Cisco offers a threat-focused next-generation firewall (NGFW), the ASA 5500-X Series. The ASA 5500 Series platforms can run either the Cisco ASA Firewall or Cisco Firepower Threat Defense (FTD). The series features appliances in a variety of form factors, including standalone options for small and midsize businesses, ruggedized appliances for extreme environments, midsize appliances for security at the Internet edge, and high-performance appliances for enterprise data centers.
N/A
Sophos UTM
Score 8.8 out of 10
N/A
Sophos UTM provides core firewall features, plus sandboxing and AI threat detection for advanced network security. It has customizable deployment options.
N/A
Pricing
Cisco ASA 5500-X with FirePOWER Services
Sophos UTM
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Cisco ASA 5500-X with FirePOWER Services
Sophos UTM
Free Trial
No
Yes
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
Cisco ASA 5500-X pricing starts at ~$400 and scales up to $20,000 for higher capacity appliances.
t2.small - $0.123 - Total / hr
m3.medium - $0.417 - Total / hr
m3.large - $0.883 - Total / hr
m3.xlarge - $1.366 - Total / hr
m3.2xlarge- $1.982 - Total / hr
c3.large - $0.555 - Total / hr
c3.xlarge - $1.11 - Total / hr
c3.2xlarge - $1.72 - Total / hr
c3.4xlarge - $2.59 - Total / hr
c3.8xlarge - $3.68 - Total / hr
c4.large - $0.55 - Total / hr
c4.xlarge - $1.099 - Total / hr
c4.2xlarge - $1.698 - Total / hr
c4.4xlarge - $2.546 - Total / hr
c4.8xlarge - $3.841 - Total / hr
m4.large - $0.868 - Total / hr
m4.xlarge - $1.365 - Total / hr
m4.2xlarge- $1.931 - Total / hr
The network is homogenous to Cisco and the integration with Cisco products is very easy (e.g. Identity Services Engine). As I am a certified engineer in Cisco Security, it feels very easy to handle Cisco products especially as more and more support docs are available across the …
This firewall is best suited for the network edge/perimeter deployment. The next gen features works very well and the remote access VPN is also very much suitable for the organizations which have a huge user base working remotely. The Remote Access VPN is very much customizable and the authentication integration option like LDAP and RADIUS provides and addon.
UTM works great if you want a solid, obvious firewall. There's not a lot of second-guessing as to what you are about to do with every change you make. If you incorporate their wireless access points and RED (remote ethernet device) for remote users or small offices, it's considerably much easier to set up than other comparable solutions. If you are looking to manage your firewalls via the cloud, you are out of luck.
Ever since we installed Cisco ASA 5500-X with FirePOWER Services we have never had to deal with an attack. We can see in the logs almost every day hackers attempting to break into our networks and failing. We also have the ability to blacklist every IP address that attempts to break into our firewalls
Cisco firepower provides automatation for an organisations security operations to detect and stop the most advanced threats fast. It also assists in preventing attacks in using intelligence and innovative solutions.
The interface is no non-sense and easy to understand. No need for any consultants to help implement this solution. The performance is consistent and solid. Paired with a good amount of firmware and definitions, it's hard to find any fault in this product. It's interoperability with other Sophos products make a compelling argument to invest in more Sophos products.
We have never had an outage caused by firewall failure. We have had a few outages caused by the internet failing or cloud applications going offline but never a firewall breaking down. When making changes we have a very strong change control, major software updates are always carried out out of working hours. At places where we have two firewalls in HA, we are able to do upgrades in working ours and the users will never know that an upgrade is taking place, that how great these firewalls are
The Cisco ASA 5500X with Firepower performance needs consideration before deploying. Although the solution is Pay as you grow, adding additional features to the system has a negative impact on overall throughput. I would more like now only to deploy the Cisco FPR units as they have better performance and will last the test of time.
I would recommend the purchase of the Smartnet 24x7 service in the case of a unit and the Smartnet 8x5NBD in the case of only one appliance installed on site. This service is important to always have the latest firmware updates, corrective updates and especially the hardware warranty and maintenance service in case of problems. The service is done by phone or on the official Cisco website and I can say that it is very good and efficient.
I find the support fair. The wait can be frustrating when dealing with fire. The pandemic has not helped with this. Although the wait can be long, the support reps are knowledgeable and was able to resolve the issues I was facing.
We implemented a centralized management of all our Cisco ASA 5500-x with FirePOWER Services so that we can have a holistic view of all our sites in London and other European countries. This also helps when making changes, instead of login on to each firewall we can use Firepower Management Center (FMC) to central deploy changes across all devices
Previous],] I was using the [pfSense] in my organization but when i switched to [Cisco ASA 5500-X with FirePOWER Services] I realized there are lots of issue and missing security features in [pfSense]. The deployment and configuration is very easy as compare to [pfSense]. I highly recommend this product to everyone.
I would rate Sophos second on this list right below Webroot. Webroot has an easier user interface and policy builder. However, Sophos would be on top of its UI would be improved. I would rank CrowStrike third and McAfee last. Sophos is great for complex environments that have multiple needs.
Security was enhanced on the data traffic shared with the vendors due to the use of VPNs
Inbound attacks were mostly blocked on the edge and saved a lot of resources (which could had been used in case of attacks getting successful on the application servers)