Cisco Adaptive Security Appliance (ASA) software is the core OS for the ASA suite. It provides firewall functionality, as well as integration with context-specific Cisco security modules. It is scaled for enterprise-level traffic and connections.
N/A
Cisco Firepower 4100 Series
Score 8.3 out of 10
N/A
The Cisco Firepower 4100 Series’ 1-rack-unit size is presented by the vendodr as ideal at the Internet edge and in high-performance environments. They further state that it shows what’s happening on your network, detects attacks earlier so you can act faster, and reduces management complexity.
Cisco ASA has the support of the Cisco prestige, ASA devices does not need to have renewing a security licence every year like other products, you can work without problems, the integration with AD, LDAP, ISE, etc are simply and you don't need to pay additional charges, you can …
Cisco Firepower 4100 Series
No answer on this topic
Features
Cisco Adaptive Security Appliance (ASA) Software
Cisco Firepower 4100 Series
Firewall
Comparison of Firewall features of Product A and Product B
Cisco Adaptive Security Appliance (ASA) Software
8.7
50 Ratings
0% above category average
Cisco Firepower 4100 Series
8.3
5 Ratings
4% below category average
Identification Technologies
7.732 Ratings
8.05 Ratings
Visualization Tools
7.731 Ratings
8.05 Ratings
Content Inspection
8.433 Ratings
9.04 Ratings
Policy-based Controls
8.646 Ratings
8.65 Ratings
Active Directory and LDAP
8.448 Ratings
8.44 Ratings
Firewall Management Console
8.849 Ratings
8.55 Ratings
Reporting and Logging
8.349 Ratings
8.55 Ratings
VPN
9.949 Ratings
7.85 Ratings
High Availability
9.549 Ratings
9.45 Ratings
Stateful Inspection
9.846 Ratings
9.55 Ratings
Proxy Server
8.932 Ratings
6.03 Ratings
Best Alternatives
Cisco Adaptive Security Appliance (ASA) Software
Cisco Firepower 4100 Series
Small Businesses
pfSense
Score 8.8 out of 10
pfSense
Score 8.8 out of 10
Medium-sized Companies
Quantum Firewalls and Security Gateways
Score 9.3 out of 10
Quantum Firewalls and Security Gateways
Score 9.3 out of 10
Enterprises
Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series
Score 9.1 out of 10
Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series
Cisco ASA's are great for internal network connected access between a firewall and the central management server. And, for complex networks where high security requirements with overly strict compliance are necessary. For networks with limited connectivity to the core or for poor network connectivity these are not the best solution. There are other more stand-alone firewall's that do this better. These firewall's are a little more complex to set up to start with so significant knowledge of these devices is required to set them up and ensure they are best practice installed.
When we are asked by local partners which security equipment we use we always recommend our Cisco security products. The Firepower firewall is no exception and we can easily recommend this to others who need a fast, secure, and well built system that integrates well with all your existing hardware and software.
To be honest there has been now great products out in the market compared to Cisco ASA. I beleieve Cisco has to do a lot of improvement in this area. The other defeiniete factors is the cost when it comes to renewals which is always a premium on Cisco products
It not easy to understand the different features it offers. Sometimes you need to spend a couple of minutes to implement a change or even open a ticket with cisco tac to figure it out. Once support is on the phone with you they know how to resolve problems. But it's not an intuitive tool
I generally have not noticed the outages, however since it's a machine it can malfunction, we need to implement the firewall infrastructure in such a way that it is highly available with device failure, region failure etc. Else any solution will be having the issues if they are not build with resiliency.
The support is usually very good and gets back to you very quickly. However I had some instances of when two engineers will give me wildly different answers to what I thought was a simple question. Overall however I do rate the support highly and they are generally always very good.
It was quite a good one, how ever requires an expertise to deploy hence the SMB segment would be finding it difficult to implement this product. The one good reason is that there are lot of ASA certified engineers in compared to the other certified engineers. Hence this resembles positively on the deployment as you have quite a lot of experienced engineer on your deployment
We were using [pfSense] before in our environment but we regularly facing difficulties over it due to software bugs & downtime. After implementing Cisco ASA, it resolved our availability issue & provides us a reliable solution with the best security features & easy to understand GUI.
As I mentioned before, the Fortigates have better failover. I think the Cisco interface is easier to use that that of the FortiGate. My only criticism would be that with multiple CLIs, it can get a bit confusing when you are trying to configure something or troubleshoot from the CLI.