Cisco Secure Firewall has impacted our cybersecurity cost efficiency.
Senior Security Engineer at a financial services firm with 501-1,000 employees
Provides IPS intrusion prevention, anti-malware, and anti-spam
Pros and Cons
- "The important features are IPS intrusion prevention, anti-malware, and anti-spam."
How has it helped my organization?
What is most valuable?
The important features are IPS intrusion prevention, anti-malware, and anti-spam.
What needs improvement?
Cisco firewall needs experience with hardware. They should also enhance security antivirus, application detection, user detection, and ID detection.
For how long have I used the solution?
I have been using Cisco Secure Firewall for three years.
Buyer's Guide
Cisco Secure Firewall
June 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
859,957 professionals have used our research since 2012.
What do I think about the scalability of the solution?
300 users are using this solution.
How are customer service and support?
The support is good.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is easy, but it takes some time to push the configurations. Also, it's a little complicated and not friendly to use. It is good only for IT and experienced people.
The deployment took two months and a team of two to three people.
What's my experience with pricing, setup cost, and licensing?
The pricing is average.
What other advice do I have?
I recommend the solution to medium and enterprise customers since it is expensive.
Overall, I rate the solution an eight out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Data center design at a comms service provider with 10,001+ employees
Provides great security for our applications
Pros and Cons
- "One of the best features is the ease of use. It's also easy to teach new engineers to use the ASA CLI."
- "It needs to provide the next-generation firewall features that other vendors provide, like data analytics, telemetry, and deep packet inspection."
What is our primary use case?
We use them for site-to-site VPN solutions as well as other VPN activities, and for general application security.
We needed a good VPN solution and, as our network grew, we had more applications that were virtualized and that can be spun up. We needed a solution that would keep us ahead.
How has it helped my organization?
Cisco ASA provides great security for our applications.
What is most valuable?
One of the best features is the ease of use. It's also easy to teach new engineers to use the ASA CLI. When I first started learning firewalls, Cisco was the first one that was taught to me and it was pretty easy to grasp. When I'm teaching other engineers to use Cisco ASAs, the results of their learning are immediate.
What needs improvement?
It needs to provide the next-generation firewall features that other vendors provide, like data analytics, telemetry, and deep packet inspection.
Also, the ASAs need to be improved a little bit to keep up with the demand for high bandwidth and session count applications.
For how long have I used the solution?
I've been using Cisco ASAs for about 11 years.
What do I think about the stability of the solution?
It's reliable. It doesn't have all the features of some of the newer firewalls, but it's very reliable. It doesn't break. It's pretty rock-solid.
What do I think about the scalability of the solution?
We have at least a pair in every one of our data centers. We gateway our applications around the firewall system, meaning all application data goes through firewalls.
How are customer service and support?
We have good support from Cisco for the ASAs. That helps us out a lot. Some of our ASAs are pretty old and technically not supported anymore, but TAC always helps us out.
How was the initial setup?
The initial one, for me, was a little bit complex because I hadn't done it before. It was inline and an active/standby pair, so it involved a little bit more than just deploying one firewall.
We had some documentation written and we tested it in the lab and then the deployment took about four hours.
We deployed it alongside different solutions and then we cut over to it when it wouldn't impact the customers.
The maintenance involves doing code upgrades periodically to keep up with the security environment requirements. One person handles that.
What about the implementation team?
We deployed with a consultant from Cisco support. Our experience with them was good. They provided a lot of documentation ahead of time to help us with our configuration.
From our side there were two people involved. One was doing the configuration and the other person was checking to make sure there were no errors, looking at IPs and the like.
What's my experience with pricing, setup cost, and licensing?
The licensing is straightforward and simple, so we don't have to keep relicensing every year as we do with other applications.
Which other solutions did I evaluate?
We use Juniper as well.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Cisco Secure Firewall
June 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: June 2025.
859,957 professionals have used our research since 2012.
Networking Project Management Specialist at Bran for Programming and Information Technology
Highly reliable, quick device replacements, and responsive support
Pros and Cons
- "Our company operates in Saudi Arabia, primarily working with government sectors. If any hardware malfunctions, the defective device is removed, and we receive a replacement from the reseller. We have not encountered any issues related to delays in receiving replacements for malfunctioning devices which has been beneficial."
- "In today's world, cyberattacks have become a common occurrence. However, so far, we have not faced any issues with our systems. I hope the situation remains the same in the future. If Cisco introduces even more advanced security measures, it would be beneficial."
What is our primary use case?
To safeguard our clients' system data and related aspects, we rely on Next-Generation Firewalls as a system integrator. In particular, we use Cisco Secure Firewall for enhanced security measures.
We have provided our services to the National Information Center in Riyadh, which is a government database. They installed Cisco Secure Firewall systems and have given us positive feedback, which is why most of the areas prefer to use Cisco. To date, we have not received any negative feedback from our clients regarding any issues, such as hacking. Everything has been secure, and I hope it stays that way in the future.
What is most valuable?
Our company operates in Saudi Arabia, primarily working with government sectors. If any hardware malfunctions, the defective device is removed, and we receive a replacement from the reseller. We have not encountered any issues related to delays in receiving replacements for malfunctioning devices which has been beneficial.
What needs improvement?
In today's world, cyberattacks have become a common occurrence. However, so far, we have not faced any issues with our systems. I hope the situation remains the same in the future. If Cisco introduces even more advanced security measures, it would be beneficial.
One of the major issues we face in the Middle East is the long delivery time for Cisco products. Currently, they are taking almost 10 months to deliver, which is much longer compared to before when we received the products within 70 to 80 days or even two to three months. For instance, we recently placed an order that has a delivery date in the middle of 2024. This delay is unacceptable as customers cannot wait that long, and they may opt for other alternatives, such as Huawei, Juniper, or HPE. Therefore, Cisco needs to improve its delivery time and ensure that they deliver products within a reasonable timeframe, as it did before.
For how long have I used the solution?
I have been working with Cisco Secure Firewall for more than 10 years.
What do I think about the stability of the solution?
We have not encountered any stability issues. The only issue we faced was with another company that did not have proper cooling systems in their data center.
What do I think about the scalability of the solution?
The scalability of the Cisco Secure Firewall is excellent.
How are customer service and support?
A few years ago, we faced an issue with some of our devices in Saudi Arabia, and we reached out to Cisco for assistance. They responded promptly and repaired our devices within the given time frame. While the delivery time for their solutions in the Middle East may be longer, Cisco still delivers their solutions on time, whether it's for repair or new orders. Even if the delivery time is up to a year, Cisco ensures that our products are provided on time.
I rate the support from Cisco Secure Firewall a ten out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
As a system integrator, our primary focus is not on selling products, but rather on providing comprehensive solutions to our customers, starting from scratch and ensuring everything runs smoothly. In this regard, we rely heavily on Cisco devices, including switches, routers, code devices, NK, Nexus, 7000, and 9000. We also use other Cisco products, such as IP phones and access points. In Saudi Arabia, Cisco is the most popular brand in the market, but its popularity is declining due to prolonged delivery times. Customers cannot afford to wait a year, and this is the primary reason for the decline in demand.
What's my experience with pricing, setup cost, and licensing?
The prices of Cisco Secure Firewall are competitive, especially for us as Cisco partners. We purchase the products directly from Cisco as a gold partner, which allows us to obtain better pricing than we would get from normal distributors or the local market.
What other advice do I have?
Our current company, SNC ICT, is already a Cisco Gold Partner. We are actively involved in investing, purchasing, and selling Cisco products to our customers, as well as performing installations, configurations, and providing other related services.
In the Middle East, most people with a budget opt for Cisco. However, I do not have any information about the preferences in Europe, South Asia, or Asia.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
System Engineer at a computer software company with 201-500 employees
The grouping of the solutions helps save time
Pros and Cons
- "The grouping of the solutions helps save time. If you have a problem and you have a high-level overview of the system, you can easily dig deeper into the problem. For example, I can check to see why ASA isn't working but the reason for the outage is actually because of Duo. I can spend a lot of time working in the wrong direction because I didn't have an overview."
- "It would be great to have all the data correlated to have an overview and one point of administration."
What is our primary use case?
We use Cisco IronPort, Firepower, Secure Firewall, Email, and Secure Connect.
As with most products, integration could be better where needed. Sometimes, for example, the Cisco Secure Firewall and IronPort are in a class of their own. When it comes to management and logging, there's room for improvement.
Most of the products aren't configured on their own, but they are related together. There should be some sort of management. We would need a supervisor to manage it before using all of the solutions together.
How has it helped my organization?
They address services that belong together. For example, the Secure Client provides remote access. Authentication and multiple-factor authentication are two different products that belong together. There should be a link between both products and between both management interfaces to see, for example, troubleshooting or reporting so that you have both sources together.
It would be great to have all the data correlated to have an overview and one point of administration.
The grouping of the solutions helps save time. If you have a problem and you have a high-level overview of the system, you can easily dig deeper into the problem. For example, I can check to see why ASA isn't working but the reason for the outage is actually because of Duo. I can spend a lot of time working in the wrong direction because I didn't have an overview.
IronPort stuff looks at first a little bit outdated. It's not a fancy-colored view, but it does its job and is extremely helpful. Debugging on this platform is very easy.
What needs improvement?
Firepower's implementation and reliability need room for improvement.
How are customer service and support?
We address our problems with the relevant people. Some of the quality of their support has dropped. If your problem gets escalated, there are many skilled people who are absolute pleasures to work with. They are brilliant at what they do.
If you talk to someone who solves the problem within five minutes you can't do any better. But on the other hand, the other end of the range needs improvement.
You can have a case that lasts 15 months in which you have to talk to 20 people to resolve.
How would you rate customer service and support?
Neutral
How was the initial setup?
The complexity of the installation depends. It's not so easy to install. Each topic needs one management interface. So you end up with 20 to 40 different management platforms. All of them use a tremendous amount of resources. If you're willing to install it, you need a huge pile of hardware. It is not clear what everything does. Some consolidation there would be helpful. Other vendors face the same problem.
What was our ROI?
We have seen ROI from using Cisco.
What other advice do I have?
I chose Cisco because I've been working with them for 23 years. I choose it for its stability and because they have the right range of products. Most of our IT staff is happy with it.
I would rate it a nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Executive Vice President, Head of Global Internet Network (GIN) at a tech services company with 10,001+ employees
The analysis tools and encrypted traffic analysis save time but the licensing is complicated
Pros and Cons
- "Application inspection, network segmentation, and encrypted traffic detection or encrypted traffic analysis (ETA) are valuable for our customers."
- "The usability of Cisco Firepower Threat Defense is an issue. The product is still under development, and the user interface is very difficult to deal with."
What is our primary use case?
We have all kinds of use cases. Our customers are large enterprises, and they need perimeter security. Zero trust, network access control, and network segmentation are quite important these days.
We are a partner and reseller. We implement, and we resell. As a Cisco Secure reseller, we have all the expertise. Our customers are usually overworked and have no time to learn how to implement these things and get some expertise. That's what we bring in. We help them select the right solution, select the proper design and architecture, and implement it. They basically lack the time and expertise, and we are a trusted advisor who helps them with their issues.
How has it helped my organization?
I'm working with security. It improves the security posture of our customers and protects them from threats. We recently saw a bunch of hacks in Germany and our customers are concerned. We help to protect our customers from that, and that's very important.
The analysis tools and encrypted traffic analysis save time. They help detect security threats and incidents that can cause outages for customers. It's a great improvement.
What is most valuable?
Application inspection, network segmentation, and encrypted traffic detection or encrypted traffic analysis (ETA) are valuable for our customers. I'm from Germany, and in Germany, people are very concerned about privacy. We have a bunch of public customers, and they have an issue with decrypting traffic, even if it's only for security analysis. They have some fears. So, they are quite interested in the capability to detect threats without decrypting traffic.
What needs improvement?
The usability of Cisco Firepower Threat Defense is an issue. The product is still under development, and the user interface is very difficult to deal with. That's one area where it should be improved. Another area for improvement, which is also related to the firewall, is stability. We are having stability issues, and we had some cases where customers had a network down situation for about one or two days, which is not great.
For how long have I used the solution?
As a partner, I have been working here for about nine years, but we offered this solution all the time. The company has probably been doing that for at least 15 years.
What do I think about the stability of the solution?
Cisco Firepower Threat Defense has improved a lot over the last few years, but we sometimes still have really big issues.
How are customer service and support?
Their support is pretty awesome. It doesn't really matter if you have a hardware issue or a software issue. If it's a hardware issue, you get a replacement quickly, and if you have a software issue, you get quick support. There are also some bad examples. I have one from wireless where after a problem was acknowledged, it needed about one year to get fixed. It depends a little bit on how complex the issue is, but in general, it's quite okay.
Which solution did I use previously and why did I switch?
We are also selling Fortinet, Palo Alto, and Check Point. We sell all solutions, but I'm quite focused on Cisco. It's mostly because I have the most expertise and experience with it over the years. I've been working with Cisco security solutions for 15 to 20 years. That's where my expertise is, and with Cisco, you have a solution for everything. It's not always the best of breed, but in the overall solution frame, you have something for everything, and they interact nicely with each other, which is great.
How was the initial setup?
The deployment model is totally customer dependent. The way we work, we look at the customer environment and develop a proper deployment model for them. Some of them are using enterprise agreements. It's becoming more and more common, so they can use several solutions at once or with some kind of added use price and other benefits.
I'm not always involved in the deployment. I work as an architect. I do not implement all the solutions I design, but I implement some of them. For me, it's important because, for one, I like it, and second thing is that I need to have some kind of hands-on experience to understand the solution so that I can make better designs.
If you do the initial setup for the first time, it's somewhat complex., but over time, you get the experience, and then it's more or less straightforward.
Our clients rarely used the firewall migration tool. It gives you a starting point for the configuration, but usually, there are so many things you need to rework afterward. We use it sometimes, but it only does a part of the job.
It does require maintenance. The clients have maintenance contracts for that.
What about the implementation team?
In our company in Germany, just for the security solutions, we have about 20 to 30 engineers. They are experienced in different areas. For the firewalls, we have 10 engineers.
What's my experience with pricing, setup cost, and licensing?
Cisco was never a cheap solution. Compared to other vendors, it's more or less at the same level, except maybe Fortinet which is fairly cheap.
In terms of licensing, we still have issues with the subscription model. Many of our customers are used to buying a solution and owning it. It takes time to convince people to go for the subscription model. That's still an issue for us.
What other advice do I have?
We have Cisco Firepower Threat Defense, email security, web security, and Cisco Umbrella. Most of the time, I am working with Identity Services Engine for identity-related things. That's the main product I work with all the time. I have almost no direct contact with Talos, but I know that below the hood, it just improves all their security solutions.
To those evaluating this solution, I would advise being a little bit careful with it. It interfaces well with other Cisco solutions, so it has value, but it's not always the best solution.
At the moment, I would rate it a six out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Network Engineer at a computer software company with 51-200 employees
Integrates easily and has VPN capabilities, but the ASDM interface is a bit buggy and the CLI isn't always intuitive
Pros and Cons
- "I like its integration with the AnyConnect client. I also like how modular it is. For example, I can easily integrate the Umbrella add-on into it. We are planning on adding Umbrella. We haven't added it yet, but we have researched."
- "One big pain point I have is the ASDM interface because it's Java, and sometimes, it's a bit buggy and has low performance. That's something that probably won't be improved because of backward compatibility."
What is our primary use case?
We are mainly using it as a VPN gateway and edge firewall.
How has it helped my organization?
It helped us with the transition to working from home and hybrid working. Because of its VPN capabilities, it enabled us to keep working while everyone had to stay home because of COVID.
It integrates well with other systems within our environment.
What is most valuable?
I like its integration with the AnyConnect client. I also like how modular it is. For example, I can easily integrate the Umbrella add-on into it. We are planning on adding Umbrella. We haven't added it yet, but we have researched it.
What needs improvement?
One big pain point I have is the ASDM interface because it's Java, and sometimes, it's a bit buggy and has low performance. That's something that probably won't be improved because of backward compatibility.
The CLI is not always clear. It's not always intuitive.
Some of the things, such as site-to-site VPN, are complicated to set up. The settings you have are all hidden away in crypto maps, and you can't have a setting per tunnel. When you want to change one particular tunnel, you automatically change them all. That's a drawback.
For how long have I used the solution?
We've been using the Cisco ASA firewall for about two years.
What do I think about the stability of the solution?
It's reliable.
How are customer service and support?
I haven't had much contact with their tech support. We have a partner called Fundamentals for support. They're good. I'd recommend them.
Which solution did I use previously and why did I switch?
We have a Palo Alto core firewall, and we handle threat detection and intrusion prevention on that device. We don't use Cisco ASA for detecting or remediating threats.
Compared to other systems that I have used in the past, Cisco ASA is reliable, and it's not a very big hassle to set up. It's very good, and it just does its job.
How was the initial setup?
It's not a very big hassle to set up. It's a bit complex when you go into different topics that aren't the basic capabilities, such as when you go above VPN and basic ACL configuration, but all in all, it does the job.
What other advice do I have?
I'd rate it a seven out of ten because of the ASDM, non-intuitive CLI, and complication of setting some of the things.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Senior Network Administrator at a comms service provider with 201-500 employees
Good performance and good support
Pros and Cons
- "Their performance is most valuable."
- "The stability could be better because we have a lot of issues with the stability of Cisco Firepower."
What is our primary use case?
We use them for firewall purposes. We use the small ones with the partners for the services they need, such as VPN and security.
What is most valuable?
Their performance is most valuable.
What needs improvement?
The stability could be better because we have a lot of issues with the stability of Cisco Firepower.
For how long have I used the solution?
I've been using Cisco firewalls for 20 years.
What do I think about the stability of the solution?
We have a lot of issues with the stability of Cisco Firepower.
What do I think about the scalability of the solution?
It depends on the model. We are hitting some issues with scalability. It's getting very expensive to scale out.
How are customer service and support?
They sometimes take too long and don't fix the issue quickly, but eventually, it is fixed. I'd rate their support a nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have been using different Cisco firewalls for a long time. We are currently using Cisco Firepower and Cisco ASA. Cisco Firepower is better than Cisco ASA, but stability is an issue.
How was the initial setup?
It's now easier than before. You can have virtual appliances.
We mostly have it on-prem, but some customers want on-prem virtual.
Which other solutions did I evaluate?
We considered using a different solution such as Check Point or Huawei. We chose to stay with Cisco because we're experienced with Cisco and because of the support.
What other advice do I have?
The old versions or models saved us time, but the newer ones take our time. Overall, I'd rate Cisco Secure Firewall an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
Senior Network Consultant at a healthcare company with 1,001-5,000 employees
Easy to understand, deploy, maintain, and troubleshoot
Pros and Cons
- "When I was managing these firewalls, I found them easy to understand, easy to deploy, and easy to maintain as compared to some of the other firewalls I have been involved with earlier. The opinion of my coworkers is that it's easy and quick to establish new zones, expand, and maintain."
- "I'm not very familiar with the largest Firepower models, but competitors like Palo Alto seem to have a more capable engine to do, for instance, TLS/SSL decryption. As I understand, Firepower doesn't let you export the decrypted traffic so that, for instance, the security department can look at the traffic or inspect traffic. It's all in the box. I've heard rumors that this is something Cisco is working on, but it isn't yet available."
What is our primary use case?
We use them in our data centers and on the client side. We have a small installation of Firepower in our main data center, and we are also using Cisco ASA firewalls. So, we have the old ASA platform and new Firepowers.
How has it helped my organization?
It saves time because it's easy to operate and it's easy to add new zones or firewall rules. It's also easy to troubleshoot. It's a neat platform.
What is most valuable?
When I was managing these firewalls, I found them easy to understand, easy to deploy, and easy to maintain as compared to some of the other firewalls I have been involved with earlier. The opinion of my coworkers is that it's easy and quick to establish new zones, expand, and maintain.
What needs improvement?
I'm not very familiar with the largest Firepower models, but competitors like Palo Alto seem to have a more capable engine to do, for instance, TLS/SSL decryption. As I understand, Firepower doesn't let you export the decrypted traffic so that, for instance, the security department can look at the traffic or inspect traffic. It's all in the box. I've heard rumors that this is something Cisco is working on, but it isn't yet available.
For how long have I used the solution?
We have been using Cisco firewalls for about 10 years.
What do I think about the stability of the solution?
Its stability is good. We have a failover standby solution that works fairly well. It can have some improvements, but we are happy with it.
What do I think about the scalability of the solution?
We had an issue where we had to install another cluster for the firewall because we went out of the capabilities on one of them. You need to analyze in advance how much your usage will grow in the future and you have to decide based on that. It's about adding more firewalls. We can scale in this way, and it's good.
How are customer service and support?
Whenever I've used their tech support, they have been successful. They quickly pinpointed the problem and provided swift remediation for all the problems. My experience has been good. I'd rate them a nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We decided to go for Firepower because we needed to expand, and we have a large installation of Cisco devices in our environment. It's 70% Cisco. We have one location where they are using Extreme equipment, but in that location also, we have Cisco firewalls. Having one vendor leads to ease of management. It's also easy in terms of competence. We have good knowledge of Cisco, so it's easy to maintain and operate a Cisco platform.
For network security, we have a central hub for all the external traffic. That is a huge load of traffic. On those applications, we are using Palo Alto. We have a mixed combination of Cisco and Palo Alto in our central locations.
Using Cisco firewalls has helped to eliminate or consolidate some of the tools and applications. We have some installations of AlgoSec to see what's going on or how the performance is, but we have, more or less, decided that we don't need them now because there is so much information that we can pull from CSM or FMC.
How was the initial setup?
It's easy to deploy and maintain.
What about the implementation team?
We have a partner for Cisco products. We have a contract with a new partner now for the SDA fabric on ACI.
What other advice do I have?
I'd rate Cisco Secure Firewall a nine out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.

Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: June 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Cisco Umbrella
Cisco Identity Services Engine (ISE)
Palo Alto Networks NG Firewalls
Check Point NGFW
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Sophos XGS
Fortinet FortiGate-VM
SonicWall NSa
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?