Cisco IOS Security Implementation Team

Karthik Venkataraman - PeerSpot reviewer
Senior Consultant at Velocis Systems

We assist a customer in setting up a new branch office, and we evaluate and recommend the necessary security solutions. This includes firewall deployment, user and device security, and endpoint protection to ensure secure access to sensitive data.

View full review »
Anik Islam - PeerSpot reviewer
System Engineer at Ha-Meem Group

The deployment process is significantly lengthy, spanning ten to fifteen years, primarily due to licensing issues. When initially setting up the firewall, the focus was primarily on regular business needs. This setup involves numerous routers and servers, including a central server and individual servers. Consequently, the complexity of the setup has driven up both the labor involved and the associated costs, particularly in terms of internet connectivity.

View full review »
Darryl Thompson - PeerSpot reviewer
ICT Leader at Safripol (Pty) Ltd.

We implemented the solution in-house.

View full review »
Buyer's Guide
Cisco IOS Security
April 2024
Learn what your peers think about Cisco IOS Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.
CO
Senior Network Associate at AMCON, Inc.

The initial setup is not much of a problem if you have an existing configuration. You just need to copy and paste. But if you're designing things, you might need a consultant.

We mostly need technical people for the solution to support users. Most of the issues we have are the Mac and our Cisco Eye. Sometimes, the user's password will expire, and the user must be called to connect them back. Sometimes, Eye does not allow the users to work, and we need to clear the ports and things like that. That's a bit of the experience where we have one challenge after another, but we are finding our way around it. Regarding the number of technical staff, we need a password administrator who does the configuration and then support guys who ensure that all the endpoints have access to the network.

View full review »
BS
Information Technology Specialist at twigalpha

We were doing everything by ourselves at first, but we ended up using an integrator at some point.

View full review »
SameerBali - PeerSpot reviewer
Network Architect at Syriatel Mobile Telecom

Deployment time really depends on the specific project scope. Let's say you have a project with 100 users and need the full installation implemented. That might take around a week, including design, installation, and finalizing the project. However, if you only need specific changes or process implementations, it could be as quick as two days.

We need one architect, two engineers, and one technician for this project.

View full review »
HA
Business Development Manager at Odxs

We implement the solution for customers on our own unless we have an issue or bug. It takes one expert staff person for deployment. Depending on the customer's policies and the network's complexity, deployment might take from three to seven days. 

Our process includes verifying the license and setting up the firewall, hardware, FMC, and the failover when there is more than one firewall. We then define or set up the configurable interfaces and the IP addresses. Finally, we define the VLAN of the customer and policies for each VLAN. 

The solution does not require ongoing maintenance if it is configured properly. 

View full review »
CE
Solution Architect at Bilicha Technology

We did the setup mostly with our team. We are consultants. We worked with a reseller. Cisco has an integrator software team too.

View full review »
MS
Senior Presale Agent

We did the implementation of Cisco IOS Security in-house.

We have two service engineers that are involved in the deployment and maintenance of the solution. They have the appropriate training needed to support the solution.

View full review »
SH
Senior Engineer Data Center at a comms service provider with 1,001-5,000 employees

We deployed this solution ourselves.

View full review »
DH
Operational Risk Manager at a financial services firm with 1,001-5,000 employees

We use every consulting firm and probably most integrators, depending on the project. On any day it could be Deloitte, Accenture, etc.

View full review »
OM
Senior Pre Sales Engineer at IKUSI

I think the initial setup was simple. We have a lot of documentation and a guide that we can follow.

View full review »
KA
Commercial Manager at Natco Information technology

We have two engineers that do the implementation and maintenance of the solution.

View full review »
AL
Sr. Security and Enterprise Architect at a security firm with 11-50 employees

We are the vendor team that handles implementations.

View full review »
FA
Networks Lead Engineer at a mining and metals company with 1,001-5,000 employees

We used a vendor. We are not doing anything ourselves except for the basic things. We are using the vendors to do this. Not everything is handled by vendors; only, again, for the complicated products. We try to approach the integrators to do it.

View full review »
FK
Network Engineer at Banque des Mascareignes

I implemented the solution myself. I am an integrator.

View full review »
MN
Owner at it logic

The solutions deployment required a three-person technical team.

View full review »
FK
Network Engineer at Banque des Mascareignes

Sometimes we will use an integrator for the deployment and sometimes we will do it ourselves. 

View full review »
FH
Cyber Security Engineer at a tech company

We handle the implementation ourselves in-house. We don't need outside consultants or integrators. 

View full review »
Buyer's Guide
Cisco IOS Security
April 2024
Learn what your peers think about Cisco IOS Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.