Cisco Secure Firewall delivers comprehensive threat protection for modern, distributed networks. Built to support hybrid workforces and multicloud environments, it enables Zero Trust access, application visibility, and secure remote connectivity. With integration across the Cisco Secure portfolio, including SecureX and Talos threat intelligence, the firewall powers organizations to detect and stop more sophisticated threats. Centralized management simplifies policy enforcement, orchestration,…
N/A
SonicWall NSA Series
Score 8.5 out of 10
N/A
The SonicWall NSA Series is the company's mid-range next generation firewall (NGFW).
The software offers advanced firewall solutions from Web threats management to behavioural analytics and comprehensive application security. Cisco Secure firewall software is incredibly easy to deploy and implement. Customer support services providers are concise and very responsive. Integration and customization of the software are exceptional. The product boasts impressive capabilities, enabling it to stop threats and manage all security flaws in real time.
This is a higher-end firewall, built for a medium to large business. It handles traffic and scanning and protection well but it would be a bit of a budget-buster and probably overkill for a small to (barely) medium sized business. SonicWall makes SoHo devices for those use cases and they would be more appropriate.
It's good at segregating networks and ensuring that you only give the access that you need to give. Especially with medical devices, you want to only give the access that they need and keep them in their own separate areas so that they can't just communicate with the rest of the network. It's also good at the border for keeping attackers out of the network.
I wish that the deployment of the updates to the sensors from the FMC was faster.
Cisco ASA firewall did a great job of authentication and authorization on the local firewall. FTD does not authorize users well in terms that an AAA must be setup to provide the granular tools that the ASA did.
Cisco's method of licensing the firewall can be improved. The FMC and the FTD are licensed through the Cisco software manager and there are instances where the devices are licensed but the firewall still displays and error due to licensing.
It works really well. We can do most anything we want or need to with it, and you don’t have to have a doctorate or multiple certs to necessarily figure it out. The thing that would probably have to happen to make us switch would be if we just got priced out - Cisco’s more powerful and higher bandwidth models cost a pretty penny.
The platform is powerful and feature-rich, especially when paired with tools like Firepower Management Center (FMC) and SecureX. The policy structure is logical, and the visibility into traffic flows, threat activity, and rule hits is quite strong once you're familiar with the interface
There is room for improvement when it comes to learning the UI, but the UI is overall pretty good. It doesn't take long to learn if you are famaliar with firewalls.
As for the availability, in general we did not experience any issues with it, neither in situations where there's only one physical device implemented nor when there's and High Availability pair. Failover works like a charm, no complaints here, it works as it should and so far it has been highly reliable.
Firewall support is professional just like any other technology Cisco sells. From answering simple questions to bringing out outages affecting a large population of our workforce, Cisco support is always courteous, professional, and communicates with our team to keep our request on their radar. Some of the brightest people I've met are from Cisco support both in IQ and EQ which shows the talent Cisco is able to onboard to their team.
Most of the time, calling SonicWall NSA Support, you get an expert who can help resolve your issues. RMAs are pretty easy once they determine there is an issue with the hardware. Support is available 24x7, which makes emergency calls easy. The only downside is the support engineers may have thick accents; however, their expertise more than makes up for any language barriers.
was a good training but questions was answered not so good. Training was "Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF)".
Our initial implementation was aided by Cisco's professional services and was excellent. The engineer was very knowledgeable and helped us work through issues while building out our new internet security edge Part of this involved tools to migrate the firewall configuration from old to new.
Cisco Secure Firewall works better with the Cisco ecosystem when we can utilize it and feels beefy enough when we utilize it in the data center. The Fortinet we have found are great, small cost boxes for remote offices with a better UI then Cisco Secure Firewalls. The feature set included with the firewalls feels similar from a security point of view.
We compared the FortiGate to Sonicwall and continued with Sonicwall as we were a mid-size school where the Sonicwall was performing adequately, and the learning curve was steep to switch platforms. The Sonicwall offered everything the FortiGate did, and was not as costly, both in the appliance and in licensing.
Positive impact. Cisco is a big player in IT environment. It is future stuff, everything, what you learn today, maybe something can be tomorrow. And yes, it's quite important to learn the new stuff every day. And yes, that's it. Yes, I'm happy with Cisco.