Zhulien KeremedchievLead Network Security Engineer at TechnoCore LTD
Shashidhara B NDirector - Technology Solutions & Services at Connectivity IT Services Private Limited
Anonymous UserManaging Director at a tech company
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"I like the way Firepower presents the data. It gives you two classifications for the evidence, something based on the priority of the evidence and another classification based on the impact of the evidence in your environment. This makes it very easy to spot the evidence that is most impactful to my environment. Instead of having to go through all the evidence based on that priority, I can focus on the evidence that has the most impact on my environment."
"The most valuable feature of the Firepower solution is FireSIGHT, which can be easily managed and is user-friendly."
"Once you add Firepower onto to it and you start enabling some of its features, you get some IDS/IPS involved with it and you can even do web filtering."
"The most valuable features of Cisco firewalls are the IPS and IDS items. We find them very helpful. Those are the biggest things because we have some odd, custom-made products in our environment. What we've found through their IPS and IDS is that their vulnerability engines have caught things that are near-Zero-day items, inside of our network."
"The IPS, as well as the malware features, are the two things that we use the most and they're very valuable."
"The protection and security features, like URL filtering, the inspection, and the IPS feature, are also very valuable for us. We don't have IT staff at most of the sites so for us it's important to have a robust firewall at those sites"
"We can easily track unauthorized users and see where traffic is going."
"With the FMC and the FirePOWERs, the ability to quickly replace a piece of hardware without having to have a network outage is useful. Also, the ability to replace a piece of equipment and deploy the config that the previous piece of equipment had is pretty useful."
"The most valuable feature is the virtualization because it can be used for customers who are using the mobile data network to request a private connection to a remote site."
"The deployment is quite easy and fast."
"I've found the security features, such as IDS and the VPN most valuable."
"The solution's stability is very good."
"I like the routing and firewall features."
"It helped us with its routing capabilities which eased the cost, because otherwise I would have had to take a router and firewall, and then integrate it. With this, however, it was an integration of firewall and routing services all together in a single product. That was one thing that I loved about it."
"The EEE security controls allow us to make policy restrictions, so I can customize port numbers to allow or limit control."
"Performance is a strong point."
"When you try to create an IP or when you have an alert about when a website is banned, these features are helpful."
"The features we have found most valuable are the firewall and the monitoring tools."
"A strong, reliable solution for small companies with little or no dedicated IT department."
"We work also with domain control (DC) from Microsoft or Amazon. We use a whole virtual appliance with Meraki."
"The internet traffic shaping has been very valuable."
"The initial setup for me was straightforward."
"Deployment takes no more than one working day."
"I use Meraki in my POCs and with my customers as well."
"Also, they have a Firepower source file that I can work on the ASA device and on Firepower devices. A problem here lies in the way that you manage these devices. Some devices do not support the FMC, and some devices have to be managed through ASDM, and others have to be managed through FMC."
"I would like to see the inclusion of more advanced antivirus features in the next release of this solution."
"In Firepower, there is an ability to search and dig into a search, which is nice. However, I'm not a super fan of the way it scrolls. If you want to look at something live, it's a lot different. You're almost waiting. With the ASDM, where it just flows, you can really see it. The second someone clicks something or does something, you'll see it. The refresh rate on the events in Firepower is not as smooth."
"The worst part of the entire solution, and this is kind of trivial at times, is that management of the solution is difficult. You manage FireSIGHT through an internet browser. I've had Cisco tell me to manage it through Firefox because that's how they develop it. The problem is, depending on the page you're on, they don't function in the same way. The pages can be very buggy, or you can't resize columns in this one, or you can't do certain things in that one. It causes a headache in managing it."
"For the new line of FTDs, the performance could be improved. We sometimes have issues with the 41 series, depending what we activate. If we activate too many intrusion policies, it affects the CPU."
"The user interface for the Firepower management console is a little bit different from traditional Cisco management tools. If you look at products we already use, like Cisco Prime or other products that are cloud-based, they have a more modern user interface for managing the products. For Firepower, the user interface is not very user-friendly. It's a little bit confusing sometimes."
"We would like to see improvement in recovery. If there is an issue that forces us to do recovery, we have to restart or reboot. In addition, sometimes we have downtime during the maintenance windows. If Cisco could enhance this, so that upgrades would not necessarily require downtime, that would be helpful."
"We had an event recently where we had inbound traffic for SIP and we experienced an attack against our SIP endpoint, such that they were able to successfully make calls out... Both CTR, which is gathering data from multiple solutions that the vendor provides, as well as the FMC events connection, did not show any of those connections because there was not a NAT inbound which said either allow it or deny it."
"The Juniper product has to improve in terms of innovation."
"The GUI needs improvement."
"In terms of other features, I'd like to see a web filter, 10 point control, application control and a DNA filter in the next release."
"The big thing is performance. With all the features turned on it slows down."
"The workplace management console needs improvement. It should be a little bit more developed. Also, the interface needs a bit more improvement."
"IPS is one that I would definitely want to be improved. I would also like SSL VPN to be integrated."
"It should be easier to escalate support tickets."
"There are a lot of features that customers do not know about and I think that better documentation would help when it comes to learning how to use the product."
"What I would like to see in the next version is to have more interfaces for WAN links."
"FortiGate is cheaper than Meraki. Even the license renewal is less than Meraki."
"The client-side VPN is weak. The product could be improved with deployment templates."
"The problem is that the two licenses do not currently integrate. We have to create separate companies and do an interconnection."
"The IPS, the Intrusion Prevention System, can be improved."
"Right now, you can postpone the update but eventually, if you don't do the update, it will install the updates automatically for you and that's something that is not working for me."
"Load balancing options and ability to manage a couple of Internet connections."
"I need more UTM protection security features."
"The price of this solution is not good or bad."
"The Firepower series of appliances is not cheap. I just got a quote recently for six firewalls that was in the range of over half-a-million dollars. That's what could push us to look to other vendors..."
"Our subscription costs, just for the firewalls, is between $400,000 and $500,000 a year."
"Cisco's pricing is high, at times, for what they provide."
"The one-time cost is affordable, but the maintenance cost and the Smart Net costs need to be reduced. They're too high."
"We normally license on a yearly basis. The hardware procurement cost should be considered. If you're virtual maybe that cost is eradicated and just the licensing cost is applied. If you have hardware the cost must be covered by you. All the shipping charges will be paid by you also. I don't thing there are any other hidden charges though."
"Cisco pricing is premium. However, they gave us a 50 to 60 percent discount."
"There are additional implementation and validation costs."
"While the price of support is expensive, the price of the solution, itself, is not."
"The price of this solution is more than other products, but it's stable, and the technical support is better than I have seen with others."
"There was no additional licensing cost because there were no IPS services. It was just a firewall IP circuit router so they have the default licensing. We just need to renew the support yearly."
"Compared to other vendors, the pricing of this solution is good."
"The product itself is costly and the price of migration is very high."
"This is an expensive product."
"The price is reasonable."
"The price could improve, it is a bit expensive."
"Pricing varies as per the type of license."
"Meraki is also expensive, but it's a little bit less expensive and it's easier to configure than Cisco ASA."
"The price varies depending on the hardware platform as well as the type of license and whether you're adding security or not."
"The license cost depends on the box. We acquired a different product line. We are dealing with MX appliance now, that is, MX6, MX54, MX100, MX250, MX450. Every box has got an identity, and it has got its own specification. Every box has got a different license fee. We deployed Meraki MX in UAE when it was not a mature product. We took a risk, but we were successful. We saved a huge amount of money after implementing and removing all the MPLS and leased lines. We got a broadband connection because Meraki MX could work on a broadband connection. We have drastically saved a very good amount of money, which was one of the successful things apart from the successful solution."
"Other content filtering solutions that I have used had more bells and whistles, but given the cost, complexity, and management overhead, I am very pleased with Meraki’s solution."
"The price is slightly increased, but reasonable."
"It is a good global solution in terms of the price and features, but because we sell this solution in dollars, sometimes we don't get to sell this solution in Brazil because the dollar is very expensive. The price of every project is different. It varies depending upon the project, scenario, and client."
"The pricing could always be improved — especially with the shape the economy is in at the moment."
Cisco NGFW firewalls deliver advanced threat defense capabilities to meet diverse needs, from
small/branch offices to high performance data centers and service providers. Available in a wide
range of models, Cisco NGFW can be deployed as a physical or virtual appliance. Advanced threat
defense capabilities include Next-generation IPS (NGIPS), Security Intelligence (SI), Advanced
Malware Protection (AMP), URL filtering, Application Visibility and Control (AVC), and flexible VPN
features. Inspect encrypted traffic and enjoy automated risk ranking and impact flags to reduce event
volume so you can quickly prioritize threats. Cisco NGFW firewalls are also available with clustering
for increased performance, high availability configurations, and more.
Cisco Firepower NGFWv is the virtualized version of Cisco's Firepower NGFW firewall. Widely
deployed in leading private and public clouds, Cisco NGFWv automatically scales up/down to meet
the needs of dynamic cloud environments and high availability provides resilience. Also, Cisco NGFWv
can deliver micro-segmentation to protect east-west network traffic.
Cisco firewalls provide consistent security policies, enforcement, and protection across all your
environments. Unified management for Cisco ASA and FTD/NGFW physical and virtual firewalls is
delivered by Cisco Defense Orchestrator (CDO), with cloud logging also available. And with Cisco
SecureX included with every Cisco firewall, you gain a cloud-native platform experience that enables
greater simplicity, visibility, and efficiency.
Learn more about Cisco’s firewall solutions, including virtual appliances for public and private cloud.
Juniper SRX is ranked 4th in Unified Threat Management (UTM) with 28 reviews while Meraki MX is ranked 2nd in Unified Threat Management (UTM) with 25 reviews. Juniper SRX is rated 7.6, while Meraki MX is rated 8.2. The top reviewer of Juniper SRX writes "This best in class Next-Gen firewall is elegant in its ease-of-use and architecture". On the other hand, the top reviewer of Meraki MX writes "Makes it easy to stay on top of everything for security". Juniper SRX is most compared with Fortinet FortiGate, Cisco ASA Firewall, Palo Alto Networks WildFire, pfSense and Sophos XG, whereas Meraki MX is most compared with Fortinet FortiGate, Cisco ASA Firewall, Sophos XG, SonicWall NSa and Zscaler Internet Access. See our Juniper SRX vs. Meraki MX report.
We monitor all Unified Threat Management (UTM) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.