Cisco Secure Firewall Management Center (formerly Firepower Management Center) are a firewall policy and intrusion detection appliance management system, providing an administrative nerve center for managing critical Cisco network security solutions. It provides complete and unified management over firewalls, application control, intrusion prevention, URL filtering, and advanced malware protection. Easily go from managing a firewall to controlling applications to investigating and remediating…
N/A
Palo Alto Panorama
Score 8.7 out of 10
N/A
According to the information provided by the vendor, Palo
Alto Panorama is a network security management solution that intends to
simplify and enhance cybersecurity processes for businesses. The product's
primary objective is to offer various features, including unified policy
management, centralized visibility, automated threat response, simplified
configuration, unrivaled scalability, and rapid security adoption. It claims to
assist organizations in efficiently managing their firewalls and…
Palo Alto Panorama is more user-friendly and provided faster policy deployment compared to Cisco FMC. Panorama is more stable compared to Cisco FMC. Cisco FMC is better when compared to CheckPoint Smart Console. Configuration and troubleshooting in CheckPoint Smart Console …
Palo Alto Panorama
No answer on this topic
Features
Cisco Secure Firewall Management Center
Palo Alto Panorama
Firewall Security Management
Comparison of Firewall Security Management features of Product A and Product B
FMC is feature-rich and user-friendly. Cisco firewalls can run on standalone mode (FDM) but fewer features are supported on FDM. FMC is a must when working with Cisco Firewall. Migration from Cisco ASA to Cisco FTD is easy. There is a tool (FMT) that converts and imports the cisco IOS configuration file to FMC. FMC runs in VM or can be purchased as a physical appliance. The downside is that FMC is not quite fast and has bugs, especially when running in the older version 5x. and 6x.
I think Palo Alto Panorama is suited for administrators of all levels because certain things can be locked down to certain permission levels. But there are executive dashboards all the way down to the weeds for the highest of administrators. This truly is a single pane of glass tool because you never have to go into the individual firewalls for anything.
If you need to push a setting or config to multiple firewalls Panorama can do that flawlessly.
Panorama has its logging centralized and this makes it easy to locate and reviews logs compared to having to get logs from each device.
I love how the interface matches the interface on the firewall. This makes the learning curve less steep.
Adding new firewalls to Panorama is super easy and not complex. Panorama can push a lot of the config and settings so you don't have to manually do it.
Stability when managing firewalls, we're having issues with Firewall 01 and Firewall 02 remaining in sync
Reporting when it comes to access control policy rules - there is no way to export a report of the rules easily. Using a custom Python script on the Cisco forums is the only way to easily export a CSV.
Support for policy and route-based site-to-site VPN was not available until 6.6.0 and later. This forced us to purchase ASAs to bridge that gap.
Dashboard reporting - when clicking a link for more information, nothing displays. Currently working with Cisco on the support case, which has been escalated.
The ability to push out OS updates could be improved in Panorama. It has the abilities, but the use is not intuitive, to the point that we generally connect directly to the firewalls to download the OS updates directly.
Scheduling. It would be nice to be able to schedule jobs to run at certain times. Pushing out updates, like OS updates mentioned above, can require significant bandwidth. So being able to schedule that work for hours that would not directly affect the users would be a welcome addition.
The list of devices in the Templates tabs should be sorted the same way that he devices are grouped in the Device Group tab, rather than just alphabetical. If there was a way to chose the order of the devices, maybe by tag, that would work as well.
We are very satisfied with SecureX and it's adaptive, active nature in protecting or data and systems. It's easy to administer, update, review notifications and update when necessary. Cisco's security practice fits into our needs and continues to evolve as global cyber events change. SecureX is easy to migrate to new cisco gear as we upgrade to newer models when supports ends on older gear. Enabling fast ROI during these capital expenditure projects.
Panorama has given us much more than we expected and the support for the product, by Palo Alto Networks has been great. We would like to see some improvements that I mentioned in another review, like scheduling changes, but overall Panorama has provided a very capable product and we are very happy with it.
Overall usability is an eight for me because it is easy to manage the firewall policies and monitor the devices' health. The configurations are all done in the GUI which makes it more convenient and hassle free. You can also see the devices' health and the progress of the task thru its taskbar.
It is a solid product, it allows me to connect multiple devices and to manage my cloud, on prem and vmware firewalling devices. I can assign roles with the required visibility depending on the users. I can also consolidate all my logs into it to have a single pane of visibility.
Since moving to Cisco secure management center from firepower management center we've had no application issues, outages or any other problems. It's always been there for us and always provides us the necessary protection and notification when we need it. Been very happy with all of our Cisco systems over our tenure to date.
We have the direct support of the manufacturer through its service channels, the attention is 24/7, and the response time is acceptable. The support for this tool is almost nil. It all depends on the level of implementation is carried out so that it can fail and request collaboration. Anyway, the manufacturer backs the entire Cisco Firepower Management Center (FMC series appliances) solution.
Palo Alto has a very nice customer support. People are very nice and were quick to reply, whenever we had an issue with the subscription or the blacklist tool. There is also a great deal of information on their website that covers each and every detail about the uses and the threat signatures. The community keeps on updating their information very frequently. Small issues are easily solved from the documentation, and for other issues, the customer support service is always present. However, on Fridays it becomes a little delayed as per my observation.
Cisco secure firewall management center is easy to install, moderate to setup in conjunction with firewall hardware, and administration of policy changes afterwards is pretty straight forward. And flexible to add more advanced security configurations as needed. Cisco support website is pretty good for researching how to documentation too. Cisco secure firewall management center enables integration to SecureX - the cloud security protection service. And AMP which protects packet flow with real time analysis. Cisco secure fmc is the evolved name for cisco firepower management center so for those customers who have firepower this is a simple migration.
We are managing multiple customers having a large number of Cisco devices that need to be managed by a single platform. For that reason, we have selected the Cisco Firewall Management Center than checkpoint firewall management. It simplifies and automates newly bought cisco firewalls at remote branch offices to manage, configure and troubleshoot them.
Palo Alto Panorama and Junos Space Security Director have many similar features but Palo Alto Panorama excels in almost all of them. The monitoring tools in Palo Alto Panorama are easy to use and give more in-depth insight into what is going on in your network. Palo Alto's security is ranked much higher and the Web Application Security is also superior to that of the Junos counterpart.
It's a very straightforward and user-friendly tool that has enhanced the total detection of malware and other threats t from intrusion into our network.
Provides stable deep network scanning, security visibility, and protection from unauthorized access.
The platform modular allows us to deploy across multiple budget cycles.
At a previous company, I deployed Palo Alto firewalls to a data center, and 12 branch locations. This allowed us to replace MPLS links with IPSec tunnels between the sites. This resulted in significantly more throughput and soft savings of increased productivity. However, the estimated net of $220,000 in hard savings over five years is what is most impressive. I could not have effectively managed all those devices without Palo Alto Panorama.