E-commerce environment, Enterprise data center.
It has improved the security posture and visibility of our traffic, but it could use more predefined security templates
What is our primary use case?
How has it helped my organization?
It has improved the security posture and visibility of our traffic. It has been proven very reliable on the hardware finishing and network portion. Since Cisco have been very experience in networking.
What is most valuable?
- Snort IPS with recommendation template
- Extendable hardware module
- Straightforward licensing
- Cisco product integration
What needs improvement?
- I would like to see more improvements made to the dashboard and UI, as well as to the reporting, the reporting is quite limited and not user friendly.
- I would like them to consider offering more predefined security templates.
- Technical support product knowledge, licensing portal, activation process will need to be improved.
- The configuration is not straightforward, Cisco will need to improve this so the user can easily pick up the product.
- Bugs are more than other firewall competitors, some bugs are quite serious.
Buyer's Guide
Cisco Secure Firewall
May 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
850,028 professionals have used our research since 2012.
For how long have I used the solution?
One to three years.
What do I think about the stability of the solution?
Yes, we found some firmware bugs and Cisco took some time to fix them. We needed to escalate the issue to the account manager to expedite the escalation process.
What do I think about the scalability of the solution?
No.
How are customer service and support?
A five out of 10.
Which solution did I use previously and why did I switch?
How was the initial setup?
Complex in configuration and understanding. It would be very challenging for a non-Cisco trained engineer.
What about the implementation team?
We implemented ourselves with some assistance from the vendor. Some vendor are not expertise in this deployment, possible because of the complexity of the product.
What's my experience with pricing, setup cost, and licensing?
Base hardware cost are average. Additional hardware modules are priced higher than the base module. They also offer very clear licensing and pricing.
Which other solutions did I evaluate?
Check Point, FortiGate, Palo Alto, SonicWall, Huawei, and Sophos.
What other advice do I have?
Cisco is still a very good hardware manufacture, but they need to catch up on the software portion. We used the Cisco product because we know they tried very hard to get back into the market and we were willing to give them a chance since we are still using a lot of Cisco product. For those who are non-Cisco trained, it would be very hard to pick up.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Network Administrator at Modern Woodmen of America
Sourcefires' visibility and control have been a great addition to the product
Pros and Cons
- "Sourcefire has been a great addition. The visibility and control have been nice."
- "If Cisco could stop rebranding, combine all the CLIs/GUIs, and give a consistent experience, this would be great."
What is our primary use case?
The primary use case is for edge firewall at multiple locations and remote access VPN. We use these for security and have them integrated with Splunk/QRadar.
How has it helped my organization?
Edge security and Sourcefire have been nice. Sourcefire was a major improvement over the legacy IDS that it previously had.
What is most valuable?
Sourcefire has been a great addition. The visibility and control have been nice.
I also like the active/standby HA.
What needs improvement?
The solution has two separate GUIs and at least three different CLIs (ASA CLI, Sourcefire CLI, and Firepower Management Center CLI). In addition, ASDM plus Firepower Management Center GUIs. If Cisco could stop rebranding, combine all the CLIs/GUIs, and give a consistent experience, this would be great.
Also, AnyConnect is very difficult to manage and use.
For how long have I used the solution?
More than five years.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Buyer's Guide
Cisco Secure Firewall
May 2025

Learn what your peers think about Cisco Secure Firewall. Get advice and tips from experienced pros sharing their opinions. Updated: May 2025.
850,028 professionals have used our research since 2012.
Senior Consultant at Unify Square
An excellent firewall, and one of the best available choices for big size companies. As usual excellence requires money.
Pros and Cons
- "ASA is stable and with a low level of work required on the maintenance side."
- "You have to know the ASA command line very well because not all operations are available in the graphical interface"
What is our primary use case?
Cisco ASA is born as an hardware firewall. The user case is security check on company's external connections (Internet and VPN access).
Most recent versions include antivirus and intrusion prevention to add security layers (including the above scenarios and the internal network)
How has it helped my organization?
Cisco ASA have been the main security device for many years, slowly replaced with Check Point on the main datacentre.
What is most valuable?
ASA is stable and with a low level of work required on the maintenance side. It is a dedicated firewall, so you do not have to manage additional topics like spam, web sites filtering and so on.The routing part is high level as usual with Cisco products.
What needs improvement?
You have to know the ASA command line very well because not all operations are available in the graphical interface (or let's say that sometimes it is better to operate with the ASA CLI).If you are searching for an "all in one product" it is not for you
What do I think about the stability of the solution?
No, stability is a really strong point with ASA.
What do I think about the scalability of the solution?
No, an assessment about the workload is important to select the right device.
How are customer service and technical support?
Over many year, the only kind of support we needed directly from Cisco was (really seldom) for parts replacement
Which solution did I use previously and why did I switch?
The previous solution was based on software firewalls that where not able to perform as the Cisco ASA
How was the initial setup?
Setup of a firewall, on a medium / large deployment is always a complex work.
Cisco ASA (more than other vendors' solutions) require a lot of know-how and real world expertise to be configured properly.
What about the implementation team?
More than one external team (Cisco partners) has been involved over time.
All of them were outstanding in their work.
What was our ROI?
Positive. The devices serves thousands of users for many years, outliving other vendors solutions.
What's my experience with pricing, setup cost, and licensing?
Cisco devices are for sure costly and budget could be an important constrain on selecting them as our security solution.
Which other solutions did I evaluate?
When the choice was made, some comparison was made with other market leaders but integration with the existing Cisco network was a really important positive side in the final decision.
What other advice do I have?
ASA is one of the the state-of-the-art firewall devices for security.
It is affordable and not too complicated to use if you are doing standard operations (modifying ACLs, natting and so on) on an existing deployment.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior IT Networking and Security Manager at a tech services company with 10,001+ employees
It is supported on many platforms and helps us gain access to the network.
What is most valuable?
There are a lot of features which are good and can be implemented, especially in the latest IOS version of the product.
They saved me a lot of time thinking how to solve different scenarios with other solutions.
Cisco AnyConnect for remote access is one of them. It is supported on most of the platforms, which business users use. They can gain access to the network, via functions like PBR, Security groups, contexts, and DNS doctoring. This gives a lot of flexibility to the product.
How has it helped my organization?
It gave us a more secure environment and a lot of flexibility to the business.
What needs improvement?
The next generations part of these products need a better approach. A lot of vendors are definitely a step or two in front of them.
For how long have I used the solution?
I have worked with these types of firewalls for more than 10 years.
What do I think about the stability of the solution?
I can say that this product is one of the most stable products I have ever worked with.
What do I think about the scalability of the solution?
In terms of scalability, this always depends on how the product was chosen and what purpose it will work for. I haven't experienced any issues with the scalability of the product.
How are customer service and technical support?
In terms of technical support, it depends on the different cases. I would surely give Cisco technical support a rating of 9/10.
Which solution did I use previously and why did I switch?
I used to work with open source solutions, but the support and complication behind them was definitely not OK. If you want to have flexibility and stability, you have to move on to something that receives more development in that specific area.
How was the initial setup?
The initial setup was straightforward and there was a lot of documentation that can help out with specific cases.
What's my experience with pricing, setup cost, and licensing?
This is definitely not a cheap solution, but I think it is worth the investment.
Which other solutions did I evaluate?
We evaluated other solutions like Juniper, but we chose Cisco, since our network was becoming more and more Cisco oriented.
What other advice do I have?
I would recommend that you understand the needs of the business case before choosing the product and start implementing it. It is very important to choose the right licenses from the beginning.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Lead Network Engineer
Enables secure communication with our peers, but needs more next-gen features
Pros and Cons
- "They are easy to maintain."
- "I would like to see them add more next-generation features so that you don't need a lot of appliances to do just one task. It should be a single solution."
What is our primary use case?
We use them for VPNs and as firewalls, of course. We wanted to protect the network and have secure communication with our peers.
How has it helped my organization?
They secure the network and ensure our network is always available.
What is most valuable?
They are easy to maintain.
What needs improvement?
I would like to see them add more next-generation features so that you don't need a lot of appliances to do just one task. It should be a single solution.
For how long have I used the solution?
I have been using Cisco ASA Firewalls for nine years.
What do I think about the stability of the solution?
In terms of stability, it is a really good product and platform. Overall, it's great.
What do I think about the scalability of the solution?
It's not really cost-effective when it comes to scalability. It is a really expensive product if you go to the modular firewalls. You need to get new appliances to get new features.
How are customer service and support?
Tech support is good but it could be improved on some points.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
I have used Fortinet, Check Point, and Palo Alto firewalls. Most of those solutions have everything integrated into them so you don't need multiple appliances. You get a single solution for your network. It would be better to have a centralized firewall, from Cisco, that can do everything.
How was the initial setup?
The initial deployment was straightforward. The last implementation of an ASA took us about one to two weeks.
Our implementation strategy was to have good architecture and to have all the requirements for the project beforehand. Everything went really smoothly because of that.
We needed four or five people for deployment, including field techs and network engineers.
What other advice do I have?
For clean and easy protection of an enterprise, it is a really good product. It can be also deployed as a virtualized solution in data centers.
Which deployment model are you using for this solution?
On-premises
Disclosure: I am a real user, and this review is based on my own experience and opinions.
ICT Department Manager at ACC
Reasonable priced, great customer service, and stable
Pros and Cons
- "We have not had to deal with stability issues."
- "My team tells me that other solutions such as Fortinet and Palo Alto are easier to implement."
What is our primary use case?
We are using the solution for airports.
How has it helped my organization?
The Cisco NGFW is an excellent fit for purpose for our network security.
For how long have I used the solution?
I have been using the solution for five years.
What do I think about the stability of the solution?
We have not had to deal with stability issues.
How are customer service and technical support?
The support of the solution is great, their staff is perfect.
How was the initial setup?
My team tells me that other solutions such as Fortinet and Palo Alto are easier to implement.
What's my experience with pricing, setup cost, and licensing?
People have said that Palo Alto is a less expensive solution than Cisco, but in my experience, at least from today, Cisco is cheaper than Palo Alto.
What other advice do I have?
I do not hear anything bad about the competition. I am difficult to change my ways and learn a new product. Unless somebody comes and makes a SWOT analysis and shows me the evidence of how the alternative is better, I am fine with Cisco.
I would recommend this solution to others.
I rate Cisco Firepower NGFW Firewall an eight out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Principal Network Engineer at a manufacturing company with 501-1,000 employees
Good monitoring capability, but it lacks the next-generation firewall functionality
Pros and Cons
- "The most valuable features for my client are the ASDM and monitoring."
- "Cisco ASA is not a next-generation firewall product."
What is our primary use case?
I am a consultant and when clients ask for white papers or studies, I do the research. At that point, they do whatever change processes they have; I give them all of the numbers and other relevant data, but that's the extent of what we do in my organization.
They are just using it as a stateful packet inspection firewall, traditional firewalling.
How has it helped my organization?
At this point, my client is looking for their next solution so something may not be working.
What is most valuable?
The most valuable features for my client are the ASDM and monitoring.
They have familiarity with the Cisco CLI.
What needs improvement?
Cisco ASA is not a next-generation firewall product.
For how long have I used the solution?
My client has been using the Cisco ASA solution for approximately five years.
What do I think about the stability of the solution?
They've been using it for five years and my assumption is that it's been good for what they needed it t do. However, they were consulting to move forward with something different.
What do I think about the scalability of the solution?
The scalability is very limited because as a traditional firewall, it's a step behind. As far as the scale goes, my assumption is that you just buy a bigger model.
Which solution did I use previously and why did I switch?
I was not consulting with this client when they implemented the Cisco ASA.
This is a hardware-based device, versus a virtual one, so it's maxed out.
How was the initial setup?
My assumption is that it's a typical HA, basic setup.
Which other solutions did I evaluate?
My client is looking for a next-generation firewall solution to replace the Cisco ASA.
What they need is a step up from what they already have that includes application-controlled firewall rules, as well as other features that ASA doesn't currently have.
What other advice do I have?
My suggestion for anybody who is looking at Cisco ASA is to work with the vendor, as they have newer products.
I would rate this solution a seven out of ten.
Disclosure: I am a real user, and this review is based on my own experience and opinions.
Senior Solution Architect at a tech services company with 51-200 employees
pxGrid enables all devices on the network to communicate
Pros and Cons
- "The Firepower+ISE+AMP for endpoint integration is something that really stands it out with other vendor solutions. They have something called pxGrid and i think it is already endorsed by IETF. This allows all devices on the network to communicate."
- "The product line does not address the SMB market as it is supposed to do. Cisco already has an on-premises sandbox solution."
What is our primary use case?
I use Firepower for all kind of customers; healthcare, government, banks etc. All all of them have different use cases and requirements. In most cases, I would mostly end up with enterprises or government organizations. If you are already have all Cisco gears, I would suggest to consider it as it will allow you to have a more integrated approach toward other network components.
How has it helped my organization?
I will definitely recommend it to any customer. But, it all depends on the requirements and money you have. But the Intrusion Prevention and anti-malware is really good with this solution. Overall, it is a really good product.
I remember a customer who was using another firewall product and they had serious issues in intrusion and malware detection and prevention. Plus, the reporting was not that detailed. I did a demo with these people with FTDv and FMCv and they were amazed with the solution.
What is most valuable?
The Firepower+ISE+AMP for endpoint integration is something that really stands it out with other vendor solutions. They have something called pxGrid and i think it is already endorsed by IETF. This allows all devices on the network to communicate. I find it to be a more proactive approach as all devices collaborate with ISE in real time. I did a demo for a customer and there were no second thoughts in the usability of the solution. You should give it a try to find out more about how this works.
What needs improvement?
The product line does not address the SMB market as it is supposed to do. Cisco already has an on-premises sandbox solution. They should include a cloud-based sandbox as part of the security subscription service. In my experience, apart from the expensive price, SMB customers are lured away by other vendor solutions because of these reasons.
For how long have I used the solution?
I work for a systems integrator, who is also a partner for Cisco and other security vendors. I have a reasonable hands-on with different firewall products. I have been doing it since v6.1 release. Firepower is a bit difficult and takes time to learn.
Which solution did I use previously and why did I switch?
I did use and deploy different firewall solutions for various customers. But every customer has his own pain points. For example, for one of the customers, he was purely looking for URL filtering. We went with Sangfor IAM in that case. They have a very strong focus on application and URL filtering and user behavior management. Plus, reporting was very extensive.
What's my experience with pricing, setup cost, and licensing?
In my country, deployment may be charged from USD 1K to USD 10K depending on setup cost. There are different types of licenses:
- Threat
- URL
- Anti-malware
I would suggest going with an all-in-one bundle. You will end up saving money. Also, Cisco has a better discount on a 3YR subscription plan. Discuss this with your Cisco AM.
Which other solutions did I evaluate?
Yes, this included firewalls from Huawei, Fortinet, Sangfor, and Sophos. Most of the customers end up with:
- Fortinet,
- Sophos
- Sangfor
Disclosure: I am a real user, and this review is based on my own experience and opinions.

Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Updated: May 2025
Popular Comparisons
Fortinet FortiGate
Netgate pfSense
Sophos XG
Palo Alto Networks NG Firewalls
Check Point NGFW
Azure Firewall
WatchGuard Firebox
SonicWall TZ
Juniper SRX Series Firewall
Fortinet FortiGate-VM
SonicWall NSa
Sophos XGS
Untangle NG Firewall
Fortinet FortiOS
Buyer's Guide
Download our free Cisco Secure Firewall Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What Is The Biggest Difference Between Cisco ASA And Fortinet FortiGate?
- Cisco Firepower vs. FortiGate
- How do I convince a client that the most expensive firewall is not necessarily the best?
- What are the biggest differences between Cisco Firepower NGFW and Fortinet FortiGate?
- What Is The Biggest Difference Between Cisco Firepower and Palo Alto?
- Would you recommend replacing Cisco ASA Firewall with Fortinet FortiGate FG 100F due to cost reasons?
- What are the main differences between Palo Alto and Cisco firewalls ?
- A recent reviewer wrote "Cisco firewalls can be difficult at first but once learned it's fine." Is that your experience?
- Which is the best IPS - Cisco Firepower or Palo Alto?
- Which product do you recommend and why: Palo Alto Networks VM-Series vs Cisco Firepower Threat Defense Virtual (FTDv)?
Did it replace a different product you had? Did you consider other products before choosing to go with this one?