We are a Cisco implementor in Venezuela.
Our primary use is to deal with incoming access. We open ports for web servers or special applications that our clients have inside their network. We also use it to provide site-to-site VPN access.
We are a Cisco implementor in Venezuela.
Our primary use is to deal with incoming access. We open ports for web servers or special applications that our clients have inside their network. We also use it to provide site-to-site VPN access.
The most valuable feature is the ability to block almost all of the ports.
All of the commands work the same way, whether in the graphical interface or when using the command line.
Cisco products have a lot of features.
The graphical interface should be improved to make the configuration easier, to do things with a single click.
There should be better integration with open-source products because some of our clients use them. It would be helpful if they integrated well.
I have been using the Cisco ASA Firewall for almost 10 years.
This is a very stable product.
The scalability is good and it can be used for organizations of all sizes.
Technical support is good and we haven't had any problems with documentation that is provided.
I also have experience with pfSense.
The initial setup is easy.
We have evaluated various open-source solutions for our clients.
The main difference with Cisco is that it is a big company, and their products are very easy to use. They have the best routers, switches, and firewalls.
Cisco ASA is a product that I can recommend for its stability.
I would rate this solution a nine out of ten.
I protect my two servers with the help of Firepower. Both servers are connected to the Firepower and I monitor the traffic to both servers with it. I block traffic from all countries except the USA, for security purposes.
It meets my requirements regarding VPN, perimeter protection, and applications. I'm comfortable with what Firepower does for me. Firepower is the only security product deployed in my organization.
The Talos team is very expert and does a good job. It is a great achievement by Cisco for Firepower. It analyzes all the websites and viruses that could create vulnerabilities. Talos helps us by providing major protection. They maintain everything and we don't need any other security appliances. In the future, we may go for an email security appliance, but right now Firepower is enough for us. Without the Talos team, the Firepower might not fulfill our requirements.
For example, if I receive an email and it has a potentially malicious link, I can enter the link in the Talos website and it will provide me with all the details about the website link in the email, including which country and IP it is from. I always try to cross-check any potentially malicious links with Talos. It tells me whether I am vulnerable or not.
One of the most valuable features is the AMP. It's very good and very reliable when it comes to malicious activities, websites, and viruses.
It also handles application vulnerabilities. I have blocked some applications in my Firepower. In addition, there are predefined policies that come with the Firepower and I have created my own policies as well.
We also use Cisco switches, the 2920 for Layer 2 and the 3560 for Layer 3. The Firepower is integrated with the 3560. I have configured a gateway on the 3560 and all our traffic goes through the switch and is then passed on to the Firepower. The integration between the two was very easy.
One feature I would like to see, that Firepower doesn't have, is email security. Perhaps in the future, Cisco will integrate Cisco Umbrella with Firepower. I don't see why we should have to pay for two separate products when both could be integrated in one box.
I have been using Cisco Firepower for two years.
It's a very mature product and runs smoothly.
Before the Firepower I was using a traditional firewall, the ASA 5510. We went to the Firepower because the 5510 did not have port security, anti-malware protection, or IDS/IPS.
I have seen a lot of events using the Firepower: vulnerability events, countries, and IPs. As a result, I feel I am secure when compared with other firewalls. With my previous firewall, I didn't have the option of blocking a country, website, or IP.
I would advise using Firepower and not other products because other products do not have all the features available in Firepower.
We are looking to integrate with Cisco Umbrella next year and we will integrate our switches and Cisco Firepower with it.
It has been a good investment for my organization and I'm happy to be using it. All its features are good. It's a great firewall for a small business. But you really need to know what you are doing to get the most benefit from it. Overall, I don't think anybody can replace Firepower or Cisco.
We are a reseller and system integrator, and this is one of the solutions that we provide for our end users. We have experience with many firewall products from different vendors.
The specific use case depends on the customer and their environment. They design the firewalls, and we supply the appropriate equipment.
The majority of deployments are on private networks.
The most valuable feature of the Firepower solution is FireSIGHT, which can be easily managed and is user-friendly.
The performance and the level of throughput need to be improved. This would make things easier for us.
I would like to see the inclusion of more advanced antivirus features in the next release of this solution.
Adding internet accounting features would also be a good improvement.
This solution is completely stable, and we have not had any issues.
Scalability of this solution is ok. They have the IPS (Intrusion Prevention System), online updates, and signature updates.
One customer might have, for example, two hundred and fifty users, whereas another might have one hundred users. There are different models for different numbers of end-users.
Technical support is ok, and we have had no problem with them.
The initial setup of this solution is straightforward.
The price of this solution is not good or bad. It is ok.
This is a solution that I recommend.
The biggest lesson that I have learned from working with this solution is to always update the firewall. If you do not have the latest updates then it will not function well, so always keep it up to date.
I would rate this solution an eight out of ten.
Our primary use for the solution is for checking on and verifying the security of our customer data.
Our organization has been improved by the solution because we can be assured that the firewall is secure. It gives us more flexibility to monitor other things. Because we have safe firewalls, we don't have to worry about that and can direct resources elsewhere. If our internet goes down in one location we can bring it back up pretty easily.
The thing we've found most valuable is the efficiency. The firewalls are easy to configure and deploy. Overall it is an easy system to manage.
Another valuable feature is just how granular we can get with it so we can keep users seeing what they are supposed to and don't compromise security.
One way the product could be improved is if you could monitor more than one rule at a time. We only have the option to have one monitor window up at a time if you're trying to troubleshoot something you end up switching back-and-forth and don't get the bigger picture all at once.
It's reliable and it does its job. It gives you the freedom to do other things while you get indications of any issues. The multi-monitor would be a huge improvement.
I'd definitely recommend the product. Even when you set it up for the first night, it definitely will tell you the status of the network. The important part in the setup is following the instructions to get it going.
The solution itself is good as far as stability.
The technical support is good and the response time quick. We had some firewalls down and gave them a call. They helped resolve the issue and it was all positive.
Previous to this we had just a normal firewall that I didn't like. It didn't provide enough.
The setup was straightforward, even without initially having all the information we needed. It was very intuitive. When I went in to get help, help was there.
We got the product from a reseller and we did the installation ourselves.
We certainly have seen a return on investment at the very least from being able to reallocate human resources.
Before selecting this as a solution we really didn't evaluate other options at all.
As far as rating this product, I would give it a nine out of ten. The only real drawbacks are the lack of multi-monitoring and not really having clear instructions prior to jumping in and implementing it.
We are using both Cisco ASAv and FTD (Firepower Threat Defense). FTD has a better interface, but we have both of them running.
We are using Cisco ASAv for the FirePower service. We use a custom interface for our firewall.
Cisco ASAv is part of our central solution. You can use the ASA family or go on the portal for normal ASAv. We use FirePower at the edge of the network.
If you are working with cloud services, it's better to use the ASAv family or other Cisco solutions.
We are using the Cisco AnyConnect for our end-user VPN with the ASA.
If a user wants to connect to our network, they access it via the Cisco intranet and connect to the firewall at the edge.
I don't have any experience with the price, but ASA is a comprehensive solution.
In the next update of the Cisco ASAv, I would like to see them release a patch for ASAv, i.e. to put the FirePower solution into the cross-platform integration.
Normally, in ASA, we have good stability.
The scalability of ASAv we can easily manage. We can have good scalability in different times but we don't have HA in ASAv. Some features are removed in ASAv.
If it's a normal ASA, i.e. a physical device, you have many more ways to scalability.
For technical support, I have little experience with Cisco, unless they patch some issues. I raised a ticket and got the response immediately. They are very supportive.
For me, ASA is easy. The deployment of ASAv is done in 20 minutes.
We used both an integrator and reseller for the deployment. For the initialization, it was me for our company. If we have an issue, we can raise a ticket or call for a Cisco patch.
For the Cisco ASAv installation, I did it myself.
The pricing for Cisco ASAv depends on your license. With AnyConnect, it depends on your license. It depends on the number of concurrent users you want to connect.
Our license is for one year only, renewable at variable pricing.
On a scale from one to ten, I would rate this product at nine. Cisco ASAv is good in many advanced networking features.
I'm working with Cisco. They have competition with many vendors.
We need a good and generic firewall which is why I bought Cisco ASAv. I also needed a secure VPN. The real reason I bought it though, was for the firewall.
The firewall power that comes with Cisco ASAv is the most valuable asset. They are very easy to manage and configure.
There definitely is room for improvement. We found it difficult to publish an antenna plug with the ASDM. Cisco should make the interface for the firewall more simple.
This product is very stable. Before installing Cisco ASAv, I had two or three viruses in my network. Since installing ASA, I have not had any problems with viruses. There is a huge difference with and without ASA.
I am satisfied with the customer service because the assistance I got from the Cisco engineer was very good.
I used a different solution before. I used Meraki and it was a little simpler to use. However, currently, I only have Cisco routers.
The initial setup for Cisco ASAv was fairly simple. It wasn't very complicated, it would be okay for an intermediate professional. It can be made easier. I believe almost anybody could set up an ASA in a few hours. It took about two to three weeks for the platform to work properly.
The installation wasn't complicated at all and I got help from a Cisco engineer.
I bought a license for three years and it was really affordable.
I did consider other options as I have experience with Meraki and other devices. Meraki is simpler to use, but I decided on Cisco ASAv.
I am really satisfied with the product and I rate this an 8.5 out of ten. The reason why I wouldn't rate it a ten, is because I find it a little more complicated to set up a firewall for publishing than when using Meraki. I therefore believe there is room for improvement.
Our primary use case is for handling office traffic VPN tunnels and filtering the traffic. All the traffic comes into the house and gets filtered in and out the Firepower interface. It's performed well.
Because of the deeper inspection it provides we have better security and sections that allow users broader access.
With this solution, you can have an inspection of each package and see what the threat level it's at. It has made the work more dynamic. We don't have to block as much like we had to in the old days.
They should develop a web interface that is actually useful. Currently, we still have an issue where you have to go in and do manual configuring by the command line if you want certain functions in it. This means that we need to find people at a higher technical level to be able to do changes in those things. It would be much easier if you had a more friendly user interface basis where you don't have to go in and do the command line off.
They should be a little bit faster sometimes in updating their threat protection. Cisco should redo their website so it's actually usable in a faster way.
Stability is fantastic.
We are a rather small firm so we don't have much growth leads but there is a wide range of firewalls that I can expand onto. We can also set up cluster solutions. It's rather indefinite in its expandable possibilities.
I've only had to use their technical support once. Otherwise, I haven't had to use them.
We were using SonicWall before.
The initial setup is very complex but once it's done, it's fantastic.
I would rate it a nine out of ten. Not a ten because of the horrible initial setup and because you can't handle all operations from one interface. You have to go back into the command line to even be able to type program language, even though you have a graphic user interface for it but it doesn't work properly.
We are currently using version 6.3. Our primary use case of this solution is to put Firepower inside of the data center and at the Edge network.
This solution has improved my organization. I'm a solution provider and so I deploy in many different companies that are my customers right now. Before Firepower, we had some problems with the architecture of the firewall. Firepower can support two types of intelligence identity: it can support the application visibility and control, and it has a great deep inspection in the packet. Before this solution, we had some problems with malware detection. Right now, we can easily detect and filter all the applications. Before this solution, we never had any file trajectory, but right now we do, according to the file trajectory of Firepower that we have after attack solutions.
We never had any solution or any workaround for after an attack. We never had any clue what the source of an attack was or how the attack could affect the company. Right now, because of the file trajectory and the great monitoring that FMC does, we know what's happened so we can analyze it after an attack.
The architecture of FTD is great because it has an in-depth coverage and because it uses the AVC, (Application, Visibility, and Control) and also rate limits. Also, the architecture of fast paths is great.
I would like to see real-time log systems because it's very helpful when you want to troubleshoot.
Stability really depends on the software that you use. If you use the suggested software that Cisco suggests, you will see a highly robust and highly stable system. A crash or block will never happen to you. It really depends on the version that you are using. Definitely check the release notes before installation.
I've worked with the 2000 series, the 4000, and the 9000. The 9000 series is really impressive because it's absolutely scalable for large deployments.
I haven't had to contact their technical support.
We previously used ASA, which is a regular firewall. We switched to Firepower because it has a lot of features. It is one of the best firewalls in the world so we shifted to Firepower.
The time it takes to implement depends on the policy of the customer. Practically speaking, it takes around three to four hours to deploy, but it can depend because the Firepower solutions have two parts. One part is the hardware, it is an actual firewall and actual device but the monitoring system and the control system is a software called FMC. Most of the customers deploy it over VMware. The time of deployment really depends on your resources, but on average will take three to four hours.
At least two to three people with professional knowledge, around three years of experience, are needed for the deployment and maintenance, not only for Firepower but in every security solution. The device is doing something, but the most important part is analyzing it. The device can give you logs, but the engineer should analyze the log and do something.
Deployment without inspection can require only one person but if you want to analyze the IPS, at least two people will be needed.
Based on the services that you will get, especially the AMP license, the price is very reasonable. The license system is also good but it's not very impressive. It's a very regular licensing system. They call it a smart license which means that your device will connect to the internet. This is a little bit of a headache for some customers. It doesn't make the customer happy because most of the customers prefer not to connect their firewall or system to the internet.
I would advise someone considering this solution to just read the release notes before doing anything. You should know what the exact architecture is and what the exact details of the software are before trying to deploy it.
I would rate this solution a ten.