Cisco Catalyst SD-WAN is a software-defined wide area network solution designed to simplify and optimize enterprise network connectivity in complex digital landscapes. It enables organizations to connect any user to any application, whether on-premises, in data centers, or across multiple clouds, with integrated capabilities for multicloud support, security, predictive automation, and enhanced network visibility—all built on a Secure Access Service Edge (SASE)-enabled…
N/A
Cisco Secure Firewall
Score 8.5 out of 10
N/A
Cisco Secure Firewall delivers comprehensive threat protection for modern, distributed networks. Built to support hybrid workforces and multicloud environments, it enables Zero Trust access, application visibility, and secure remote connectivity. With integration across the Cisco Secure portfolio, including SecureX and Talos threat intelligence, the firewall powers organizations to detect and stop more sophisticated threats. Centralized management simplifies policy enforcement, orchestration,…
The best case, what I recommend to others and to clients to use is Cisco Catalyst SD-WAN one for is the case when you have a huge number of branches or small offices or remote offices, you name it. Even home offices, you have a large number and you want this whole infrastructure to be extremely easy to set up and also to have everything almost the same, not to have deviations from the standard configuration. This is the sweet spot for introducing Cisco Catalyst SD-WAN.
Cisco Secure Firewall is essential for any organization that wants to secure its network and ensure that data packets are not lost during transmission. It helps structure and consistently deploy policies throughout the organization. However, the high licensing costs for the standby unit, which remains idle, may make this solution unsuitable for small, cost-sensitive organizations.
We are able to use a multiple different circuits to go into the cloud, so we are not relying on just one particular private wireless. We're relying on wine circuits, ethernet, ethernet out. So it provides us that flexibility where we didn't have that before. Provides security that is very robust and flexible and scalable and it provides us with, the biggest thing is redundancy, where we have backup. For example, we have a Starlink for nuclear power plants. If our main circuits go down, we have that. And without Cisco Catalyst SD-WAN it would be very hard to actually achieve, to accomplish true redundancy. So we're happy with Cisco Catalyst SD-WAN in that regard.
It's good at segregating networks and ensuring that you only give the access that you need to give. Especially with medical devices, you want to only give the access that they need and keep them in their own separate areas so that they can't just communicate with the rest of the network. It's also good at the border for keeping attackers out of the network.
I will say the way we use it now, and I think what happened was the way it was deployed, it was fine, but unfortunately over the course of the years we've gotten a little out of hand with our device templates and feature templates. I think if there's any form of feedback that I would give to Cisco is how do we find ways to improve the environment as it stands so we get to a certain point with the environment and then we don't know how to undo it or fix it or optimize the environment. Because right now we're in a position where we're playing a lot of catch up and clean up and if there was a way or some tool or feature that we can take advantage of that would allow us to optimize that environment where we will kind of corner ourselves into a lot of problems in the future. There's some feature or something that we could take advantage of that will allow us to optimize that environment and not let it get out of control pretty easily. That would be my suggestion.
I wish that the deployment of the updates to the sensors from the FMC was faster.
Cisco ASA firewall did a great job of authentication and authorization on the local firewall. FTD does not authorize users well in terms that an AAA must be setup to provide the granular tools that the ASA did.
Cisco's method of licensing the firewall can be improved. The FMC and the FTD are licensed through the Cisco software manager and there are instances where the devices are licensed but the firewall still displays and error due to licensing.
I would rate SD-WAN highly because it has significantly improved network performance, reliability, and cost-efficiency for my organization. Its ability to optimize traffic dynamically, enhance security, and simplify management across multiple locations has been invaluable. With SD-WAN, we’ve reduced dependency on costly MPLS, improved cloud application performance, and gained greater control over our network infrastructure.
It works really well. We can do most anything we want or need to with it, and you don’t have to have a doctorate or multiple certs to necessarily figure it out. The thing that would probably have to happen to make us switch would be if we just got priced out - Cisco’s more powerful and higher bandwidth models cost a pretty penny.
The niche configurations are given equal focus as the standard use cases, which can make onboarding difficult in the beginning (ie why am I not using an entire tab of the portal), but aside from that part, the dashboard is relatively easy to navigate and apply the configuration. The metrics and analytics available are also nice to have in a single pane.
i think overall after ALOT of tac cases it works allright now. But still have alot of issues if you use cloud based mangement. fx, if you open 2 windows of access policys, both of the pages, rules starte to jump form side to side. if you then open one more list, its start to jump even faster. if you close the 2 of them, its back to normal. ALSO the extended access lists for VPN, SUCKS. Its the tiniest window when opening the editor, and you are not able to give the rules names, Which means finding and editing rules SUCKS, its a horrible experience, and eveytime we have to we want to yell :P
We have not had any performance issues with Cisco Secure Firewall, even with DPI and IPS enabled, we have not seen a performance hit. Emoployes have not complained about any slow network speeds that could have been attributed to the secure firewall it has always been something else within the office network.
Al ser soluciones integradas del portafolio de soluciones de Cisco, el soporte es transversal a cada uno de los componentes implementados, teniendo el cliente la capacidad de resolver sus inconvenientes bajo una misma infraestructura que está totalmente homologada, satisfacciendo de esta manera, las necesidades del cliente asi como permitiendo, que este se concentre en su negocio. Since the Cisco SD-WAN tools are a part of Cisco’s broader portfolio of solutions, support cross-cuts to each of our deployed components, with our company as the customer having the ability to solve our problems through the same, approved infrastructure. Their support team easily satisfies the customer’s needs so that they continue to focus on business functions.
Firewall support is professional just like any other technology Cisco sells. From answering simple questions to bringing out outages affecting a large population of our workforce, Cisco support is always courteous, professional, and communicates with our team to keep our request on their radar. Some of the brightest people I've met are from Cisco support both in IQ and EQ which shows the talent Cisco is able to onboard to their team.
was a good training but questions was answered not so good. Training was "Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF)".
Our initial implementation was aided by Cisco's professional services and was excellent. The engineer was very knowledgeable and helped us work through issues while building out our new internet security edge Part of this involved tools to migrate the firewall configuration from old to new.
We've used the old Cisco SD-WAN, which no longer exists. It was a lot more complex to configure what is now called Cisco Catalyst SD-WAN. So they've definitely come a long way in that it is a lot less complicated to set up and template based.
Cisco Secure Firewall works better with the Cisco ecosystem when we can utilize it and feels beefy enough when we utilize it in the data center. The Fortinet we have found are great, small cost boxes for remote offices with a better UI then Cisco Secure Firewalls. The feature set included with the firewalls feels similar from a security point of view.
A solid, realistic rating most people give for Cisco Secure Firewall pricing is 7 or 8 out of 10 (because the product is strong but licensing can be a bit complex)
Cisco Secure Firewall has never given us any trouble, it has stayed up at all times, upgrading the appliance has also become much simpler. We operate the appliance in a HA pair, so 0% downtime within our organisation. During switchover while upgrading, not a single packet seems to get lost, so this has been a very valuable asset to our company.
Our branch offices can connect to our enterprise network and the internet quickly and securely, which has helped to increase productivity and reduce downtime.
We have been able to reduce our dependence on expensive MPLS connections, and instead utilize a combination of broadband and LTE connections, which are more cost-effective
The centralized location improves network visibility and troubleshooting process
Positive impact. Cisco is a big player in IT environment. It is future stuff, everything, what you learn today, maybe something can be tomorrow. And yes, it's quite important to learn the new stuff every day. And yes, that's it. Yes, I'm happy with Cisco.