I deal with Cisco Secure Firewall, especially when dealing with zero-day attacks, and known and unknown malware, both inbound and from within the network. So, it includes IOS Security and IDPS functionalities.
The solution is the core of our network to implement, for example, Cisco Eyes, since we have Cisco Eyes on our network. At the core and access layers, we also use the solution for all our configurations concerning admission control into the network.
We employ a firewall to safeguard our secret clusters within our infrastructure. Additionally, we utilize panels such as Internet panels, which handle a substantial amount of security traffic, including handheld products. This setup extends to our routers and connector switches as well.
Our company uses the solution as intrusion protection for customers. It fully integrates with the BMA and ISE. We manage all traffic in data centers to protect them from internal users and outside traffic.
We use Cisco IOS Security for integration purposes. We have Cisco features and Cisco devices in our organization. We use it as an integration system for Cisco devices.
We can use iOS security for a variety of security features. We can use it to run DPM. We run encrypted data and can use it for zone-based firewalls, to a zone-based firewall. I use VPN solutions such as site-to-site or user-site VPN, and some do not require a firewall.
Sr. Security and Enterprise Architect at a security firm with 11-50 employees
Real User
2021-12-03T15:39:00Z
Dec 3, 2021
The solution is used for enterprise and NAC connectivity. This kind of technology has the advantage of being very flexible to any size organization. It is a cornerstone as a part of the basic network infrastructure. It can be used as a simple switch to connect your network devices with security features embedded - such as port security, for example. This allows companies to limit to a fixed address per port, avoiding external or malicious assets for accessing the network. For example, if you have a retail business, and you have a lot of small stores spread nationwide, you just need to connect some cameras and sales points to the network. iOS security solutions allow you to have a secure LAN and you could add a secure WAN connection through your Internet provider with LTE links as backups. You can set up on-demand VPN connections from store to store for voice/video calls, or do inventory queries direct to the HQ database.
Field Solutions Engineer at a computer software company with 1,001-5,000 employees
MSP
2020-09-29T05:58:00Z
Sep 29, 2020
We are a reseller and Cisco IOS Security is one of the network security products that we offer to our clients. The primary use case is securing connectivity between sites. Examples of this are between a site and a data center, or a site and a cloud provider.
Some of our uses for this product are on-premise-based and then some are cloud-based. Mostly, we are cloud-based right now because we are getting away from physical architecture moving forward into the cloud as is Cisco. It allows going from considering CapEx (Capital Expenditure) to OpEx (Operating Expense, Operating Expenditure). That is one of the important things that it allows us to do. It is easier to have solutions cloud-based when it makes sense. All the updates and maintenance get taken care of on their side which is a benefit. On the cloud, we have both public and private services. It depends on what we are doing. If we have a client that is a hospital, they have got to be HIPAA (Health Insurance Portability and Accountability Act) compliant. We also recommend private cloud services for some huge retailers that have to be PCI (Payment Card Industry) compliant. We use it mostly just for prevention. Basically to prevent unauthorized use of network resources. They use it for routing capabilities, threat mitigation, worms, and viruses. A lot of times, it is used for the network application layer threat.
Product Manager - Wireless / IT Support Manager at a tech services company with 51-200 employees
Real User
2019-06-30T10:29:00Z
Jun 30, 2019
Since we do system integration, we have a lot of clients we deploy. There is not really a single case to point to because we have multiple clients. It depends and can vary from customer to customer.
I use Cisco IOS Security. We install it for people. We have a very small network station. We don't use Cisco IOS Security very often, but we install it for clients. We use Cisco IOS Security mostly for routers to route off the firewall. It's a next-generation device. With firewalls, we can connect the solution for the mail cloud. We've deployed with Fortinet FortiGate. We don't use it much. We use Cisco IOS Security to manage for enterprise clients. Our primary use case for this solution is in the insurance industry.
Networks Lead Engineer at a mining and metals company with 1,001-5,000 employees
Real User
2019-06-23T09:40:00Z
Jun 23, 2019
We use it for endpoint security, to control access to our edge level. Basically, Cisco IOS checks the identity of each endpoint (printers, etc.). There's a specific group allowing the printer to immediately connect to the network. Also, if there is a laptop, for example, then the IOS will tell you, okay this is a laptop, please add the user name and password to access the network. Once it gets authenticated with IOS, they will still do something like posturing, checking the compliance list. For example, if a laptop doesn't have an updated antivirus or updated patches - if it's non-compliant with any one of those things, the system will reject it and isolate it in a special network, so it cannot access our network.
Cisco IOS Software delivers a sophisticated set of security capabilities for a comprehensive, layered security approach throughout your network infrastructure. Cisco IOS security technologies help to defend critical business processes against attack and disruption, protect privacy, and support policy and regulatory compliance controls.
I deal with Cisco Secure Firewall, especially when dealing with zero-day attacks, and known and unknown malware, both inbound and from within the network. So, it includes IOS Security and IDPS functionalities.
Primarily, we were looking for security solutions for a specific project and another one after that.
We use Cisco IOS Security for security functions like firewalls and IPS in specific remote branches.
The solution is the core of our network to implement, for example, Cisco Eyes, since we have Cisco Eyes on our network. At the core and access layers, we also use the solution for all our configurations concerning admission control into the network.
We employ a firewall to safeguard our secret clusters within our infrastructure. Additionally, we utilize panels such as Internet panels, which handle a substantial amount of security traffic, including handheld products. This setup extends to our routers and connector switches as well.
We use Cisco IOS Security for firewalls and security purposes. Cisco has licenses that allow you to create registered ports.
We use the solution to secure data centres for clients.
We use the product for firewalls.
We use Cisco IOS Security to segregate IT and OT environments.
The primary use case of the solution is firewall protection.
Our company uses the solution as intrusion protection for customers. It fully integrates with the BMA and ISE. We manage all traffic in data centers to protect them from internal users and outside traffic.
IOS Security is a firewall, and every connection goes through it. We have around 12,000 people in the company.
We're using it for internet traffic security. It's for protection.
The main purpose of Cisco IOS Security is for our data center. It connects each node and user to the network.
We use Cisco IOS Security for integration purposes. We have Cisco features and Cisco devices in our organization. We use it as an integration system for Cisco devices.
We can use iOS security for a variety of security features. We can use it to run DPM. We run encrypted data and can use it for zone-based firewalls, to a zone-based firewall. I use VPN solutions such as site-to-site or user-site VPN, and some do not require a firewall.
The solution is used for enterprise and NAC connectivity. This kind of technology has the advantage of being very flexible to any size organization. It is a cornerstone as a part of the basic network infrastructure. It can be used as a simple switch to connect your network devices with security features embedded - such as port security, for example. This allows companies to limit to a fixed address per port, avoiding external or malicious assets for accessing the network. For example, if you have a retail business, and you have a lot of small stores spread nationwide, you just need to connect some cameras and sales points to the network. iOS security solutions allow you to have a secure LAN and you could add a secure WAN connection through your Internet provider with LTE links as backups. You can set up on-demand VPN connections from store to store for voice/video calls, or do inventory queries direct to the HQ database.
We are using Cisco IOS Security for endpoint security. For example, spyware, firewall, database and application protection.
The primary use of the solution is used for testing the core banking customer function.
We primarily use the solution as a VPN concentrator. It's the main VPN concentrator for all remote connections.
We are a reseller and Cisco IOS Security is one of the network security products that we offer to our clients. The primary use case is securing connectivity between sites. Examples of this are between a site and a data center, or a site and a cloud provider.
Our primary use is just as a firewall. That is pretty much it.
Some of our uses for this product are on-premise-based and then some are cloud-based. Mostly, we are cloud-based right now because we are getting away from physical architecture moving forward into the cloud as is Cisco. It allows going from considering CapEx (Capital Expenditure) to OpEx (Operating Expense, Operating Expenditure). That is one of the important things that it allows us to do. It is easier to have solutions cloud-based when it makes sense. All the updates and maintenance get taken care of on their side which is a benefit. On the cloud, we have both public and private services. It depends on what we are doing. If we have a client that is a hospital, they have got to be HIPAA (Health Insurance Portability and Accountability Act) compliant. We also recommend private cloud services for some huge retailers that have to be PCI (Payment Card Industry) compliant. We use it mostly just for prevention. Basically to prevent unauthorized use of network resources. They use it for routing capabilities, threat mitigation, worms, and viruses. A lot of times, it is used for the network application layer threat.
We basically use it for security. It can be used as the internet as well as the data center security firewall.
Our primary use case for this solution is internet security at the edge.
We use this solution to connect branch offices and keep the security on each one.
We use Cisco IOS for security prevention. It enables us to check the network.
Since we do system integration, we have a lot of clients we deploy. There is not really a single case to point to because we have multiple clients. It depends and can vary from customer to customer.
I use Cisco IOS Security. We install it for people. We have a very small network station. We don't use Cisco IOS Security very often, but we install it for clients. We use Cisco IOS Security mostly for routers to route off the firewall. It's a next-generation device. With firewalls, we can connect the solution for the mail cloud. We've deployed with Fortinet FortiGate. We don't use it much. We use Cisco IOS Security to manage for enterprise clients. Our primary use case for this solution is in the insurance industry.
We use it for endpoint security, to control access to our edge level. Basically, Cisco IOS checks the identity of each endpoint (printers, etc.). There's a specific group allowing the printer to immediately connect to the network. Also, if there is a laptop, for example, then the IOS will tell you, okay this is a laptop, please add the user name and password to access the network. Once it gets authenticated with IOS, they will still do something like posturing, checking the compliance list. For example, if a laptop doesn't have an updated antivirus or updated patches - if it's non-compliant with any one of those things, the system will reject it and isolate it in a special network, so it cannot access our network.
I usually use it for GRE channels and VPNs. Is very stable and is a good solution. It has been stable.
We use it for routing and switching, VPNs, connectivity to some degree, and firewalls.