Likelihood to Recommend I think it is well suited for smaller companies or (as in our case) extension to a central system with higher performance. My personal guess is, that it can be quite annoying with those delays in bigger environments, when 20 or more devices needed to be managed. From the point of security, support and updates it works quite good and seem to have no downsides.
Read full review Sometimes it is really hard to handle. There are so many bugs especially when it comes to ACL or HA creation. Sometimes the Cisco Secure Firewall just needs a restart in order to work but that shouldn't be like that in our environment the Cisco Secure Firewall is the heart of the network and if the Cisco Secure Firewall is down the whole branch is down, for that we need a more reliable product.
Read full review Pros My organization is all Cisco and wants to stay in the Cisco life cycle, Firepower 1000 series is great for small to medium-size office. Very robust enterprise-grade security solution with updated threat features to handle any current and upcoming threats. The solution is backed by Cisco to ensure constant security updates. Integrated AnyConnect remote client VPN is a big plus to allow for secure remote workers access. Easier to set up a site to site VPN due to the large user base and case studies published on integrating to other manufacturer solutions. Read full review How the firewall works well is normally the firewall is protecting the secure network for the internal network to prevent the attack from external network. normally for the ISP customer, we usually filter the firewall polices only for the server farm, server farm because normally in ISP is the customer doesn't want to be filtered. So only for the server farm, they need the firewall for the enterprise like banking and for the DDoS attack, like the malware attack, something like that. And then sometimes it's some customer in ISPalso, they got the many DDoS attack and then they are using the public ip. When there are using the public ip, they need to protect their ip. So they need to use the firewall. So the firewall is essentially needed. many attackers and many, many things, terrible things have been to the network which has large impact.. Read full review Cons ACLS in gui are PIA cant see object details Objects in ACLs dont show IP addresses Have to renames every object to name+ip to make acl GUI useable Speed to data can use improvement. Health warnings should allow you to resolve you have to dig n search in some cases. Read full review The UI in Cisco Firepower formerly Sourcefire) is complicated and entirely redundant. A lot of these features are not useful, and therefore, it can be removed from the main window. The interface is very slow, with each operation taking a lot of time. Searching through the logs takes too much time. Read full review Likelihood to Renew It is quite good, robust and reliable but not always so easy to manage and configure. The tools could be improved and the price is not low for an entry level firewall
Read full review It works really well. We can do most anything we want or need to with it, and you don’t have to have a doctorate or multiple certs to necessarily figure it out. The thing that would probably have to happen to make us switch would be if we just got priced out - Cisco’s more powerful and higher bandwidth models cost a pretty penny.
Read full review Usability Firepowers are secure, reliable, central management and configuration is easy and they fit in well with our existing Cisco infrastructure. Good feature set and support. Good management and control with chassis manager and central control with additional Firepower Management Centre.
Read full review Solution is highly effective, offers a lot of features with constant improvements and additions of new features over time. It's relatively easy to get familiar with the system, especially if transitioning from adaptive security appliances. If this is not the case, as for learnability there's a learning curve but once learned it is relatively easy to remember the details about the system even after a period of non-use
Read full review Reliability and Availability Has not let me down yet.
Read full review We have had really good success with Cisco Secure Firewall when it comes to availability. Even when we’ve had temporary issues with one appliance or the other, or with the Firewall Management Center, it has stayed up and defended our network diligently. We even had an issue where the licensing got disabled for multiple days, and it kept spinning like a top
Read full review Performance Great performance even on the lower end model of the series. You can push a lot of traffic through these devices without much performance impact. If you decide you want to inspect encrypted traffic however, you may take a big hit on the cpu and memory of the box, but they still manage to keep up even with all the bells and whistles turned on.
Read full review Support Rating I have had troubles with Firepower Management Center and the FTD's in the past. Sticking to a Gold Star image and upgrading when the "bugs" are fixed is great. That still doesn't mean you are left vulnerable though. The extra features are just not enabled yet. Great product and calling support is readily available for any issue.
Read full review Customer service has been great. TAC has been mostly able to identify and fix problems that we may have and have been very responsive. If for some reason something isn't fixed right away, they have been adamant on staying with us and working the issues out before things get escalated up the chain.
Read full review Implementation Rating Utilize the new FMC cloud which is available in Cisco Defense Orchestrator.
Read full review In the beginning transition from Adaptive Security Appliance to Cisco Secure Firewall did not look like the best choice. Solution was new, there were a lot of bugs and unsupported features and the actual execution in the form of configuration via Firepower Management Center was extremely slow. Compare configuring a feature via CLI on ASA in a manner of seconds (copy/paste) to deployment via FMC to Secure Firewall which took approx. 10 mins (no exaggeration). Today, situation is a bit different, overall solution looks much more stable and faster then it was but there's still room for improvement.
Read full review Alternatives Considered Cisco Meraki MX is much more simple to configure it if you compare to Cisco Firepower 1000, but it is more limited to pur some complex configurations. The Cisco Firepower 1000 Series is typically deployed as a physical appliance, while the Meraki MX can be deployed as a physical or virtual appliance.The Firepower 1000 Series has a more complex user interface, with a steeper learning curve, but offers more customization and configuration options. The Meraki MX has a simpler, more intuitive interface,
Read full review We use the FMC as a virtual machine, it combines administration, monitoring and can be used perfectly for error analysis. There are restrictions due to administration without the FMC, so we decided on the FMC as the central administration.
Read full review Return on Investment We have seen improved throughput on our internet. It took several attempts with Cisco engineers to configure the device; it requires a deep set of knowledge to set up in a more complicated environment. This will allow us to move forward with a more stable and configurable environment with security available we didn't have before. Read full review Cisco Secure Firewall has provided a single management interface for all of our devices. We have had issues implementing 1010 in HA where a site was using a dynamic IP previously. Lack of DHCP options has slowed deployment to our smaller sites. Read full review ScreenShots