The Cisco Firepower® 1000 Series for small to medium-size businesses and branch offices is a family of four threat-focused Next-Generation Firewall (NGFW) security platforms designed to deliver business resiliency through superior threat defense. The vendor provides that they offers exceptional sustained performance when advanced threat functions are enabled. The 1000 Series’ throughput range addresses use cases from the small office, home office, remote branch office to the Internet edge. The…
N/A
Zscaler Internet Access
Score 8.9 out of 10
N/A
Zscaler Internet Access™ (ZIA) is a secure web gateway (SWG), delivering cloud native cyberthreat protection and zero trust access to the internet and SaaS apps.
Not at the host level, but at network-level, Firepower is a great product for small scale businesses and the logging capability is excellent. The resource's accessibility for understanding the event type and support is well. Firepower is not a competitor for FortiGate. …
FortiGate NGFW, is also an excellent product with good processing power and traffic handling. But our client was previously familiar with Cisco Firepower, and we had resources to support it well. The trust and support facility of Cisco helped our client to choose Firepower over …
I think it is well suited for smaller companies or (as in our case) extension to a central system with higher performance. My personal guess is, that it can be quite annoying with those delays in bigger environments, when 20 or more devices needed to be managed. From the point of security, support and updates it works quite good and seem to have no downsides.
Zscaler Internet Access is effectively a cloud firewall. It thrives best for traveling users that need a consistent experience as the multiple Service Edges around the world will help reduce the bottleneck and latency of VPNs hosted on firewalls. Also reduces the cost to spin up small locations that wouldn't necessarily need a firewall on site for Zonal traffic (this rings true for any SSE product). However troubleshooting this tool is a bit of a beast as previously mentioned - the logs are pretty minimal and the first reaction after perusing logs is typically to get a pcap file (which used to be a last resort for Network Engineers).
My organization is all Cisco and wants to stay in the Cisco life cycle, Firepower 1000 series is great for small to medium-size office.
Very robust enterprise-grade security solution with updated threat features to handle any current and upcoming threats. The solution is backed by Cisco to ensure constant security updates. Integrated AnyConnect remote client VPN is a big plus to allow for secure remote workers access. Easier to set up a site to site VPN due to the large user base and case studies published on integrating to other manufacturer solutions.
Single Pane of Glass Management - Everything is very easy to access and monitor the entire environment from an internet security perspective.
Install Flexibility - We can and do install Zscaler Internet Access on both our client devices as well as our SD-WAN appliances and servers. This allows us to control internet security even on devices without an agent in our networks.
The activate button when making changes could be better, activate seems somewhat like a misnomer especially to newer admins/engineers to the product, a more accurate word would be publish.
Blocked action message for the user could be more user friendly
It is quite good, robust and reliable but not always so easy to manage and configure. The tools could be improved and the price is not low for an entry level firewall
Firepowers are secure, reliable, central management and configuration is easy and they fit in well with our existing Cisco infrastructure. Good feature set and support. Good management and control with chassis manager and central control with additional Firepower Management Centre.
The application is easy to install and configure on all Windows devices. To troubleshoot any internet issue, we can easily collect all the relevant logs from Zscaler and check the exact issue. The only problem is with the uninstall, as a dedicated crew needs to provide the password.
Great performance even on the lower end model of the series. You can push a lot of traffic through these devices without much performance impact. If you decide you want to inspect encrypted traffic however, you may take a big hit on the cpu and memory of the box, but they still manage to keep up even with all the bells and whistles turned on.
I have had troubles with Firepower Management Center and the FTD's in the past. Sticking to a Gold Star image and upgrading when the "bugs" are fixed is great. That still doesn't mean you are left vulnerable though. The extra features are just not enabled yet. Great product and calling support is readily available for any issue.
I cannot give a fair rating for this as I have not had to contact Zscaler support. There was one time we had to contact them because we needed to check if they were having issues on their end. Our ISP was actually the problem but support seemed very friendly.
Cisco Meraki MX is much more simple to configure it if you compare to Cisco Firepower 1000, but it is more limited to pur some complex configurations. The Cisco Firepower 1000 Series is typically deployed as a physical appliance, while the Meraki MX can be deployed as a physical or virtual appliance.The Firepower 1000 Series has a more complex user interface, with a steeper learning curve, but offers more customization and configuration options. The Meraki MX has a simpler, more intuitive interface,
Zscaler Intenet Access outperformed the competition due to its lightning-fast policy delivery and cross-compatibility. It is easy to track employee usage and block unnecessary websites, reducing company internet usage. Zscalar installed on every system increases cloud-based software bandwidth, decreasing user turnaround time and increasing efficiency.
It took several attempts with Cisco engineers to configure the device; it requires a deep set of knowledge to set up in a more complicated environment.
This will allow us to move forward with a more stable and configurable environment with security available we didn't have before.
We just turned off the general VPN this week, post Zscaler rollout of ZPA & ZIA, but it's still the "new" kid on the block, so "everything" is a Zscaler issue.
The ZIA implementation revealed to us exactly how inadequate our internal policies regarding internet access are. Instead of leveraging the tool to reduce risk factors, we find ourselves adjusting ZIA policies to accommodate user complaints rather than adhering to company policy enforcement.