Skip to main content
TrustRadius
Cisco Routers

Cisco Routers

Overview

What is Cisco Routers?

Cisco routers support secure, reliable enterprise connections. These enterprise routers help users implement an intent-based, future-ready WAN that is constantly learning, adapting, and protecting. Deploy routers for the branch, cloud, co-location, or the data center with any type of connectivity,…

Read more
Recent Reviews

Cisco Routers review

7 out of 10
February 08, 2024
Incentivized
Whole department with one sister department using Cisco Routers NCS5508.
Use ASR1k to terminate subscriber ppp sessions provide …
Continue reading

Cisco Router

10 out of 10
April 20, 2023
The Routers are connecting the two offices between NIC and NCDRC. NCDRC is also connecting multiple offices i.e. GPO Complex New Delhi to …
Continue reading

Meraki MX routers the best option.

9 out of 10
August 14, 2022
My organization is using the Meraki MX routers for smaller branches where we can connect an additional switch, camera, and access point …
Continue reading

Routers Cisco

10 out of 10
December 24, 2021
Incentivized
Cisco routers are used throughout the company in order to maintain a stable network, these have been implemented as an upgrade to previous …
Continue reading
Read all reviews

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Reviewer Pros & Cons

View all pros & cons
Return to navigation

Product Details

What is Cisco Routers?

Cisco routers support secure, reliable enterprise connections. These enterprise routers help users implement an intent-based, future-ready WAN that is constantly learning, adapting, and protecting. Deploy routers for the branch, cloud, co-location, or the data center with any type of connectivity, including MPLS, Internet, and 4G LTE.

With over 30 years of experience and an end-to-end portfolio, Cisco routing solutions can deliver for today’s networking needs. The vendor promises to help customers successfully manage technology transitions. Embedded security detects threats in mere hours instead of months. The vendor has studies how networks are consumed, applying those learnings to the new network.

About Cisco
Cisco routers deliver open, intent-based networking platform across the branch, WAN, and cloud. They provide end-to-end security, automation, and analytics with award-winning services and support.

Cisco Routers Video

Cisco Routers Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

(262)

Attribute Ratings

Reviews

(1-24 of 24)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use Cisco Routers in our branch office to get internet access, remote VPN access and also to protect the internal network. We use Cisco Routers in combination with Cisco Umbrella to secure our network and protect us against threats. An even greater benefit is the setup of SD-WAN with Cisco Routers.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
We use the basic features of the Cisco Routers such as advanced logins and MFA. The devices are fairly secure by nature. We do not leverage additional features on the Cisco Routers themselves, as we have firewalls and third-party devices that secure the perimeter as well as internal security. However, we do trust that our routers are secure by the nature of Cisco products.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Cisco can help secure the network, however alone they are not capable to do it as such and we need to have the firewall device or any SASE technology to secure the perimeter. What Cisco Routers can do, they can connect with Security devices or vendors to Secure the organizations. Cisco Firewall such as ASA Firewall is capable of having the features such as threat protection and Securing the Parameter. But Cisco Routers can be connected to any Security Vendor Equipment or cloud to secure the enterprise network.
Abbinow Talashi | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Yes, Cisco Routers have been designed to provide threat protection and secure your network. Our organization has benefited from this capability. We have used all the features of the Cisco Products like their VPN, Security & connectivity to secure our organization.
Score 9 out of 10
Vetted Review
Verified User
If the organization where I work has benefited from the security capabilities that integrate Meraki MX routers such as content filtering, IPS, and malware protection, in addition to being able to integrate umbrella in the future to have SASE in each of the remote sites or only in the datacenter where the output to the applications in the cloud would be.
Ravinder Beniwal | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Cisco Routers are provided with a dedicated third radio to perform network scans to identify rogue devices and network attacks. Cisco Meraki Air Marshal integrated into each access point provides details about real-time intrusion alerts, policy violations, and mitigation techniques. The devices provide enterprise-grade security via features such as an in-built firewall, application blocking and traffic shaping, network access control for BYOD devices, and radius-based authentication. These security features were the important factors in considering Cisco Meraki routers and the organization is happy with the way these features enhance network and data security for the users.
December 24, 2021

Routers Cisco

Score 10 out of 10
Vetted Review
Verified User
Incentivized
At the security level, Cisco has several guides that provide help so that the configuration of its equipment is generated in a safe and reliable way, in turn, the administrators of the organization have defined the parameters and ports established as best practices under the existing ISOs. this in order to prevent any vulnerability that may arise.
November 27, 2021

The Best Router

Jose Manuel Castillo | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
If the truth is that the equipment is not very vulnerable, and the benefit has been obtained by implementing the best practices recommended by the manufacturers, which are aligned to maintain a network with high availability and security.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
There are many forms of security. With Cisco routers, you can turn on and off ports. If an intruder can gain access to a closet they can simply plugin. Shutting off ports makes things more secure. There is also user management. You can tie Cisco into Active Directory so that you know who is logging into the router and making changes vs everyone using a generic admin account and password.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
Cisco Routers are perfect to be used as an aggregation point for branches. We have used encrypted VPNs solutions to guarantee security and integrity. Tunneling Encryption with IPsec or link integrity and confidentiality using Macsec [is] one of the main features used in our solutions.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
Our organization has not benefited from this capability as we are using firewalls for threat protection and securing our networking edge. The firewalls have a wide range of security features and stronger hardware for inspection and filtering of inbound and outbound traffic. It also has web filtering and antivirus built-in.
Ty English | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
We've benefited from a lot of the inbuilt intrusion detection on our cloud hosting side of things. Helps let the users in while keeping the boogeymen out! It also have a nice VPN client to help make a tunnel from remote locations back to the office.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
One of the major strong points of purchasing Cisco Routers in spite of its exorbitantly high price, is the trust and security it provides. Our organization has definitely benefited as our security protocols are now stronger than ever. It also prevents data frauds, breeches and rules out any suspicious or unauthorized activities.
Jacob Klein | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Incentivized
Yes, we have certainly benefitted from threat protection on our network from Cisco. The access controls from Cisco provide reliable and secure lockout mechanisms and ensure our VLANs are segmenting traffic as we need them to. We have recently undergone a vulnerability scan from an outside security company and were very pleased to hear that our network protection performed as expected and kept the scanning utilities out of our critical server infrastructure (as we expected it to).
Score 6 out of 10
Vetted Review
Verified User
Incentivized
The Meraki series provides really good threat protection and is a good option for overall network security. Having the constant updates and always-on link to the web console allows Cisco to include better security than on their standalone devices. I think the subscription fee helps force Cisco to support their Meraki products with updates longer than they would with a standalone product, so I don't have to worry about replacing equipment as often.
Score 9 out of 10
Vetted Review
Verified User
Incentivized
While our Cisco router is not the primary line of defense of our network, they do allow us to add that little extra protection. Although Cisco offers the options for security, you still need to configure them yourself, so it is important to have knowledgable staff or contractors to help you.
Score 8 out of 10
Vetted Review
Verified User
Incentivized
It has configurable firewalls and logs that add security to your network. They have good security options that will work well in conjunction with other protections applied in the network. There are also access configuration options, blacklists, and web filtering.
Return to navigation