Cisco offers a threat-focused next-generation firewall (NGFW), the ASA 5500-X Series. The ASA 5500 Series platforms can run either the Cisco ASA Firewall or Cisco Firepower Threat Defense (FTD). The series features appliances in a variety of form factors, including standalone options for small and midsize businesses, ruggedized appliances for extreme environments, midsize appliances for security at the Internet edge, and high-performance appliances for enterprise data centers.
N/A
Sophos SG Firewall Appliances
Score 8.4 out of 10
N/A
Sophos SG Firewall Appliances are designed to provide optimal protection for organizations of all sixes from small remote offices, to global organizations requiring high-availability and
N/A
Pricing
Cisco ASA 5500-X with FirePOWER Services
Sophos SG Firewall Appliances
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Cisco ASA 5500-X with FirePOWER Services
Sophos SG Firewall Appliances
Free Trial
No
No
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
Cisco ASA 5500-X pricing starts at ~$400 and scales up to $20,000 for higher capacity appliances.
In comparison to Sophos Firewall, Cisco ASA 5500-X is still better with Firepower services. Reason is first its support and second its scalability. It has catered the request for all the users in our company without any throughput issue while using the Cisco AnyConnect remote …
I selected Sophos SG Firewall over Cisco and Barracuda because of cost. Sophos SG Firewall is very aggressive and offers competitive pricing when compared to Cisco and Barracuda. My rating scale would go however: Cisco 1, Barracuda 2 and Sophos SG Firewall 3 with regards to …
It certainly stacks up well as it is very competitive in the pricing segment while having all the features that an ideal NGFW should possess. Basic functionalities like Network Firewall, Proxy and VPN work flawlessly while advanced features like IPS perform reasonably well. The …
This firewall is best suited for the network edge/perimeter deployment. The next gen features works very well and the remote access VPN is also very much suitable for the organizations which have a huge user base working remotely. The Remote Access VPN is very much customizable and the authentication integration option like LDAP and RADIUS provides and addon.
It is well-suited for all sizes of organizations. It will help them to safeguard their network from various cyber threats like ransomware, phishing, malware, etc. It will provide them with many features like deep packet inspection, web filtering, application control, etc. in one place. It will also help them optimize bandwidth usage
Ever since we installed Cisco ASA 5500-X with FirePOWER Services we have never had to deal with an attack. We can see in the logs almost every day hackers attempting to break into our networks and failing. We also have the ability to blacklist every IP address that attempts to break into our firewalls
Cisco firepower provides automatation for an organisations security operations to detect and stop the most advanced threats fast. It also assists in preventing attacks in using intelligence and innovative solutions.
Management could use some improvements. Sophos management and workflows has always been designed by Engineers for Engineers. They do not always follow logical workflows in the real world. Once you figure this out it is easier to use but no where as smooth as many other products on the market.
We have never had an outage caused by firewall failure. We have had a few outages caused by the internet failing or cloud applications going offline but never a firewall breaking down. When making changes we have a very strong change control, major software updates are always carried out out of working hours. At places where we have two firewalls in HA, we are able to do upgrades in working ours and the users will never know that an upgrade is taking place, that how great these firewalls are
The Cisco ASA 5500X with Firepower performance needs consideration before deploying. Although the solution is Pay as you grow, adding additional features to the system has a negative impact on overall throughput. I would more like now only to deploy the Cisco FPR units as they have better performance and will last the test of time.
I would recommend the purchase of the Smartnet 24x7 service in the case of a unit and the Smartnet 8x5NBD in the case of only one appliance installed on site. This service is important to always have the latest firmware updates, corrective updates and especially the hardware warranty and maintenance service in case of problems. The service is done by phone or on the official Cisco website and I can say that it is very good and efficient.
The biggest selling point for sophos is their vendor support. Those guys put a smile on our faces. There are multiple ways you can contact their support like chat, or telephone or email. They are very responsive and they do have very knowledgable and patient support staff. We have raised tickets at all odd hours and they have been addressed correctly
We implemented a centralized management of all our Cisco ASA 5500-x with FirePOWER Services so that we can have a holistic view of all our sites in London and other European countries. This also helps when making changes, instead of login on to each firewall we can use Firepower Management Center (FMC) to central deploy changes across all devices
Previous],] I was using the [pfSense] in my organization but when i switched to [Cisco ASA 5500-X with FirePOWER Services] I realized there are lots of issue and missing security features in [pfSense]. The deployment and configuration is very easy as compare to [pfSense]. I highly recommend this product to everyone.
We use Sophos in conjunction with WatchGuard, for an extra added level of security. Sophos is a little more sophisticated and complicated but they work well together as added layers of protection against most cyber threats.
Security was enhanced on the data traffic shared with the vendors due to the use of VPNs
Inbound attacks were mostly blocked on the edge and saved a lot of resources (which could had been used in case of attacks getting successful on the application servers)