Cisco Adaptive Security Appliance (ASA) software is the core OS for the ASA suite. It provides firewall functionality, as well as integration with context-specific Cisco security modules. It is scaled for enterprise-level traffic and connections.
N/A
Palo Alto Networks Next-Generation Firewalls - PA Series
Score 9.0 out of 10
N/A
Palo Alto Network’s Next-Generation Firewalls is a firewall option integrated with other Palo Alto security products. Released in late 2023, the PA-7500 ML-Powered NextGeneration Firewall (NGFW) enables enterprise-scale organizations and service providers to deploy security in high-performance environments.
$1.50
per hour per available zone
Pricing
Cisco Adaptive Security Appliance (ASA) Software
Palo Alto Networks Next-Generation Firewalls - PA Series
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Cisco Adaptive Security Appliance (ASA) Software
Palo Alto Networks Next-Generation Firewalls - PA Series
Free Trial
No
Yes
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
—
Users may also choose to pay per gigabyte of data used starting at .065/GB. Note that prices listed here reflect installations via Amazon Web Services. Pricing may differ if other service providers are used.
Cisco has made it easy to buy, set up, and manage all of our firewalls with the central FirePower Management Center. All licensing is done via one license portal too. Tech support is standardized for all ASA devices and like support engineers who know the different models to …
Cisco ASA is doing well, has [a] lot of documents available, [and easy] implementation, however, other vendors are also very easy to deploy. Cisco ASA has [a] great support team. Cisco ASA is truly [a] next-generation product. Now it is cloud-managed, along with zero-touch …
Configuration and management of Cisco's ASA are straightforward. We chose Cisco ASA for many reasons, as well as Cisco's threat response reports. We previously had issues with Sophos UTM due to its poor performance. We no longer have to be concerned about performance issues …
We have been using and deploying different vendor-based firewalls.
Our main considerations for selection; use case, functionalities, and the price
of the product. When there’s a Vpn or detailed routing scenarios Cisco ASA is the
[Cisco] ASA is far better than pfSense[.] pfSense is a very complicated firewall and if you need any help documentation is not easily available. Cisco ASA configuration via CLI is [the] very best and fast for configuration[.]
Our Palo Altos and Cisco ASAs are pretty comparable. They both seem to work well when used in an HA pair. They can both do IP/Port based ACLs. But the Palos also have APP-ID which helps to make sure that the traffic passing through your firewall is the type of traffic …
When comparing Cisco ASA to other vendors' products we needed to bear in mind that most other security vendors offer a next-gen Firewall solution while the ASA is still a legacy firewall. Based on this, Cisco ASA is by no means a loser here. Cisco ASA is an extremely capable …
Cisco tried to build a new platform by bolting acquired and rebranded SourceFire as a next generation platform but really missed the boat. Cisco should be considered a networking company not security. Firewall technology is changing and Cisco needs to reevaluate their place in …
Cisco made sense from the standpoint that my engineers already knew it and there was little learning curve. Personally, I prefer a purpose-built hardware solution. Untangle is not ready for the enterprise as a whole but works great to do web/application filtering . …
We sell both PAN and Cisco products. We feel a certain bias toward ASA as overall they are easier to deploy, easier to troubleshoot, last years beyond their supported lifetime and have extremely sturdy reliable hardware.
I've used older Cisco PIX and we have a third party that uses Palo Alto firewalls that is more suited for our enterprise but the ASA works seamlessly with our communication manager server.
We selected Cisco ASA because most of the other networking equipment is also Cisco devices. With this we are able to be confident that we will not have any issues with incompatibility. The ability to integrate with other Cisco solutions that we already had in place was also a …
We currently have both products running in our environment. The ASA has a more mature product line and we have had create success with implementing and administering the ASA for the years. Solid product with great features.
The Cisco back end support is what made the difference for us. The ability to configure the device to our specific needs was a plus as well. VPN was easy to set up and we have had few issues with end users connectivity.
We actually went with the Palo Alto firewalls in most sites, and are using the Palo Alto to replace the classic ASAs; however, there was one location where cost was a major issue so we decided to go with the X-series ASA. We spent a few thousand dollars (though only the L4 …
Shortly before my departure, my previous company had me involved with a 3 month proof-of-concept and vendor selection process for SCADA environments in an oil and gas environment. The products tested were the Cisco ASA 5516 w/SourceFire, Palo Alto, and CheckPoint. Of them, …
Palo Alto Networks Next-Generation Firewalls - PA Series
Verified User
Analyst
Chose Palo Alto Networks Next-Generation Firewalls - PA Series
The Palo Alto Networks Next-Generation Firewalls - PA Series are much easier to configure than both Checkpoint and Cisco, in my opinion. From Security policy management and traffic inspection standpoints, there is no comparison.
Chose Palo Alto Networks Next-Generation Firewalls - PA Series
We are using Cisco ASA before in our environment but when it comes to deep scanning & layer 7 security it doesn't have that capability. After using Palo Alto Networks Next-Generation Firewall we are using sandboxing & advance malware protection that provides high-level end-user …
Chose Palo Alto Networks Next-Generation Firewalls - PA Series
No one can say any other companies in this time is better than Palo Alto Networks Next-Generatoin Firewalls. Palo Alto offers very advanced features which protect you[r] organization. Advanced malware protection, anti spam, lots of other threats.
Chose Palo Alto Networks Next-Generation Firewalls - PA Series
Palo Alto has a user-friendly GUI and it comes with a single console from where you can manage all the policies and routing. It has advanced capabilities to prevent APT (Advanced Persistent Threat) attacks. Cisco Firepower lacks in capabilities with Palo Alto if we compare it.
Chose Palo Alto Networks Next-Generation Firewalls - PA Series
I did not originally choose Palo Alto as our core firewall appliance. It has already been purchased when I came on board. However, I did recently choose to purchase new Palo Alto firewalls to replaced our older models. I have had experience working with Cisco ASAs and …
Chose Palo Alto Networks Next-Generation Firewalls - PA Series
The main competitor I can compare Palo Alto to is the FortiGate series of devices by Fortinet. FortiGates are capable UMTs and also less expensive than Palo Altos. That being said, category filtering on FortiGates is less effective, and they are not as feature-rich as Palo …
Chose Palo Alto Networks Next-Generation Firewalls - PA Series
We previously used Cisco 5585 ASAs with firepower. We wanted a more holistic solution than what the Cisco ASA was providing for us. In this situation, we needed to have consistency in how rules were applied across multiple types of traffic, while also knowing what kind of …
Chose Palo Alto Networks Next-Generation Firewalls - PA Series
In my opinion, Palo Alto provides the most easily managed firewall on the market, with the most options for device management. Compared to other vendors it's very obvious that Palo Alto focuses on their firewall technologies and supporting them. The monitoring and visibility …
Chose Palo Alto Networks Next-Generation Firewalls - PA Series
Palo Alto has the ability to secure public cloud which none of the vendors have currently. With Palo Alto VM series you can deploy firewall VM in minutes and secure your public cloud.
Chose Palo Alto Networks Next-Generation Firewalls - PA Series
I've been really happy with our Palo Alto [solutions] and we're replacing a good chunk of our ASAs with Palo Alto. As far as firewalls go the Palo Alto firewalls are significantly better in my opinion, but we still use ASAs as VPN devices in a few scenarios and they work just …
Chose Palo Alto Networks Next-Generation Firewalls - PA Series
Why did we choose PAN? The number of exploits written for PAN devices are much smaller than ASA. It's much simpler to manage than the checkpoint. It includes web filtering module with the product. Quite simply, it was just the best bang for the buck. Our management consistently …
Chose Palo Alto Networks Next-Generation Firewalls - PA Series
Palo Alto beats all other current UTM/NGFW at this point in time. Palo Alto has a complete vision and is less buggy/requires less management overhead than other NGFW/UTMs on the market. They are currently developing a lot of products and I can see in the next 5 years, other …
Chose Palo Alto Networks Next-Generation Firewalls - PA Series
All the other products varied from just okay to very good at their individual tasks, but none had the complete vision package provided by Palo Alto. Some were easier to use and setup, with very friendly interfaces. Palo Alto have come a looong way with their Web interface, …
Chose Palo Alto Networks Next-Generation Firewalls - PA Series
The GUI on the Palo Alto firewalls is excellent, compared to the ASA. Also, the Panorama management GUI is very good. At the time when we were evaluating vendors, Cisco had just acquired Sourcefire, so the ASA just didn't have the features that the Palo Alto did in terms of …
Chose Palo Alto Networks Next-Generation Firewalls - PA Series
Cisco ASA doesn't even compare to the Palo Alto firewalls. When using a Cisco ASA at another company, we were constantly dealing with malware that got past the firewalls because it didn't provide any layer 7 protection. The PA's provide next level protection against application …
Chose Palo Alto Networks Next-Generation Firewalls - PA Series
I have used Cisco & Sonicwall primarily in most of my 23+ years of network security experience. Over the years all of these platforms have matured, but Palo Alto beats them all in terms of user interface.
The ability to run reports, get access to data immediately, and have …
Chose Palo Alto Networks Next-Generation Firewalls - PA Series
I have used the Cisco ASA 5520 but it is a traditional packet filtering firewall. We chose the Palo Alto because it is a next-gen application aware device which the Cisco is not. I also evaluated the Cisco next-gen device but I felt they were late to the game and Palo Alto was …
Palo Alto Networks Next-Generation Firewalls - PA Series
Likelihood to Recommend
Cisco
Cisco ASA's are great for internal network connected access between a firewall and the central management server. And, for complex networks where high security requirements with overly strict compliance are necessary. For networks with limited connectivity to the core or for poor network connectivity these are not the best solution. There are other more stand-alone firewall's that do this better. These firewall's are a little more complex to set up to start with so significant knowledge of these devices is required to set them up and ensure they are best practice installed.
It is well-suited for a company needing strong edge security with ease of administration. It comes standard with many features such as VPN, Application ID and "Day-1 Config" that make the networks it protects secure from the very start. Palo is definitely a premium product and is much more expensive than other firewalls, but the value is realized immediately. The robust options for firewall rules/policies allow the administrator to apply security in new and creative ways to hit the sweet spot between security and usability.
The PA handles VPN connectivity without missing a beat. We have multiple VPN tunnels in use for redundancy to cloud-based services.
The PA has great functionality in supporting failover internet connections, again with the ability to have multiple paths out to our cloud-based services.
The PA is updated on the regular with various security updates, we are not concerned with the firewall's ability to see what packets are really flowing across the network. Being able to see beyond just IP and port requests lets you know things are locked down better than traditional firewalls.
It is a great overall kit, with URL filtering and other services that fill in the gaps between other solutions without breaking the bank.
To be honest there has been now great products out in the market compared to Cisco ASA. I beleieve Cisco has to do a lot of improvement in this area. The other defeiniete factors is the cost when it comes to renewals which is always a premium on Cisco products
The PA5220s have far exceeded what we have expected out of them. It was a bit of a learning curve coming from another vendor, but everything falls into place now with ease. The capabilities of the solution still surprise us, allowing us to remove other costly hardware and providing a single point of management needed
It can be a little tricky at first if you have never used the product or a firewall before. If you have experience with firewalls in general, it does not take long to learn the Palo Alto Networks Next-Generation Firewalls - PA Series interface. They offer great training resources and knowledge base articles to help get up to speed.
I generally have not noticed the outages, however since it's a machine it can malfunction, we need to implement the firewall infrastructure in such a way that it is highly available with device failure, region failure etc. Else any solution will be having the issues if they are not build with resiliency.
The support is usually very good and gets back to you very quickly. However I had some instances of when two engineers will give me wildly different answers to what I thought was a simple question. Overall however I do rate the support highly and they are generally always very good.
We've run into a couple undocumented bugs, but that seems to happen with every brand and technology. Any time we've had to engage Palo Alto support they've always been professional, knowledgeable and prompt. In almost all cases we've been able to resolve our issues without having to escalate our tickets.
It was quite a good one, how ever requires an expertise to deploy hence the SMB segment would be finding it difficult to implement this product. The one good reason is that there are lot of ASA certified engineers in compared to the other certified engineers. Hence this resembles positively on the deployment as you have quite a lot of experienced engineer on your deployment
We were using [pfSense] before in our environment but we regularly facing difficulties over it due to software bugs & downtime. After implementing Cisco ASA, it resolved our availability issue & provides us a reliable solution with the best security features & easy to understand GUI.
We are using Cisco ASA before in our environment but when it comes to deep scanning & layer 7 security it doesn't have that capability. After using Palo Alto Networks Next-Generation Firewall we are using sandboxing & advance malware protection that provides high-level end-user security. Also after implementing it we can easily monitor user-level traffic.
We used to outsource our Firewall and it's management. Not only did we find their SLA's to be lacking, in general, but communication between us was horrible. Many times we could not understand them and that resulted in less than desirable rule creation or troubleshooting.
Since we no longer have to pay a company for 24/7 management (and SLOW SLA's) we are saving a ton of money each year. Also our fellow employee's are much happier that things can be resolved in a timely manner.