• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

3 Standout New Features in Cisco’s Firepower 6.3 Release

Cisco recently released version 6.3, the latest iteration of software powering its Firepower family of cyber security solutions. Included as part of this update are Cisco Firepower 6.3 release several features that have long sat atop the wish lists of Cisco security shops. We caught up with members of our Network and Security team to learn more about what’s new with Firepower version 6.3 and what these changes could mean for customers.

Multi-instance for Firepower

One of the headline features that the 6.3 release brings to Firepower, specifically to Firepower 4100/9300 w/ Firepower Threat Defense (FTD), is multi-instance. Previously, admins could deploy a lone instance of FTD on a given security utility. As a result of this update, however, admins can now spin up multiple virtual appliances per security device. Each such appliance has its own FTD container and admins can customize it independently.

This revamped security architecture can support organizations in their pursuit of two constant data center objectives. By using this approach, admins can deliver a data center that is both highly available and also flexible enough to scale alongside organizational demands.

Two-factor authentication

Another new feature ushered in by version 6.3 is two-factor authentication for FTD. Remote users connecting via a VPN can now take advantage of the extra security of two factor authentication. The initial factor in the authentication process can be any RADIUS or LDAP/AD server. Secondary validation can occur through either an RSA token or from a DUO passcode sent out to a user’s internet-connected device.

Leveraging two-factor authentication can ensure users have the flexibility they want to work remotely without opening the organization up to any unnecessary risks.

Local authentication for VPN users

On the subject of authentication, version 6.3 brings additional verification capabilities to the table. So, admins are able to create users by way of Firepower Device Manager. They can use this locally-hosted account database to authenticate access requests coming in through a remote VPN connection. In this type of arrangement, that local cache of accounts can serve as either the primary or fallback verification method.

Of course, proximity is no longer a prerequisite for an attack. Given the ever-increasing threat posed by far-off malicious actors, it’s critical for organizations to take whatever steps necessary to tightly manage remote access to sensitive data.

Next Steps: Is Cisco’s Firepower 6.3 release the right fit for you?

These are just a few of the changes the 6.3 version of Firepower software can bring to organizational security postures. Want to learn more about what else it has in store? Thinking about upgrading your existing Firepower deployment or bringing the solutions to your company for the first time? Arraya’s Network and Security teams can help. Our experts are available to help you assess your current security environment and address any gaps with solutions and strategies designed to fit your individual needs. Visit https://www.arrayasolutions.com//contact-us/ today to start a conversation.

As always, feel free to leave us a comment on this or any of our blogs through social media. Arraya can be found on LinkedIn, Twitter, and Facebook. Furthermore, remember to follow us to stay up to date on our industry insights and unique IT learning opportunities.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}