We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
"Firepower has been used for quite a few enterprise clients. Most of our clients are Fortune 500 and Firepower is used to improve their end to end firewall functionality."
"There are no issues that we are aware of. It does its job silently in the background."
"We have not had to deal with stability issues."
"It is one of the fastest solutions, if not the fastest, in the security technology space. This gives us peace of mind knowing that as soon as a new attack comes online that we will be protected in short order. From that perspective, no one really comes close now to Firepower, which is hugely valuable to us from an upcoming new attack prevention perspective."
"We get the Security Intelligence Feeds refreshed every hour from Talos, which from my understanding is that they're the largest intelligence Security Intelligence Group outside of the government."
"It's got the capabilities of amassing a lot of throughput with remote access and VPNs."
"The most valuable features of this solution are the integrations and IPS throughput."
"The Firepower+ISE+AMP for endpoint integration is something that really stands it out with other vendor solutions. They have something called pxGrid and i think it is already endorsed by IETF. This allows all devices on the network to communicate."
"The VPN functionality is really good. Overall, the whole device is very easy to manage. The software that comes with it is also good."
"It has been delivering results efficiently. Its configurations and updates have been easy. It is also user-friendly."
"SonicWall NSSP is stable and scalable too."
"What I like about the solution is the ease of use."
"The intrusion prevention is great, and I like dual virus scanning on the network layer because we scan it through Avira and Sophos. Web filtering is also a fantastic option for clients who want to really lock down internet access."
"The cost of the solution is very reasonable."
"I would recommend UTM over XG because it's easier to manage."
"We've found the technical support to be helpful."
"The initial setup is pretty easy."
"Monitoring and reporting are areas that need improvement."
"The most valuable feature is ransomware protection."
"Implementations require the use of a console. It would help if the console was embedded."
"I believe that the current feature set of the device is very good and the only thing that Cisco should work on is improving the user experience with the device."
"It would be great if some of the load times were faster."
"There is limited data storage on the appliance itself. So, you need to ship it out elsewhere in order for you to store it. The only point of consideration is around that area, basically limited storage on the machine and appliance. Consider logging it elsewhere or pushing it out to a SIEM to get better controls and manipulation over the data to generate additional metrics and visibility."
"Report generation is an area that should be improved."
"The visibility for VPN is one big part. The policy administration could be improved in terms of customizations and flexibility for changing it to our needs."
"The price and SD-WAN capabilities are the areas that need improvement."
"Its interface is sometimes is a little bit slow, and it can be improved. When you need to put your appliance in failover mode, it is a little difficult to do it remotely because you need to turn off the appliance in Cisco mode. In terms of new features, it would be good to have AnyConnect VPN with Firepower. I am not sure if it is available at the moment."
"Its reporting functions can be improved. It has decent reporting, but you got to pay a lot more money for it. That's where it begins to fall apart. It comes with minimal zero reporting unless you buy some extra modules. With those extra modules, you can get all the data, but it takes a while to put together what you need for your customer. It is for technical people, but there is no executive summary of the reporting."
"No security product is foolproof against hackers, intruders, and other such things. As a security product, they have to keep pace in terms of protection from new hackers and intruders."
"The user interface, the GUI, could be improved."
"It's stable, but the reaction time of the GUI is terrible."
"We need to speed up the support."
"Sophos should improve its ability to check something like bandwidth consumption for users or something more real-time."
"The ease of use could be a bit better."
"It would be nice if it had basic features, such as DLP (Data Loss Prevention)."
"The solution is not scalable."
"Anti-phishing functionality should be improved."
"The five-factor authentication needs improvement."
"The price of Firepower is not bad compared to other products."
"This product requires licenses for advanced features including Snort, IPS, and malware detection."
"Its price is in the middle range. Both Firepower and FortiGate are not cheap. Palo Alto and Check Point are the cheapest ones. I don't remember any costs in addition to the standard licensing fees."
"Pricing is the same as other competitors. It is comparable. The licensing has gotten better. It has been easier with Smart Licensing."
"I like the Smart Licensing, because it is more dynamic and easier to keep track of where you are at. If we have a high availability firewall pair and they are deployed in active/standby rather than active/active, I would expect that we would only pay for one set of licenses because you are using only one firewall at any one time. The other is there just for resiliency. The licensing, from a Firepower perspective, still requires you to have two licenses, even if the firewalls are in active/standby, which means that you pay for the two licenses, even though you might only be using one firewall any one time. This is probably not the best way to do it and doesn't represent the best value for money. This could be looked at to see if it could be done in a fairer way."
"I am happy with the product in general, including the pricing."
"Cisco is not for a small mom-and-pop shop because of the cost, but if you're in a regulated industry where a breach could cost you a million dollars, it's a bargain."
"There are additional implementation and validation costs."
"For SonicWall NSSP high availability, active/passive, you need to buy one license, and so you get much more value for money."
"You got to buy some VPN licenses, and there might be a $40 to $50 one-time license fee per current user. There are different layers. They have several different levels of event security software and depending on the model, it seems to come out to be $1 to $2 a day. So, if you bought a three-year license, it is going to be anywhere from $900 to $1800 depending on the bundle and model that you buy."
"Our licensing fees are paid on a monthly basis."
"The appliance should be purchased and there is a fee for the license."
"I think the pricing of Sophos is very fair."
"The prices can be better, they could make it a lot cheaper."
"We pay for the service on a yearly basis. The last time we paid was in June, for a year. At the time, it was about $20,000."
"The solution is very low cost compared to competitors. You have a good firewall, a lot of functions for less than the price of some omni firewall competitors."
"It's reasonably priced."
"This product is free for home users. The more expensive products have better performance."
Cisco NGFW firewalls deliver advanced threat defense capabilities to meet diverse needs, from
small/branch offices to high performance data centers and service providers. Available in a wide
range of models, Cisco NGFW can be deployed as a physical or virtual appliance. Advanced threat
defense capabilities include Next-generation IPS (NGIPS), Security Intelligence (SI), Advanced
Malware Protection (AMP), URL filtering, Application Visibility and Control (AVC), and flexible VPN
features. Inspect encrypted traffic and enjoy automated risk ranking and impact flags to reduce event
volume so you can quickly prioritize threats. Cisco NGFW firewalls are also available with clustering
for increased performance, high availability configurations, and more.
Cisco Firepower NGFWv is the virtualized version of Cisco's Firepower NGFW firewall. Widely
deployed in leading private and public clouds, Cisco NGFWv automatically scales up/down to meet
the needs of dynamic cloud environments and high availability provides resilience. Also, Cisco NGFWv
can deliver micro-segmentation to protect east-west network traffic.
Cisco firewalls provide consistent security policies, enforcement, and protection across all your
environments. Unified management for Cisco ASA and FTD/NGFW physical and virtual firewalls is
delivered by Cisco Defense Orchestrator (CDO), with cloud logging also available. And with Cisco
SecureX included with every Cisco firewall, you gain a cloud-native platform experience that enables
greater simplicity, visibility, and efficiency.
Learn more about Cisco’s firewall solutions, including virtual appliances for public and private cloud.
The SonicWall Network Security services platform (NSsp) 12000 series takes a modern approach to threat detection and prevention by combining cloud intelligence with appliance-based protection in a scalable, high-speed platform.
SonicWall NSSP is ranked 26th in Firewalls with 3 reviews while Sophos UTM is ranked 2nd in Unified Threat Management (UTM) with 21 reviews. SonicWall NSSP is rated 9.6, while Sophos UTM is rated 8.4. The top reviewer of SonicWall NSSP writes "Good VPN functionality, very good support, easy to manage, and meets all of our needs". On the other hand, the top reviewer of Sophos UTM writes "Great web and email filtering with reasonable pricing". SonicWall NSSP is most compared with , whereas Sophos UTM is most compared with Fortinet FortiGate, pfSense, Sophos XG, Untangle NG Firewall and Palo Alto Networks NG Firewalls.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.