How do you or your organization use this solution?
Please share with us so that your peers can learn from your experiences.
Our primary use case for this solution is to improve network security. The maturity of our company's security implementation depends on our clients. Some of our clients really need a lot of work but some of them are advantaged. We are major implementors for Cisco. We implement it for our clients and we also use it internally. Our security maturity is advanced. We have been in IT business for over 75 years. We have major netowrk firewall experts in the company, so we know what to do. Our company uses more than thirty security tools. Ideally, we would use an end to end unified tool. But network security is far from that so we need to use multiple tools.
These are our primary edge firewalls at two data centers.
Currently, we have 16 remote sites. Some of them are sales offices and some of them are industrial plants. And we have a centralized IT department here in Brazil. The business asked me to support those remote sites. We started using the Firepower Threat Defense, which is one of the versions of next-gen firewalls from Cisco, at some of the sites. We have them operating at five sites, and we are deploying at a sixth site, in Mexico, with the same architecture. That architecture has the firewall running on the site's router, and we manage them all from here in Brazil.
The primary use case of for Cisco firewalls is to segment our network. We're using them on the perimeter network for traffic filtering. Since deploying them, we have seen a maturing of the security in our organization. We're using both the FTD 2100 and 4100. We have about 40 sites that are using our approximately 80 FTDs. We have about 2,000 users.
Our primary use cases for FTD are IPS, intrusion detection, and to get visibility into the network and the traffic that is going on in some sites. We always have them in-line, meaning that they're between two networking connections, and we analyze the traffic for the purposes of internal detection. In production, from the FTD line, we mostly have 2110s and 2130s because we have a lot of small sites, and we are starting to put in some 4110s. We only have FirePOWER here, but we don't use them most of the time as next-gen firewalls but more as an IPS. Everything is on-premises. We don't use public clouds for security reasons.
We use them in multiple places on our network. We use them on the edge of our network, in more of the traditional sense for inbound and outbound filtering. We also use them as a center of our network between all of our users and servers, so that all user traffic going through our servers is IPS and IDS as well. We have multiple Cisco 5000 Series firewalls and we also have a 4110 Series firewall, all running the FireSIGHT threat detection image. We keep that up to date within three months. If a new release comes out within three months, we're updating. The software deployment is on-prem.
We are a reseller and system integrator, and this is one of the solutions that we provide for our end users. We have experience with many firewall products from different vendors. The specific use case depends on the customer and their environment. They design the firewalls, and we supply the appropriate equipment. The majority of deployments are on private networks.
Our primary use case is whatever is best for our customer. I'm the service provider. The customer's main purpose is to use the malware services protection and the firewall itself, as well as the application awareness feature.
Cisco has a new general firewall: the Firepower NGFW. If you take a look at the Cisco Firepower product line, they have three models available: * A low-scale model: the 2000 series * A high-end model: the 4000 series * The carrier-grade model: the 9000 series We have already used the 4000 and 2000 series over here. We've been using this solution in Bangladesh for some customers over the last eight months. We've been using FPR 2110, 2120, 2130, & 2140. We also employ the FPR 4130 and 4140. We have been using this equipment on our last few projects. We used it as a transfer and for firewalling. The most recent one we are using for firewall support as well.
Our primary use case is for handling office traffic VPN tunnels and filtering the traffic. All the traffic comes into the house and gets filtered in and out the Firepower interface. It's performed well.
Our primary use case is to support a security environment. It has performed well.
Our primary use case of this solution is for firewalling.
My primary use case for this solution is for Internet access for the enterprise or for users, publishing, email, and to protect our network.
We are currently using version 6.3. Our primary use case of this solution is to put Firepower inside of the data center and at the Edge network.
Our primary use case is as a firewall and using it for web filtering. We use IPsec VPN services on it, as well as the router. I have been using the product for only a few months, but the company has been using it for a couple of years.
It's primarily for managing our employees. So far, it has been working great. We don't have many problems.
The primary use is to block incoming threats from the internet, at the edge of the network. It's performing well. We check the report of blocked pages, blocked attacks, etc.
The use case has been for the banking sector, for one of our banking customers. According to them, it's working perfectly.
We use it as a firewall and it has performed adequately.
E-commerce environment, Enterprise data center.