I use the solution mostly to separate internal networks.
Cisco Secure Firewall Threat Defense Virtual - PAYG
Cisco Systems, Inc.External reviews
External reviews are not included in the AWS star rating for the product.
The monitoring dashboard lets us see if the packets get from the source to the destination correctly
What is our primary use case?
How has it helped my organization?
Being able to create and apply new policies to the firewall has been helpful. It is an object-oriented way of doing things that helps a lot because we can build and apply new policies. We can also test it and revert to the old one if it doesn't work.
What is most valuable?
The monitoring dashboard is valuable to us for troubleshooting. It lets us see if the packets get from the source to the destination correctly.
What needs improvement?
With the new FTD, there is a little bit of a learning curve. The learning curve could probably be simplified a little bit. I've come around that learning curve, and I'm able to get around it.
For how long have I used the solution?
I have been using the solution for 15 years.
What do I think about the stability of the solution?
Cisco is known for its general stability.
What do I think about the scalability of the solution?
The solution’s scalability is excellent. I don't know if the scalability has a downside or even a limit.
How are customer service and support?
The support is really good. I have a good team that supports us, and I'm able to always reach out to them. It's nice to have somebody on the cell phone and just be able to reach out to them.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Years ago, I used different firewalls like Juniper, but mostly, it's been fixed to ASA and FTD. We switched to Cisco because our customers were using Cisco.
How was the initial setup?
The initial setup had a little bit of a learning curve, especially because I came from ASA. I needed some help from Cisco. However, I knew what I was doing once it was set up, especially with FMC and Firepower.
What about the implementation team?
We used Cisco’s support to deploy the product.
What was our ROI?
In general, we have seen an ROI on the product. Using it, applying policies, setting it up, and leaving it alone is helpful. It helps save resources.
What other advice do I have?
I don't use the product for application visibility and control. I tend to worry more about blocking or allowing certain things versus looking deep into the servers and applications and how they work.
The product is great for securing our infrastructure from end to end. I'd like to be able to test out some of the other products, like dashboards and IPS/IDS, that work with it. For the most part, I set up a firewall, and I set up the rules. If things don't work, I monitor it through the monitoring dashboard and try to figure it out.
Cisco Secure Firewall has helped free up a lot of time for our IT staff. Apart from monitoring, unless somebody needs a firewall rule change or anything like that, there's no need to mess with it. Once we set it up, it just runs.
The solution has helped our organization to improve its cybersecurity resilience. Being a firewall, by definition of the term, the product has improved our organization’s security.
People should always evaluate other products. If you’re looking for a solid firewall, Cisco makes the choice so much simpler, especially now with FMC. We are able to apply policies easily and control different firewalls at the same time.
Overall, I rate the solution a nine out of ten.
Enhances cybersecurity posture, offers a single unified interface, and zone segmentation
What is our primary use case?
We use Cisco Secure Firewalls to secure our business.
How has it helped my organization?
Cisco Secure Firewall is a Layer 7 next-generation firewall, providing us with a significant amount of visibility into our traffic patterns and the traffic passing through the firewall. It informs us about the zones that facilitate a smooth data flow, where the data is being directed, and covers ingress and egress all the way up to layer seven. Therefore, I believe the visibility it offers is excellent.
Cisco Secure Firewall is effective in securing our infrastructure from end to end, enabling us to detect and remediate threats. However, the way we currently utilize it may not be the most optimal approach to fully leverage its end-to-end capabilities. Nonetheless, considering its purpose within our usage, it effectively fulfills its intended role.
The ability of Cisco Secure Firewall to enhance our organization's cybersecurity posture and resilience is commendable. Cisco Secure Firewall serves as our primary line of defense, deployed at the Internet edge of every site across the globe.
What is most valuable?
The most valuable feature is zone segmentation, which we utilize through the Firepower management console. This allows for centralized management, which proves highly useful. In the past, when using Cisco Firewalls, we had to manage them independently. However, now we have a single unified interface to manage all our Cisco Firewalls worldwide.
What needs improvement?
The Cisco Firewall UI could be improved. While having a centralized management console is a significant improvement, I believe there are several enhancements that could be made to the UI to enhance its user-friendliness and improve the overall flow. This is particularly important during troubleshooting, as we want to avoid wasting time navigating through different sections and excessive clicking. It would be beneficial to have everything readily accessible and a smoother flow to quickly reach the desired locations.
I believe Cisco needs to make the appliance more automated in order to provide us with additional time. This would eliminate the need for us to manually go through the firewall, search, find, and troubleshoot everything. It would be beneficial if the appliance had some form of AI integrated to generate such information, enabling us to quickly identify the problem. If necessary, we could then delve deeper into the issue.
For how long have I used the solution?
I have been using Cisco Secure Firewall for 19 years.
What do I think about the stability of the solution?
Cisco Secure Firewall is stable.
What do I think about the scalability of the solution?
The scalability of Cisco Secure Firewall depends on the different models available, as each model may have a fixed scalability level. Therefore, the scalability we obtain will vary depending on the specific model we utilize.
How are customer service and support?
The quality of technical support varies. We occasionally receive excellent technicians, while other times we do not. Consequently, I believe it is preferable to rely more on the competent ones rather than the subpar ones.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
We had previously used Check Point but decided to switch to Cisco Secure Firewall. The reason for this switch was the lower cost and our company's desire to remove Check Point from our environment. It was an excellent deal, and the technology was on par. We did not lose any functionality or experience any drawbacks by choosing Cisco over Check Point. In fact, I believe we gained additional features, and Cisco is more widely adopted and supported compared to Check Point. Therefore, I am confident that we made the right decision.
How was the initial setup?
The initial setup was complex. Firstly, we were migrating from a completely different platform and vendor to Cisco. Therefore, the ruleset migration was not only complex but also tedious because there was no suitable migration tool available for transitioning from Check Point to Cisco Firepower. The second part involved a complete change in our design, as we opted for a more zone-based approach where our checkpoints are more streamlined. This complexity was a result of our own decision-making.
What about the implementation team?
We utilized our partner, ConvergeOne, for the integration, and they were exceptional. They demonstrated sharp skills, and together we successfully completed the job. The entire process took us a year during which we managed to cover every site within our company.
What was our ROI?
We have witnessed a return on investment through the capabilities of Cisco Secure Firewall itself, along with its numerous threat defense technologies. As a result, we do not need to purchase additional tools to enhance the firewall; everything is already integrated. Therefore, I believe this was a significant victory for us.
What's my experience with pricing, setup cost, and licensing?
The pricing structure for Cisco Secure Firewall can be challenging to manage. It involves separate line items that need to be carefully tracked, such as SmartNet, FCD licenses, and other license features. This complexity adds to the difficulty of dealing with the pricing.
What other advice do I have?
I rate Cisco Secure Firewall an eight out of ten.
Cisco Secure Firewall has not helped consolidate any of our applications or tools.
We use Cisco Talos to pull the signatures for everything we download. However, we don't rely on Cisco Talos for our day-to-day operations.
Cisco Secure Firewall is a commendable product and holds a leadership position in the industry. While there are other competitors available, it is certainly worth considering, particularly for organizations that already utilize Cisco switching, routing, and related infrastructure. Cisco Secure Firewall can seamlessly integrate into the existing ecosystem, making it an appealing option to explore.
Having in-house expertise in Cisco and its products is indeed valuable when making a decision to go with Cisco Secure Firewall. The fact that our team already had a lot of expertise and experience with Cisco products played a significant role in the decision-making process.
Which deployment model are you using for this solution?
A ubiquitous and easy-to-deploy product with a good support team
What is our primary use case?
I'm a design consultant. We primarily use the product to secure various client networks, major infrastructure, highways, and urban surveillance.
What is most valuable?
The solution is pretty easy to deploy. It is pretty ubiquitous too, so it is easy to get. It pretty much does the job we need it to do.
What needs improvement?
I would like to see an IE version of the solution where it is ruggedized. Most of what we do is infrastructure based on highways. Now that the product has a hardened switch, the only thing left in our hubs that isn't hardened is probably the firewall. It would be nice to pull the air conditioners out of the hubs.
For how long have I used the solution?
I have been using the solution for 20 years.
What do I think about the stability of the solution?
I've never had a stability problem with firewalls.
What do I think about the scalability of the solution?
The solution seems to be very scalable. I probably don't have much experience with scalability because, by the nature of how our networks work, we don't scale them; we just add another one.
How are customer service and support?
Support is very good. I've never had a problem with any form of support.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I used only a couple of other products over the years due to client preference. In general, Cisco Secure Firewall is easier to deploy mostly because of the depth of personnel trained in it. Every other product seems to be a niche thing that two people know, but Cisco once again seems ubiquitous throughout the industry. Our customers choose Cisco for various reasons, from cost to a preference for Cisco. It meets the task that they need to meet. It's really the spectrum.
How was the initial setup?
The deployment is pretty straightforward. It's the same as deploying any other Cisco equipment. If you know what you're doing, it's not a huge deal.
What was our ROI?
I believe our clients have seen an ROI. Their networks are more secure. Various agencies have tested a few of them to prove it, and they've proven okay. Since they weren't attacked, they have received an ROI.
What's my experience with pricing, setup cost, and licensing?
The licensing is not so bad. The solution’s pricing could be lower. It's not horrible, though.
What other advice do I have?
The application visibility and control are pretty good. It seems to do everything we've ever needed it to do. I've never asked the product to do something that it couldn't do. The solution has been pretty successful at securing our infrastructure from end to end. Most of our client’s staff have reported that the product is not as maintenance intensive as they would like. They never had to deal with maintenance before, but now they do. We deploy new systems for our clients.
I haven't had much experience with Cisco Talos directly. I know it's there, but I haven't really been involved. I haven't experienced it, which I believe is a good thing. It's doing its job if I don't have to get involved with it. The product has definitely helped improve our organization’s cybersecurity resilience. We weren't secure at all before, and we are a known target since we’re based in infrastructure. The solution has been very helpful in providing security.
It is a good product. I would definitely look into it. There is great value in going to a partner to a reseller to deploy the product. They understand the equipment and have expertise. Normally, they're local, so local knowledge is always useful. They have done deployments before, so sometimes they know tips or tricks that aren't in the manuals.
People evaluating the solution should give it a look. Definitely, it is worth taking a look at it.
Overall, I rate the product a nine out of ten.
Is reliable, enhances cybersecurity resilience, and provides visibility into our network
What is our primary use case?
We use Cisco Secure Firewall for remote VPN.
How has it helped my organization?
Cisco Secure Firewall played a crucial role in enabling all our users to establish remote connections from their homes.
Cisco Secure Firewalls' application visibility and control are beneficial because they provide a management console that allows us to view logging and sessions.
It enhances our organization's cybersecurity resilience by enabling us to deploy multiple instances of it both in Azure and on-premises. This redundancy ensures that in the event of an outage or any other issues, we can seamlessly switch to alternative locations.
What is most valuable?
Cisco Secure Firewall is reliable, which is why we opted for it during the pandemic for our remote users.
What needs improvement?
The cloud does not precisely mimic what is on-premises. There are some new challenges with the features in Azure. Due to Azure limitations, we cannot synchronize configurations between an active standby. This aspect makes it difficult to perform such tasks in the cloud, requiring manual intervention.
For how long have I used the solution?
I have been using Cisco Secure Firewall ASA for ten years.
What do I think about the stability of the solution?
In my current role, I have not encountered any stability issues.
What do I think about the scalability of the solution?
Cisco Secure Firewall is scalable.
How are customer service and support?
Cisco's technical support is excellent, and its personnel are knowledgeable. I consistently receive prompt and satisfactory responses from them. However, there are occasions when we need to reach out to them for feedback follow-up.
How would you rate customer service and support?
Positive
How was the initial setup?
We encountered some issues with the deployment because we run on Azure now.
What's my experience with pricing, setup cost, and licensing?
Although I am not directly involved in dealing with the pricing aspect of the Cisco Secure Firewall, I know that the licensing has improved over the years.
What other advice do I have?
I rate Cisco Secure Firewall a nine out of ten.
The Cisco Secure Firewall is not a remediation tool but rather designed for secure remote sessions.
We use the same ASAs for firewall functionality as we do for VPN functionality.
Our organization is currently considering Palo Alto as an alternative to Cisco. However, I am not involved in the decision-making process.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Fantastic reliability, easy to understand, and works very well for policy-based VPN
What is our primary use case?
We mainly use it for policy-based VPNs to IPSec one of the businesses. We also use it as a firewall solution for remote VPN users. We have vendors who have access to our VPN solution, and they get a dedicated network.
How has it helped my organization?
We can automate the VPN. The build process and how we've standardized it makes it very easy for us to focus on other tasks. We know that an end user can push a button, and the VPN will get built. They only bring us in for troubleshooting or higher-level issues with the other vendor. Because of that program, the ability to use Cisco ASA every time, in the same way, makes our job easy.
Once we started standardizing and using the same solution, we've been able to correlate that so we know what we are doing. We can train even less experienced and newer guys to do the tasks that in turn frees up the higher-level engineers. It has cut out the VPN work for higher-level engineers. They may have been spending ten hours a week previously, and now they may spend ten hours in the quarter.
It has improved our cybersecurity resilience. It has allowed us to see some differences with partners using weaker ciphers, which allows us to validate what we're using and reevaluate it. We put exceptions in cases where we have to. The security risk team is as well aware of those, and they can essentially go back on a buy-in or see if the vendor has upgraded to plug in a security hole. It has given us that visibility to see where we are weak with our vendors.
What is most valuable?
Being able to use it as a policy-based VPN is valuable. It's very easy to understand.
It's very easy to troubleshoot. It may be because I'm comfortable with it or because I've used it for so long, but it's easy to use for me. I don't have any problems with how to set it up or use it.
What needs improvement?
For what we use it for, it ends up being the perfect product for us, but it would help if they could expand it into some of the other areas and other use cases working with speeding up and the reliability of the pushes from the policy manager.
For how long have I used the solution?
We've been using Cisco ASA at least for the last six years. That's how long I've been in this organization, but my organization has been using it longer.
What do I think about the stability of the solution?
We don't open bugs for it. It just works for what we've used it for. The last time we opened up an ASA bug would have probably been three years ago. From a reliability standpoint of what we're using it for, it's fantastic.
What do I think about the scalability of the solution?
We've had no problems with scaling our business. We went from using probably 200 active VPNs an hour to over 600 VPNs without blinking an eye at that.
How are customer service and support?
I enjoy Cisco's tech support. Just like any tech support out there, you could get a great or fantastic engineer, or you may get somebody who has just learned, so you just have to work with it. However, working with Cisco TAC, you find less of that than you do with other companies.
Just to give them a shout-out, whenever we hit the Australian TAC, they're absolutely fantastic. Sometimes I feel that we should wait our hours when we open a ticket just so that we get one of them. They know their stuff. They absolutely do, so whoever they're hiring there, they got to keep that up and spread that out. I'd rate them a nine out of ten.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
I've worked with Check Point's firewall, and I've worked with Palo Alto's firewall. Things like packet capturing and packet tracing that I can manipulate to pretend I'm doing traffic through the firewall are a lot easier to do with ASAs than with other products.
We have other firewalls in our environment. We still use Palo Alto. We do have a little bit of a mix with Palo Alto in our environment, but in terms of VPN specifically, the way that Palo Alto does route-based VPN by default doesn't flow well with most people out there. It works great with cloud providers. Cisco can do route-based VPNs too. We have a route-based VPN solution with Cisco as well. We just use an ISR for that instead of a firewall.
How was the initial setup?
I've been part of the deployment. Specifically, how NATTING and the firewalls work, that part is not difficult at all, but there are some challenges when you take any product and manipulate the order of operations, but that's not a Cisco challenge. You're pairing different information. There are some tools that usually try to help with those conversions, but most of the time, I find it just easier to develop what you need and just build it from scratch.
What about the implementation team?
We implemented it on our own.
What was our ROI?
We've seen an ROI in terms of our high-level engineers having to work less on the product. I've been able to provide it to the NOC because of the use of the solution. They see value in that.
What's my experience with pricing, setup cost, and licensing?
Pricing is more for my leadership, but I give them the quotes, and if they approve, they're happy. They've never wavered, so I wouldn't say it's out of the realm where they're considering another product. It must be in the direct price range for our leadership to not blink an eye when we give it to them.
What other advice do I have?
To those evaluating this solution, I'd say that it's a solid product. It works. It does what we need. It gives us peace of mind to sleep at night. I'd definitely put it up there with some of the other firewalls to consider.
I'd rate Cisco ASA a nine out of ten.
Which deployment model are you using for this solution?
Great visibility and control, improved IPS, and easy to troubleshoot
What is our primary use case?
We are a Cisco partner and we are currently using Cisco Firepower for our internet edge, intrusion prevention systems, and filtering.
We use virtual appliances in the cloud and hardware appliances on-premises.
How has it helped my organization?
Cisco Secure Firewall has improved usability in our environment.
The application visibility and control are great. Cisco Secure Firewall provides us with visibility into the users and the applications that are being used.
We are capable of securing our infrastructure from end to end, enabling us to detect and address threats. We have excellent visibility into the traffic flows, including those within the DMZs.
Cisco Secure Firewall has helped save our IT staff a couple of hours per month of their time because it is much easier to use the GUI instead of attempting to manage things through the CLI, which we have to access from the CRM.
We have several clients who had larger security stacks that they were able to consolidate because they were using separate products for IPS or URL filtering. With Firepower, we were able to consolidate all of those into a single solution.
The ability of Cisco Secure Firewalls to consolidate tools or applications has had a significant impact on our security infrastructure by enabling us to eliminate all the additional tools and utilize a single product.
Cisco Talos helps us keep on top of our security operations.
Cisco Secure Firewall has helped our organization enhance its cybersecurity resilience. We can generate periodic reports that are shared with the security teams to keep them informed.
What is most valuable?
The ASA has seen significant improvement due to the IPS.
The ability to troubleshoot more easily through the gate is valuable.
What needs improvement?
The integration with all the necessary products needs improvement. Managing various product integrations, such as Umbrella, is challenging.
For how long have I used the solution?
I have been using Cisco Secure Firewall for four years. My organization has been using Cisco Secure Firewall for a much longer period of time.
What do I think about the stability of the solution?
We experienced stability issues when transitioning to version 7.2, particularly related to operating Snort from Snort Two to Snort Three. In some cases, the firewalls necessitated a reboot, but we ultimately reverted back to using Snort Two.
How are customer service and support?
The technical support is responsive. In most cases where I've opened a ticket, they have promptly worked on figuring out the actual problem and assisting me in resolving it.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We have had clients who switched to Cisco Secure Firewall from Check Point, Palo Alto, and WatchGuard due to the features and support that Cisco offers.
How was the initial setup?
The initial setup is straightforward. Since we were transitioning from ASA to Firepower, a significant portion of our work involved transferring the access control lists to the power values in the GUI. After that, we began adding additional features, such as IPS.
What's my experience with pricing, setup cost, and licensing?
The pricing and licensing structure of the firewall is fair and reasonable.
Which other solutions did I evaluate?
The closest competitor that matches Cisco Firepower is Palo Alto, and the feature sets are quite comparable for both of them. One issue I have noticed with Cisco's product is the SSL decryption when used by clients connecting from inside to outside the Internet.
Cisco lacks the ability to check CRLs or OCSP certificate status unless we manually upload them, which is impractical for a large number of items like emails. On the other hand, Palo Alto lacks the ability to inspect the traffic within the firewall tunnel, which is a useful feature to have.
What other advice do I have?
I rate Cisco Secure Firewall eight out of ten.
I recommend taking advantage of the trial by downloading virtual next-gen firewalls provided by OBA, deploying them in a virtual environment, and testing their performance to evaluate their effectiveness. This is a crucial step.
Which deployment model are you using for this solution?
Offers high availability infrastructure along with access to excellent customer support
What is our primary use case?
Our primary use cases lie mainly with high availability and the security features available doing Layer 3 routing that we would need on our internal network.
How has it helped my organization?
It has simplified the internal network, so we don't have to worry about one device failing and losing connectivity. High availability is always there.
What is most valuable?
Our top three features are the high-availability features, the VPN and the IPSec.
It has fantastic visibility. It's a 10 out of 10.
Cisco Secure Firewall is fantastic at securing our infrastructure from end to end so we can detect and remediate threats. We have already caught things that have tried to get in.
Cisco Secure Firewall has improved resilience by a huge margin. It has been a great help.
Cisco Secure Firewall has freed staff because we don't have IT staff worrying about a lot of the threats. We trust the device that we are going to catch the threat. We are going to get a notification and be able to act upon that. Cisco Secure Firewall has saved at least 25 hours a week
The newer versions have made it so that we do not have to worry about other appliances with feature sets that are already built into the Cisco firewall.
The solution has had a huge effect, especially from physical density when it comes to securing our infrastructure. A lot of people don't think about power availability and cooling aspects. You have a limit to how much power you can push, and every little bit helps.
We chose Cisco because of its understanding, customer service, warranties, and the quality of the product
What needs improvement?
We would like to see dual power supplies for some Cisco Firewall products. Having to get an ATS in the Data Center application because there's an A+B power feed on such a vital device with high availability may be something that I want to put in there.
For how long have I used the solution?
We have been using Cisco Firewall for the last 20 years.
What do I think about the stability of the solution?
The solution is very stable.
What do I think about the scalability of the solution?
The solution is scalable because Cisco keeps up with new technology, the security application, bandwidth, optics, and the kind of speed that one can use.
How are customer service and support?
Customer support has been very responsive, whether it is a hardware failure or calling for any kind of technical support.
How would you rate customer service and support?
Positive
What was our ROI?
We have seen a return on investment in the total cost of ownership.
What's my experience with pricing, setup cost, and licensing?
The pricing is fair compared to competitors. Cisco is the Cadillac in its field. You get what you pay for.
What other advice do I have?
Cisco is amazing at upgrading, so even if we did have to upgrade a device, it is plug-and-play because of that availability option.
Cisco is doing a great job with all the improvements that are coming; they are allowing for GUI setups where many people aren't so used to CLI. Many of the younger grads coming into our field are more used to APIs and automation, so having that GUI feel is a lot better than CLI.
I rate the solution a ten out of ten.
An easy to configure solution that can act as a VPN concentrator
What is our primary use case?
We mostly use Cisco Secure Firewall as a VPN concentrator and for its firewall features.
How has it helped my organization?
Using Cisco Secure Firewall has helped grow our familiarity with people that know Cisco.
What is most valuable?
The most valuable feature of Cisco Secure Firewall is its ease of configuration and that it's scalable for firewalls and VPNs.
What needs improvement?
Changes you make in the GUI sometimes do not reflect in the command line and vice versa.
For how long have I used the solution?
We have been using the solution since its inception, so, for many years now.
What do I think about the stability of the solution?
We did not have any stability issues with Cisco Secure Firewall.
What do I think about the scalability of the solution?
We did not see any limitations with Cisco Secure Firewall’s scalability.
Which solution did I use previously and why did I switch?
We also use Aruba in our organization. We never have to factor in extra development time when we go to a new major version of Cisco. With Aruba, we have a pretty drawn-out development timeline for any upgrades or software improvements. Aruba and Cisco Secure Firewall are very different in their implementation and development.
How was the initial setup?
The initial setup of the Cisco Secure Firewall is very straightforward. The average time it took to deploy the solution was very short. Deploying the VM and automating our configurations took a couple of minutes.
What's my experience with pricing, setup cost, and licensing?
Cisco smart licensing is a hassle for a disconnected environment. However, I haven't licensed anything in a while. There have been many changes, making it easier to license disconnected devices connected to the internet.
What other advice do I have?
ASAv uses the solution as a VPN concentrator and a firewall because it could be used for both. It can be used for landing AnyConnect clients on ASAv and as a firewall.
What sets Cisco Firewall apart from other products is that when we do an update, we know we're not going to break a lot of things, and there are not a lot of bugs. The integration on the Cisco side is pretty good.
Most of our team is familiar with Cisco, and everyone knows what to expect when they log in. So it's easy in that way.
I like the application visibility and control with Cisco Secure Firewall. My only complaint is that the changes made in the GUI sometimes do not reflect in the command line.
I haven't had any problems with Cisco Secure Firewall. It's very straightforward and reliable. Also, it's trustworthy because it has the Cisco name.
Cisco Secure Firewall has helped free up our IT staff for other projects. The product is quite heavy into automation. So with it being Cisco, it is very scalable in generating configs. The solution saves a week or two for implementation and integration.
Cisco Secure Firewall has helped our organization improve its cybersecurity resilience through the reliability aspect.
You know what you're getting when you use an ASAv from Cisco. Cisco Secure Firewall is a great product in terms of reliability and scalability.
Overall, I rate Cisco Secure Firewall ten out of ten.
Which deployment model are you using for this solution?
Secures our infrastructure from end to end
What is our primary use case?
We have some in our DMZ. We have some located in several locations throughout our state. Then we have our local Egress and VPN firewalls that we use.
What is most valuable?
The VPN is our most widely used feature for Cisco Secure Firewall. Since we were forced into a hybrid working situation by COVID a few years back, VPN is the widely used feature because everybody is working remotely for our agency. So it came in very handy.
What needs improvement?
Cisco Secure Firewall’s customer support could be improved.
For how long have I used the solution?
I have been using Cisco Secure Firewall for 20 years.
What do I think about the stability of the solution?
Cisco Secure Firewall is a very stable solution.
What do I think about the scalability of the solution?
We bought scalable products, and we're in a good position.
How are customer service and support?
With Cisco Secure Firewall's technical support, it's always hard to get somebody that knows what they're doing on the line. However, when you finally get somebody on the line, it's pretty good. Having to deal with the licensing and be able to open a TAT case based on the serial numbers was very difficult. The individuals we get support from are pretty good, but the solution's support is two out of ten because of the process of having to get to that point to get support.
How would you rate customer service and support?
Negative
Which solution did I use previously and why did I switch?
I have previously used Juniper. Our company decided to go with Cisco Secure Firewall because of the cost and ease of use. Also, the people in our team knew Cisco versus other solutions.
How was the initial setup?
Cisco Secure Firewall's initial setup was pretty straightforward. They have a wizard, which helped in some instances, but there's also a lot of documentation online that helps a lot.
What about the implementation team?
We have a reseller that we go through, and they helped implement Cisco Secure Firewall for us.
What other advice do I have?
The application visibility and control with Cisco Secure Firewall is pretty great. We have the FTD, the firewall threat defense, and FMC, the management console we use, and we have great visibility using that product.
Cisco Secure Firewall's ability to secure our infrastructure from end to end is really good. We always find things and or block things before they even happen. So it's great, especially with Talos.
Cisco Secure Firewall has helped free up our IT staff for other projects to a certain degree. We still have to review logs in the firewall, and hopefully, someday, we'll have AI to help do that for us too. The solution has probably saved our organization about ten hours a week.
We use Talos, among other threat advice tools, and it's very good. Talos automatically updates us on the threats out there, and we can deploy those to our devices if we deem it fit to deploy them.
Cisco Secure Firewall has helped our organization improve its cybersecurity resilience. We've used Cisco for so long, and we've never had a data breach up to this point.
Overall, I rate Cisco Secure Firewall ten out of ten.
Does what we need to do and when we need to do it
What is our primary use case?
We use Cisco Secure Firewall for traditional firewall use cases, like VPN, segmenting of traffic, and creating PPSs.
How has it helped my organization?
We need reliable communication to do what we do, and that's very important. The solution does what we need to do and when we need to do it. It has a great reputation for the support that we need because if things don't work within the Department of Defense, people don't survive. Communication and keeping the adversary out are key components of our work. So we need a robust, reliable, and secure product, and that's what Cisco provides us.
What is most valuable?
Cisco Secure Firewall is robust and reliable.
What needs improvement?
The process of procuring modern-day technology within the DOD needs to improve.
For how long have I used the solution?
I've spent quite a few years with Cisco Secure Firewall.
What do I think about the stability of the solution?
Cisco Secure Firewall is a very stable solution.
What do I think about the scalability of the solution?
Cisco Secure Firewall is a very scalable solution.
How are customer service and support?
Cisco Secure Firewall's technical support is great, reliable, and responsive.
How would you rate customer service and support?
Positive
What was our ROI?
We have seen a return on investment from using Cisco Secure Firewall. From the DOD's perspective, we need a reliable and robust solution that has to be reliable in real-time. Cisco Secure Firewall is a reliable solution that works when needed.
What other advice do I have?
Cisco Secure Firewall is a great scalable, secure, and robust product.
There is a dedicated team designed to handle firewalls.
I have a good impression of Cisco Talos and its effects on our security operations. They have a great reputation for doing a lot of great things.
Cisco Secure Firewall has helped our organization improve its cybersecurity resilience.
Overall, I rate Cisco Secure Firewall nine out of ten.