Cisco ASA Reviews

<a href='https://www.trustradius.com/static/about-trustradius-scoring#question3' target='_blank' rel='nofollow noopener noreferrer'>Customer Verified: Read more.</a>
160 Ratings
<a href='https://www.trustradius.com/static/about-trustradius-scoring' target='_blank' rel='nofollow noopener noreferrer'>trScore algorithm: Learn more.</a>
Score 8.3 out of 101

Do you work for this company?

TrustRadius Top Rated for 2019

Overall Rating

Reviewer's Company Size

Last Updated

By Topic

Industry

Department

Experience

Job Type

Role

Reviews (1-25 of 46)

Jyrki Halonen profile photo
Score 8 out of 10
Vetted Review
Verified User
Review Source
We are using a Cisco ASA firewall in front of our SDN data centre network to form first line protection against the Internet. We automate all our configurations to this platform with other Cisco tools and ASA fits fine to this zero touch day 2 operation model.
  • Well suited to automated operation/configuration
  • Well known technology
  • Price
  • Basic features ok, but NGFW features could be better
[Well suited] to an environment where other Cisco products are also used.
Read Jyrki Halonen's full review
Jeffrey Thoenen profile photo
Score 9 out of 10
Vetted Review
Verified User
Review Source
We use Cisco ASA across our whole enterprise network. We use them to protect our local LANs to support PCI compliance and to protect any internet-facing circuits.
  • Cisco ASAs are simple to configure and manage.
  • Cisco ASAs allow easy setup of VPNs.
  • Cisco ASAs provide secure segmentation to offer compliance with PCI.
  • The CLI commands of the ASA is a bit different than Cisco's IOS devices.
Cisco allows easy configuration of VPNs to various vendors that need access to your internal networks. Make sure to size the ASA correctly for the application, as it has various supported throughput speeds according to the model.
Read Jeffrey Thoenen's full review
Steven Van Jaarsveld profile photo
May 21, 2019

Cisco ASA Review

Score 10 out of 10
Vetted Review
Reseller
Review Source
Cisco ASA is used internally by our organization's IT department to secure the perimeter edge. We also use Cisco ASA in our lab to do testings of multiple client scenarios. We sell Cisco ASA to customers and implement Cisco ASA as well for customers in a project environment. It addresses network security issues on the perimeter and sometimes even in the data centre, however, Cisco Firepower appliances are more well-suited to this implementation.
  • SSL VPN.
  • Site-to-Site VPN.
  • Ease of use and configuration.
  • Easy CLI.
  • Robust.
  • Easy to troubleshoot.
  • ASDM ease-of-use could be improved.
  • Upgrade/migration from previous versions and the way objects are named.
  • Bring in more support contexts in the default licensing.
  • Bring in more support for SSL VPN connections in the default licensing.
Cisco ASA is well suited for customer scenarios where a customer does not need or want next-gen features and only needs legacy firewalling functionality. Cisco ASA is less appropriate in situations where a customer requires next-gen features and network segmentation. In this scenario, a customer should investigate the option of Cisco Firepower appliances running the Firepower threat defense software.
Read Steven Van Jaarsveld's full review
No photo available
Score 8 out of 10
Vetted Review
Verified User
Review Source
We've deployed ASAs throughout our multiple datacenters and we also use them as onsite edge devices at many of our client sites. We're using them for NATing client devices as well as applying stringent ACLs to control what clients can access on our networks and what we can access on a clients network.
  • HA NAT
  • ACLS
  • FAILOVER
  • HA
  • VPN
  • Maybe this has changed, but our ASAs were/are limited ACLs based on Object-Groups/IPs/Ports versus our Palo Altos offer application layer inspection to make sure that traffic traversing the firewall on a specific well known port such as 22 is actually SSH traffic or that traffic on port 80/443 is actually HTTP/HTTPS.
They work fairly well for firewalling and tended to be lower cost than our Palo Altos. If you're looking for a decent firewall and cost is a concern I'd say ASAs are a decent option. If you'e looking for a more secure environment you might want to look at the Palo Altos in addition to or instead of the ASAs.
Read this authenticated review
No photo available
Score 7 out of 10
Vetted Review
Verified User
Review Source
Cisco ASA is used to filter access to very specific networks that need isolation from the rest of the information system. Our requirements were to have a good level of security, along with enough flexibility so that we could address unpredictable changes in the feature set that the admins of those networks may demand in the future.
  • Manageability.
  • Deployment.
  • Security.
  • Set of features apart from simple stateful filtering.
  • Performance.
  • Clustering.
  • Scalability once setup if you don't go for clustering.
Cisco ASA is well suited for situations where you have a short set of rules but need many features that enhance the filtering. For instance, if you have to isolate a network within your information system, in order to give ownership of that specific network to another team, and still have a lot of flexibility on how you interact with that network and your main site network, this is one good way to go.
You can even give access to the other team for monitoring purposes and helping with debugs.
Read this authenticated review
George Venianakis profile photo
May 13, 2019

Cisco ASA review

Score 8 out of 10
Vetted Review
Verified User
Review Source
Cisco ASA is being used in a department addressing the protection of several critical aspects. It is being used along with firepower in order to streamline the level of security needed.
  • Zero downtime upgrades.
  • Consistent API interface.
  • Rich feature set.
  • The GUI (ASDM) should get rid of Java.
  • API specifications and commands lack proper documentation.
  • Deeper regression testing on later releases.
Ease of deployment for almost all scenarios, a rich feature set, excellent product and technical support with tons of config examples, and integration with Cisco Umbrella.
Read George Venianakis's full review
Dalibor Cvetanovic profile photo
May 09, 2019

Cisco ASA Review

Score 9 out of 10
Vetted Review
Verified User
Review Source
We use the ASA as a firewall, intrusion prevention, and VPN in the whole organization. Basically it's a proactive threat defense that stops attacks before they spread through the network.
  • We Can use multiple contexts or also known as Firewall multimode.
  • Ability to use dynamic routing protocols.
  • The complex way of connecting external connectivity.
  • Would like more SLA and event manager functionality.
  • GUI interface is lacking. The interface is java specific.
  • Positive: VPN functionality with the ease of setup and security. Being a Cisco shop, this proved to be more cost-effective with less need of multiple experts in-house.
  • Negative: the inability to use VPN while in multimode. Would prefer a single entry point with load balancing.
Read Dalibor Cvetanovic's full review
Tom Erdman profile photo
Score 9 out of 10
Vetted Review
Verified User
Review Source
We use our Cisco ASA as a traditional firewall, inspecting and routing traffic. We also have Firepower running on it, which allows us to use it for content filtering.
  • The ASA has been around forever, and has been proven to be a great firewall solution.
  • ASAs are very versatile, running everything from VPNs and ACLs to content filtering.
  • Running them in tangent with other Cisco routing solutions allows for a very diverse and secure setup.
  • There are two types of technologists: ones who speak Cisco, and ones who don't. The ASA is no different from any Cisco device, in that it comes with a learning curve.
  • These aren't consumer products, and they come with an enterprise price tag.
  • Like many vendors, Cisco uses a java based admin consoles. This is its own special form of torture.
Anyone running traffic through a business needs a firewall solution, and the ASA is a great one if you have the funds and expertise. We especially appreciate the Firepower solution for filtering and malware protection.
Read Tom Erdman's full review
Wouter Hindriks profile photo
Score 8 out of 10
Vetted Review
Verified User
Review Source
We deploy the CIsco ASA 5505 & 5506 on over 250 customers' sites to protect the local LAN and establish a site-to-site VPN to our datacenter from which we host the customer applications. On our datacenter, we use an HA pair of ASA 5585s to produce redundant internet access and NAT all traffic.
  • Easy to configure with a template and CLI.
  • TACACS command authorization and accounting is must have for compliance.
  • Good SNMP monitoring options.
  • Well developed and very compatible firewall OS.
  • The 'Next Generation' options feel bolted on and the performance is underwhelming.
  • Impact of enabling the Firepower Inspection is too big. Both response time and throughput suffered horribly.
Excellent layer 1-4 firewall, HA works flawless, great performance for classic firewall.

For Next Gen features you had better look at the firepower threat defense devices, as the next generation features of ASA are not well integrated.
Read Wouter Hindriks's full review
No photo available
Score 8 out of 10
Vetted Review
Verified User
Review Source
We have about a dozen Cisco ASA models deployed from 5505-5545. We use them to separate traffic between internal organizations, for DMZ, and for VPN (both IPSEC and SSL). The problems these units address are two-fold: to protect our internal network from foreign networks that we have no control over, and to protect the foreign networks from the chance of getting infected by something on our internal network.
  • When sized appropriately, it can handle demanding traffic well.
  • Cisco is pretty good about putting out security-related updates so we can rest assured that the networks can be as safe as possible.
  • The hardware is very reliable and I don't recall any hardware related issues in the 5+ years of using them.
  • Software upgrades are smooth and I would recommend getting Cisco support assistance for them to review your current configuration and have them advise which stable and secure version you should move to. They may provide additional commands to enter prior to upgrading if you are moving from a very old version of the software.
  • Reporting, especially for VPN functionality, could use some improvements to be able to pinpoint when particular users log in/out.
  • The JAVA-based GUI could use some modernization. I currently have to use an older version of JAVA JRE to run the ASDM.
  • Some of the licensing structure could use some simplifying. You really have to size the appliance for growth before purchasing the initial license. The bare-bones license doesn't provide much flexibility.
DMZ firewall, general internet browsing, VPN (SSL and IPSEC). ASA can handle many firewall rules without slowing down. Some of them also offer PoE on the switchports of the firewall, which is convenient for small home office installations. One of the features is a high availability configuration in an active/standby mode. You can upgrade the software without any downtime.
Read this authenticated review
No photo available
January 25, 2019

Cisco ASA Rocks!

Score 10 out of 10
Vetted Review
Verified User
Review Source
We use Cisco ASA at the headquarters and the sites to build our cross-network and edge gateway. Like always, Cisco rocks with their hardware, no issues at all. Even better now with the Cloud services, Cisco pushes down updates to the ASA blocking potential threads.
  • Rock solid when it comes to VPN Site-to-Site.
  • Excellent Firewall functionalities.
  • HA capabilities, it never fails.
  • It would be better if Cisco continues improving the ASDM for new administrators starting their networking career.
  • It would be great if Cisco builds a management web interface like they do for small business products.
I don't know why an IT department would not consider a Cisco ASA.
Read this authenticated review
Larry Chisholm profile photo
Score 9 out of 10
Vetted Review
Verified User
Review Source
The Cisco ASA platform has become the standard which I use for most of my SOHO and enterprise setups. I most recently have used this as a buffer between an AWS environment and a production network, where it behaved flawlessly. A second use case was as a VPN concentrator to consolidate all client to site, and site to site VPN connectivity, where it again behaved admirably.
  • Top of the line crypto, and firepower inline makes threat management easy.
  • easy to set up vpn, now including tunnel interfaces!
  • SOLID infrastructure for client to site vpn with anyconnect
  • TCO is higher than most.
  • firepower integration into the appliance is straightforward but weak. Units often times cannot process the amount of traffic thrown at them.
  • Support can be painful to work with at times. Need more english speaking staff.
Places where this product is well suited -
* VPN Functionality - Client to Site/Site to Site
* Internet Edge Gateway - NAT/PAT providing internet access to staff/production networks
* Interior firewall - Network segmentation
Read Larry Chisholm's full review
Carlos Daniel Casañas Bertolo ஃ profile photo
Score 9 out of 10
Vetted Review
Verified User
Review Source
We use it in several critical access and control points, both internal and external. With it we deploy the VPNs that interlace all our offices and authorized consultants for remote access.Together with other tools of the same brand, automated rules are established that allow a more effective control of cybersecurity inside and outside the company.

  • Excellent integration with several systems and equipment of other brands, as well as with the entire Cisco ecosystem.
  • Very good support and attention from the company and its associates. Constant security updates and functionalities.
  • Robust and reliable equipment, great flexibility in configurations and fully scalable in power and functionalities to the need of the company.
  • Well, the price is always an important factor with this brand, but I am witnessing that it is worth what it costs, although the ROI is generally not as good as the investors would like it to be.
  • The virtual appliance still consumes too many resources compared to similar ones and I have to assign physical network cards to get an adequate performance when implementing it.
Implementing an ASA is not advisable for a small business with a tight budget for IT. To get the juice you must be willing to invest in licenses and maintain the support contract to continue receiving updates. In the medium term you will be satisfied, but in the meantime I am sure that the finance manager is not going to be your best friend. Now, if you are looking for stability, performance, redundancy in communications, security at all levels and you want to keep all your branches properly interconnected, ASA is your smartest choice.
Read Carlos Daniel Casañas Bertolo ஃ's full review
Richard Oberle profile photo
Score 10 out of 10
Vetted Review
Reseller
Review Source
We use Cisco ASA units for internal remote users to remain connected to our network for access to applications, file shares and corporate email. We also recommend and sell ASA units to customers for use in their networks. Lastly, we recommend and sell ASA units to customers that we host for various applications, so that they can have access to "cloud" based apps but also be as secure as possible in the access thereof.
  • ASA units provide firewall capabilities that would normally be found in much more expensive equipment
  • ASA units provide POE capability for use with VOIP phones or other equipment.
  • ASA units connect outside internet to inside networks and VPN's with very little overhead and no loss of signal speed.
  • ASA units allow me to run a wireless access point in parallel so that both wired and wireless devices can share one DHCP scope which makes it easier to manage and maintain.
  • ASA units make use of ASDM but also the Cisco standard CLI which makes it easier to train engineers to manage and have ease of deployment using config templates.
  • In the ASA5506, unlike its predecessor, there are no switched Ethernet ports. Adding that feature would be helpful and save the cost of the additional switch that must be purchased.
  • The real time log viewer is not that great, it's not 100% reliable, its explanations are often a bit too technical, the filter could use some enhancement
  • The ASDM interface as a whole being java is not good. Java has become a nightmare due to poor backwards compatibility and cliff-facing certificate requirements between versions, so java versions for administrators become a nightmare to manage for what should be simple changes
We appreciate that there are a variety of ASA units for different sized networks. It is particularly well suited for businesses that have multiple small to medium sites that need internet protection and VPN connections at the same time. The added capability of wireless access makes the ASA in our opinions a great one-stop shop for network, firewall, and VPN.
Read Richard Oberle's full review
Brandon Holbrook profile photo
Score 9 out of 10
Vetted Review
Verified User
Review Source
Cisco ASA is our main firewall for our site. It is also the VPN termination point for our LAN to LAN VPNs and Remote Access VPNs. It has solved the problem of needing a firewall for cyber security. It has also solved the problem of employees needing remote access into the corporate network.
  • Cisco ASA is very configurable.
  • Cisco ASA has a lot of features.
  • Cisco ASA is robust. Failing almost never.
  • Cisco ASA can integrate with many other Cisco security solutions.
  • There is a learning curve for Cisco ASA.
  • A lot of what can be done, initially, needs to be done at the command line interface.
  • Organizing all the firewall rules can be a little daunting with the current UI.
Cisco ASA - we have integrated it with Cisco Firepower. Our Cisco ASA is an important part of our network infrastructure. When we need to implement a new firewall rule or edit an existing one the Cisco ASA UI makes this task easy. The Cisco ASA is well suited for any network firewall need.
Read Brandon Holbrook's full review
Jitu Mani Das profile photo
Score 10 out of 10
Vetted Review
Verified User
Review Source
Cisco ASA is our main Perimeter firewall across the globe, routing all the internet traffic in and out of our infrastructure. It gives the secured way of filtering traffic as per our need. The best part of ASA is the support and trust of loyalty in last 10 years we just never have to reboot the device once also. Its credibility is amazing.
  • How we can manage: ASDM the GUI is so much easier to manage it even for a new guy also.
  • Traffic handling capacity
  • More secure and the different features it gives.
  • Support from the TAC team or from the community manages to handle issues very efficiently.
  • I would say Cisco should concentrate more how they will move way the traditional IPS to a new sand-boxing kind of environment.
CISCO ASA is suitable for every organization from MID range to HIGH RANGE. However, for small customers, they can buy Cisco product but support cost will be the challenge. However nowadays one tool is never enough, but Cisco gives us a unified way of managing infra with there different solutions. I agree they are more stable products comparing any products which are available in the Market.
Read Jitu Mani Das's full review
Jesus Mata profile photo
Score 8 out of 10
Vetted Review
Verified User
Review Source
This device is being used across the entire organization. It is currently our firewall and what guards us from exterior attacks. It is also functioning as our VPN provider for users that need access outside of the company.
  • Great user management
  • Good usage of ACE and ACL rules that control the network
  • Decent power for a VPN that can be easily created
  • Not user friendly
  • The GUI is nice, but it doesn't tell you what it does
  • Sometimes, it's hard to track down exactly what is going on
  • Definitely well suited for a small to medium business where it can highlight the usage of its firewall and small amounts of VPN connectivity.
  • It might get overshadowed in a larger company.
Read Jesus Mata's full review
Amit Gumber profile photo
July 18, 2018

Cisco ASA

Score 10 out of 10
Vetted Review
Verified User
Review Source
We are using Cisco ASA to connect our remote sites using IPsec VPN feature in secured manner.Also using it as for SSL VPN to connect our web services.
  • Cisco ASA is very robust device that keeps our network secure from threats
  • Cisco ASA is very in intelligent device and full of multiple features such as load balancing , quality of service and many more
  • Cisco ASA have enough licensing options which any customer can choose it from.
  • Cisco ASA is limited to UTM features such as malware and antivirus
  • Cisco ASA is less modular in terms of adding / removing modules
  • Cisco ASA don't have AC/DC combined power options
Cisco ASA is well suited in scenarios such as IPsec VPN , SSL VPN and L2 VPN requirement.
Cisco ASA is not well suited in scenarios where we need excessive routing of data traffic
Read Amit Gumber's full review
No photo available
Score 9 out of 10
Vetted Review
Verified User
Review Source
Cisco ASA provides many security and networking features. These include VPN (Virtual Private Network) capabilities, traffic prioritization, DHCP, Firewall protection of our network, routing, and many more. These allow our business to operate securely, give remote employees easy access to our on-network services, shape our traffic to allow critical services (such as VOIP) to operate at higher priority, and generally give us fine-tuned control over the operation and management of our network and how it interacts with the outside world.
  • Performance
  • Reliability
  • Security
  • Configurability/Customization
  • User Interface
  • Ease of use
  • Setup
You will want an IT expert who can assist with setup as well as day to day management. Certain VPN configurations may require additional licensing - make sure you know what your needs are and research costs accordingly. Licensing across the board should be researched carefully since it's not always clear with Cisco products. Ideally, have a Cisco expert research and quote a solution that meets your specific business needs.
Read this authenticated review
No photo available
Score 5 out of 10
Vetted Review
Verified User
Review Source
The Cisco ASA platform has a niche place in our infrastructure. It is a decent stateful firewall but lacks features and functionality for changes in network security, segmentation, and user-based access controls. It is a good SSL VPN technology but that is about the only feature on the ASA platform that is widely used. As technology advances, it appears that Cisco has forgotten about the ASA.
  • SSL VPN
  • Authentication tiering
  • User-based access control functionality
  • Better logging
  • User interface
The ASA platform really is only suitable for SSL VPN use cases that can't be solved by other means. Its time as an industry leading firewall has ended. Cisco missed the boat with updates to the ASA platform and has not kept up with firewall trends. They tried to add bolt on functionality but the ASA really is not a security appliance and is one of the last stateful firewalls left that only has vanilla functionality.
Read this authenticated review
No photo available
Score 10 out of 10
Vetted Review
Verified User
Review Source
We use Cisco ASA for our remote phone VPN users. It’s being used primarily by our attorneys that sometimes work at home. It allows our users to have a home office and work with our clients and have them accessible for conferences and gives our users flexibility to conduct business outside the office.
  • Allows remote phones to VPN and connect to the phone system
  • It’s secure and allows TLS 1.2 encryption
  • It’s more reliable to use a physical phone than soft clients e.g. Jabber
  • Since we use it for VPN phones the devices need to be configured internally before we deploy them in the field. I have to be able to update the VPN profiles remotely.
We use ASA for CisVPNvpn phones and it handles that task well. For enterprise wide firewall we use Palo Alto equipment.
Read this authenticated review
No photo available
Score 9 out of 10
Vetted Review
Verified User
Review Source
I use Cisco ASA routers in conjunction with Meraki Z1 & Z3 appliances to allow my remote teams to connect to the main office and for those traveling to easily be able to link back to the home network for easy access while on the road.
  • Site-2-site VPN tunnels.
  • Monitoring network traffic using firepower
  • VLANs
  • Better GUI interface
  • More robust trouble shooting tools
  • Clearer licensing agreements
I was able to connect my 5545x ASA to my Meraki Z1 & Z3 appliances for dynamic site-to-site von tunnels which allowed my remote field offices to use VoIP phones the same way employees in my main office use them. Simply dialling an extension allowed remote employees in other countries to receive calls as local calls.
Read this authenticated review
No photo available
Score 10 out of 10
Vetted Review
Verified User
Review Source
I use the ASA as our main firewall for all outward facing services utilizing the FirePower functionality as well.
  • Hardens the network
  • Advanced Malware Protection
  • IPS / IDS functionality
  • VPN Connectivity
  • Software upgrades can be somewhat challenging at times.
  • Pricing is a little high
The ASA has been a fantastic VPN device as well as firewall with integrated services. Protection features with Firepower provides advanced malware protection with an active license. I haven’t experienced any situations where the device is less appropriate.
Read this authenticated review
Sergei Chernooki profile photo
Score 9 out of 10
Vetted Review
Reseller
Review Source
Cisco ASA is used as a border firewall at the network edge and also between critical network segments and other parts of the network. With Cisco ASA we achieved remote access connectivity and event logging. Next-gen features are used at network edge with regard to performance. By using Cisco ASA awe created reliable network edge gateways with minimal Open.
  • Stateful inspection is perfectly implemented, reliable and has a very good performance.
  • NAT is feature-reach, perfectly implemented, reliable and has a very good performance.
  • VPN is feature-reach, perfectly implemented, reliable and has a very good performance (hardware limited).
  • I am not quite happy with 5500 series NGFW performance, this was fixed starting from 2100 series on.
  • HTTP inspection performance also is a bottleneck, it should not be used without clear need.
  • Licensing costs may triple the appliance price.
It does it's best when minimal OpEx is required. Initial setup may be complex for inexperienced engineers. Network visibility may be incomplete without additional tools. Performance of next-gen features may be low on cheap models.
Read Sergei Chernooki's full review
Brian Taylor profile photo
Score 10 out of 10
Vetted Review
Verified User
Review Source
My organization switched to the ASA from the PIX close to 8 years ago. We were looking for a solution that provided added security, better redundancy, integrated well with our existing Cisco infrastructure and was easy to manage and use. The ASA addressed all of those concerns and has been a critical component in our network stacks since.
  • Consistent commands. A lot of the general commands used on other Cisco switches and routers also work here, making it easy script common tasks and changes across multiple devices without having to switch command structure.
  • Processing power. The ASA is incredibly fast and doesn't introduce much if any latency.
  • The Java based ASDM can botch commands and isn't compatible on some more locked down systems.
  • Monitoring. Really the same complaint as above, the monitoring available through the ASDM is crappy at best. A much better solution is to send the logs and mirror packets to a SEIM, but that can create issues of its own when looking for realtime analysis.
  • Compatibility across other ASA models. ASA 5520s don't play well with 5525X which don't play well with older 5510s. Each is great on it's own, but it's next to impossible to logically stack them or have them as layers of firewalls in an infrastructure.
  • Lack of cloud based management. The Cisco Meraki security devices do this well, but the ASAs are still behind in this regard.
The ASA is the gold standard of adaptive security devices in a Cisco environment. If your organization predominately uses Cisco hardware, then the ASA is the firewall of choice as it plays nicely with other routers and switches. If your infrastructure uses a mix of hardware vendors or open network hardware, there can sometimes be issues communicating between those devices, but workarounds are easy enough and issues well documented.
Read Brian Taylor's full review

Feature Scorecard Summary

Identification Technologies (6)
7.3
Visualization Tools (5)
7.0
Content Inspection (6)
6.8
Policy-based Controls (5)
8.2
Active Directory and LDAP (5)
7.6
Firewall Management Console (6)
7.8
Reporting and Logging (6)
8.2
VPN (6)
8.0
High Availability (6)
8.3
Stateful Inspection (6)
8.7
Proxy Server (3)
8.0

About Cisco ASA

Cisco Adaptive Security Appliance (ASA) software is the core operating software for Cisco’s ASA suite. It supports a variety of specialized network security and firewall options, allowing users to modularize to their business needs. It is scaled for enterprises through “clustering” ASAs, enabling 128 Gbps processing load and 50 million concurrent connections.

Cisco ASA provides a robust VPN setup process and integrates with other Cisco security offerings, including Cloud Web security and Trustsec. CWS provides cloud-based systems security across public and private clouds, and Trustsec is a software-defined segmentation product that mitigates the scope of network threats and data breaches. The platform also supports IPv4 and IPv6, enabling a smoother evolution in Internet Protocols for users.

Categories:  Firewall

Cisco ASA Technical Details

Operating Systems: Unspecified
Mobile Application:No