Cisco offers the Firepower 2100 Series NGFW, designed to allow businesses to gain resiliency through superior security with sustained performance. The Firepower 2100 Series has a dual multicore CPU architecture that optimizes firewall, cryptographic, and threat inspection functions simultaneously, to achieve security doesn’t come at the expense of network performance.
N/A
Forcepoint NGFW
Score 8.0 out of 10
N/A
Forcepoint Next-Generation Firewall delivers network security at scale. They can be deployed from anywhere through the Secure Management Console (SMC) and unify policy management, incident response and reporting.
$900
one-time fee for the entry tier Forcepoint N60 (approx)
Pricing
Cisco Firepower 2100 Series
Forcepoint NGFW
Editions & Modules
Firepower 2100
3,000-20,000
per appliance
Forcepoint NGFW N60
$900
one-time fee (approx)
Forcepoint NGFW N120
$1314
one-time fee (approx)
Forcepoint NGFW N350
$7850
one-time fee (approx)
Forcepoint NGFW N1200
$13600
one-time fee (approx)
Forcepoint NGFW N2200
$36000
one-time fee (approx)
Forcepoint NGFW N3400 & N3500
varies
one-time fee
Offerings
Pricing Offerings
Cisco Firepower 2100 Series
Forcepoint NGFW
Free Trial
No
Yes
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
—
Firewalls are bought predominately through partners and third-party VARs. Pricing for purchase and lease and support options vary by reseller.
More Pricing Information
Community Pulse
Cisco Firepower 2100 Series
Forcepoint NGFW
Features
Cisco Firepower 2100 Series
Forcepoint NGFW
Firewall
Comparison of Firewall features of Product A and Product B
Cisco Firepower 2100 Series
8.5
2 Ratings
2% below category average
Forcepoint NGFW
8.1
1 Ratings
7% below category average
Identification Technologies
9.02 Ratings
5.01 Ratings
Visualization Tools
6.01 Ratings
5.01 Ratings
Content Inspection
9.02 Ratings
10.01 Ratings
Policy-based Controls
9.02 Ratings
10.01 Ratings
Active Directory and LDAP
9.02 Ratings
8.01 Ratings
Firewall Management Console
8.02 Ratings
10.01 Ratings
Reporting and Logging
9.02 Ratings
8.01 Ratings
VPN
10.02 Ratings
9.01 Ratings
High Availability
10.02 Ratings
9.01 Ratings
Stateful Inspection
10.02 Ratings
7.01 Ratings
Proxy Server
5.02 Ratings
00 Ratings
Best Alternatives
Cisco Firepower 2100 Series
Forcepoint NGFW
Small Businesses
pfSense
Score 8.8 out of 10
pfSense
Score 8.8 out of 10
Medium-sized Companies
Quantum Firewalls and Security Gateways
Score 9.3 out of 10
Quantum Firewalls and Security Gateways
Score 9.3 out of 10
Enterprises
Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series
Score 9.1 out of 10
Palo Alto Networks Virtualized Next-Generation Firewalls - VM Series
The Cisco [Firepower] 2100 [Series] is an easy sell for anyone looking. You already know Cisco excels in the security department, but now that firepower lives right on the box and inline with the rest of the firewall data flow you can save yourself a lot of time and headaches. Unless you cant quite afford Cisco's 2100 line, there's not much reason to go with the competition.
If you are looking for a smaller network/security team, the ease and low complexity create an easy to manage environment. One engineer can easily manage 100 nodes/locations. If you are just starting to get security conscious and predict regular adjustments to policy, routing, and access, this is a very good system for making easy to understand and low impact changes on a regular basis without operations interruption.
Easy to manage and make changes on - ACL's are done with ease.
Easy USB initial configuration - The easy initial setup of a new location and firewall saves massive time. Settings are automatically pushed to new nodes upon contact with the controller.
Low Complexity - This system does not have a lot of complexity requiring extra hours, training, or personnel to manage.
Career-wise very familiar with the ASAs, you know, the previous gen firewalls, Pyxis, ASAs, the CHA. As far as being intuitive, those seem to be far more intuitive to learn and figure out what the features and changes and config management, all that stuff is. With Firepower, it's a learning curve and I feel like I have quite a bit of experience with it, and so does my team, but feels like it's not as intuitive, and trying to make changes just always seems harder for some reason. We've gone to some Cisco security training and all that, but even then it's just harder to work with. The other big thing is, and this is a big gripe of mine, I suppose, that on any other firewall, when we have various different manufacturers, if you make a change, you know, a simple change object, object name gets changed or object is deleted or whatever the simplest of change is, it gets implemented instantly.
With the Firepower system, you have to deploy the change and it'll take about six or seven minutes for the change to actually take, which is insanely different than any other platform where that change is instantaneous. So let's say if I'm making seven different changes for a troubleshooting job I don't know which one of the seven is gonna fix it, I do one by one by one. I'm like, oh, let me try one change, one second, change, third change, four changes. It's going to take seven deploys. And seven deploys mean it's gonna take an hour of just deploy time. So that is a big, big gripe
Poor Reporting - It exists but even when calling in to support for assistance, they have no idea how to tackle customizing reports or searching for specific data.
There are three main problems with this platform: - short EoL time - it is really missery because this platform was overrated from cisco sales and after shor time they accepted on EoL - sometimes problems with upgrades paths, because of strange behaviour between FXOS and ASA image on the top of it - not good performance when comparing to newer 1k platform
In the days of purchase of Cisco Firepower 2100 series it was new platform and Cisco aimed their sailsmains to force selling this platfrom. It was one of the first platform with FXOS with full support of ASA images. It was cheper then 4k series and would be better than ASA 5500-x series (but regarding all problems with upgrades and EoL , it is not).
Efficiency/Productivity increase. The company moved from Cisco firewall and routing hardware to Forcepoint NGFW. It now takes fewer people and fewer hours to manage the new product. This has allowed the company to put the man-hours to use on other projects and tasks.
Long term viability. This has been a concern in the past when the company started as Stonegate, merged to become Stonesoft then got purchased by McAfee, then McAfee got purchased by Intel. However, with Forcepoint the product seems to have found a stable home.
Low complexity. The Web GUI based system for management has reduced the cost of personnel and training required. There is no longer a need for the company to have higher trained and higher salary cost employees to manage the system. Mid-level admins at lower salaries are capable of managing the GUI based system with ease.