffic.
Unfortunately in Cisco, only the hardware was good.
The most important point is the detection engine which is now part of the next-generation firewalls and which is supported by Cisco Talos.
The most valuable features are the flexibility and level of security that this solution provides.
Integration with all the other Cisco tools is valuable.
We moved from a legacy firewall to the ASA with FirePOWER, increasing our Internet Edge defense dramatically.
A good network security system for medium-sized businesses with an excellent GUI interface that gives a graphic view of network status.
The solution is extremely scalable.
This is an easy means of setting up high-availabilty firewall protection.
The initial setup is easy. It's the easiest firewall installation process on the market. I work with three or four other products and this one is the easiest.
The most valuable feature of this solution would be the caching feature.
It has a lot of scalability abilities which makes it easy to scale.
What I like about this solution, is that it is the only solution that currently offers VPN for clients.
The technical support is very good and the assistance they gave was very good.
The option to generate phishing emails has proven to be very valuable in understanding the behavior of users.
It contains almost all the available exploits and payloads.
It's not possible to do penetration testing without being very proficient in Metasploit.
We were also not too thrilled when Cisco announced that in the upcoming new-gen ASA, iOS was not going to be supported, or if you install them, they will not be able to be managed through the Sourcefire. However, it seems like Cisco is moving away from the ASA iOS to the Sourcefire FireSIGHT firmware for the ASA. We haven't had a chance to test it out.
Our latest experience with a code upgrade included a number of bugs and issues that we ran into. So more testing with their code, before it hits us, would help.
The software was very buggy, to the point it had to be removed.
In NGFW, Cisco should be aligned with the new technology and inspection intelligence because Cisco is far behind in this pipeline.
Most users do not have awareness of this product's functionality and features. Cisco should do something to make them aware of them. That would be quite excellent and useful to organizations that are still using legacy data-center-security products.
There was an error in the configuration, related to our uplink switches, that caused us to contact technical support, and it took a very long time to resolve the issue.
With regards to stability, we had a critical bug come out during our evaluation... not good.
The product would be improved if the GUI could be brought into the 21st Century.
While it is a solid solution, there are some product limitations which exclude it from deployment in some situations.
The solution needs to adjust its pricing models. With the way they are structured, everything is very disparate and sold separately, and, depending on the solution, it can get quite pricey.
The support is not very good, but the product is stable so it is not so much of a problem.
In terms of what needs improvements, the troubleshooting could use improvement. When we work with other products like Cisco ASA, Palo Alto, and Check Point, we see a big difference in the troubleshooting. It's not easy to find a report.
Their technical support needs improvement.
In terms of what needs improvement, the pricing could be lower. The price is very steep.
In the future I would like to see more user-friendly dashboards and a drop in the price.
The GUI could be improved to make it more usable, easier to administer, and easier to configure.
Metasploit cannot be installed on a machine with an antivirus.
It is necessary to add some training materials and a tutorial for beginners.
The initial setup was a bit "tweaky" for the open-source version.
Pricing and Cost Advice
Pricing varies on the model and the features we are using. It could be anywhere from $600 to $1000 to up to $7,000 per year, depending on what model and what feature sets are available to us.
We used Check Point and the two are comparable. Cost was really what put us onto the ASAs... the price tag for Check Point was exorbitantly more than what it is for the ASA solution.
Always consider what you might need to reduce your wasted time and invest it in other solutions.
Watch out for hidden licensing and incredibly high annual maintenance costs.
We paid about $7,000 for the Cisco firewall, plus another small Cisco router and the lead switch. It was under the combined license. It's a final agreement.
The cost is a big factor for us. This is why we are using it only in our restricted area. They are very much higher than their competitors in the market.
Licensing is expensive compared to other solutions.
Pricing is high, but it is essentially a corporate decision.
Pricing depends on implementation and licensing choices and is usually not a practical budget choice for small businesses.
We pay $100,000. That covers the cost of the hardware that we run the VN's on. That also includes any SGNA costs for the internal support tech.
Be sure to choose a licensing plan that leaves a little headroom so performance is not an issue.
We pay an annual license fee. It is rather expensive so I would like to perhaps see a drop in price in the future.
The program is expensive.
It is expensive. Our license expired, and our company is not thinking to renew because of our budget.
I use the open-source version of this product. Pricing is not relevant.
Compared 39% of the time.
Compared 11% of the time.
Compared 9% of the time.
Compared 24% of the time.
Compared 17% of the time.
Compared 12% of the time.
Compared 62% of the time.
Compared 11% of the time.
Compared 7% of the time.
Also Known As
|Cisco ASA, Adaptive Security Appliance, ASA||Metasploit|
Adaptive Security Appliance (ASA) is Cisco's end-to-end software solution and core operating system that powers the Cisco ASA product series. This software solution provides enterprise-level firewall capabilities for all types of ASA products, including blades, standalone appliances and virtual devices. Adaptive Security Appliance provides protection to organizations of all sizes, and allows end-users to access information securely anywhere, at any time, and through any device.
Adaptive Security Appliance is also fully compatible with other key security technologies, and so provides organizations with an all-encompassing security solution.
Block more threats and quickly mitigate those that do breach your defenses with the industry’s first threat-focused NGFW.
Control all the security and networking capabilities in all your FortiGates across your entire network with one intuitive operating system. Improve your protection and visibility while reducing operating expenses and saving time with a truly consolidated next generation enterprise firewall platform.
Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.
Learn more about Cisco ASA NGFW
Learn more about Fortinet FortiOS
Learn more about Rapid7 Metasploit
|There are more than one million Adaptive Security Appliances deployed globally. Top customers include First American Financial Corp., Genzyme, Frankfurt Airport, Hansgrohe SE, Rio Olympics, The French Laundry, Rackspace, and City of Tomorrow.||Black Gold Regional Schools, Amadeus Hospitality, Jefferson County, Chunghwa Telecom, City of Boroondara, Dimension Data||City of Corpus Christi, Diebold, Lumenate, Nebraska Public Power District, Prairie North Regional Health, Apptio, Automation Direct, Bob's Stores, Cardinal Innovations Healthcare Solutions, Carnegie Mellon University|
Financial Services Firm17%
Comms Service Provider11%
Software R&D Company28%
Comms Service Provider16%
Comms Service Provider43%
Financial Services Firm14%
Software R&D Company23%
Comms Service Provider23%
No Data Available