Most Helpful Review
I discovered that I could still keep the data rates really high, up near the 1 gigahertz data speed, without...
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Unfortunately in Cisco, only the hardware was good.
For us, the most valuable features are the IPX and the Sourcefire Defense Center module. That gives us visibility into the traffic coming in and going out, and gives us the heads-up if there is a potential outbreak or potential malicious user who is trying to access the site. It also helps us see traffic generated by an end device trying to reach out to the world.
The information coming from Talos does a good job... I like the fact that Cisco is working with them and getting the information from them and updating the firewall.
The firepower sensors have been great; they do a good job of dropping unwanted traffic.
The most important point is the detection engine which is now part of the next-generation firewalls and which is supported by Cisco Talos.
The most valuable feature of this solution is AMP (Advanced Malware Protection), as this is really needed to protect against cyber threats.
I like the Cisco ASDM (Adaptive Security Device Manager), which is the configuration interface for the Cisco firewall.
The technical team is always available when we have problems.
It seems to be a durable, stable product.
WatchGuard has a very easy VPN and branch office VPN setup, so we use those pretty extensively.
Regarding the reporting, I was in the Dimension server earlier today. It's very powerful. I like it. And the management features are easy to use. I like the fact that I can open up the System Manager client or I can just do it through the web if I'm making a quick change.
The set up of the VPN is pretty straightforward. Being able to build VPNs on the fly for certain users, if need be, is also valuable.
The solution has increased productivity with our outside salespeople being able to connect into their computers and use those remotely.
It's hard to pick one feature over another. But if I had to pick one, the UTM would be the most valuable because of the notification. I get notified via email if there is any type of threat detection or alert, telling me something is wrong.
The most valuable feature is the ease of use of the interface.
It's very easy to use, especially compared to similar products. A lot more users use the WatchGuard appliance now than use the SonicWall appliance because of the ease of usability.
The most valuable features of this solution are live logging, rule setup and maintenance, and VPN creation.
In NGFW, Cisco should be aligned with the new technology and inspection intelligence because Cisco is far behind in this pipeline.
We were also not too thrilled when Cisco announced that in the upcoming new-gen ASA, iOS was not going to be supported, or if you install them, they will not be able to be managed through the Sourcefire. However, it seems like Cisco is moving away from the ASA iOS to the Sourcefire FireSIGHT firmware for the ASA. We haven't had a chance to test it out.
Our latest experience with a code upgrade included a number of bugs and issues that we ran into. So more testing with their code, before it hits us, would help.
The software was very buggy, to the point it had to be removed.
Most users do not have awareness of this product's functionality and features. Cisco should do something to make them aware of them. That would be quite excellent and useful to organizations that are still using legacy data-center-security products.
I have found that Cisco reporting capabilities are not as rich as other products, so the reporting could be improved.
The Sandbox and the Web Censoring in this solution need to be improved.
It will be nice if they had what you traditionally would use a web application scanner for. If the solution could take a deeper look into HTTP and HTTPS traffic, that would be nice.
They need to improve their research team and they need to study their data to analyze it and build the product.
Once you start getting into proxy actions and setting up: "Okay, cool. Once this rule gets triggered, what actions have to happen?" I do know a few people who use WatchGuard and they still have to get assistance when they look at that. So I would file that as a con for WatchGuard. Proxy actions can be a little bit complicated.
The usability could be better, but it is definitely manageable. If we have to go to a backup internet connection, that could be a little bit easier.
The few issues that we have had, such as not knowing where to go, they have been answered quickly.
Websense is an application that monitors and filters internet traffic. Websense was derived from WatchGuard. But when you go to WatchGuard to actually implement that particular feature, you have to use some type of additional feature and you have to pay for it, unfortunately. I think it should be free or free in the WatchGuard box itself, as an option. It would be nice if they didn't charge us for that.
The reporting is a little on the weak side. I would like to see a better reporting set and easier drill-down options.
There is a slight learning curve.
We would like to see granular notification settings and more advanced filtering in traffic monitoring.
I'd like to have better access to workstation monitoring, connection monitoring, and the amount of time an address is being used, to better gauge proper network utilization. If I knew that something was connected to a particular external location for an extended period that seems abnormal, I'd be able to act upon it.
Pricing and Cost Advice
Always consider what you might need to reduce your wasted time and invest it in other solutions.
Pricing varies on the model and the features we are using. It could be anywhere from $600 to $1000 to up to $7,000 per year, depending on what model and what feature sets are available to us.
We used Check Point and the two are comparable. Cost was really what put us onto the ASAs... the price tag for Check Point was exorbitantly more than what it is for the ASA solution.
We are in the process of renewing our three-year license, which costs approximately $24,000 USD for the thirty-six months.
The pricing for Cisco products is higher than others, but Cisco is a very good, strong, and stable technology.
The program is very expensive.
The cost of this solution is high.
Some of our customers would be more likely to standardize on Cisco equipment if the cost was lower because a lot of people install cheap equipment.
It costs about 8 to 10 thousand dollars per year for 500 users, standard licensing fees included.
I usually tell people that it's really affordable as well, particularly compared to Cisco.
We don't have any other costs other than the licensing stuff.
The cost was somewhere in the vicinity of $2,000 to $3,000 for each one...
It costs me about $800 a year.
I buy a three-year renewal on the main device, which is usually around $3,000 to $4,000. They usually upgrade the device when I do it. You get a big discount when you do three years.
Their price point worked, which is the reason why we stayed with WatchGuard.
We pay about $3,500 every three years.
I think we might be subscribed to one or two of the premium features.
Compared 38% of the time.
Compared 10% of the time.
Compared 10% of the time.
Compared 35% of the time.
Compared 21% of the time.
Compared 11% of the time.
Compared 25% of the time.
Compared 14% of the time.
Compared 11% of the time.
Also Known As
|Cisco ASA, Adaptive Security Appliance, ASA, Cisco Sourcefire Firewalls||Sangfor NGAF Firewall Platform|
Adaptive Security Appliance (ASA) is Cisco's end-to-end software solution and core operating system that powers the Cisco ASA product series. This software solution provides enterprise-level firewall capabilities for all types of ASA products, including blades, standalone appliances and virtual devices. Adaptive Security Appliance provides protection to organizations of all sizes, and allows end-users to access information securely anywhere, at any time, and through any device.
Adaptive Security Appliance is also fully compatible with other key security technologies, and so provides organizations with an all-encompassing security solution.
Block more threats and quickly mitigate those that do breach your defenses with the industry’s first threat-focused NGFW.
Sangfor NGAF is capable of detecting in real-time threats at every step and provide a rapid response on how to deal with them. In order to meet the challenges of escalating attacks, it's not enough to provide the detection of static elements. We need a total security collaboration between each module to continuously detect unknown & new threats to quickly issue policy based on detection results to refine the scope of the threats.
WatchGuard's approach to network security focuses on bringing best-in-class, enterprise-grade security to any organization, regardless of size or technical expertise. Ideal for SMBs and distributed enterprise organizations, our award-winning Unified Threat Management (UTM) appliances are designed from the ground up to focus on ease of deployment, use, and ongoing management, in addition to providing the strongest security possible.
Learn more about Cisco ASA NGFW
Learn more about Sangfor NGAF
Learn more about WatchGuard Firebox
|There are more than one million Adaptive Security Appliances deployed globally. Top customers include First American Financial Corp., Genzyme, Frankfurt Airport, Hansgrohe SE, Rio Olympics, The French Laundry, Rackspace, and City of Tomorrow.||Sony EMCS (Malaysia) Sdn. Bhd., Malaysian Road Transport Department, Universiti Sultan Zainal Abidin, Punjab Medical College (Pakistan)||Ellips, Diecutstickers.com, Clarke Energy, NCR, Wrest Park, Homeslice Pizza, Fortessa Tableware Solutions, The Phoenix Residence|
Financial Services Firm19%
Comms Service Provider9%
Software R&D Company6%
Software R&D Company28%
Comms Service Provider19%
No Data Available
Software R&D Company17%
Comms Service Provider12%
No Data Available