Cisco IOS Security Implementation Team
We assist a customer in setting up a new branch office, and we evaluate and recommend the necessary security solutions. This includes firewall deployment, user and device security, and endpoint protection to ensure secure access to sensitive data.
The deployment process is significantly lengthy, spanning ten to fifteen years, primarily due to licensing issues. When initially setting up the firewall, the focus was primarily on regular business needs. This setup involves numerous routers and servers, including a central server and individual servers. Consequently, the complexity of the setup has driven up both the labor involved and the associated costs, particularly in terms of internet connectivity.
View full review »We implemented the solution in-house.
View full review »Buyer's Guide
Cisco IOS Security
April 2024
Learn what your peers think about Cisco IOS Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.
CO
Cletus Okolie
Senior Network Associate at AMCON, Inc.
The initial setup is not much of a problem if you have an existing configuration. You just need to copy and paste. But if you're designing things, you might need a consultant.
We mostly need technical people for the solution to support users. Most of the issues we have are the Mac and our Cisco Eye. Sometimes, the user's password will expire, and the user must be called to connect them back. Sometimes, Eye does not allow the users to work, and we need to clear the ports and things like that. That's a bit of the experience where we have one challenge after another, but we are finding our way around it. Regarding the number of technical staff, we need a password administrator who does the configuration and then support guys who ensure that all the endpoints have access to the network.
View full review »BS
Bill Sangiwa
Information Technology Specialist at twigalpha
We were doing everything by ourselves at first, but we ended up using an integrator at some point.
View full review »Deployment time really depends on the specific project scope. Let's say you have a project with 100 users and need the full installation implemented. That might take around a week, including design, installation, and finalizing the project. However, if you only need specific changes or process implementations, it could be as quick as two days.
We need one architect, two engineers, and one technician for this project.
View full review »HA
Hassan-Ayoub
Business Development Manager at Odxs
We implement the solution for customers on our own unless we have an issue or bug. It takes one expert staff person for deployment. Depending on the customer's policies and the network's complexity, deployment might take from three to seven days.
Our process includes verifying the license and setting up the firewall, hardware, FMC, and the failover when there is more than one firewall. We then define or set up the configurable interfaces and the IP addresses. Finally, we define the VLAN of the customer and policies for each VLAN.
The solution does not require ongoing maintenance if it is configured properly.
View full review »CE
CHIMEZIE EMECHEBE
Solution Architect at Bilicha Technology
We did the setup mostly with our team. We are consultants. We worked with a reseller. Cisco has an integrator software team too.
View full review »MS
MohamedSalah8
Senior Presale Agent
We did the implementation of Cisco IOS Security in-house.
We have two service engineers that are involved in the deployment and maintenance of the solution. They have the appropriate training needed to support the solution.
View full review »SH
SeniorEn2e68
Senior Engineer Data Center at a comms service provider with 1,001-5,000 employees
We deployed this solution ourselves.
View full review »DH
Operatioa29e
Operational Risk Manager at a financial services firm with 1,001-5,000 employees
We use every consulting firm and probably most integrators, depending on the project. On any day it could be Deloitte, Accenture, etc.
View full review »OM
Omar Moran
Senior Pre Sales Engineer at IKUSI
I think the initial setup was simple. We have a lot of documentation and a guide that we can follow.
View full review »KA
Khalil AbdulrahmanAlasbahi
Commercial Manager at Natco Information technology
We have two engineers that do the implementation and maintenance of the solution.
View full review »AL
reviewer1540473
Sr. Security and Enterprise Architect at a security firm with 11-50 employees
We are the vendor team that handles implementations.
View full review »FA
reviewer1074924
Networks Lead Engineer at a mining and metals company with 1,001-5,000 employees
We used a vendor. We are not doing anything ourselves except for the basic things. We are using the vendors to do this. Not everything is handled by vendors; only, again, for the complicated products. We try to approach the integrators to do it.
View full review »FK
Fadil Kadrat
Network Engineer at Banque des Mascareignes
I implemented the solution myself. I am an integrator.
View full review »MN
Manish Nalawade
Owner at it logic
The solutions deployment required a three-person technical team.
View full review »FK
FadilKadrat
Network Engineer at Banque des Mascareignes
Sometimes we will use an integrator for the deployment and sometimes we will do it ourselves.
View full review »FH
reviewer1491402
Cyber Security Engineer at a tech company
We handle the implementation ourselves in-house. We don't need outside consultants or integrators.
View full review »Buyer's Guide
Cisco IOS Security
April 2024
Learn what your peers think about Cisco IOS Security. Get advice and tips from experienced pros sharing their opinions. Updated: April 2024.
768,740 professionals have used our research since 2012.