Tuesday, November 12, 2019

Cisco product strategy for Cisco ASA?

This post is not about vendor comparison (Check Point, Palo, Fortigate...) and why they are better or worse (just kidding).

So when I have to use Cisco ASA nowadays I wonder what is the product strategy for this product.

Cisco still sell the ASA(v) boxes together with their Firepower lineup.

Cisco is still working on their feature parity unified image in addition to their hybrid ASA image, their genuine ASA OS and Firepower image. I don't get what to use and I'm driven by the limitations of each OS to chose the "right" platform, which severely limits all other options.

Cisco rapidly lifecycles their "old" appliances. It feels like a constant flow, not with new features but features already present replaced by something else, a bit different but essentially the same. New features (aka bought 3rd party cloud services) itself are poorly implemented into the system.

Overall it feels like an unfinished piece of art done by multiple artist you already paid for or a surgery gone wrong but still in progress.

I'm confused, why would should anyone invest into the ASA platform? All signs point to Firepower. Is it the legacy of the AnyConnect or former edge firewall glory?

There are vague statements on the Cisco forums where they are headed with ASA OS but I miss the overall big picture.

Has someone some insight into the Cisco ASA/FP masterplan and where they are headed?



No comments:

Post a Comment