Likelihood to Recommend Cisco ASA's are great for internal network connected access between a firewall and the central management server. And, for complex networks where high security requirements with overly strict compliance are necessary. For networks with limited connectivity to the core or for poor network connectivity these are not the best solution. There are other more stand-alone firewall's that do this better. These firewall's are a little more complex to set up to start with so significant knowledge of these devices is required to set them up and ensure they are best practice installed.
Read full review MikroTik is suited for large companies that require advanced distributions in terms of contracted bandwidth, and in the same way, allows a single device to specify filtering and firewall rules without acquiring an additional device. There is a range for small companies which is more economical and less robust, but in case it's not necessary, such a strict control over the data consumption of the company is not a feasible solution.
Read full review Pros ASA is our VPN concentrator. The client and server are very stable and very easy to use ASA also offers Intrusion Prevention, to an extent. This is also very useful for an improved security posture for a small company ASA allowed us to scale very quickly. We could onboard clients, partners, and consultants and give them a great onboarding experience as well Administrative costs with ASA are low. It's very easy to administer. Read full review Affordable, it has more features compared to other brand at the same price. Widely available, by today it's easy to obtained one, even online retailers sell it. Highly customizable, you may write a powerful script to enhance the function. Flexible, you can make different configuration approach based on you needs. Read full review Cons The ASDM software is at times a nightmare to install because of different java versions[.] [The firewall] could do with a power button, just to be able to do a hard reboot when needed[.] It would be nice to manage the firewall via the web on port 443[.] Read full review Some of the wiki articles have not been updated or are not accurate enough. We spent a couple of days trying to find an example of implementing a mobile IPSec client solution. But once this has been implemented, it has been solid (always worked). A bigger community would help, and I am finding it hard to find the time to contribute to these articles. Read full review Likelihood to Renew To be honest there has been now great products out in the market compared to Cisco ASA. I beleieve Cisco has to do a lot of improvement in this area. The other defeiniete factors is the cost when it comes to renewals which is always a premium on Cisco products
Read full review Usability Almost perfect, despite some issue that need to be addressed by the manufacturer. If this issue has been addressed, a full 10 mark will be given.
Read full review Reliability and Availability I generally have not noticed the outages, however since it's a machine it can malfunction, we need to implement the firewall infrastructure in such a way that it is highly available with device failure, region failure etc. Else any solution will be having the issues if they are not build with resiliency.
Read full review Support Rating The support is usually very good and gets back to you very quickly. However I had some instances of when two engineers will give me wildly different answers to what I thought was a simple question. Overall however I do rate the support highly and they are generally always very good.
Read full review There is no SOC, NOC, where you can contact to try to resolve any difficulties. The problems that these devices have are solved largely through the community, with workaround alternatives, or if the support team responds to a request, the response times are too high for the current needs of technological communications.
Read full review Implementation Rating It was quite a good one, how ever requires an expertise to deploy hence the SMB segment would be finding it difficult to implement this product. The one good reason is that there are lot of ASA certified engineers in compared to the other certified engineers. Hence this resembles positively on the deployment as you have quite a lot of experienced engineer on your deployment
Read full review Alternatives Considered We were using [
pfSense ] before in our environment but we regularly facing difficulties over it due to software bugs & downtime. After implementing Cisco ASA, it resolved our availability issue & provides us a reliable solution with the best security features & easy to understand GUI.
Read full review Cisco Routers are one of the best in the market, however they are also very expensive and not suitable for a small deployment or any deployment which requires just a couple of routers. MikroTik on the other hand are less expensive and provides many features that you require for a small scale deployment. they fit in with the budget and do what you need them to.
Read full review Return on Investment Most network engineers have worked with ASA, so there is no need for re-training when adding or turning over staff Current configs from older devices plug in easily, and are operational on larger devices if an upgrade is required Many support options available Read full review First of all it's cheaper than Cisco routers. It has more functionality than Cisco routers that cost 4 times more. It has a GUI. But it has CLI too. Read full review ScreenShots