We use the Firepower as a perimeter firewall to protect from the outside network.
Network Engineer at a financial services firm with 5,001-10,000 employees
Since the product is stable, we do not have to spend additional money to buy other firewalls
Pros and Cons
- "Since the product is stable, we do not have to spend additional money to buy other firewalls. Once deployed, we can use the product for a long time. Thus, it is cost effective."
- "The reporting and other features are nice, but there is an issue with applying the configuration. That part needs some improvement."
What is our primary use case?
How has it helped my organization?
We are using Firepower to protect a number of services.
We are using it in a dynamic environment. This is important for our company's policies. The dynamic policy capabilities enable tight integration with Secure Workload at the application workload level.
What is most valuable?
The most valuable feature is the IPS. We also like the AnyConnect feature.
We monitor daily the final inspection activities and intelligence on Firepower. We also send logs from Firepower to our monitoring server, which is a nice feature.
What needs improvement?
The reporting and other features are nice, but there is an issue with applying the configuration. That part needs some improvement.
Services from the outside, like financial services that are critical, should be protected by the NGFW. There are cyber attacks on these services. Therefore, adding this NGFW in front of those services will reduce our costs for cyber crime.
Buyer's Guide
Cisco Secure Firewall
August 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
For how long have I used the solution?
We started using this next-generation firewall two years ago.
What do I think about the stability of the solution?
It is stable, but there are issues with the hybrid when you do the activation.
What do I think about the scalability of the solution?
It is scalable. All our users utilize this firewall. We have more than 30,000 users who are end users, admins, and developers.
How are customer service and support?
Cisco technical support team is perfect in their specific area, but they could improve their support for Cisco integration issues between products. I would rate them as eight out of 10.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We were previously using Cisco ASA for eight years. Now, we are using Firepower NGFW. We hope to continue using this product in the future, as long as there are no discouraging issues.
We are also using Check Point in conjunction with Cisco. We use Checkpoint for our internal networks and Secure Firewall for our outside network.
How was the initial setup?
Installation wasn't that difficult, but there were some challenges on the integration. Sometimes, we face issues from the integration between another Cisco product's API and Firepower NGFW. We just integrated with our existing networks.
The firewall takes no more than two weeks to install. The integration with the API takes about six months.
What about the implementation team?
We implemented ourselves.
Two technical guys deployed it and now maintain it.
What was our ROI?
If we didn't use this NGFW, our company might have been charged by a number of attackers. Therefore, the firewall reduces our costs and operational expenses by around 40%.
Since the product is stable, we do not have to spend additional money to buy other firewalls. Once deployed, we can use the product for a long time. Thus, it is cost effective.
What's my experience with pricing, setup cost, and licensing?
Pricing for Cisco is expensive. There are additional costs for the licensing part, support, and even the hardware part. The device cost is very high. I would be very happy with an improvement on the price.
Which other solutions did I evaluate?
From the user perspective, the reporting and other features are easy to use and user-friendly, but the Control feature of Firepower needs improvement, especially when comparing Firepower to Check Point NGFW.
What other advice do I have?
For digital banking, this solution's firewalls have greatly improved our economy. Most enterprises in our country are using Cisco products because Cisco has worldwide support and cable devices.
I would rate this solution as eight out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Engineer Specialist at Telekom Slovenije
Keeps our environment secure and helps reduce firewall-related operational costs
Pros and Cons
- "With Cisco, there are a lot of features such as the network map. Cisco builds the whole network map of the machines you have behind your firewall and gives you insight into the vulnerabilities and attributes that the host has. Checkpoint and Fortinet don't have that functionality directly on the firewall."
- "The only drawback of the user interface is when it comes to policies. When you open it and click on the policies, you have to move manually left and right if you want to see the whole field within the cell. Checkpoint has a very detailed user interface."
What is our primary use case?
We primarily use it as a corporate, perimeter firewall for traffic to the internet and back, for surfing. We also have some site-to-site connections with customers.
How has it helped my organization?
So far, there hasn't been any breach, so we are very happy.
It has also helped to reduce the operational costs of our firewall. There is a report that is automatically generated. You don't have to search for and prepare everything by yourself. You don't need staff to prepare the information because it is automated. We only go through this report once a week and if there are some special events, we can take care of them.
What is most valuable?
The next-generation features, like IPS, among others, are the most valuable. IPS is mandatory in modern networks for protection against malicious attacks and network anomalies.
Also, it gives you great visibility when doing deep packet inspection, but you have to do HTTP inspection. If you don't do HTTP inspection, the visibility is not complete. That is the case for every firewall vendor.
What needs improvement?
The ease of use, when it comes to managing Cisco Firepower NGFW Firewalls, is getting better because the UI is improving. It was a bit cumbersome in previous versions. Checkpoint, for example, has one of the most intuitive user interfaces, and now Cisco is really improving.
The only drawback of the user interface is when it comes to policies. When you open it and click on the policies, you have to move manually left and right if you want to see the whole field within the cell. Checkpoint has a very detailed user interface. Cisco is getting better and becoming more and more user-friendly.
Cisco needs a more intuitive user interface. When you know what to do, it's easy. Otherwise, you need training. You can install it and do the initial configuration, but if you don't have the proper training it's also possible to configure it the wrong way. If that happens, some things might pass through that you don't know about.
For how long have I used the solution?
We have been using Cisco Secure Firewall for about five years, from the beginning of the Cisco Firepower 2100 Series.
What do I think about the stability of the solution?
We were on version 6.2.2 but now we're up to version 7.7.0, and it has really improved. It was not hard to implement but there were many bugs in the earlier version and some were serious, but now it's stable. There are no more bugs. It's really getting better. I would recommend Firepower to every customer now because it's stable. It's a really nice firewall.
What do I think about the scalability of the solution?
The model we have is okay for our environment, so it's scalable. We haven't seen any problems in that regard. There are 50 or 60 devices behind it and about 500 clients. It is used in a very specific environment for a large Slovenian system.
The device has achieved its purpose. We won't implement any other features.
How are customer service and support?
Cisco support is the best, especially if you compare it to other vendors. Cisco may be a bit expensive compared to other vendors, but the support is really good. When you open a case they're really responsive and they resolve every case. This is my personal experience, not only when it comes to Firepower but for the whole Cisco portfolio, which I have been working with since 2005.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial configuration was done within a few hours, but getting all the policies in place took about a month. That was not related to the firewall, it was related to all the requirements from management and from other people as well. But the configuration to get it set up initially was straightforward, nothing special.
What about the implementation team?
My colleagues and I did the deployment. We are an internal team. We are integrators, so we were able to do it by ourselves.
What was our ROI?
When it comes to XDR, the cost-effectiveness of this firewall depends on the use case because you don't always need XDR functionality. SecureX is included free of charge, so from that point of view, maybe Cisco is not that expensive compared to other vendors. Other vendors' XDR products are not free of charge.
But if you just look at just the firewall functionality, Checkpoint is expensive but Cisco is not the cheapest. Fortinet is cheaper.
Where we have seen ROI is due to the support, time savings, ease of management, and the reporting.
Which other solutions did I evaluate?
Aside from the user interface, which is getting better, Cisco is at the top for functionality and in all other respects. We work with Fortinet, Checkpoint, and we used to work with Juniper, in addition to Cisco.
With Cisco, there are a lot of features such as the network map. Cisco builds the whole network map of the machines you have behind your firewall and gives you insight into the vulnerabilities and attributes that the host has. Checkpoint and Fortinet don't have that functionality directly on the firewall. They don't give you that direct visibility into the host, such as which operating the host has.
We don't work with Juniper anymore because its user interface is really not okay. You only have the CLI or you have to use Security Director for management, which is very complex and not user-friendly. That is why we abandoned Juniper as a product.
I would rate Cisco at eight out of 10 overall, and Check Point would be a seven. Check Point fields a great solution in this space, but they have very bad support, and support is one of the most important things. Having great blogs doesn't help if support doesn't come through when you need it.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Buyer's Guide
Cisco Secure Firewall
August 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: August 2025.
865,295 professionals have used our research since 2012.
Senior Network Security Engineer at a tech services company with 11-50 employees
Its Snort 3 IPS gives us flexibility and more granular control of access
Pros and Cons
- "Its Snort 3 IPS has better flexibility as far as being able to write rules. This gives me better granularity."
- "I would like it to have faster deployment times. A typical deployment could take two to three minutes. Sometimes, it depends on the situation. It is better than it was in the past, but it could always use improvement."
What is our primary use case?
We are using it for firewall and intrusion prevention.
I have deployed it into different environments: retail, commercial, law, real estate, and the public sector. Retail is the biggest environment that I have deployed this firewall into, with 43 different sensors and a range up to 10 GbE throughput.
I am using up to version 7.0 across the board as well as multiple models: 1000 Series or 2100 Series.
How has it helped my organization?
The integration of network and workload micro-segmentation help us provide unified segmentation policies across east-west and north-south traffic. It is important to have that visibility. If you can't detect it, then you can't protect it. That is the bottom line.
The solution has enabled us to implement dynamic policies for dynamic environments. These are important because they give us flexibility and more granular control of access.
What is most valuable?
- Ease of operability
- Security protection
It is usually a central gateway into an organization. Trying to keep it as secure as possible and have easy to use operability is always good. That way, you can manage the device.
The solution has very good visibility when doing deep packet inspection. It's great because I can get packet captures out of the device. Because if an intrusion fires, I can see the packet that it fired in. So, I can dive into it and look at what is going on, what fired it, or what caused it.
Cisco Secure Firewall is fine and works when it comes to integration of network and workload micro-segmentation.
The integration of network and workload micro-segmentation is very good when it comes to visibility in our environment. It is about how you set it up and the options that you set it up for, e.g., you can be as detailed as you like or not at all, which is good.
Its Snort 3 IPS has better flexibility as far as being able to write rules. This gives me better granularity.
What needs improvement?
It needs better patching and testing as well as less bugs. That would be nice.
I would like it to have faster deployment times. A typical deployment could take two to three minutes. Sometimes, it depends on the situation. It is better than it was in the past, but it could always use improvement.
For how long have I used the solution?
I have been using it for seven years.
What do I think about the stability of the solution?
Stability has been good so far. It has been much better than in the past. In the past, there were times where there were known issues or bugs.
What do I think about the scalability of the solution?
Scalability has been fine. I haven't had an issue with it. I just haven't had a need to deal with scalability yet.
How are customer service and technical support?
I would rate Cisco's support for this solution as nine out of 10 for this solution. The support has been very good. We got the job done. Sometimes, why it wasn't perfect, the challenge was getting a hold of someone.
Which solution did I use previously and why did I switch?
I have used this solution to replace different vendors, usually Cisco ASA that is reaching end of life.
How was the initial setup?
The initial setup is straightforward for me at this point. That is just because of the experience that I have in dealing with it. for a new person, it would be a little bit more complex. They have gotten better with some of the wizards. However, if you are not familiar with it, then that makes it a little more challenging.
What about the implementation team?
Depending on the situation, we will go through the typical setups. We know what we want to configure and sort of follow a template.
What was our ROI?
We have seen ROI with a better, more secure environment.
Cisco Secure Firewall has helped us to reduce our firewall operational costs. This is based on the fact that the newer models, where we have been replacing older models, have better throughput, capacity, and performance overall.
What's my experience with pricing, setup cost, and licensing?
Pricing is the same as other competitors. It is comparable. The licensing has gotten better. It has been easier with Smart Licensing.
There are additional costs, but that depends on the feature sets that you get. However, that is the same with any firewall vendor at this point.
Which other solutions did I evaluate?
I have also worked with Check Point and Palo Alto. The support is much better with Cisco than Check Point. Check Point had a little bit better of a central management station. Whereas, Cisco with the FMC is a little different as far as there are still some features that are being added to the FMC, which is good. As far as Palo Alto goes, they are quite comparable as far as their functionality and feature sets. Cisco wins for me because it has Snort, which is a known standard for IPS, which is good. Also, Cisco has the Talos group, which is the largest group out there for security hunting.
Check Point was the easiest as far as user-friendliness and its GUI. After that, Cisco and Palo Alto would be kind of tied for ease of use.
What other advice do I have?
Definitely do your research, e.g., how you want to set it up and how deep you want to go in with it. This will actually help you more. When we say Cisco Secure Firewall, is it Next-Generation, running ASA, or running Firepower? Or, does Meraki actually fit in there? So, there are different scales based on what you are trying to look for and how deep security-wise you want to go into it.
SecureX is a nice feature, but it has to be for the right environment. It is nice that we get it, but most people don't take advantage of it.
The dynamic policy capabilities can enable tight integration with Secure Workload at the application workload level, but I am not using much with Secure Workload at this point.
I would rate Cisco Secure Firewall as nine out of 10. I would not give it a 10 because of bugs.
Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Partner
Security Network Architect at Inmac
Has an easy installation process, but the integration capabilities with various applications need improvement
Pros and Cons
- "The advantage of using Cisco is its integration within the Cisco fabric, which allows for effective threat detection and mitigation."
- "Cisco could improve its score by developing more features that integrate seamlessly with various applications and investing in hardware acceleration to enhance performance."
What is our primary use case?
Cisco Secure Firewall is a next-generation firewall that can be used for various security applications.
What is most valuable?
The advantage of using Cisco is its integration within the Cisco fabric, which allows for effective threat detection and mitigation.
What needs improvement?
Cisco could improve its score by developing more features that integrate seamlessly with various applications and investing in hardware acceleration to enhance performance.
What do I think about the stability of the solution?
The product is stable with minimal glitches or latency issues.
How was the initial setup?
The solution is easy to install, requiring minimal expertise. Deployment time varies, but it can take about two days for a medium-sized company with 200-300 users to configure and install.
What was our ROI?
After five years of product usage, the high return on investment and low total cost of ownership can be observed.
What's my experience with pricing, setup cost, and licensing?
Pricing depends on partnerships and certifications. The engineering team's certifications can qualify it for seven to eight percent discounts.
What other advice do I have?
The platform's integration capabilities depend on the project context. In some cases, integrating Palo Alto may provide better performance, but Cisco can still be effective.
However, its classification in industry comparisons, such as those from Gartner, is lower than that of competitors like FortiGate and Palo Alto.
Overall, I rate it seven out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Security Engineer at a financial services firm with 501-1,000 employees
Provides IPS intrusion prevention, anti-malware, and anti-spam
Pros and Cons
- "The important features are IPS intrusion prevention, anti-malware, and anti-spam."
How has it helped my organization?
Cisco Secure Firewall has impacted our cybersecurity cost efficiency.
What is most valuable?
The important features are IPS intrusion prevention, anti-malware, and anti-spam.
What needs improvement?
Cisco firewall needs experience with hardware. They should also enhance security antivirus, application detection, user detection, and ID detection.
For how long have I used the solution?
I have been using Cisco Secure Firewall for three years.
What do I think about the scalability of the solution?
300 users are using this solution.
How are customer service and support?
The support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is easy, but it takes some time to push the configurations. Also, it's a little complicated and not friendly to use. It is good only for IT and experienced people.
The deployment took two months and a team of two to three people.
What's my experience with pricing, setup cost, and licensing?
The pricing is average.
What other advice do I have?
I recommend the solution to medium and enterprise customers since it is expensive.
Overall, I rate the solution an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
An easy to configure solution that can act as a VPN concentrator
Pros and Cons
- "The most valuable feature of Cisco Secure Firewall is its ease of configuration and that it's scalable for firewalls and VPNs."
- "Changes you make in the GUI sometimes do not reflect in the command line and vice versa."
What is our primary use case?
We mostly use Cisco Secure Firewall as a VPN concentrator and for its firewall features.
How has it helped my organization?
Using Cisco Secure Firewall has helped grow our familiarity with people that know Cisco.
What is most valuable?
The most valuable feature of Cisco Secure Firewall is its ease of configuration and that it's scalable for firewalls and VPNs.
What needs improvement?
Changes you make in the GUI sometimes do not reflect in the command line and vice versa.
For how long have I used the solution?
We have been using the solution since its inception, so, for many years now.
What do I think about the stability of the solution?
We did not have any stability issues with Cisco Secure Firewall.
What do I think about the scalability of the solution?
We did not see any limitations with Cisco Secure Firewall’s scalability.
Which solution did I use previously and why did I switch?
We also use Aruba in our organization. We never have to factor in extra development time when we go to a new major version of Cisco. With Aruba, we have a pretty drawn-out development timeline for any upgrades or software improvements. Aruba and Cisco Secure Firewall are very different in their implementation and development.
How was the initial setup?
The initial setup of the Cisco Secure Firewall is very straightforward. The average time it took to deploy the solution was very short. Deploying the VM and automating our configurations took a couple of minutes.
What's my experience with pricing, setup cost, and licensing?
Cisco smart licensing is a hassle for a disconnected environment. However, I haven't licensed anything in a while. There have been many changes, making it easier to license disconnected devices connected to the internet.
What other advice do I have?
ASAv uses the solution as a VPN concentrator and a firewall because it could be used for both. It can be used for landing AnyConnect clients on ASAv and as a firewall.
What sets Cisco Firewall apart from other products is that when we do an update, we know we're not going to break a lot of things, and there are not a lot of bugs. The integration on the Cisco side is pretty good.
Most of our team is familiar with Cisco, and everyone knows what to expect when they log in. So it's easy in that way.
I like the application visibility and control with Cisco Secure Firewall. My only complaint is that the changes made in the GUI sometimes do not reflect in the command line.
I haven't had any problems with Cisco Secure Firewall. It's very straightforward and reliable. Also, it's trustworthy because it has the Cisco name.
Cisco Secure Firewall has helped free up our IT staff for other projects. The product is quite heavy into automation. So with it being Cisco, it is very scalable in generating configs. The solution saves a week or two for implementation and integration.
Cisco Secure Firewall has helped our organization improve its cybersecurity resilience through the reliability aspect.
You know what you're getting when you use an ASAv from Cisco. Cisco Secure Firewall is a great product in terms of reliability and scalability.
Overall, I rate Cisco Secure Firewall ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Networking Project Management Specialist at Bran for Programming and Information Technology
Highly reliable, quick device replacements, and responsive support
Pros and Cons
- "Our company operates in Saudi Arabia, primarily working with government sectors. If any hardware malfunctions, the defective device is removed, and we receive a replacement from the reseller. We have not encountered any issues related to delays in receiving replacements for malfunctioning devices which has been beneficial."
- "In today's world, cyberattacks have become a common occurrence. However, so far, we have not faced any issues with our systems. I hope the situation remains the same in the future. If Cisco introduces even more advanced security measures, it would be beneficial."
What is our primary use case?
To safeguard our clients' system data and related aspects, we rely on Next-Generation Firewalls as a system integrator. In particular, we use Cisco Secure Firewall for enhanced security measures.
We have provided our services to the National Information Center in Riyadh, which is a government database. They installed Cisco Secure Firewall systems and have given us positive feedback, which is why most of the areas prefer to use Cisco. To date, we have not received any negative feedback from our clients regarding any issues, such as hacking. Everything has been secure, and I hope it stays that way in the future.
What is most valuable?
Our company operates in Saudi Arabia, primarily working with government sectors. If any hardware malfunctions, the defective device is removed, and we receive a replacement from the reseller. We have not encountered any issues related to delays in receiving replacements for malfunctioning devices which has been beneficial.
What needs improvement?
In today's world, cyberattacks have become a common occurrence. However, so far, we have not faced any issues with our systems. I hope the situation remains the same in the future. If Cisco introduces even more advanced security measures, it would be beneficial.
One of the major issues we face in the Middle East is the long delivery time for Cisco products. Currently, they are taking almost 10 months to deliver, which is much longer compared to before when we received the products within 70 to 80 days or even two to three months. For instance, we recently placed an order that has a delivery date in the middle of 2024. This delay is unacceptable as customers cannot wait that long, and they may opt for other alternatives, such as Huawei, Juniper, or HPE. Therefore, Cisco needs to improve its delivery time and ensure that they deliver products within a reasonable timeframe, as it did before.
For how long have I used the solution?
I have been working with Cisco Secure Firewall for more than 10 years.
What do I think about the stability of the solution?
We have not encountered any stability issues. The only issue we faced was with another company that did not have proper cooling systems in their data center.
What do I think about the scalability of the solution?
The scalability of the Cisco Secure Firewall is excellent.
How are customer service and support?
A few years ago, we faced an issue with some of our devices in Saudi Arabia, and we reached out to Cisco for assistance. They responded promptly and repaired our devices within the given time frame. While the delivery time for their solutions in the Middle East may be longer, Cisco still delivers their solutions on time, whether it's for repair or new orders. Even if the delivery time is up to a year, Cisco ensures that our products are provided on time.
I rate the support from Cisco Secure Firewall a ten out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
As a system integrator, our primary focus is not on selling products, but rather on providing comprehensive solutions to our customers, starting from scratch and ensuring everything runs smoothly. In this regard, we rely heavily on Cisco devices, including switches, routers, code devices, NK, Nexus, 7000, and 9000. We also use other Cisco products, such as IP phones and access points. In Saudi Arabia, Cisco is the most popular brand in the market, but its popularity is declining due to prolonged delivery times. Customers cannot afford to wait a year, and this is the primary reason for the decline in demand.
What's my experience with pricing, setup cost, and licensing?
The prices of Cisco Secure Firewall are competitive, especially for us as Cisco partners. We purchase the products directly from Cisco as a gold partner, which allows us to obtain better pricing than we would get from normal distributors or the local market.
What other advice do I have?
Our current company, SNC ICT, is already a Cisco Gold Partner. We are actively involved in investing, purchasing, and selling Cisco products to our customers, as well as performing installations, configurations, and providing other related services.
In the Middle East, most people with a budget opt for Cisco. However, I do not have any information about the preferences in Europe, South Asia, or Asia.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
System Engineer at a computer software company with 201-500 employees
The grouping of the solutions helps save time
Pros and Cons
- "The grouping of the solutions helps save time. If you have a problem and you have a high-level overview of the system, you can easily dig deeper into the problem. For example, I can check to see why ASA isn't working but the reason for the outage is actually because of Duo. I can spend a lot of time working in the wrong direction because I didn't have an overview."
- "It would be great to have all the data correlated to have an overview and one point of administration."
What is our primary use case?
We use Cisco IronPort, Firepower, Secure Firewall, Email, and Secure Connect.
As with most products, integration could be better where needed. Sometimes, for example, the Cisco Secure Firewall and IronPort are in a class of their own. When it comes to management and logging, there's room for improvement.
Most of the products aren't configured on their own, but they are related together. There should be some sort of management. We would need a supervisor to manage it before using all of the solutions together.
How has it helped my organization?
They address services that belong together. For example, the Secure Client provides remote access. Authentication and multiple-factor authentication are two different products that belong together. There should be a link between both products and between both management interfaces to see, for example, troubleshooting or reporting so that you have both sources together.
It would be great to have all the data correlated to have an overview and one point of administration.
The grouping of the solutions helps save time. If you have a problem and you have a high-level overview of the system, you can easily dig deeper into the problem. For example, I can check to see why ASA isn't working but the reason for the outage is actually because of Duo. I can spend a lot of time working in the wrong direction because I didn't have an overview.
IronPort stuff looks at first a little bit outdated. It's not a fancy-colored view, but it does its job and is extremely helpful. Debugging on this platform is very easy.
What needs improvement?
Firepower's implementation and reliability need room for improvement.
How are customer service and support?
We address our problems with the relevant people. Some of the quality of their support has dropped. If your problem gets escalated, there are many skilled people who are absolute pleasures to work with. They are brilliant at what they do.
If you talk to someone who solves the problem within five minutes you can't do any better. But on the other hand, the other end of the range needs improvement.
You can have a case that lasts 15 months in which you have to talk to 20 people to resolve.
How would you rate customer service and support?
Neutral
How was the initial setup?
The complexity of the installation depends. It's not so easy to install. Each topic needs one management interface. So you end up with 20 to 40 different management platforms. All of them use a tremendous amount of resources. If you're willing to install it, you need a huge pile of hardware. It is not clear what everything does. Some consolidation there would be helpful. Other vendors face the same problem.
What was our ROI?
We have seen ROI from using Cisco.
What other advice do I have?
I chose Cisco because I've been working with them for 23 years. I choose it for its stability and because they have the right range of products. Most of our IT staff is happy with it.
I would rate it a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner

Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: August 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Cisco Umbrella
Cisco Identity Services Engine (ISE)
Palo Alto Networks NG Firewalls
WatchGuard Firebox
Check Point Quantum Force (NGFW)
Azure Firewall
SonicWall TZ
Cisco Secure Network Analytics
Sophos XGS
Juniper SRX Series Firewall
Fortinet FortiGate-VM
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?