Top Rated Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) Alternatives
Inexpensive, ease to configure and manage, HA features are outstanding. Review collected by and hosted on G2.com.
I dislike very little with the ASA firewalls. Review collected by and hosted on G2.com.
90 out of 91 Total Reviews for Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv)
Overall Review Sentiment for Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv)
Log in to view review sentiment.

I am working as a Google workspace administrator and my client using cisco for the security. As my personal experience cisco is the very good security option for the technician field. Review collected by and hosted on G2.com.
Some time it's take few minutes for the connecting Review collected by and hosted on G2.com.

Simplified management which enables us to manage policies and rules from single console Review collected by and hosted on G2.com.
SNMP configuration is too complex. HA broke once when we performed the upgrade. Review collected by and hosted on G2.com.
Configuration is straightforward and user friendly. Particularly effective, for data centers and cloud environments. No issues or problems were encountered during usage. Review collected by and hosted on G2.com.
Integrating it with vendors products for IPS/URL filtering and monitoring is difficult. In virtualized or cloud environments scalability poses constraints requiring resources. Review collected by and hosted on G2.com.

"Cisco Secure Firewall Threat Defense Virtual (formerly NGFWv) provides comprehensive protection against advanced threats and malware, making it ideal for businesses with multiple branch locations or cloud-based applications. Its scalability and simplified management make it easier, while its seamless integration with other Cisco security solutions further enhances its capabilities." Review collected by and hosted on G2.com.
For smaller organizations, the cost of deploying and managing Cisco Secure Firewall Threat Defense Virtual can be high, as licensing, maintenance and support fees can quickly add up. With limited third-party integration, it also requires significant expertise to deploy and manage effectively. Review collected by and hosted on G2.com.
Love the fact how quickly and robust the system is at ensuring that your equipment does not get affected. Review collected by and hosted on G2.com.
Would like to see more about what is getting blocked to understand where attacks may be coming from. Review collected by and hosted on G2.com.

The best thing about Cisco firewall threat defense is the lower deployment cost with low-cost provisioning, and efficiency in blocking malicious flows is excellent Review collected by and hosted on G2.com.
There is a need to improve encrypted traffic performance and detect more sophisticated threats with a complete line of firewall solutions, which will help in having a more secure environment. Review collected by and hosted on G2.com.

It is a web-based firewall where we can access remotely by accessing and configure the requests with malware defense and URL filtering. Review collected by and hosted on G2.com.
Management flatform performance can be improvised with more user-friendliness and overall stability. Review collected by and hosted on G2.com.

we can eaisly manage the devices which are at different location and across different different platforms Review collected by and hosted on G2.com.
It's bit costly for small organizations to license, maintain and support it Review collected by and hosted on G2.com.
Once you set it up, there aren't a ton of annoying pop ups or udpates required by staff. It works seamlessly and in the background. Review collected by and hosted on G2.com.
I did have to hire a third party IT expert to help set it up. Review collected by and hosted on G2.com.

The tool's threat intelligence, signatures, and configuration for detecting risks all seem to be acceptable. Which leads to quality and security of the application. Review collected by and hosted on G2.com.
As of the right moment, the tool has received only favorable comments, it can be better in terms of the speed and smooth flow Review collected by and hosted on G2.com.