No more typing reviews! Try our Samantha, our new voice AI agent.
Senior Solution Architect at Teras Solutions Limited
Real User
Mar 14, 2024
Used for deep packet inspection, Internet Edge functionality, IDS, and IDP
Pros and Cons
  • "We use the solution for deep packet inspection, Internet Edge functionality, IDS, and IDP."
  • "The solution’s GUI could be better."

What is our primary use case?

I deployed the Cisco Secure Firewall at the Internet Edge for the most part.

What is most valuable?

We use the solution for deep packet inspection, Internet Edge functionality, IDS, and IDP.

What needs improvement?

The solution’s GUI could be better.

For how long have I used the solution?

I have been using Cisco Secure Firewall for six years.

Buyer's Guide
Cisco Secure Firewall
May 2026
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,915 professionals have used our research since 2012.

What do I think about the scalability of the solution?

Cisco Secure Firewall is a scalable solution that allows you to add capacity.

How was the initial setup?

The solution’s initial setup is straightforward.

What's my experience with pricing, setup cost, and licensing?

The solution’s pricing is competitive.

What other advice do I have?

I rate the solution's ease of management and configuration an eight out of ten. I would recommend Cisco Secure Firewall to other users based on what they want it for and a combination of price point and supportability.

Overall, I rate the solution an eight out of ten.

Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer2146902 - PeerSpot reviewer
Engineer at a tech services company with 501-1,000 employees
Real User
Apr 9, 2023
Saves us time and offers good security
Pros and Cons
  • "The security features are the most valuable. My customers find the security products very useful because nowadays there are many threats from the internet and other malicious users. The security products really help."
  • "It should be easier for the IT management or the admin to configure products. For example, the firewall products are not very straightforward for many users. They should be easier to configure and should be more straightforward."

What is our primary use case?

We deploy the firewall on the customer end and the customer can facilitate the VPN for their clients. We use Cisco Umbrella to secure their network and their endpoints.

How has it helped my organization?

We only work with Cisco products. We have been working with Cisco products for many years. In that way, we save time and we don't want to change to other vendors.

What is most valuable?

The security features are the most valuable. My customers find the security products very useful because nowadays there are many threats from the internet and other malicious users. The security products really help.

So far, Cisco Secure for securing infrastructure from end-to-end so that we can detect and remediate threats is good enough.

What needs improvement?

It should be easier for the IT management or the admin to configure products. For example, the firewall products are not very straightforward for many users. They should be easier to configure and should be more straightforward. 

Some competitors are very easy to configure, you don't need to spend a lot of time reading the documents and learning them.

For how long have I used the solution?

I have been using Cisco products for ten years. 

How are customer service and support?

The support is good. Sometimes it has a long waiting time. The waiting time depends on the products. For some products, for example, the Data Center solutions, you have to wait for an hour, even though they said that they escalated the case. 

How would you rate customer service and support?

Positive

How was the initial setup?

The initial deployment should be more straightforward. It's not that straightforward at the moment.

What's my experience with pricing, setup cost, and licensing?

The licensing is not good, it's confusing. I'm an engineer so I don't care about the actual price that much but the licensing part is confusing.

Which other solutions did I evaluate?

We've evaluated other solutions. We've been consulted to use competitors' products. There are things that are good with those competitors, but everything has two sides.

We choose Cisco because we are a Cisco partner, so we only recommend Cisco products. They believe in us, so we have a good relationship with them. 

What other advice do I have?

I would rate Cisco Secure products an eight out of ten. 

My advice would be to use them. 

Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
PeerSpot user
Buyer's Guide
Cisco Secure Firewall
May 2026
Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: May 2026.
893,915 professionals have used our research since 2012.
reviewer2108076 - PeerSpot reviewer
Network Engineer at a government with 10,001+ employees
Real User
Mar 1, 2023
Is stable, but management features need to be updated
Pros and Cons
  • "I like that it is easy to change the settings."
  • "Cisco ASDM is a problem because it is old."

What is our primary use case?

We use ASA firewalls to limit traffic between the networks.

We use an on-premises deployment model.

What is most valuable?

I like that it is easy to change the settings.

What needs improvement?

Cisco ASDM is a problem because it is old.

For how long have I used the solution?

I've been working with it for a year, but my company has been using Cisco firewalls for 15 years.

We use Cisco Secure Firewall ASA 5506 and 5508.

What do I think about the stability of the solution?

Cisco Secure Firewall ASA's stability is good.

How are customer service and support?

I recently had a case with technical support that took a couple of weeks to resolve. We use Cisco Smart Licensing and are not connected to the net. It was a big problem to get it to work. Cisco's technical support did not know how it worked, and I had to tell them how it worked. We haven't had interactions with technical support where there were more positive outcomes.

On a scale from one to ten with ten being the best, I would rate technical support at two.

How would you rate customer service and support?

Negative

How was the initial setup?

The initial deployment is easy for this solution.

What other advice do I have?

Overall, I would rate this solution at seven out of ten because Cisco ASDM needs to be updated.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1905519 - PeerSpot reviewer
Network Architect at a tech vendor with 10,001+ employees
Real User
Jul 10, 2022
Security solution that offers a broad range of protection and has given us better control over securing our organization
Pros and Cons
  • "This solution made our organization more secure and gave us better control."
  • "This solution made our organization more secure and gave us better control."
  • "This solution could be more granular and user-friendly."
  • "This solution could be more granular and user-friendly."

What is our primary use case?

We use this solution for company security and to define access and connection between different devices.

How has it helped my organization?

This solution made our organization more secure and gave us better control.

What is most valuable?

The access list is the most valuable feature of this solution. 

What needs improvement?

This solution could be more granular and user-friendly.

For how long have I used the solution?

I have been using this solution for 12 years. 

What do I think about the stability of the solution?

This is a stable solution. 

What do I think about the scalability of the solution?

This is a scalable solution. 

How are customer service and support?

The technical support for this solution is good. I would rate it a seven out of ten.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

We use this solution together with Palo Alto, depending on the use case. 

How was the initial setup?

The initial setup is straightforward and the deployment only takes a few hours. Our deployment strategy was to keep it simple. A large deployment of this solution can require up to 10 resources. 

The solution does require maintenance and we use an external service provider for this maintenance. 

What other advice do I have?

I would rate this solution an eight out of ten. 

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1895523 - PeerSpot reviewer
Network Systems Manager at a computer software company with 5,001-10,000 employees
Vendor
Jun 30, 2022
VPN enables staff to work from home, and our response times to events has been reduced
Pros and Cons
  • "The VPN feature is the most valuable to us because it accomplishes the task well. We're able to do everything we need to do."
  • "The VPN feature is the most valuable to us because it accomplishes the task well, and we're able to do everything we need to do."
  • "I would like to see them update the GUI so that it doesn't look like it was made in 1995."
  • "I would like to see them update the GUI so that it doesn't look like it was made in 1995."

What is our primary use case?

We use it for our VPN requirements. We wanted to allow people to work from home and we used the ASA to create VPNs through AnyConnect at the endpoints.

How has it helped my organization?

It has 

  • allowed people to work from home when they otherwise couldn't
  • improved response times when there are fires that need to be put out when people are not onsite.

What is most valuable?

The VPN feature is the most valuable to us because it accomplishes the task well. We're able to do everything we need to do.

What needs improvement?

I would like to see them update the GUI so that it doesn't look like it was made in 1995.

For how long have I used the solution?

I've been using the Cisco ASA Firewall for between one and two years.

What do I think about the stability of the solution?

It's been very stable. I don't think we've ever had an issue with it failing entirely.

What do I think about the scalability of the solution?

It scales well. We've had no issues ramping things up.

We're going to expand our usage of it. We rolled it out to about 200 users and now we're going to expand that to about 1,000 users out of our 3,000-user base. It has been really good.

How are customer service and support?

The tech support is excellent. I've always gotten really good tech support from Cisco.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

We did not have a previous solution.

What's my experience with pricing, setup cost, and licensing?

The pricing could always be cheaper.

What other advice do I have?

The solution always requires maintenance. I have about two people who are the "experts" and they help maintain it pretty well.

Cyber security resilience has been extremely important for our organization because of our customers' demands for security. The ASA has really helped to accomplish that with the VPN. My advice to leaders who are looking to build resilience is don't go cheap, and make sure you have backup solutions and high availability.

It's a good, robust firewall and VPN solution, with lots of knobs to turn. It is effective at what it does.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
reviewer1895511 - PeerSpot reviewer
Lead Network Engineer
Real User
Jun 29, 2022
Enables secure communication with our peers, but needs more next-gen features
Pros and Cons
  • "They are easy to maintain."
  • "For clean and easy protection of an enterprise, it is a really good product."
  • "I would like to see them add more next-generation features so that you don't need a lot of appliances to do just one task. It should be a single solution."
  • "It's not really cost-effective when it comes to scalability. It is a really expensive product if you go to the modular firewalls."

What is our primary use case?

We use them for VPNs and as firewalls, of course. We wanted to protect the network and have secure communication with our peers.

How has it helped my organization?

They secure the network and ensure our network is always available.

What is most valuable?

They are easy to maintain.

What needs improvement?

I would like to see them add more next-generation features so that you don't need a lot of appliances to do just one task. It should be a single solution.

For how long have I used the solution?

I have been using Cisco ASA Firewalls for nine years.

What do I think about the stability of the solution?

In terms of stability, it is a really good product and platform. Overall, it's great.

What do I think about the scalability of the solution?

It's not really cost-effective when it comes to scalability. It is a really expensive product if you go to the modular firewalls. You need to get new appliances to get new features.

How are customer service and support?

Tech support is good but it could be improved on some points.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

I have used Fortinet, Check Point, and Palo Alto firewalls. Most of those solutions have everything integrated into them so you don't need multiple appliances. You get a single solution for your network. It would be better to have a centralized firewall, from Cisco, that can do everything.

How was the initial setup?

The initial deployment was straightforward. The last implementation of an ASA took us about one to two weeks.

Our implementation strategy was to have good architecture and to have all the requirements for the project beforehand. Everything went really smoothly because of that.

We needed four or five people for deployment, including field techs and network engineers.

What other advice do I have?

For clean and easy protection of an enterprise, it is a really good product. It can be also deployed as a virtualized solution in data centers.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
Network & Systems Administrator Individual Contributor at T-Systems
Real User
Mar 21, 2022
Good user interface and easy to configure but needs better integration capabilities.
Pros and Cons
  • "The management aspect of the product is very straightforward."
  • "It's an almost perfect solution."
  • "It would be nice if you didn't have to configure using a command-line interface. It's a bit technical that way."
  • "It would be nice if you didn't have to configure using a command-line interface. It's a bit technical that way."

What is our primary use case?

We primarily use the solution for configuring the firewall.

What is most valuable?

It's an almost perfect solution.

The configuration is very easy.

The management aspect of the product is very straightforward.

The solution offers very good protection. 

The user interface itself is very nice and quite intuitive.

What needs improvement?

It would be ideal if the solution offered more integration capabilities with other vendors. For example, if you had a web security appliance, it would be great to be able to integrate everything in order to better report security events.

While I can't think of specific features I'd like improved, overall, they could do more to continue to refine the solution.

It would be nice if you didn't have to configure using a command-line interface. It's a bit technical that way.

For how long have I used the solution?

We first started using the solution in 2015. It's been five years at this point.

What do I think about the stability of the solution?

The solution is very stable. We've found it to be extremely reliable. There are not bugs or glitches. It doesn't crash or freeze.

What do I think about the scalability of the solution?

The solution can scale well. that's not a problem at all. If a company needs to expand it to fit their needs, they can do so.

How are customer service and support?

We've been in contact with technical support on multiple occasions and each time we've had a good experience. We're satisfied with their level of support. They are fairly good.

How was the initial setup?

I have nothing bad to say about the deployment. It went pretty well, and we can configure everything as we need to.

What's my experience with pricing, setup cost, and licensing?

I don't really handle the billing, so I'm unsure of the pricing. I work more on the technical side. 

What other advice do I have?

We're just customers. We don't have a business relationship with Cisco.

It's a very good solution. I'd recommend it to other users.

Overall, I'd rate it seven out of ten.

Although I can't speak to the pricing, I've found the solution works quite well for us. I'd rate it higher if it could integrate a bit better with other solutions.

Which deployment model are you using for this solution?

On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
PeerSpot user
it_user1662657 - PeerSpot reviewer
Network Engineer at a computer software company with 51-200 employees
Real User
Sep 13, 2021
Enables us to create policies based on who is accessing a resource instead of just IP addresses but the UI needs improvement
Pros and Cons
  • "Another benefit has been user integration. We try to integrate our policies so that we can create policies based on active users. We can create policies based on who is accessing a resource instead of just IP addresses and ports."
  • "I'm not going to say that we're spending less time, but we're gaining more value."
  • "It's mainly the UI and the management parts that need improvement. The most impactful feature when you're using it is the user interface and the user experience."
  • "The ease of use when it comes to managing Cisco Firepower has a lot of room for improvement."

How has it helped my organization?

I can't put Cisco on the firewall when the security landscape has changed so much in the past five to ten years. We are doing a lot more in the next generation of firewalls. We had a legacy classic firewall before we went to Firepower, and we spent a lot less time on that firewall, but we are spending more time on the Firepower because we are utilizing a lot of the features that are available in Firepower that were not available in the previous firewall that we had. I'm not going to say that we're spending less time, but we're gaining more value.

Another benefit has been user integration. We try to integrate our policies so that we can create policies based on active users. We can create policies based on who is accessing a resource instead of just IP addresses and ports.

What is most valuable?

If I were to have been asked a few weeks ago, I would have said threat prevention was the most valuable feature, but the world is changing a lot, so my favorite features a few years ago might not be my favorite features today.

What needs improvement?

The visibility the solution gives when doing deep packet inspection can be complex. I really like the visibility, but it's not always intuitive to use. I also help other customers. We are a contracting company that implements their solutions, and I've found that it's not always easy to get everyone to utilize some of the visibility features. But for me personally, I think they're very valuable. 

The ease of use when it comes to managing Cisco Firepower has a lot of room for improvement. When monitoring a large set of firewall policies, the user interface could be lighter. It's sometimes heavy in use, and there could be improvements there. I know they're trying to make improvements.

It's mainly the UI and the management parts that need improvement. The most impactful feature when you're using it is the user interface and the user experience.

For how long have I used the solution?

We were an early adopter when Firepower first came out. I've been using Cisco firewalls for the last two decades.

What do I think about the stability of the solution?

For newer hardware models, the stability is good. We've tried to run Firepower on some of the legacy-supported hardware as well, but with the stability issues, they are not as good. If I were to judge based on the hardware that I have, I'd say it's good. I haven't had any issues with the stability on my platform.

What do I think about the scalability of the solution?

We just recently enabled Snort 3 so I'm evaluating the functionality. That's what we've considered, but we haven't done any performance testing. Our company would qualify as a small to medium business company. The average office environment is about 100 to 200 people. Performance-wise, my company is about 120 people.

Scalability is really not relevant. I know there are features that address some of those parts, like clustering and stuff, but that's really not applicable in my use cases.

How are customer service and technical support?

The support is eight to nine out of ten. You can't blame them for any faults of the prototypes, but the support has been really good and really helpful when we had any issues.

Which solution did I use previously and why did I switch?

I have hands-on experience in both Fortinet and Palo Alto. So if I were to compare this to Palo Alto, for example, I would say that the user interface in Palo Alto is a lot better. But the reason that I'm working with Firepower is that we have a Cisco network as well, and Cisco ISE. We're trying to integrate different Cisco solutions. We're trying to utilize the ecosystem benefits where I can connect my Cisco Firepower to ISE and have it talk to the App Cloud. There's a benefit of utilizing Cisco Firepower in conjunction with our other Cisco solutions.

Ease of management is similar with Cisco and Fortinet, I would say similar, but it's easier in Palo Alto.

How was the initial setup?

I recently deployed a similar solution at a customer's premises, and that setup was straightforward.

The steps are fairly documented and the documentation and guides on Cisco are straightforward. You know what you're expected to configure, and it's easy to get up, running, and started. It takes some more time to check everything and get everything as you want to have it, but getting started and getting connectivity and starting to create policies was easy to do and didn't take a very long time.

It took two to four hours, including some upgrades.

What other advice do I have?

My main advice would be to utilize all the guides and documentation available from Cisco publicly and not trying to implement it using legacy thinking. Don't try to just replace something else you have. If you have a next-gen firewall, you want to try to utilize what you're getting, and getting the most out of a firewall. There are some great guides and documentation on Cisco that explains what you can do and how you can do it.

I would rate it a seven out of ten. 

Disclosure: PeerSpot contacted the reviewer to collect the review and to validate authenticity. The reviewer was referred by the vendor, but the review is not subject to editing or approval by the vendor. The reviewer's company has a business relationship with this vendor other than being a customer: Partner
PeerSpot user
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.
Updated: May 2026
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros sharing their opinions.