Cisco offers a threat-focused next-generation firewall (NGFW), the ASA 5500-X Series. The ASA 5500 Series platforms can run either the Cisco ASA Firewall or Cisco Firepower Threat Defense (FTD). The series features appliances in a variety of form factors, including standalone options for small and midsize businesses, ruggedized appliances for extreme environments, midsize appliances for security at the Internet edge, and high-performance appliances for enterprise data centers.
N/A
Zscaler Internet Access
Score 8.9 out of 10
N/A
Zscaler Internet Accessâ„¢ (ZIA) is a secure web gateway (SWG), delivering cloud native cyberthreat protection and zero trust access to the internet and SaaS apps.
N/A
Pricing
Cisco ASA 5500-X with FirePOWER Services
Zscaler Internet Access
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Cisco ASA 5500-X with FirePOWER Services
Zscaler Internet Access
Free Trial
No
No
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
Yes
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
Cisco ASA 5500-X pricing starts at ~$400 and scales up to $20,000 for higher capacity appliances.
This firewall is best suited for the network edge/perimeter deployment. The next gen features works very well and the remote access VPN is also very much suitable for the organizations which have a huge user base working remotely. The Remote Access VPN is very much customizable and the authentication integration option like LDAP and RADIUS provides and addon.
Zscaler Internet Access is effectively a cloud firewall. It thrives best for traveling users that need a consistent experience as the multiple Service Edges around the world will help reduce the bottleneck and latency of VPNs hosted on firewalls. Also reduces the cost to spin up small locations that wouldn't necessarily need a firewall on site for Zonal traffic (this rings true for any SSE product). However troubleshooting this tool is a bit of a beast as previously mentioned - the logs are pretty minimal and the first reaction after perusing logs is typically to get a pcap file (which used to be a last resort for Network Engineers).
Single Pane of Glass Management - Everything is very easy to access and monitor the entire environment from an internet security perspective.
Install Flexibility - We can and do install Zscaler Internet Access on both our client devices as well as our SD-WAN appliances and servers. This allows us to control internet security even on devices without an agent in our networks.
The activate button when making changes could be better, activate seems somewhat like a misnomer especially to newer admins/engineers to the product, a more accurate word would be publish.
Blocked action message for the user could be more user friendly
Ever since we installed Cisco ASA 5500-X with FirePOWER Services we have never had to deal with an attack. We can see in the logs almost every day hackers attempting to break into our networks and failing. We also have the ability to blacklist every IP address that attempts to break into our firewalls
Cisco firepower provides automatation for an organisations security operations to detect and stop the most advanced threats fast. It also assists in preventing attacks in using intelligence and innovative solutions.
The application is easy to install and configure on all Windows devices. To troubleshoot any internet issue, we can easily collect all the relevant logs from Zscaler and check the exact issue. The only problem is with the uninstall, as a dedicated crew needs to provide the password.
We have never had an outage caused by firewall failure. We have had a few outages caused by the internet failing or cloud applications going offline but never a firewall breaking down. When making changes we have a very strong change control, major software updates are always carried out out of working hours. At places where we have two firewalls in HA, we are able to do upgrades in working ours and the users will never know that an upgrade is taking place, that how great these firewalls are
The Cisco ASA 5500X with Firepower performance needs consideration before deploying. Although the solution is Pay as you grow, adding additional features to the system has a negative impact on overall throughput. I would more like now only to deploy the Cisco FPR units as they have better performance and will last the test of time.
I would recommend the purchase of the Smartnet 24x7 service in the case of a unit and the Smartnet 8x5NBD in the case of only one appliance installed on site. This service is important to always have the latest firmware updates, corrective updates and especially the hardware warranty and maintenance service in case of problems. The service is done by phone or on the official Cisco website and I can say that it is very good and efficient.
I cannot give a fair rating for this as I have not had to contact Zscaler support. There was one time we had to contact them because we needed to check if they were having issues on their end. Our ISP was actually the problem but support seemed very friendly.
We implemented a centralized management of all our Cisco ASA 5500-x with FirePOWER Services so that we can have a holistic view of all our sites in London and other European countries. This also helps when making changes, instead of login on to each firewall we can use Firepower Management Center (FMC) to central deploy changes across all devices
Previous],] I was using the [pfSense] in my organization but when i switched to [Cisco ASA 5500-X with FirePOWER Services] I realized there are lots of issue and missing security features in [pfSense]. The deployment and configuration is very easy as compare to [pfSense]. I highly recommend this product to everyone.
Zscaler Intenet Access outperformed the competition due to its lightning-fast policy delivery and cross-compatibility. It is easy to track employee usage and block unnecessary websites, reducing company internet usage. Zscalar installed on every system increases cloud-based software bandwidth, decreasing user turnaround time and increasing efficiency.
Security was enhanced on the data traffic shared with the vendors due to the use of VPNs
Inbound attacks were mostly blocked on the edge and saved a lot of resources (which could had been used in case of attacks getting successful on the application servers)
We just turned off the general VPN this week, post Zscaler rollout of ZPA & ZIA, but it's still the "new" kid on the block, so "everything" is a Zscaler issue.
The ZIA implementation revealed to us exactly how inadequate our internal policies regarding internet access are. Instead of leveraging the tool to reduce risk factors, we find ourselves adjusting ZIA policies to accommodate user complaints rather than adhering to company policy enforcement.