Skip to main content
TrustRadius
Cisco Secure Firewall

Cisco Secure Firewall

Overview

What is Cisco Secure Firewall?

Cisco Secure Firewall (formerly Cisco Firepower NGFW) is a firewall product that integrates with other Cisco security offerings. It provides Advanced Malware protection, including sandboxing environments and DDoS mitigation. Cisco also offers a Next Generation Intrusion Prevention System, which provides…

Read more
Recent Reviews

Cisco Secure Firewall

10 out of 10
May 08, 2024
Incentivized
It is our primary firewall, our first line of defense. We are a Cisco shop, we also have Cisco DNA and are looking at Cisco hyper shield …
Continue reading

Cisco Secure Firewall

9 out of 10
February 15, 2024
Incentivized
We use the product for Geosegmentation for countries like China, Brazil, etc. We use basic prefilter policies and snort, currently we are …
Continue reading

Cisco Secure Firewall

8 out of 10
February 12, 2024
Incentivized
Cisco Secure Firewall is used for edge protection, identity management control access and for IPS and malware protection. We are also …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Popular Features

View all 11 features
  • Policy-based Controls (65)
    8.2
    82%
  • Firewall Management Console (64)
    7.5
    75%
  • Reporting and Logging (64)
    7.0
    70%
  • Visualization Tools (62)
    6.5
    65%

Reviewer Pros & Cons

View all pros & cons

Video Reviews

1 video

Cisco Secure Firewall Review
09:28
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Cisco Secure Firewall?

Cisco Secure Firewall (formerly Cisco Firepower NGFW) is a firewall product that integrates with other Cisco security offerings. It provides Advanced Malware protection, including sandboxing environments and DDoS mitigation. Cisco also offers a Next Generation Intrusion Prevention System, which…

Entry-level set up fee?

  • No setup fee
For the latest information on pricing, visithttps://www.trustradius.com/buyer…

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

18 people also want pricing

Alternatives Pricing

What is Cisco Meraki MX?

Cisco Meraki MX Firewalls is a combined UTM and Software-Defined WAN solution. Meraki is managed via the cloud, and provides core firewall services, including site-to-site VPN, plus network monitoring.

N/A
Unavailable
What is Cisco Firepower 1000 Series?

The Cisco Firepower® 1000 Series for small to medium-size businesses and branch offices is a family of four threat-focused Next-Generation Firewall (NGFW) security platforms designed to deliver business resiliency through superior threat defense. The vendor provides that they offers exceptional…

Return to navigation

Features

Firewall

A firewall is a filter that stands between a computer or computer network and the Internet. Each firewall can be programmed to keep specific traffic in or out

7.5
Avg 8.5
Return to navigation

Product Details

What is Cisco Secure Firewall?

Cisco Secure Firewall (formerly Cisco Firepower NGFW) is a firewall product that integrates with other Cisco security offerings. It provides Advanced Malware protection, including sandboxing environments and DDoS mitigation. Cisco also offers a Next Generation Intrusion Prevention System, which provides security across cloud environments using techniques like internal network segmentation. The firewall can be managed locally, remotely, and via the cloud. The product is scalable to the scope of the business needs.

Cisco Secure Firewall Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(112)

Attribute Ratings

Reviews

(1-25 of 71)
Companies can't remove reviews or game the system. Here's why
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Cisco Secure Firewall is indispensable in maintaining content filtering as required by regulation and securing our environment from malicious actors. Without Cisco Secure Firewall we would be completely vulnerable to anyone with malicious intent and wouldn't even have the visibility to know it was happening.
  • Provide granular content filtering based on user roles
  • Maintain up to date definitions
  • Provide critical logging and visibility
  • Admin portal could be more responsive in some areas
Cisco Secure Firewall is suited to nearly any situation where security, visibility, and safety is important to the organization. I can't imagine any scenario where that would not be the case. I definitely recommend this solution to any organization that is considering it.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
We have various access policies that we use for all DMZs. It also terminates our IP check tunnels to regional hospitals in our area that are used obviously for healthcare purposes. Those are the biggies that we use it for.
  • It's been a big change for us because like I said, we've been using it about a year, I think. And we went from ASAs to this, so it was a big changeover from being able to do everything in CLI honestly, it's a bit clunky and more time consuming to have to configure things through the Gooey, which has been a pain point for us. But we've tried to automate as much as we can. What it does well is the analysis. The event, not event viewer, but unified event, that's what it is. Handy tool. Also the tunnel troubleshooting the site to site tunnel monitoring or troubleshooting, I can't remember what it's called. It's pretty good too. It's nice how it has some predefined commands in there. I'd say those are probably the things we like about it the most.
  • A couple of things pop into my mind right away. We've had some pain points with CPU usage and actually have gone through the, it's not professional services, I can't remember what it's called now, but talking to them, trying to optimize things, haven't had a lot of luck with that right now. It's mostly been system when it's not service effecting, but it's just more of an annoyance for us. Another one, and it's a very trivial thing, but it's just a little bit of a pain or an annoyance is the windows, the popup windows, even though it looks like you can resize them, you can't resize them, which is super annoying. Having to scroll in 'em, the pages, not being able to change how many things are displayed on a page is a bit annoying. And having to scroll through pages on the plus side, the filtering is, helps offset that. But still just little annoying things. Yeah, I can't think of anything else that really is a pain point.
Again, it does a good job for the site-to-site tunnels. The access policies are, once you get used to 'em, it's pretty good for that. As far as being intuitive, I guess.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
We generally use this product for our edge firewalls, data center interconnects along with our implementation of ISE segmentation. The Cisco Secure Firewall products help segment our access layer (users) from our compute and provides VPN and Internet access for our users. We utilize a combination of Firepower 9300s, 1100's and 3300's for these services.
  • ACL integrations with user identity work well with Cisco's segmentation products such as Cisco ISE analytics along with its ability to incorporate pretty much anything you throw at it.
  • Deployments on Cisco firewalls, if you make a policy change you have to do a deployment. Obviously you can do automated deployments for some things based on what's going on, but the deployment time is definitely the most frustrating thing. If I am to make a change on the firewall, just one line for example, one ACL, and if you have enough of those, it could take 40 to 45 minutes or more for it to go through. It can be a very stressful time. It may fail or may complete, but during that timeframe little is known as to the result until it finishes. This only generally occurs with deployments that have hundreds or thousands of preexisting ACL's. The newer software versions have improved on this deployment process.
This product is well suited for deployments that include existing Cisco products such as ISE, Cisco AMP (Secure Endpoint) and etc. It's easy to understand and use for day to day. Implementation into environments where products are mixed could cause some headaches. In particular, HA environments that do not use an underlying Cisco network infrastructure.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
It is our edge security solution, so for the internet, so in all of our egress points, we have the Cisco Secure Firewalls at each of the egress points. Also keeps potential threat actors out of our network.
  • We use it for our remote VPN users and our site to site VPN, and we had an opportunity to replace it because we have some other firewalls that sit behind the Cisco ones, but we love the user interface and the way Cisco Umbrella ties in with the VPN agent. So we kept that and our users love the product because it's easy to use.
  • I think the biggest thing has was the FMC for us because, which is the management console. Because when we originally purchased it, it was a Sourcefire product, and then Cisco purchased Sourcefire. And so we had to convert our current firewall versions over to a version that was supported with a new FMC and there wasn't a good migration path for that, and we ended up having to do it manually and it was very painful. But now that we're on the seven version when we went from six to seven, it's been so much easier and the integration is so much better. But that piece was just a bit painful.
Well, I mean it is really meant for the edge. I think maybe some of the smaller models you could maybe use at your, if you have remote workers where you wanted to protect their environment more than in their home network or whatever, but for us, we've always use the enterprise versions.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
A lot of migrations from ASA to FTD. Customers are looking for newer hardware models or they're looking to upgrade the firmware. Some of them are coming from different vendors, so they're coming from Palo to Cisco. We have to make recommendations on what a good comparable is from Palo or Fortinet to Cisco. Then we talk about software too. If they want to implement anything next gen, any integrations, just a whole bunch of other stuff.
  • It has a nice interface. It's easy to use in my opinion. Going from ASA to FTD, it's gotten a lot easier to do. There's a lot of good material out there that Cisco has, a lot of tools as well, makes things easier.
  • I can't think of anything.
Where it's not appropriate. The only thing I can think of is if they don't have enough money for the products, Cisco firewalls and then the subscriptions on things makes it, that conversation's difficult to have. Then if you want to manage it as well, that's another cost. I would say cost is one of the number one things that kind of tears people away. And then it was a good thing. A good thing is Cisco has a really good reputation in the industry.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
It is our primary firewall, our first line of defense. We are a Cisco shop, we also have Cisco DNA and are looking at Cisco hyper shield possible in the near future. We have various Cisco ASAs as well.
  • Intrusion detection
  • Intrusion prevention
  • Ease to update
  • Ease to patch
  • Firmware upgrades
Very happy overall
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Replacing some older asa firewalls to bring more intelligence and visibility to the packet flow and a better set of policies to apply wherever needed.
  • Deep inspection
  • Signature update
  • Rich database
  • Better cli
  • Better api documents
Compared with other brands, Cisco Secure Firewall does a good job in the NG Firewall business.
February 15, 2024

Cisco Secure Firewall

Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use the product for Geosegmentation for countries like China, Brazil, etc. We use basic prefilter policies and snort, currently we are considering integrating automation a bit more. We use ftds in addition to palo alto devices, so interoperability and integration is quite important for us. So far, the solution works for us with no major issues.
  • Snort
  • Troubleshooting
  • Support
  • Officially supported automation
  • Simplification of Lina and Snort engines
  • Global find option
Good: Wide troubleshooting possibilities from the cli, good and accurate vulnerability database, which we install on a monthly basis, decent Geosegmentation for our remote sites
Not so good: GUI can be a bit slow, no global find capability, tough to remember which of the 3 terminals gives which options/commands
February 14, 2024

Cisco Secure Firewall

Score 8 out of 10
Vetted Review
Verified User
Incentivized
We are using Cisco Secure Firewall to protect our clients from cyber attacks.
  • Packet filtering
  • Ips
  • Roosting device
  • GUI is slow
  • More simple
  • Complex dashboard
Cisco FTD can be the gateway between the premises and the internet. We can also use it as an edge router. We are using the IPS functions. It can not be used as layer 2 device. Also good use is to create site to site VN between different customer locations so they can have secure connection.
February 12, 2024

Cisco Secure Firewall

Score 8 out of 10
Vetted Review
Verified User
Incentivized
Cisco Secure Firewall is used for edge protection, identity management control access and for IPS and malware protection. We are also using Cisco Secure Firewall for vpn access and remote access filtering. Also communication within different site is done using IPsec VPN.
  • Url filtering
  • Malware analysis
  • VPN connection
  • Rule base filtering
  • Remote access
  • Identity management
  • Cut trough portal
  • GUI interface (FMC)
  • Context or domain for smaller sensor
Reach feature set, good performance.
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We have 200+ FTDs deployed in branch offices and datacenters.
Addresses the performance issues related and improves user experience with direct internet access.
Centralised configuration management from FMC.
Integration with ISE and deploy policies based on identities.
Automate certain tasks using FMC APIs,
  • PBR
  • Access Policy
  • Ease of management
  • Ease of upgrade
Direct internet access
Score 5 out of 10
Vetted Review
ResellerIncentivized
I don't have it for one customer. I had a scenario with a customer that only wanted to use FDM and we have to build it by hand at that time there were no tools to help with that and also used postman scripts to configure it.
  • Be a next gen firewall
  • Layer 7 firewall
  • Nice dashboard
  • Context firewalling like asa
  • Be more simple it its layout
  • Take all the good things form the asa
  • Finish the product so there is no need for making use of postman
its use full to use just not with a firepower image i normally use asa
February 09, 2024

Cisco Secure Firewall

Score 5 out of 10
Vetted Review
Verified User
Incentivized
We are using the Cisco Secure Firewall in all of our production and office locations (around 200 locations) around the world, as our gateway and to secure our network. All traffic in our network is going over the firewalls and checked there. We are using a Cisco Firewall Management Center (FMC) to manage all of our firewalls globally in one tool.
  • AnyConnect VPN
  • Good overview over the centralized FMC
  • Hardware is very stable (less failures)
  • Lots of Bugs in multiple areas
  • Deployment can be faster
  • Configuration over CLI
Combined with the Firewall Management Center (FMC) is good to use for larger deployments as it is easy and fast to do global changes and apply them to all Cisco Secure Firewalls at once.
Score 5 out of 10
Vetted Review
Verified User
Incentivized
We use the Cisco Secure Firewall as the secure Gateway. This means every vlan or network that we have needs to go over the firewall if it wants to enter an other network. We also use the Cisco Secure Firewall to establish Site to Site tunnels to different branches. We also use the Cisco Secure Firewall for Anyconnect access to our company.
  • Access List
  • AnyConnect access
  • Policy overviews
  • Some times some ACL just doesn't work
  • Creating HA if one FW is already installed is not working
  • Make Wildcardmask rules work at the moment it has a bug
Sometimes it is really hard to handle. There are so many bugs especially when it comes to ACL or HA creation. Sometimes the Cisco Secure Firewall just needs a restart in order to work but that shouldn't be like that in our environment the Cisco Secure Firewall is the heart of the network and if the Cisco Secure Firewall is down the whole branch is down, for that we need a more reliable product.
February 09, 2024

Let’s Master IT

Score 9 out of 10
Vetted Review
Verified User
Incentivized
Allow traffic and users to access the resources that we have in out DMZ, implement traffic restrictions and block the truth actors that try to damage or render out services unavailable.
  • Block traffic
  • Allow users to access different resources
  • Log the users activity
  • More friendliest interface
  • Easy access
  • Rule making improvements
Denying access from threat actors.
Score 7 out of 10
Vetted Review
Verified User
Incentivized
We are using Cisco Secure Firewall as our Special network firewall.
The firewall is working without any issues, but the FMC Instance and Virtual machine had a few problems in the past. We opened several Cisco TAC Cases to solve those problems which affected:
-FMC DB reachability (deployment did not worked)
-FMC VM should be reinstalled
  • Handle a lot of VLANs, Zones without any issue
  • L4 firewalling
  • Packet capture, Packet tracert options
  • Device management from FMC
  • Layer 7 application filtering
  • FMC instance
  • FMC event logging
Working well in medium large networks, using as a perimeter or test zone firewall. Easy to manage, straightforward the GUI of FMC. Layer 7 filtering had a few issues, not identify the applications correctly and the Snort IDS can block some traffic which is not malicious. L4 filtering working well, also prefilter policies are great.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
We are using Cisco as a 5525 with Cisco Secure Firewall. The single issue we are facing right now is CPU usage when Cisco Secure Firewall inspects the traffic or have performance tests. However we know that we can cover this issue with NGFW which are taken in consideration for the next year. Overall we are satisfied with Cisco Secure Firewall solution and and user experience.
  • DAP
  • UI
  • CPU threading
  • AI
For management and great support solution.
February 07, 2024

Cisco FTD and FMC

Score 10 out of 10
Vetted Review
Verified User
Incentivized
In our organization, we use Cisco Secure Firewall and the Firewall Management Center for administration. Due to the structured configuration, the rules can be rolled out to multiple devices and systems simultaneously via the firewall management center. This makes work easier and saves time. We also install this solution for many customers.
  • Easy administration of the Cisco Secure Firewall
  • Developing workflows and automations thanks to the FMC API
  • Versioning the configuration and rollback
  • AI Integration is missing
  • Import of objects
  • Backup of the access control policy (FMC)
The Cisco Secure Firewall is only recommended in combination with the firewall management center. The FMC makes work easier and saves time. We use several 31xx in the data center, which are administered via an FMC. Managing OSPF routing information could be easier and clearer. Deploying the configuration to the FTD takes too long. Service objects can only be defined based on the destination ports. The source port address is missing.
Score 6 out of 10
Vetted Review
Verified User
Incentivized
User experience problems, too much bugs problems in the every versions. We have 10 FTD, FXOS and 2 FMC devices. We have an experience on these devices for 5 years and ı had much problems every versions. There is no more information notification on devices so if you have a any problem you should submit a case. This is so time wasted.
  • using snort engine
  • Custome signature creation
  • Confidential being product of cisco
  • Gui interface should be more easily
  • Less more bugs on ftd systems
  • More strong API functionality
Log4j vulnetability quick signature update. I was trying to upgrade cisco fmc, upgrade process is stuck. I solve this problem and continue deployment. After deploy the ftd devices the policies, all our customer services was gone. This problem solved for 36 hours with 5 cisco case engineer. I can not remember this worst case
Tom Erdman | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Our organization uses Cisco Secure Firewall to protect our enterprise network. It has a ton of features that are very straightforward to use. It allows us to easily setup Access Lists determining what few services we let in. We also use Malware filtering, file inspection, and URL filtering to protect our public. Cisco Secure Firewall allows us to NAT our devices and servers that need an external connection, and even allows for different virtual interfaces to be setup as gateways for internal subnets.
  • Easy to update configurations
  • Automated backup and failover
  • Intuitive Access Control
  • Interface can be slow.
  • Current version is buggy in regards to tracking connection events.
  • File inspection isn't always intuitive to set up.
  • An external logging system is required for true insight into activity.
Cisco Secure Firewall is well suited for an SMB and up that can afford the licensing and can use an enterprise firewall. I'm a Systems guy by trade, but I can handle the day to day work on this powerful appliance without too much headache. That being said, it could be too much for a small shop that doesn't have a Cisco resource, especially if just buying the device puts you in the hole. A poorly configured expensive firewall is much worse than a properly configured simple one.
Return to navigation