"Firepower has been used for quite a few enterprise clients. Most of our clients are Fortune 500 and Firepower is used to improve their end to end firewall functionality."
"Firepower NGFW has improved my organization in several ways. Before, we were trying to stamp out security threats and issues, it was a one-off type of way to attack it. I spent a lot of manpower trying to track down the individual issues or flare-ups that we would see. With Cisco's Firepower Management, we're able to have that push up to basically one monitor and one UI and be able to track that and stop threats immediately. It also gives us a little more granularity on what those threats might be."
"One of the most valuable features is the AMP. It's very good and very reliable when it comes to malicious activities, websites, and viruses."
"Provides good integrations and reporting."
"The content filtering is good."
"One of the most valuable features of Firepower 7.0 is the "live log" type feature called Unified Event Viewer. That view has been really good in helping me get to data faster, decreasing the amount of time it takes to find information, and allowing me to fix problems faster. I've found that to be incredibly valuable because it's a lot easier to get to some points of data now."
"The customer service/technical support is very good with this solution."
"It's got the capabilities of amassing a lot of throughput with remote access and VPNs."
"The most valuable feature is the Stateful Inspection, which was developed by Check Point."
"The online documentation is complete and easy to read and understand."
"We can build the new firewalls with minimum efforts."
"It's quite a stable solution."
"The most valuable feature of the firewall is the packet inspection. That is an amazing feature from Check Point."
"The product is very scalable."
"The easy and standardized management interface, now with a complete and functional API mechanism, provides the administrator several ways of managing the solution."
"All of the features are very valuable, but the most valuable features are the sandboxing and the advanced IPS/IDS."
"One of the most valuable features is Palo Alto's firewall management. We find it easier to manage the firewall centrally."
"The most valuable feature of Palo Alto Networks K2-Series is its management abilities. Additionally, the updates are very good."
"Everything I could possibly want has already been implanted in the new version."
"Overall, this is a very simple and very effective firewall, and I am satisfied with it."
"I have found that Palo Alto Networks K2-Series has the best security. They are more user-friendly, older firewalls used to have to be configured using the command-line interface, but in this solution, it can be done in the GUI."
"Palo Alto has a unique solution for DNS security, which is very good."
"Palo Alto firewalls are scalable enough. We have about 110 employees in our company, and we are about to expand to 130."
"This firewall is very good for our customers because they don't have to write their own rules for adding an application."
"There is limited data storage on the appliance itself. So, you need to ship it out elsewhere in order for you to store it. The only point of consideration is around that area, basically limited storage on the machine and appliance. Consider logging it elsewhere or pushing it out to a SIEM to get better controls and manipulation over the data to generate additional metrics and visibility."
"One issue with Firepower Management Center is deployment time. It takes seven to 10 minutes and that's a long time for deployment. In that amount of time, management or someone else can ask me to change something or to provide permissions, but during that time, doing so is not possible. It's a drawback with Cisco. Other vendors, like Palo Alto or Fortinet do not have this deployment time issue."
"Deploying configurations takes longer than it should."
"It's mainly the UI and the management parts that need improvement. The most impactful feature when you're using it is the user interface and the user experience."
"Its interface is sometimes is a little bit slow, and it can be improved. When you need to put your appliance in failover mode, it is a little difficult to do it remotely because you need to turn off the appliance in Cisco mode. In terms of new features, it would be good to have AnyConnect VPN with Firepower. I am not sure if it is available at the moment."
"Implementations require the use of a console. It would help if the console was embedded."
"The performance should be improved."
"The change-deployment time can always be improved. Even at 50 seconds, it's longer than some of its competitors. I would challenge Cisco to continue to improve in that area."
"Sometimes there are security bugs, which is frustrating."
"Check Point should add additional management choices."
"The quality of the console should be improved in terms of aesthetics."
"There have been a few requests/issues about the Identity Awareness feature."
"When we hit a bug, the support team recommends some hotfix, and if we upgrade to that, we have to uninstall it before we apply some newer jumbo hotfix."
"They should integrate all blades to use a single policy rather than multiple."
"The only thing which I think should be improved is that training should be increased. In my position I also interview potential employees and I haven't found many people in the market, nowadays, who are familiar with the Check Point firewall. They are more familiar with Palo Alto and Cisco ASA and they are more comfortable with them."
"The debugging of VPN tunnels is very stressful."
"I would like to see the threat intelligence capability integrated with other vendors such as Cisco and Forcepoint."
"In the past, we've had trouble with Palo Alto's application filtering not getting it right. I would not be recommending layer 7 application filtering yet."
"I'd like to see more data protection on the system."
"Palo Alto has many other products. It would be nice for these products to be centralized under one tool"
"When it comes to renewing the solution, they tend to try to jack up the pricing."
"They could improve by providing more features in the solution."
"It would be nice if it could easily be integrated with Elasticsearch or Nagios."
"The reporting functionality in GlobalProtect needs to be improved."
More Cisco Firepower NGFW Firewall Pricing and Cost Advice →
Check Point NGFW is ranked 2nd in Firewalls with 185 reviews while Palo Alto Networks K2-Series is ranked 19th in Firewalls with 13 reviews. Check Point NGFW is rated 8.8, while Palo Alto Networks K2-Series is rated 8.4. The top reviewer of Check Point NGFW writes "Central architecture means we can see an end-to-end picture of attacks". On the other hand, the top reviewer of Palo Alto Networks K2-Series writes "Stable with great deep inspection functionality and good scalability". Check Point NGFW is most compared with Fortinet FortiGate, Palo Alto Networks NG Firewalls, Azure Firewall, Cisco ASA Firewall and pfSense, whereas Palo Alto Networks K2-Series is most compared with Juniper SRX, Meraki MX, Fortinet FortiGate-VM and Cisco ASA Firewall. See our Check Point NGFW vs. Palo Alto Networks K2-Series report.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.