The Cisco Firepower® 1000 Series for small to medium-size businesses and branch offices is a family of four threat-focused Next-Generation Firewall (NGFW) security platforms designed to deliver business resiliency through superior threat defense. The vendor provides that they offers exceptional sustained performance when advanced threat functions are enabled. The 1000 Series’ throughput range addresses use cases from the small office, home office, remote branch office to the Internet edge. The…
N/A
Palo Alto Networks Next-Generation Firewalls - PA Series
Score 9.1 out of 10
N/A
Palo Alto Network’s Next-Generation Firewalls is a firewall option integrated with other Palo Alto security products. Released in late 2023, the PA-7500 ML-Powered NextGeneration Firewall (NGFW) enables enterprise-scale organizations and service providers to deploy security in high-performance environments.
$1.50
per hour per available zone
Pricing
Cisco Firepower 1000 Series
Palo Alto Networks Next-Generation Firewalls - PA Series
Editions & Modules
Firepower 1000
1,000-5,000
per appliance
No answers on this topic
Offerings
Pricing Offerings
Cisco Firepower 1000 Series
Palo Alto Networks Next-Generation Firewalls - PA Series
Free Trial
No
Yes
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
—
Users may also choose to pay per gigabyte of data used starting at .065/GB. Note that prices listed here reflect installations via Amazon Web Services. Pricing may differ if other service providers are used.
[We've used] checkpoint 2200 and 3200 models. Based on the compromises we had to make by not applying the "Optimised" IPS profile and High CPU problems, I would suggest Firepower 1000 but Meraki MX series can take away the spot light from Firepower 1000.
No issues from a technical standpoint - Firepowers are secure, reliable and do what they say on the tin. Central management and configuration is easy and they fit in well with our existing Cisco infrastructure. These are not the cheapest available option for firewalls and we …
I have had experience with many firewalls and firewall management solutions. Many companies choose to opt for the Cisco Firepower 1000 Series because the threat intelligence from Cisco and the ease of administration for intrusion prevention is very competitive. As far as …
In terms of cost-effectiveness, Cisco gives the same or better service at a lower cost compared to Palo Alto devices. There are other products in the market with similar protection services and even lower cost but customer service is not as good as Cisco. So, it is a combined …
Cisco is up there, not the lowest cost in terms of initial purchase or maintenance. Also not quite the best in terms of reputation yet but getting better. Some companies bundle their hardware, license, and support better. Cisco has a more modular approach that allows for choice …
Chose Palo Alto Networks Next-Generation Firewalls - PA Series
Cisco Firepower only has basic functionality, URL filtering always create problems also GUI is very bad that's why most organization [are] using Palo Alto rather than Cisco Firepower.
Palo Alto Networks Next-Generation Firewalls - PA Series
Likelihood to Recommend
Cisco
I think it is well suited for smaller companies or (as in our case) extension to a central system with higher performance. My personal guess is, that it can be quite annoying with those delays in bigger environments, when 20 or more devices needed to be managed. From the point of security, support and updates it works quite good and seem to have no downsides.
Palo Alto Networks Next-Generation Firewalls - PA Series are extremely versatile. Whether it be a one office location or multiple sites, the Panorama interface allows centralized management. I've found Palo Alto does a great job with their updates and supporting customers. As a cybersecurity professional, I like that Palo Alto's products offer a wide range of controls to support defense in depth. It is easy for security and network infrastructure teams to use the same consoles to deliver performance with security built in.
My organization is all Cisco and wants to stay in the Cisco life cycle, Firepower 1000 series is great for small to medium-size office.
Very robust enterprise-grade security solution with updated threat features to handle any current and upcoming threats. The solution is backed by Cisco to ensure constant security updates. Integrated AnyConnect remote client VPN is a big plus to allow for secure remote workers access. Easier to set up a site to site VPN due to the large user base and case studies published on integrating to other manufacturer solutions.
The PA handles VPN connectivity without missing a beat. We have multiple VPN tunnels in use for redundancy to cloud-based services.
The PA has great functionality in supporting failover internet connections, again with the ability to have multiple paths out to our cloud-based services.
The PA is updated on the regular with various security updates, we are not concerned with the firewall's ability to see what packets are really flowing across the network. Being able to see beyond just IP and port requests lets you know things are locked down better than traditional firewalls.
It is a great overall kit, with URL filtering and other services that fill in the gaps between other solutions without breaking the bank.
It is quite good, robust and reliable but not always so easy to manage and configure. The tools could be improved and the price is not low for an entry level firewall
The PA5220s have far exceeded what we have expected out of them. It was a bit of a learning curve coming from another vendor, but everything falls into place now with ease. The capabilities of the solution still surprise us, allowing us to remove other costly hardware and providing a single point of management needed
Firepowers are secure, reliable, central management and configuration is easy and they fit in well with our existing Cisco infrastructure. Good feature set and support. Good management and control with chassis manager and central control with additional Firepower Management Centre.
The few aspects of the Palo Alto Networks Next-Generation Firewalls - PA Series that could use improvement - such as slow commit times, which I hear they have improved on in the newest models - are vastly outshined by everything else these appliances provide. We have been using the Palo Alto Networks Next-Generation Firewalls - PA Series appliances for more than 10 years and plan to continue using them for the foreseeable future.
Great performance even on the lower end model of the series. You can push a lot of traffic through these devices without much performance impact. If you decide you want to inspect encrypted traffic however, you may take a big hit on the cpu and memory of the box, but they still manage to keep up even with all the bells and whistles turned on.
I have had troubles with Firepower Management Center and the FTD's in the past. Sticking to a Gold Star image and upgrading when the "bugs" are fixed is great. That still doesn't mean you are left vulnerable though. The extra features are just not enabled yet. Great product and calling support is readily available for any issue.
We've run into a couple undocumented bugs, but that seems to happen with every brand and technology. Any time we've had to engage Palo Alto support they've always been professional, knowledgeable and prompt. In almost all cases we've been able to resolve our issues without having to escalate our tickets.
Cisco Meraki MX is much more simple to configure it if you compare to Cisco Firepower 1000, but it is more limited to pur some complex configurations. The Cisco Firepower 1000 Series is typically deployed as a physical appliance, while the Meraki MX can be deployed as a physical or virtual appliance.The Firepower 1000 Series has a more complex user interface, with a steeper learning curve, but offers more customization and configuration options. The Meraki MX has a simpler, more intuitive interface,
We are using Cisco ASA before in our environment but when it comes to deep scanning & layer 7 security it doesn't have that capability. After using Palo Alto Networks Next-Generation Firewall we are using sandboxing & advance malware protection that provides high-level end-user security. Also after implementing it we can easily monitor user-level traffic.
It took several attempts with Cisco engineers to configure the device; it requires a deep set of knowledge to set up in a more complicated environment.
This will allow us to move forward with a more stable and configurable environment with security available we didn't have before.
Overall, even though the device is very expensive (both hardware and licensing), the product does produce a decent ROI, given that one (or HA pair) of devices can do so many things, such as anti-virus, anti-malware, URL filtering, SSL decryption, SSL VPN, routing, etc.
There will definitely be sticker shock when you're renewal comes up annually (or after 3 years), so be sure to look very carefully at the recurring costs of this product, with respect to licensing and hardware/software maintenance.