Cyber Security Head at Turnkey Integrated Technologies TK-IT
Reseller
Top 5
2024-08-01T13:39:43Z
Aug 1, 2024
We encountered challenges, particularly when building use cases for this firewall, as it requires specific OS versions and firmware upgrades, which can lead to increased downtime. It adds an administrative burden on the operation team, as it is essential for managing the firewalls. I recommend they work on usability and ensure the solution is more user-friendly. It includes improving the connectivity and functionality when bugs occur.
Systems Hardware Operation Executive at a tech services company with 201-500 employees
Real User
Top 20
2024-04-23T17:16:58Z
Apr 23, 2024
Improving the product by incorporating SD-WAN functionality would be highly beneficial, especially for remote offices with limited server and Internet availability.
We use the suggested standard policies that come with the equipment. We don't put much effort into customizing these policies, which we know is a risk. We're moving to a more advanced IT area that will change how we manage the firewall policies. Cisco offers many ways to manage the equipment, but our team lacks extensive knowledge. We're moving these responsibilities to a specialized security team.
Areas for improvement include pricing points and the range of products available at any given time. Cisco could potentially address these aspects more effectively to better accommodate the needs of customers across various tiers and levels.
Cisco Secure Firewall Management Center's dashboard needs to be modified. Due to the lack of enough tutorials available online, I face problems with Cisco. There needs to be enough sources provided by Cisco from where users can learn more about Cisco products. It would be great if Cisco could provide users with tutorials that help with dashboards and CLM since Cisco does not provide much information in the aforementioned areas.
Learn what your peers think about Cisco Secure Firewall Management Center. Get advice and tips from experienced pros sharing their opinions. Updated: November 2024.
Chief Information Security Officer at Allied Bank Limited
Real User
Top 10
2023-07-12T06:24:00Z
Jul 12, 2023
The product must improve its performance. When we push policies from the console, it takes a lot of time. It takes five to seven minutes to push one policy. If someone pushes a wrong policy and there is an outage in the banking system, they would have to wait six to seven minutes to revert it. We have highlighted this issue to Cisco. A year ago, we told Cisco that we need APIs for integration with SOAR for pushing policies. We cannot push policies or run playbooks from SOAR to block any IOCs on the web and email gateway because Cisco doesn’t expose the APIs. It is one thing for which we have been following up with Cisco for the last year, but I don't think they've developed the API integration. Palo Alto and Fortinet provide this feature to their users.
Network Admistrator at a energy/utilities company with 10,001+ employees
Real User
Top 20
2023-05-18T09:50:00Z
May 18, 2023
Since it became unlicensed, there have been constant issues that became problematic. I can't understand why it happened. It was stable, stable, stable, and suddenly, there was a huge influx of traffic from the outside interface. And basically, the services get disabled. I see SLA agents crashing and Smart Life Protection errors occurring. I believe it's due to the lack of license, but I can't explain why it's happening. So there have been many issues with stability. It's not very user-friendly and can be somewhat disorganized. In additional features, I think the login process could be improved. It's currently a big challenge, and creating proper and easy-to-generate reports is not very straightforward. There are some gaps that need to be addressed.
Sr. Network Administrator at a computer software company with 1,001-5,000 employees
Real User
Top 20
2023-02-20T06:43:41Z
Feb 20, 2023
There is a performance issue with the STDs. There are full limitations on the site where we installed IPS and IDS, which is a prevention system. This is affecting the mentioned performance, which is not up to the standard required for the books. Furthermore, if we have to failover, we will have to do an RMA, and then rebuild it, since there is no solution. If the file is RMA, it will not be in the cluster. This means we have to build a new cluster, which will result in downtime. The performance of the Cisco Secure Firewall Management Center could be improved. It is very slow and difficult to manage the group. Previously, it was based on the CLI, but the group performance did not meet the market standards. When comparing Cisco Secure Firewall Management Center with Palo Alto, the SMPS of Palo Alto is much better.
Head of the IT Security Division at a tech services company with 11-50 employees
Real User
Top 10
2022-11-17T14:59:02Z
Nov 17, 2022
The GUI needs to be improved, and I'd like to see better performance particularly with VMware installation. There are slowness issues. Cisco firewalls use old ESR or a Linux system, and there are problems with encryption. When we switch on encryption, the throughput goes down. It would be good to have information on the correlation of logs for a botnet attack, for example.
IT Manager at a tech services company with 201-500 employees
Real User
2021-12-27T19:10:00Z
Dec 27, 2021
The user management and protection in-network access should be improved upon. The initial setup is a bit complex. There is no technical support available. We're based in Iran and cannot directly work with them due to sanctions.
Cisco Systems at a comms service provider with 501-1,000 employees
MSP
2021-07-06T17:40:20Z
Jul 6, 2021
I think the IOS and the deploy option could be improved. They should also consider working on the batteries. It's not helpful most of the time. Cisco's competitors have more features and they give more thought to their solutions.
The Cisco Secure Firewall Management Center is the administrative nerve center for select Cisco security products running on multiple platforms. It provides unified management of Cisco Secure Firewalls with Firewall Threat Defense (FTD) software for port and protocol control, application control, IPS, URL filtering, and malware protection functions. Firewall Management Center is the centralized event and policy manager for:
● Cisco Secure Firewall with the Firewall Threat Defense (FTD)...
We encountered challenges, particularly when building use cases for this firewall, as it requires specific OS versions and firmware upgrades, which can lead to increased downtime. It adds an administrative burden on the operation team, as it is essential for managing the firewalls. I recommend they work on usability and ensure the solution is more user-friendly. It includes improving the connectivity and functionality when bugs occur.
The interface should be more user friendly.
Improving the product by incorporating SD-WAN functionality would be highly beneficial, especially for remote offices with limited server and Internet availability.
We use the suggested standard policies that come with the equipment. We don't put much effort into customizing these policies, which we know is a risk. We're moving to a more advanced IT area that will change how we manage the firewall policies. Cisco offers many ways to manage the equipment, but our team lacks extensive knowledge. We're moving these responsibilities to a specialized security team.
Areas for improvement include pricing points and the range of products available at any given time. Cisco could potentially address these aspects more effectively to better accommodate the needs of customers across various tiers and levels.
Cisco Secure Firewall Management Center's dashboard needs to be modified. Due to the lack of enough tutorials available online, I face problems with Cisco. There needs to be enough sources provided by Cisco from where users can learn more about Cisco products. It would be great if Cisco could provide users with tutorials that help with dashboards and CLM since Cisco does not provide much information in the aforementioned areas.
Cisco Secure Firewall Management Center needs to reduce its price.
Cisco Secure Firewall Management Center's logging functionality could be improved.
The solution should improve the user interface. It could be more user-friendly.
The product must improve its performance. When we push policies from the console, it takes a lot of time. It takes five to seven minutes to push one policy. If someone pushes a wrong policy and there is an outage in the banking system, they would have to wait six to seven minutes to revert it. We have highlighted this issue to Cisco. A year ago, we told Cisco that we need APIs for integration with SOAR for pushing policies. We cannot push policies or run playbooks from SOAR to block any IOCs on the web and email gateway because Cisco doesn’t expose the APIs. It is one thing for which we have been following up with Cisco for the last year, but I don't think they've developed the API integration. Palo Alto and Fortinet provide this feature to their users.
The product's setup could be easier.
Since it became unlicensed, there have been constant issues that became problematic. I can't understand why it happened. It was stable, stable, stable, and suddenly, there was a huge influx of traffic from the outside interface. And basically, the services get disabled. I see SLA agents crashing and Smart Life Protection errors occurring. I believe it's due to the lack of license, but I can't explain why it's happening. So there have been many issues with stability. It's not very user-friendly and can be somewhat disorganized. In additional features, I think the login process could be improved. It's currently a big challenge, and creating proper and easy-to-generate reports is not very straightforward. There are some gaps that need to be addressed.
The solution could improve the number of ports available and load balancing. In a feature release, it would be beneficial to add a sandboxing feature.
There is a performance issue with the STDs. There are full limitations on the site where we installed IPS and IDS, which is a prevention system. This is affecting the mentioned performance, which is not up to the standard required for the books. Furthermore, if we have to failover, we will have to do an RMA, and then rebuild it, since there is no solution. If the file is RMA, it will not be in the cluster. This means we have to build a new cluster, which will result in downtime. The performance of the Cisco Secure Firewall Management Center could be improved. It is very slow and difficult to manage the group. Previously, it was based on the CLI, but the group performance did not meet the market standards. When comparing Cisco Secure Firewall Management Center with Palo Alto, the SMPS of Palo Alto is much better.
The GUI needs to be improved, and I'd like to see better performance particularly with VMware installation. There are slowness issues. Cisco firewalls use old ESR or a Linux system, and there are problems with encryption. When we switch on encryption, the throughput goes down. It would be good to have information on the correlation of logs for a botnet attack, for example.
Cisco Secure Firewall Management Center could improve by being less expensive.
The user management and protection in-network access should be improved upon. The initial setup is a bit complex. There is no technical support available. We're based in Iran and cannot directly work with them due to sanctions.
I think the IOS and the deploy option could be improved. They should also consider working on the batteries. It's not helpful most of the time. Cisco's competitors have more features and they give more thought to their solutions.