Cisco offers a threat-focused next-generation firewall (NGFW), the ASA 5500-X Series. The ASA 5500 Series platforms can run either the Cisco ASA Firewall or Cisco Firepower Threat Defense (FTD). The series features appliances in a variety of form factors, including standalone options for small and midsize businesses, ruggedized appliances for extreme environments, midsize appliances for security at the Internet edge, and high-performance appliances for enterprise data centers.
N/A
Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series
Score 9.2 out of 10
N/A
The VM-Series is a virtualized form of Palo Alto next-generation firewall that can be deployed in a range of cloud environments. The VM-Series natively analyzes all traffic in a single pass to determine the application identity, the content within, and the user identity.
N/A
Pricing
Cisco ASA 5500-X with FirePOWER Services
Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Cisco ASA 5500-X with FirePOWER Services
Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series
Free Trial
No
No
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
Cisco ASA 5500-X pricing starts at ~$400 and scales up to $20,000 for higher capacity appliances.
Chose Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series
The above firewalls are great but the Palo Alto is the king. The Palo Alto does everything from layer 3 to layer 7. It gives visibility to the network, unlike other firewalls. When configured properly it will monitor and report on each and every packet that enters and leaves …
Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series
Likelihood to Recommend
Cisco
This firewall is best suited for the network edge/perimeter deployment. The next gen features works very well and the remote access VPN is also very much suitable for the organizations which have a huge user base working remotely. The Remote Access VPN is very much customizable and the authentication integration option like LDAP and RADIUS provides and addon.
PaloAlto VM-200 is a virtualized firewall with high processing power and network edge protection. The great advantage is being able to implement in a VMware environment without worrying about hardware, rack space, physical network connections and others. It can be easily managed via the web and remotely to create protection, access and reporting rules. The VM-200 firewall can be used by any company, small or large because it has several models available according to the real needs of each one.
Ever since we installed Cisco ASA 5500-X with FirePOWER Services we have never had to deal with an attack. We can see in the logs almost every day hackers attempting to break into our networks and failing. We also have the ability to blacklist every IP address that attempts to break into our firewalls
Cisco firepower provides automatation for an organisations security operations to detect and stop the most advanced threats fast. It also assists in preventing attacks in using intelligence and innovative solutions.
It is very easy to use, even for those with little experience in this particular firewall. Some of the advanced content filtering and content-based policies are difficult to pick up; however, almost all required decoders are built in. Built-in logging and rule testing make rule definition easy, and labels/tags allow filtering, grouping, and categorisation of rules. Updates are easy, and high availability is also reliable.
We have never had an outage caused by firewall failure. We have had a few outages caused by the internet failing or cloud applications going offline but never a firewall breaking down. When making changes we have a very strong change control, major software updates are always carried out out of working hours. At places where we have two firewalls in HA, we are able to do upgrades in working ours and the users will never know that an upgrade is taking place, that how great these firewalls are
The Cisco ASA 5500X with Firepower performance needs consideration before deploying. Although the solution is Pay as you grow, adding additional features to the system has a negative impact on overall throughput. I would more like now only to deploy the Cisco FPR units as they have better performance and will last the test of time.
I would recommend the purchase of the Smartnet 24x7 service in the case of a unit and the Smartnet 8x5NBD in the case of only one appliance installed on site. This service is important to always have the latest firmware updates, corrective updates and especially the hardware warranty and maintenance service in case of problems. The service is done by phone or on the official Cisco website and I can say that it is very good and efficient.
We implemented a centralized management of all our Cisco ASA 5500-x with FirePOWER Services so that we can have a holistic view of all our sites in London and other European countries. This also helps when making changes, instead of login on to each firewall we can use Firepower Management Center (FMC) to central deploy changes across all devices
Previous],] I was using the [pfSense] in my organization but when i switched to [Cisco ASA 5500-X with FirePOWER Services] I realized there are lots of issue and missing security features in [pfSense]. The deployment and configuration is very easy as compare to [pfSense]. I highly recommend this product to everyone.
palo alto firewalls are application-oriented systems. They can beat other product which are based on layer 3/4 inspection. Vm series are also quickly available and could be useful in urgent deployment needs . other vendors like Fortinet and cisco could take much more time to provide the VM and in some cases installation and license validation are complicated
Security was enhanced on the data traffic shared with the vendors due to the use of VPNs
Inbound attacks were mostly blocked on the edge and saved a lot of resources (which could had been used in case of attacks getting successful on the application servers)