Cisco Secure Firewall Management Center Review
October 28, 2022

Cisco Secure Firewall Management Center Review

Daniel Sayer | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User

Overall Satisfaction with Cisco Secure Firewall Management Center

We use Cisco Secure Firewall Management Center to manage multiple firewalls from a central point. We are able to check intrusions and apply configuration changes across our network using this tool. It give us visibility in real time of any malware outbreaks allowing us to respond proactively to fix and remediate.
  • Enforce rules anywhere
  • Simplifies the protection of our network
  • Intrusion prevention
  • Deployment of policies can take a long time
  • Switching between tabs can take some time.
  • Reduced time to identify and fix issues
  • Reduced time of implementing fixes across multiple sites
  • Single vendor providing support
Cisco Secure Firewall Management Center had centralized management for both FTD and ASA Firepower module.

Do you think Cisco Secure Firewall Management Center delivers good value for the price?

Yes

Are you happy with Cisco Secure Firewall Management Center's feature set?

Yes

Did Cisco Secure Firewall Management Center live up to sales and marketing promises?

I wasn't involved with the selection/purchase process

Did implementation of Cisco Secure Firewall Management Center go as expected?

Yes

Would you buy Cisco Secure Firewall Management Center again?

Yes

I wouldn't recommend Cisco Secure Firewall Management Center for just a couple of firewalls but once you have more than this over a wide geographic area the ability to remotely manage and apply configuration changes is invaluable. It has reduced our time to respond to issues and being able to see through a "single pane" if there are any issues is really helpful.

Cisco Secure Firewall Management Center Feature Ratings

Policy planning and rule management
7
Automated Policy Orchestration
7
Device Discovery
8
Policy Compliance Auditing
7
Attack Path Simulation Testing
8
Anomalous Event or Behavior Deviation
7
Vulnerability Scans
8
Firewall Rule Cleanup
7