Top Rated Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) Alternatives
Cisco ASDM may seem complex at first, but it doesn't take long to learn to use it effectively to manage an environment's network traffic. With each iteration of the application, more useful features have been introduced, from rule hit counts to the ability to create network objects using FQDN to being able to quickly identify orphaned network objects, while the core features continues to deliver. The CLI provides users who prefer to perform management tasks using command line the options to do so, and the overall GUI is organized and simplifies the firewall management experience. Review collected by and hosted on G2.com.
Two things come to mind - Java dependency on launching ASDM and duplicate network objects.
With Java dependency, being able to launch the ASDM successfully becomes a challenge. At one point it was necessary to roll back Java to a previous version in order for ASDM to work, and a more common nuisance is finding which web browser will actually launch ASDM successfully. For example, I'm only able to launch ASDM through Firefox but not any other popular browers.
With regards to duplicate network objects, it may be specific to our company's deployment but after a recent firewall context upgrade, several existing network objects were duplicated. Furthermore there is no easy way to eliminate them so they end up sitting in the network objects list, not being used anywhere, until they are manually deleted. Review collected by and hosted on G2.com.
90 out of 91 Total Reviews for Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv)
Overall Review Sentiment for Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv)
Log in to view review sentiment.

I am working as a Google workspace administrator and my client using cisco for the security. As my personal experience cisco is the very good security option for the technician field. Review collected by and hosted on G2.com.
Some time it's take few minutes for the connecting Review collected by and hosted on G2.com.

Simplified management which enables us to manage policies and rules from single console Review collected by and hosted on G2.com.
SNMP configuration is too complex. HA broke once when we performed the upgrade. Review collected by and hosted on G2.com.
Configuration is straightforward and user friendly. Particularly effective, for data centers and cloud environments. No issues or problems were encountered during usage. Review collected by and hosted on G2.com.
Integrating it with vendors products for IPS/URL filtering and monitoring is difficult. In virtualized or cloud environments scalability poses constraints requiring resources. Review collected by and hosted on G2.com.

"Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) provides comprehensive protection against advanced threats and malware, making it ideal for businesses with multiple branch locations or cloud-based applications. Its scalability and simplified management make it easier, while its seamless integration with other Cisco security solutions further enhances its capabilities." Review collected by and hosted on G2.com.
For smaller organizations, the cost of deploying and managing Cisco Secure Firewall Threat Defense Virtual can be high, as licensing, maintenance and support fees can quickly add up. With limited third-party integration, it also requires significant expertise to deploy and manage effectively. Review collected by and hosted on G2.com.
Love the fact how quickly and robust the system is at ensuring that your equipment does not get affected. Review collected by and hosted on G2.com.
Would like to see more about what is getting blocked to understand where attacks may be coming from. Review collected by and hosted on G2.com.

The best thing about Cisco firewall threat defense is the lower deployment cost with low-cost provisioning, and efficiency in blocking malicious flows is excellent Review collected by and hosted on G2.com.
There is a need to improve encrypted traffic performance and detect more sophisticated threats with a complete line of firewall solutions, which will help in having a more secure environment. Review collected by and hosted on G2.com.

It is a web-based firewall where we can access remotely by accessing and configure the requests with malware defense and URL filtering. Review collected by and hosted on G2.com.
Management flatform performance can be improvised with more user-friendliness and overall stability. Review collected by and hosted on G2.com.

we can eaisly manage the devices which are at different location and across different different platforms Review collected by and hosted on G2.com.
It's bit costly for small organizations to license, maintain and support it Review collected by and hosted on G2.com.
Once you set it up, there aren't a ton of annoying pop ups or udpates required by staff. It works seamlessly and in the background. Review collected by and hosted on G2.com.
I did have to hire a third party IT expert to help set it up. Review collected by and hosted on G2.com.

The tool's threat intelligence, signatures, and configuration for detecting risks all seem to be acceptable. Which leads to quality and security of the application. Review collected by and hosted on G2.com.
As of the right moment, the tool has received only favorable comments, it can be better in terms of the speed and smooth flow Review collected by and hosted on G2.com.