Cisco Secure Firewall delivers comprehensive threat protection for modern, distributed networks. Built to support hybrid workforces and multicloud environments, it enables Zero Trust access, application visibility, and secure remote connectivity. With integration across the Cisco Secure portfolio, including SecureX and Talos threat intelligence, the firewall powers organizations to detect and stop more sophisticated threats. Centralized management simplifies policy enforcement, orchestration,…
N/A
Sophos UTM
Score 8.8 out of 10
N/A
Sophos UTM provides core firewall features, plus sandboxing and AI threat detection for advanced network security. It has customizable deployment options.
N/A
Pricing
Cisco Secure Firewall
Sophos UTM
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Cisco Secure Firewall
Sophos UTM
Free Trial
Yes
Yes
Free/Freemium Version
No
No
Premium Consulting/Integration Services
No
No
Entry-level Setup Fee
No setup fee
No setup fee
Additional Details
—
t2.small - $0.123 - Total / hr
m3.medium - $0.417 - Total / hr
m3.large - $0.883 - Total / hr
m3.xlarge - $1.366 - Total / hr
m3.2xlarge- $1.982 - Total / hr
c3.large - $0.555 - Total / hr
c3.xlarge - $1.11 - Total / hr
c3.2xlarge - $1.72 - Total / hr
c3.4xlarge - $2.59 - Total / hr
c3.8xlarge - $3.68 - Total / hr
c4.large - $0.55 - Total / hr
c4.xlarge - $1.099 - Total / hr
c4.2xlarge - $1.698 - Total / hr
c4.4xlarge - $2.546 - Total / hr
c4.8xlarge - $3.841 - Total / hr
m4.large - $0.868 - Total / hr
m4.xlarge - $1.365 - Total / hr
m4.2xlarge- $1.931 - Total / hr
This security solution is well-suited for a complex environment that requires a scalable and secure solution with granular control. It is also recommended that it be implemented with other Cisco security solutions. Requirements are Security-First. It is less appropriate in a small business scenario where advanced configurations are not required. It should be well-trained on this solution.
UTM works great if you want a solid, obvious firewall. There's not a lot of second-guessing as to what you are about to do with every change you make. If you incorporate their wireless access points and RED (remote ethernet device) for remote users or small offices, it's considerably much easier to set up than other comparable solutions. If you are looking to manage your firewalls via the cloud, you are out of luck.
It's good at segregating networks and ensuring that you only give the access that you need to give. Especially with medical devices, you want to only give the access that they need and keep them in their own separate areas so that they can't just communicate with the rest of the network. It's also good at the border for keeping attackers out of the network.
I wish that the deployment of the updates to the sensors from the FMC was faster.
Cisco ASA firewall did a great job of authentication and authorization on the local firewall. FTD does not authorize users well in terms that an AAA must be setup to provide the granular tools that the ASA did.
Cisco's method of licensing the firewall can be improved. The FMC and the FTD are licensed through the Cisco software manager and there are instances where the devices are licensed but the firewall still displays and error due to licensing.
It works really well. We can do most anything we want or need to with it, and you don’t have to have a doctorate or multiple certs to necessarily figure it out. The thing that would probably have to happen to make us switch would be if we just got priced out - Cisco’s more powerful and higher bandwidth models cost a pretty penny.
i think overall after ALOT of tac cases it works allright now. But still have alot of issues if you use cloud based mangement. fx, if you open 2 windows of access policys, both of the pages, rules starte to jump form side to side. if you then open one more list, its start to jump even faster. if you close the 2 of them, its back to normal. ALSO the extended access lists for VPN, SUCKS. Its the tiniest window when opening the editor, and you are not able to give the rules names, Which means finding and editing rules SUCKS, its a horrible experience, and eveytime we have to we want to yell :P
The interface is no non-sense and easy to understand. No need for any consultants to help implement this solution. The performance is consistent and solid. Paired with a good amount of firmware and definitions, it's hard to find any fault in this product. It's interoperability with other Sophos products make a compelling argument to invest in more Sophos products.
would rate Cisco Secure Firewall’s availability a 9 out of 10. In our production environments at Rackspace, the platform has been consistently reliable. We’ve deployed it in high-availability pairs, and failover works as expected with minimal disruption. Over the past several quarters, we’ve had no major unplanned outages directly attributable to the firewall itself. The software has been stable
Firewall support is professional just like any other technology Cisco sells. From answering simple questions to bringing out outages affecting a large population of our workforce, Cisco support is always courteous, professional, and communicates with our team to keep our request on their radar. Some of the brightest people I've met are from Cisco support both in IQ and EQ which shows the talent Cisco is able to onboard to their team.
I find the support fair. The wait can be frustrating when dealing with fire. The pandemic has not helped with this. Although the wait can be long, the support reps are knowledgeable and was able to resolve the issues I was facing.
was a good training but questions was answered not so good. Training was "Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF)".
Our initial implementation was aided by Cisco's professional services and was excellent. The engineer was very knowledgeable and helped us work through issues while building out our new internet security edge Part of this involved tools to migrate the firewall configuration from old to new.
Cisco Secure Firewall works better with the Cisco ecosystem when we can utilize it and feels beefy enough when we utilize it in the data center. The Fortinet we have found are great, small cost boxes for remote offices with a better UI then Cisco Secure Firewalls. The feature set included with the firewalls feels similar from a security point of view.
I would rate Sophos second on this list right below Webroot. Webroot has an easier user interface and policy builder. However, Sophos would be on top of its UI would be improved. I would rank CrowStrike third and McAfee last. Sophos is great for complex environments that have multiple needs.
Positive impact. Cisco is a big player in IT environment. It is future stuff, everything, what you learn today, maybe something can be tomorrow. And yes, it's quite important to learn the new stuff every day. And yes, that's it. Yes, I'm happy with Cisco.