What do you like most about Cisco ASA NGFW?
Thanks for sharing your thoughts with the community!
They provide DDoS protection and multi-factor authentication. That is a good option as it enables work-from-home functionality.
The most valuable feature is that the encryption is solid.
For us, the most valuable features are the IPX and the Sourcefire Defense Center module. That gives us visibility into the traffic coming in and going out, and gives us the heads-up if there is a potential outbreak or potential malicious user who is trying to access the site. It also helps us see traffic generated by an end device trying to reach out to the world.
The information coming from Talos does a good job... I like the fact that Cisco is working with them and getting the information from them and updating the firewall.
The firepower sensors have been great; they do a good job of dropping unwanted traffic.
Unfortunately in Cisco, only the hardware was good.
The most important point is the detection engine which is now part of the next-generation firewalls and which is supported by Cisco Talos.
The most valuable feature of this solution is AMP (Advanced Malware Protection), as this is really needed to protect against cyber threats.
I like the Cisco ASDM (Adaptive Security Device Manager), which is the configuration interface for the Cisco firewall.
The stability of the solution is very good. We can see that it gets even better with every release.
The technical team is always available when we have problems.
The most valuable feature is that it has the ability to divide the network into three parts; internal, external, and DMZ.
A powerful enterprise security solution that is dependible.
The most important feature is its categorization because on the site and social media you are unified in the way they are there.
The most valuable feature of this solution is its ability to integrate vertically.
The most valuable features are the flexibility and level of security that this solution provides.
This solution is easy to use if you know how to set it up.
An efficient, easy to deploy and dependable firewall solution.
The web interface was easy for me. The configuration is logical, so it's easy to use and easy to understand how to protect, how to open a port, how to manage and how to route a device. That's why I prefer Cisco. It's robust and I never have issues with the hardware. That's why I choose Cisco and not another vendor.
Integration with all the other Cisco tools is valuable.
We moved from a legacy firewall to the ASA with FirePOWER, increasing our Internet Edge defense dramatically.
Cisco ASA NGFW significantly improves our bank. It protects any high-value products that we use from hackers, viruses, malware, and script-bots. It gives us metrics on network traffic as well as what kind of attacks we are getting from the outside.
Right now, Cisco ASA NGFW has given us a lot of improvement. We are planning to move to a new facility and will be a much larger organization.
I would say the Firepower module is most valuable. I'm trying more to transition to this kind firewall. I had to study a little on Palo Alto Networks equipment. There is a lot I have to learn about the difference.
The stability of Cisco ASA is excellent compared to other products on the market. Because of our customer experience as an integrator company, our clients never report any performance problems. We have a good performance reputation with Cisco ASA.
I like the user interface because the navigation is very easy, straightforward on your left side pane you have all the sites that you need to browse. Unlike any other firewalls, it's pretty straightforward.
We have multiple secure internal networks linked with our plants. We are from a oil company, so we have multiple plant areas which need to have restricted network access. Therefore, we are using it for restricting access to the plant area.
The feature that I found most valuable is the overall stability of the
The greatest benefit for the organization is the confidence that we are secured.
Its ability to discover attacks is a valuable feature. All of the other features that have to do with security are good.
This solution has good security, and it's a good product. You can trust Cisco, and there's support as well, which is really good.
Its VPN and ASN features are very stable.
It provides security for our company and users.
It protects our network.
Cisco ASA is very strong.
Cisco ASA works out-of-the-box. With the setup wizard, it was easy to get it deployed quickly, even by novice IT users.
It is scalable and stable.
It is a secure product.
At this point, we find that this product has high productivity and high availability and there is no need for improvement.
The IPS (In-plane switching) is the most valuable feature.
It allowed us to consolidating multiple security devices into a single appliance.
Valuable features include AnyConnect, double translations, and an independent IPS module.
ASA 5505 and ASA 5506 are very powerful tools to use in a business environment, and provide a lot of security.
It joins all branches and permits employees to work outside their offices, but everything is based on high securities standards (PCI compliance).
I am used to the ASA syntax, therefore it is quite easy to make up new rules. I have found that DNS doctoring rules are useful.
VPN load balancing has been particularly essential for my connections to integrate via multiple time zones.
ASDM provides GUI for configurations. The ASDM has made configuring ASA easy. No need to memorize CLI commands.
Sourcefire has been a great addition. The visibility and control have been nice.
Beats sophisticated cyber attacks with a superior security appliance.
Once configured to suit your needs, these firewalls are rock solid appliances.
Cisco ASA has an okay CLI with a nice GUI.
My confidence continues to build upon using Cisco firewalls.
I'm looking at firewalls. Which of these firewall solutions is the latest: