"When it comes to the integration among Cisco tools, we find it easy. It's a very practical integration with other components as well."
"Provides good integrations and reporting."
"I like the firewall features, Snort, and the Intrusion Prevention System (IPS)."
"We have not had to deal with stability issues."
"It has a good security level. It is a next-generation firewall. It can protect from different types of attacks. We have enabled IPS and IDS."
"I have experience with URL filtering, and it is very good for URL filtering. You can filter URLs based on the categories, and it does a good job. It can also do deep packet inspection."
"The most valuable feature is stability."
"We get the Security Intelligence Feeds refreshed every hour from Talos, which from my understanding is that they're the largest intelligence Security Intelligence Group outside of the government."
"The product is quite robust and durable."
"It has definitely improved our organization. It gives us remote connectivity, helps workers connect remotely, and also gives us good connectivity to our other branches."
"One of the best features is the ease of use. It's also easy to teach new engineers to use the ASA CLI."
"Cisco offers a great educational series to train users on their devices."
"The interface is user-friendly."
"The most valuable features for my client are the ASDM and monitoring."
"It is extremely stable I would say — at least after you deploy it."
"Even in very big environments, Cisco comes in handy with configuration and offers reliability when it comes to managing multiple items on one platform."
"I like the firewall product, the security server, and the content filter."
"The performance has been very good. Overall, the solution is quite stable."
"It lets me monitor in live time if someone is 'hogging' bandwidth."
"It's a very cost-effective solution."
"Technical support is good."
"It does exactly what it says on the tin. It is good for protecting the business from being compromised. Its port protection is very good."
"Good site categorization and application controls."
"User-friendly firewall solution which scales well, is stable, and has high availability."
"The ability to better integrate with other tools would be an improvement."
"The only drawback of the user interface is when it comes to policies. When you open it and click on the policies, you have to move manually left and right if you want to see the whole field within the cell. Checkpoint has a very detailed user interface."
"FirePOWER does a good job when it comes to providing us with visibility into threats, but I would like to see a more proactive stance to it."
"We cannot have virtual domains, which we can create with FortiGate. This is something they should add in the future. Additionally, there is a connection limit and the FMC could improve."
"The visibility for VPN is one big part. The policy administration could be improved in terms of customizations and flexibility for changing it to our needs."
"Report generation is an area that should be improved."
"On the VPN side, Firepower could be better. It needs more monitoring on VPNs. Right now, it's not that good. You can set up a VPN in Firepower, but you can't monitor it."
"When you make any changes, irrespective of whether they are big or small, Firepower takes too much time. It is very time-consuming. Even for small changes, you have to wait for 60 seconds or maybe more, which is not good. Similarly, when you have many IPS rules and policies, it slows down, and there is an impact on its performance."
"I have used Fortinet, Palo Alto, and Check Point previously and I prefer the process of everything working together."
"I have worked with the new FTD models and they have more features than the ASA line."
"It doesn't have Layer 7 security."
"Cisco ASA Firewall could improve by adding more advanced features such as web filtering, which is available in the next-generation firewalls. However, the Cisco ASA Firewall I am using could be old and these features have been updated."
"The graphical interface could be improved. From what I have seen, Fortinet, for example, has a nicer GUI."
"It needs to provide the next-generation firewall features that other vendors provide, like data analytics, telemetry, and deep packet inspection."
"The stability is not the best."
"I would like it if there was a centralized way to manage policies, then sticking with the network functions on the actual devices. That is probably the thing that frustrates me the most. I want a way that you can manage multiple policies at several different locations, all at one site. You then don't have to worry about the connectivity piece, in case you are troubleshooting because connectivity is down."
"The interface and technical support are probably the two most important things that I would like SonicWall to improve."
"The user support could be improved because you have to go outside to get that kind of support."
"In an upcoming release, SonicWall could improve by adding cloud management for all devices for free or at a nominal cost. Currently, they have a cloud management platform but is not free. We have the MySonicWall portal for purchasing from them for software updates and renewals."
"Its reporting can be improved. Currently, we cannot directly get the user names. It only shows the IP, which makes it a bit confusing because we need to use the IP to find the user. If we could directly get the name of the user, it would be better."
"In general, the company needs to think contingently and integrate more security options."
"There is a point I don't like about SonicWall in the past and now. Most of the destinations we look at when we're detecting some user using too much bandwidth or something like that, SonicWall just gave us destination IP address, instead of the full qualified domain name. I think that's the most important part that is still missing. I think that's the most important for us."
"I would like to see a SonicWall integration with the DLP tool, this would be interesting. Data Loss Prevention integration."
"It could be made more user friendly."
More Cisco Firepower NGFW Firewall Pricing and Cost Advice →
Cisco ASA Firewall is ranked 6th in Firewalls with 69 reviews while SonicWall TZ is ranked 11th in Firewalls with 38 reviews. Cisco ASA Firewall is rated 8.0, while SonicWall TZ is rated 8.4. The top reviewer of Cisco ASA Firewall writes "Packet inspection with ASDM works well, but upgrading requires notable planning and effort". On the other hand, the top reviewer of SonicWall TZ writes "Easy to implement, fairly stable, and supports SSL-DPI". Cisco ASA Firewall is most compared with Fortinet FortiGate, Palo Alto Networks WildFire, Meraki MX, pfSense and WatchGuard Firebox, whereas SonicWall TZ is most compared with Fortinet FortiGate, Sophos XG, pfSense and Meraki MX. See our Cisco ASA Firewall vs. SonicWall TZ report.
See our list of best Firewalls vendors.
We monitor all Firewalls reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.