Most Helpful Review
The integration between Nmap, the database and Metasploit saves a lot of time. The initial setup was a bit tricky.
We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
For us, the most valuable features are the IPX and the Sourcefire Defense Center module. That gives us visibility into the traffic coming in and going out, and gives us the heads-up if there is a potential outbreak or potential malicious user who is trying to access the site. It also helps us see traffic generated by an end device trying to reach out to the world.
The information coming from Talos does a good job... I like the fact that Cisco is working with them and getting the information from them and updating the firewall.
The firepower sensors have been great; they do a good job of dropping unwanted traffic.
Unfortunately in Cisco, only the hardware was good.
The most important point is the detection engine which is now part of the next-generation firewalls and which is supported by Cisco Talos.
The most valuable features are the flexibility and level of security that this solution provides.
Integration with all the other Cisco tools is valuable.
We moved from a legacy firewall to the ASA with FirePOWER, increasing our Internet Edge defense dramatically.
Technical support for this solution is very good.
The stability of this solution is excellent.
Cisco IOS allows us to keep the same security features as our principal offices.
I've found their network routing to be very good.
You can scale it when you need to.
The VPN is the most valuable feature.
We use Cisco IOS Security mostly for routers to route off the firewall. It's a next-generation device.
Previously, anyone in the organization would see any data point in the wall. They could just go and connect their machine with that data point and could access the network. But now, even if someone came and tried that, they will not be given access.
The option to generate phishing emails has proven to be very valuable in understanding the behavior of users.
It contains almost all the available exploits and payloads.
It's not possible to do penetration testing without being very proficient in Metasploit.
We were also not too thrilled when Cisco announced that in the upcoming new-gen ASA, iOS was not going to be supported, or if you install them, they will not be able to be managed through the Sourcefire. However, it seems like Cisco is moving away from the ASA iOS to the Sourcefire FireSIGHT firmware for the ASA. We haven't had a chance to test it out.
Our latest experience with a code upgrade included a number of bugs and issues that we ran into. So more testing with their code, before it hits us, would help.
The software was very buggy, to the point it had to be removed.
In NGFW, Cisco should be aligned with the new technology and inspection intelligence because Cisco is far behind in this pipeline.
Most users do not have awareness of this product's functionality and features. Cisco should do something to make them aware of them. That would be quite excellent and useful to organizations that are still using legacy data-center-security products.
There was an error in the configuration, related to our uplink switches, that caused us to contact technical support, and it took a very long time to resolve the issue.
With regards to stability, we had a critical bug come out during our evaluation... not good.
The product would be improved if the GUI could be brought into the 21st Century.
In the next release of this solution, we would like to see support for the 100BT and 7000 models.
I think setup could be one area for improvement, because sometimes we don't have people inside so we have to move to the place.
I wish it would be more like the next generation firewall technology. There should be more selection between the application and filtering.
If they could increase the performance a little better because the device sometimes gets slow.
The routers, don't have like long-term tendency features, or higher availability features available for the IOS. It could also use a better user interface.
Most of their features are meant for Cisco. You cannot integrate them with any other vendor.
We have a very bad experience on the support. They take too much time requesting logs, and they are not coming directly online to resolve the issues.
There's a technology called SD-WAN that we would like to see. We are unable to handle multiple connections or to automatically load balance. I would like to have a feature that enables us to automatically prepare for load balancing.
Metasploit cannot be installed on a machine with an antivirus.
It is necessary to add some training materials and a tutorial for beginners.
The initial setup was a bit "tweaky" for the open-source version.
Pricing and Cost Advice
Pricing varies on the model and the features we are using. It could be anywhere from $600 to $1000 to up to $7,000 per year, depending on what model and what feature sets are available to us.
We used Check Point and the two are comparable. Cost was really what put us onto the ASAs... the price tag for Check Point was exorbitantly more than what it is for the ASA solution.
Always consider what you might need to reduce your wasted time and invest it in other solutions.
Watch out for hidden licensing and incredibly high annual maintenance costs.
We paid about $7,000 for the Cisco firewall, plus another small Cisco router and the lead switch. It was under the combined license. It's a final agreement.
The cost is a big factor for us. This is why we are using it only in our restricted area. They are very much higher than their competitors in the market.
Licensing is expensive compared to other solutions.
Pricing is high, but it is essentially a corporate decision.
The licenses for this solution are expensive.
The licensing is on a subscription basis, and it is fairly costly. I would prefer a one-time payment.
The pricing is very expensive. Normally I do a yearly contract; I don't know the exact pricing, but it's around $75,000 USD per year. That's the standard licensing.
It is expensive. Our license expired, and our company is not thinking to renew because of our budget.
I use the open-source version of this product. Pricing is not relevant.
Compared 39% of the time.
Compared 11% of the time.
Compared 9% of the time.
Compared 20% of the time.
Compared 16% of the time.
Compared 14% of the time.
Compared 62% of the time.
Compared 11% of the time.
Compared 7% of the time.
Also Known As
|Cisco ASA, Adaptive Security Appliance, ASA||IOS Security||Metasploit|
Adaptive Security Appliance (ASA) is Cisco's end-to-end software solution and core operating system that powers the Cisco ASA product series. This software solution provides enterprise-level firewall capabilities for all types of ASA products, including blades, standalone appliances and virtual devices. Adaptive Security Appliance provides protection to organizations of all sizes, and allows end-users to access information securely anywhere, at any time, and through any device.
Adaptive Security Appliance is also fully compatible with other key security technologies, and so provides organizations with an all-encompassing security solution.
Block more threats and quickly mitigate those that do breach your defenses with the industry’s first threat-focused NGFW.
|Cisco IOS Software delivers a sophisticated set of security capabilities for a comprehensive, layered security approach throughout your network infrastructure. Cisco IOS security technologies help to defend critical business processes against attack and disruption, protect privacy, and support policy and regulatory compliance controls.|
Attackers are always developing new exploits and attack methods—Metasploit penetration testing software helps you use their own weapons against them. Utilizing an ever-growing database of exploits, you can safely simulate real-world attacks on your network to train your security team to spot and stop the real thing.
Learn more about Cisco ASA NGFW
Learn more about Cisco IOS Security
Learn more about Rapid7 Metasploit
|There are more than one million Adaptive Security Appliances deployed globally. Top customers include First American Financial Corp., Genzyme, Frankfurt Airport, Hansgrohe SE, Rio Olympics, The French Laundry, Rackspace, and City of Tomorrow.||Arup Group, Brunel University London, City of Biel, Gobierno de Castilla-La Mancha, K&L Gates , New South Wales Rural Fire Service, Offshore Northern Seas, Transplace||City of Corpus Christi, Diebold, Lumenate, Nebraska Public Power District, Prairie North Regional Health, Apptio, Automation Direct, Bob's Stores, Cardinal Innovations Healthcare Solutions, Carnegie Mellon University|
Financial Services Firm17%
Comms Service Provider11%
Software R&D Company28%
Comms Service Provider16%
Financial Services Firm22%
Comms Service Provider22%
Mining And Metals Company11%
Software R&D Company24%
Comms Service Provider22%
No Data Available