YES to ASA for your business
January 09, 2020

YES to ASA for your business

Robert Ross | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Overall Satisfaction with Cisco ASA

Our Cisco ASA's act as our perimeter gateways for our corporate offices. We also have our two largest sites outside of our headquarters using the devices to connect via a VPN. This allows for access to corporate information housed on storage area networks based in the corporate data centers
  • Fits into Cisco's ecosystem seamlessly.
  • Advanced features to adapt to today's world.
  • The GUI could use an update and is clumsy, still, after all this time.
  • Network Access Control integration still needs to be improved.
  • No negatives at this time. The investment is well worth it.
We have looked at other solutions but this was the best fit.
Cisco TAC is not great but there are partners who can take it forward and level it up.

Do you think Cisco Adaptive Security Appliance (ASA) Software delivers good value for the price?

Yes

Are you happy with Cisco Adaptive Security Appliance (ASA) Software's feature set?

Yes

Did Cisco Adaptive Security Appliance (ASA) Software live up to sales and marketing promises?

Yes

Did implementation of Cisco Adaptive Security Appliance (ASA) Software go as expected?

Yes

Would you buy Cisco Adaptive Security Appliance (ASA) Software again?

Yes

The Cisco IOS Firewall provides an extensive set of security features that allow administrators to design customized security solutions to tailor to the specific needs of their organization. The Cisco IOS Firewall is comprised of the following functions and technologies:

  • Cisco IOS Stateful Packet Inspection
  • Context-Based Access Control
  • Intrusion Prevention System
  • Authentication Proxy
  • Port-to-Application Mapping
  • Network Address Translation
  • Zone-Based Policy Firewall
  • Cisco IOS Stateful Packet Inspection

Cisco Adaptive Security Appliance (ASA) Software Feature Ratings

Identification Technologies
7
Visualization Tools
6
Content Inspection
Not Rated
Policy-based Controls
10
Active Directory and LDAP
9
Firewall Management Console
7
Reporting and Logging
10
VPN
9
High Availability
8
Stateful Inspection
9
Proxy Server
Not Rated