Try our new research platform with insights from 80,000+ expert users

Cisco Secure Firewall EVENT - Zero-Trust Model

What is your evaluation of Secure Firewall in helping your organization implement a zero-trust security model? Please provide reasons based on your experience.

reviewer2718408 - PeerSpot reviewer
reviewer2718408
OT NETWORK MANAGER at a energy/utilities company with 10,001+ employees
Cisco Secure Firewall in helping my company implement a zero-trust security model. I've yet to try it, however, I'm very excited to work on it.
View full review »
DP
Dev Patel
Network Engineer at a government with 10,001+ employees
Regarding zero trust security model implementation, we are exploring options with SD-WAN, both on-premises and in the cloud with firepower. I'm meeting with a Cisco engineer next week to discuss implementation strategies.
View full review »
MR
Marc Roxas
Assistant Vice President at PLDT Enterprise
Implementing a zero-trust security model is what we need help with. We're making progress. We have different types of security for our native applications, but we're slowly looking into what Cisco can deliver.
View full review »
Philman Tjong - PeerSpot reviewer
Philman Tjong
Electrical Engineer Associate I at a energy/utilities company with 5,001-10,000 employees
Cisco Secure Firewall does a good job in helping our company implement a zero-trust security model, and it deserves an eight out of ten.
View full review »
Chris Yankajtis - PeerSpot reviewer
Chris Yankajtis
Systems Engineer at Métis Practice Solutions
In evaluating Cisco Secure Firewall, I find that it helps us implement a zero-trust security model by allowing us to create one policy and deploy it across all of our networks versus multiple agents.
View full review »
CK
Corey Keyonnie
It Administration at Dilcon Community School
Regarding the zero-trust security model, Cisco Secure Firewall helps our company. Our students and staff have the ability to do whatever they need to do with their research. It helps them while keeping security top of mind.
View full review »
Ben Kusa - PeerSpot reviewer
Ben Kusa
Director, Information Technology at a engineering company with 501-1,000 employees
Cisco Secure Firewall helps us along the path to implementing a zero-trust security model, but there are a lot of tools and different paths to cover, so it's just really one tool in the arsenal.
View full review »
reviewer2634264 - PeerSpot reviewer
reviewer2634264
Manager, Network & Security at a financial services firm with 10,001+ employees
However, whenever traffic comes into the network, it must pass through all the policies and match the required ones, which takes considerable time. This solution helps us streamline our processes, streamline our information security requirements, and streamline our audit requirements to achieve our goals.
View full review »
Nassif  Kaleny - PeerSpot reviewer
Nassif Kaleny
IT Manager at Bavaria Egypt S.A.E.
Regarding implementing a zero-trust security model, I did not pursue this option because zero-trust is new technology with significant human impact on business operations. I use multi-factor authentication instead, with devices such as YubiKey, which is a USB device for trusting device authentication with hardware, but I have not implemented zero-trust at this time.
View full review »
RB
Rajender Bhandari
Chief Technology Officer at Binary Global Limited
Cisco Secure Firewall helps with the Zero Trust Security Model. ZTNA is a concept that has to be implemented at every tier, including the firewall. You cannot implement zero trust without a firewall also supporting it. It is an important piece in building a zero trust architecture.
View full review »
RajeshKumar - PeerSpot reviewer
RajeshKumar
Network Consultant at a outsourcing company with 1,001-5,000 employees
In terms of implementing a zero-trust security model, Cisco Secure Firewall helps demonstrate use cases in our setup. For zero-trust, we have a secure firewall and SDA fabric or some network switches connected on the trust side. We have the Cisco ISE server here. From there, we securely onboard users in the network with the help of ISE. If some connected users try to access malicious sites or attempt to do something they are not supposed to do, we have configured a response in our setup.
View full review »