Cisco ASAv Room for Improvement

Ryan Partington
Systems Administrator at Universal Audio
Even on a smaller scale, people are finding you need HA pairs, and there's no way that the ASA can do that, at least in the virtual version. We needed the ability to failover to one of the others to do maintenance, and this is a glaring issue. However, it is one of their cheaper products, so its understandable. It is just that we would hope by now, because it has been in use in a lot of different environments, for even moderately sized companies, the ability to have HA pairs would be extremely useful. View full review »
Vikram Arsid
Cyber Security Software Engineer at Fireeye
Cisco ASA should be easier to use. It is a bit tough to navigate and see what is going on. While I like the UI and dashboards of Cisco ASA, if you compare them to Palo Alto or Fortinet, they have much richer UIs. An analyst (or anyone) can see them, and say, "I have got all these important pointers on my dashboard." However, with Cisco ASA, we need to dig into many things and go to many views to see what is actually there. View full review »
Technical Manager at a comms service provider with 501-1,000 employees
Normally in terms of design, the user prefers to use Cisco ASAv as a border router or a border firewall, because you have two different kinds of firewalls. You have a firewall when the data communication enters the network, and then you have a firewall, for when you've been inside the network. So, for the inside network firewall, Check Point is better because it can make a better notation of your network infrastructure. But, for the incoming data, or border firewall, ASAv is better. In terms of improving the interface, if you compared to the Check Point file, then I think that ASAv should be better. They should improve the interface so that it's similar to the Check Point firewall. View full review »
Find out what your peers are saying about Cisco, pfSense, Palo Alto Networks and others in Firewalls. Updated: June 2019.
353,345 professionals have used our research since 2012.
Jonathan LELOU
Ingénieur technico-commercial at Inter-Continental Business Machines (ICBM)
I think the visibility of the network can be improved, at least from our current setup. I do not know everything about the solution and exactly how it can be modified. Another way they can improve is their pricing. One thing I notice is about the price is that it would be good if they could adapt the price to the area where a company is. West Africa is not the same as in India or in the USA and it is much more difficult to afford. If Cisco can manage this for our people it would help us implement better solutions. To upgrade to some Cisco solutions or features you have to invest resources to create the solution or pay the difference for that functionality to upgrade services or license. It is not really an all-in-one solution. So if Cisco could manage to build an all-in-one solution with most or all of the features we would be looking for in one solution, it would be better for us. For example, if you want faithful service from the company and equipment, you have to pay more just to get the solutions. If it's included it would be easier for us to deploy. View full review »
George Karani
IT Manager
I would say the pricing could be improved. It's quite expensive, especially for the economy. I'd like to see them more integration so that I don't need other parties for protecting my network. If I could just have ASA firewalls for perimeter protection and LAN protection, then I'm good. I don't need so many devices. I would like to see improvements for client protection. View full review »
Farhad Foladi
Cloud Services Operation Engineer at Informatic Services Company (ISC)
I don't have any experience with the price, but ASA is a comprehensive solution. In the next update of the Cisco ASAv, I would like to see them release a patch for ASAv, i.e. to put the FirePower solution into the cross-platform integration. View full review »
Donald Fitzai
LAN admin at Cluj County Council
There definitely is room for improvement. We found it difficult to publish an antenna plug with the ASDM. Cisco should make the interface for the firewall more simple. View full review »
Nasser Abd EL Rahman
IT Infrastructure Manager at Beltone financial
The overall application security features can be improved. It could also use a reporting dashboard. View full review »
Munish Gupta
Partner - Consulting & Advisory at Wipro Technologies
The artificial intelligence and machine learning (behavioral based threat detection), which I can this will be coming out in another year, these are what we need now. View full review »
Aimee White
Website and EComm at a local government with 10,001+ employees
We didn’t find any huge issues. Obviously, there are always vulnerabilities that come up and there was one in early 2018 but this was patched with software updates. Admin rights need to be given out carefully as they give overarching control to all devices - but that’s the same for everything. View full review »
Systems Administrator at a manufacturing company with 501-1,000 employees
The user interface is old fashioned. View full review »
Bashir Bashir
IT Administrator at Bash and Co
I tried to buy licenses, but I had trouble. Their licensing is too expensive. If they can get the reporting to go into deeper detail, it would really be helpful because in order to get the reports in Cisco you have to go to look at the information that you don't necessarily need. Also, the pricing is quite high. View full review »
Cristian Serban
Network Engineer at a financial services firm with 5,001-10,000 employees
* Interaction with the equipment * Different interface with the product * A more simple procedure in delivering policies to the equipment * Simplified upgrade procedure * Tracking flows * Monitoring and logs should be easier. View full review »
Find out what your peers are saying about Cisco, pfSense, Palo Alto Networks and others in Firewalls. Updated: June 2019.
353,345 professionals have used our research since 2012.
Sign Up with Email