Remediate Malware Outbreaks Automatically with Cisco SFMC
January 17, 2022

Remediate Malware Outbreaks Automatically with Cisco SFMC

Wayne Lin | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Cisco Secure Firewall Management Center

For the last couple of years, we have been heavily relying on Cisco Secure Firewall Management Center to gain total visibility into our network and endpoints.
  • Threat management.
  • Control access to our network by preventing unknown endpoints automatically.
  • Centralizing security management in one platform.
  • Due to the complexity of the Cisco Secure Firewall Management Center, it was hard for us to implement it. However, we partnered with an external service provider (Deloitte Cyber Risk) during the entire process from selection, deployment, training to customization.
  • Malware prevention.
  • We don't perform security management processes since Cisco SFMC helps control hosts and applications, investigate and resolve malware outbreaks.
We partnered with a third-party service provider, which insisted to implement Cisco Secure Firewall Management Center since they had a great expertise with it.

Do you think Cisco Secure Firewall Management Center delivers good value for the price?

Yes

Are you happy with Cisco Secure Firewall Management Center's feature set?

Yes

Did Cisco Secure Firewall Management Center live up to sales and marketing promises?

Yes

Did implementation of Cisco Secure Firewall Management Center go as expected?

Yes

Would you buy Cisco Secure Firewall Management Center again?

Yes

Before, we couldn't see devices that are using our network, cyber risks, and the activity of users. Cisco Secure Firewall Management Center has centralized security management in one place by automating over 60% of procedures.

Cisco Secure Firewall Management Center Feature Ratings

Policy planning and rule management
10
Automated Policy Orchestration
10
Device Discovery
10
Policy Compliance Auditing
10
Attack Path Simulation Testing
10
Anomalous Event or Behavior Deviation
10
Vulnerability Scans
10
Firewall Rule Cleanup
10