$("#con-aspect-container .snippet-list").append('
\"Paul<\/div>
Paul Nduati<\/span><\/a><\/div>
Assistant Ict Manager at a transportation company with 51-200 employees<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Jul 17, 2022<\/div><\/div>
A feature that would allow me to load balance among multiple ISPs, especially since we have deployed it as a perimeter firewall, would be a great addition.<\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
\"it_user1141920<\/div>
it_user1141920<\/span><\/a><\/div>
Systems Engineer at Wingmen Solutions A/S<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Sep 6, 2021<\/div><\/div>
On the VPN side, Firepower could be better. It needs more monitoring on VPNs. Right now, it's not that good. You can set up a VPN in Firepower, but you can't monitor it. <\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
FM<\/span><\/div><\/div>
Francesco-Molino<\/span><\/a><\/div>
Practice Lead at IPConsul<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Jul 28, 2021<\/div><\/div>
I would like to see improvement when you create policies on Snort 3 IPS on Cisco Firepower. On Snort 2, it was more like a UI page where you had some multiple choices where you could tweak your config. On Snort 3, the idea is more to build some rules on the text file or JSON file, then push it. So, I would like to see a lot of improvements here.<\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
MR<\/span><\/div><\/div>
MohammadRauf<\/span><\/a><\/div>
Security Officer at a government<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Nov 4, 2019<\/div><\/div>
We were also not too thrilled when Cisco announced that in the upcoming new-gen ASA, iOS was not going to be supported, or if you install them, they will not be able to be managed through the Sourcefire. However, it seems like Cisco is moving away from the ASA iOS to the Sourcefire FireSIGHT firmware for the ASA. We haven't had a chance to test it out.<\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
JF<\/span><\/div><\/div>
reviewer1357989<\/span><\/a><\/div>
Cisco Security Specialist at a tech services company with 10,001+ employees<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
May 27, 2020<\/div><\/div>
Cisco missed the mark with all the configuration steps. They are a pain and, when doing them, it looks as if we're using a very old technology — yet the technology itself is not old, it's very good. But the front-end configuration is very tough.<\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
PC<\/span><\/div><\/div>
PaulChauchis<\/span><\/a><\/div>
Security Architect<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Oct 15, 2019<\/div><\/div>
For the new line of FTDs, the performance could be improved. We sometimes have issues with the 41 series, depending what we activate. If we activate too many intrusion policies, it affects the CPU. <\/span><\/div><\/div><\/div>
Read full review<\/a> <\/i><\/div><\/div><\/div><\/div><\/div>
JS<\/span><\/div><\/div>
JoelStech<\/span><\/a><\/div>
Senior Network Engineer at Orvis<\/div><\/div><\/div><\/div>
<\/i><\/i><\/i><\/i><\/i> <\/span>
Oct 7, 2019<\/div><\/div>
Our latest experience with a code upgrade included a number of bugs and issues that we ran into. So more testing with their code, before it hits us, would help.<\/span><\/div><\/div><\/div>