We are using this product to filter network traffic.
It's a flexible solution and is well-known in the community. Most professionals are familiar with Cisco products and we prefer to work with products that we know. That is why we chose to work with Cisco firewalls, and also for the quality.
In the next year, we are planning to migrate to the Cisco Firepower. Our planned product would be Cisco Firepower 20 or the 40 series.
In the next release, I would like to see the VPN and UTM features included.
I have been using the Cisco ASA Firewall for the past ten years.
We have a few different versions that we are using. Some are 5505, 5510, and 5515.
It's stable. We have not had any issues with stability.
It's a scalable solution. We have five or six users in our organization.
We have not contacted technical support because we have not had any issues.
Previously, we did not use any other solutions. Our company is almost 11 years old and have been using this solution for ten years. We have been using this solution from the beginning.
I have not been present for most of the deployments, but from my experience, the deployment is not complex for organizations like ours because we have less equipment and infrastructure.
In Ethiopia, most of the deployments, especially in government organizations, are on-premises because of government policy.
Our policies are limited and not complex.
Overall, I would say that it's pretty straightforward. While I was not a part of the deployment and had to guess, I would say it may have taken a week to deploy.
We require a team of four or five to maintain this solution.
In summary, this is a good product and I recommend it.
I would rate this solution a nine out of ten.
Mostly Enterprise firms they're using both, would be Palo Alto using in core and gateway traffic.