Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

The Cisco Adaptive Security Appliance (ASA) Software serves as the primary operating system for the Cisco ASA Family, providing robust enterprise-level firewall functionalities across various formats, including standalone units, blades, and virtual appliances, suitable for diverse network ecosystems. Additionally, ASA Software works in conjunction with other essential security technologies, ensuring it offers extensive solutions that can adapt to the ever-changing landscape of security requirements. This integration allows organizations to maintain a high level of protection against emerging threats while optimizing their network performance.

Description

Prevent the horizontal movement of threats within multi-cloud environments by implementing a software-based Layer 7 firewall at each workload location. As threat actors navigate through your infrastructure and ransomware attacks grow more advanced, east-west traffic has emerged as a critical area of concern. Leverage a software-defined Layer 7 firewall that provides detailed enforcement at scale, effectively securing east-west traffic in the contemporary multi-cloud landscape. This solution allows for straightforward network segmentation, halting the lateral spread of threats while enabling rapid, secure development as you transition to a Zero Trust model. Achieve comprehensive visibility across all network flows, facilitating precise micro-segmentation and the creation of context-aware policies tailored for each workload. By adopting a modern, distributed firewall solution specifically designed to protect multi-cloud traffic across virtualized workloads, you will significantly decrease the attack surface and enhance defenses against both known and emerging threats. Ultimately, this proactive approach not only fortifies your security posture but also ensures a resilient and agile infrastructure in an evolving threat landscape.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

A10 Defend DDoS Mitigator
AWS Marketplace
Alibaba Cloud SSL Certificates Service
Cisco ACI
Cisco Defense Orchestrator
Cisco SD-Access
ContraForce
Elastic Observability
Entrust TLS/SSL Certificates
FlashBlade//S
Genian NAC
LogMan.io
RapidScale Identity as a Service
Rublon
SecureIdentity IRAD
SecureIdentity PAM
Splunk SOAR
Splunk User Behavior Analytics

Integrations

A10 Defend DDoS Mitigator
AWS Marketplace
Alibaba Cloud SSL Certificates Service
Cisco ACI
Cisco Defense Orchestrator
Cisco SD-Access
ContraForce
Elastic Observability
Entrust TLS/SSL Certificates
FlashBlade//S
Genian NAC
LogMan.io
RapidScale Identity as a Service
Rublon
SecureIdentity IRAD
SecureIdentity PAM
Splunk SOAR
Splunk User Behavior Analytics

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Cisco

Founded

1984

Country

United States

Website

www.cisco.com/c/en/us/products/security/adaptive-security-appliance-asa-software/index.html

Vendor Details

Company Name

Broadcom

Founded

1991

Country

United States

Website

www.vmware.com/products/cloud-infrastructure/vdefend-distributed-firewall

Product Features

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Product Features

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Alternatives

FortiGate NGFW Reviews

FortiGate NGFW

Fortinet

Alternatives

Check Point CloudGuard Reviews

Check Point CloudGuard

Check Point Software Technologies
Palo Alto Networks VM-Series Reviews

Palo Alto Networks VM-Series

Palo Alto Networks
VyOS Reviews

VyOS

VyOS Networks