No headaches
February 05, 2021

No headaches

Anonymous | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Cisco Firepower Management Center (FMC series appliances)

I work in a bank in the Technology department, We use Fire Power Management Center to administer the firewalls, it has been a great help for the centralized management of devices. It has facilitated the management of resolution of events, the implementation of VPN site to sites, and remote access in an easier way. With the URL module, we have facilitated access to devices that do not use a proxy with which it has been possible to control internet browsing and the security with AMP module.
  • Malicious ips detecion.
  • URL Filtering.
  • ACL by Applications
  • Remote Access VPNs
  • Deployment to apply changes is very slow.
  • The fact that there is no serious attack incidence helps us meet institutional objectives.
We selected Firepower Management Center because we needed to centralize equiment management and it was easily adapted to our architecture,since at that time we had an ASA with IPS / IDS modules and an FTD and a need to have a URL control and detect a Highest level of threats with the AMP module.

Do you think Cisco Secure Firewall Management Center delivers good value for the price?

Yes

Are you happy with Cisco Secure Firewall Management Center's feature set?

Yes

Did Cisco Secure Firewall Management Center live up to sales and marketing promises?

Yes

Did implementation of Cisco Secure Firewall Management Center go as expected?

Yes

Would you buy Cisco Secure Firewall Management Center again?

Yes

In the scenario of managing several devices it is excellent, but in the case that it is required to replicate rules to an alternative data center, NATs are not replicated.

Cisco Secure Firewall Management Center Feature Ratings

Policy planning and rule management
9
Automated Policy Orchestration
9
Device Discovery
9
Policy Compliance Auditing
9
Attack Path Simulation Testing
9
Anomalous Event or Behavior Deviation
9
Vulnerability Scans
9
Firewall Rule Cleanup
10