{"id":3957,"date":"2025-09-01T08:05:00","date_gmt":"2025-09-01T08:05:00","guid":{"rendered":"https:\/\/www.purevpn.com\/white-label\/?p=3957"},"modified":"2025-09-02T08:38:09","modified_gmt":"2025-09-02T08:38:09","slug":"what-is-firepower-threat-defense","status":"publish","type":"post","link":"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/","title":{"rendered":"What Is Firepower Threat Defense (FTD) and How Does It Work?"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_71 ez-toc-wrap-left counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#What_Is_Firepower_Threat_Defense\" title=\"What Is Firepower Threat Defense?\">What Is Firepower Threat Defense?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#Cisco_Firepower_Threat_Defense_Features\" title=\"Cisco Firepower Threat Defense Features\">Cisco Firepower Threat Defense Features<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#What_Do_FTD_and_FMC_Stand_For\" title=\"What Do FTD and FMC Stand For?\">What Do FTD and FMC Stand For?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#How_Firepower_Threat_Defense_Works\" title=\"How Firepower Threat Defense Works?\">How Firepower Threat Defense Works?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#Firepower_Threat_Defense_vs_ASA\" title=\"Firepower Threat Defense vs ASA\">Firepower Threat Defense vs ASA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#Deployment_Configuration_Essentials\" title=\"Deployment &amp; Configuration Essentials\">Deployment &amp; Configuration Essentials<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#Performance_and_Sizing_Considerations\" title=\"Performance and Sizing Considerations\">Performance and Sizing Considerations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#IT_Compliance_and_Governance_Implications\" title=\"IT Compliance and Governance Implications\">IT Compliance and Governance Implications<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#Extending_Protection_Beyond_FTD_With_PureVPN\" title=\"Extending Protection Beyond FTD With PureVPN\">Extending Protection Beyond FTD With PureVPN<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#Conclusion\" title=\"Conclusion\">Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n<p>Traditional firewalls used to be enough for most businesses. Block or allow traffic, set some rules, and you were covered. But attacks today don\u2019t stop at ports or IP addresses. They hide inside encrypted traffic, exploit applications, and bypass legacy defenses.<\/p>\n\n\n\n<p>This is where <strong>Firepower Threat Defense (FTD)<\/strong> comes in. Cisco designed it to merge the familiar ASA firewall foundation with next-generation features like intrusion prevention, URL filtering, and advanced malware defense. Instead of deploying separate tools for firewalling and intrusion detection, FTD combines them into a single unified platform.<\/p>\n\n\n\n<p>If you run a business that <a href=\"https:\/\/www.purevpn.com\/white-label\/central-management-console\/\" target=\"_blank\" rel=\"noreferrer noopener\">handles sensitive data<\/a>, finance, healthcare, <a href=\"https:\/\/www.purewl.com\/industries\/white-label-saas\/\" target=\"_blank\" rel=\"noreferrer noopener\">SaaS<\/a>, you\u2019ll likely run into FTD when scoping out security solutions. And if you\u2019re already a Cisco shop, it\u2019s the logical upgrade path. Let\u2019s break down what it is, how it works, and why it matters.<\/p>\n\n\n\n<link href=\"https:\/\/fonts.googleapis.com\/css2?family=Poppins:wght@500;600&#038;display=swap\" rel=\"stylesheet\">\n\n<style>\n  .tldr-box {\n    font-family: 'Poppins', sans-serif;\n    max-width: 800px;\n    margin: 40px auto;\n    background: #F9F7FF;\n    border: 1px solid #D9D2F5;\n    border-radius: 12px;\n    box-shadow: 0 8px 25px rgba(166, 143, 239, 0.08);\n    padding: 25px 30px;\n    display: flex;\n    align-items: flex-start;\n  }\n\n  .tldr-title {\n    font-weight: 700;\n    font-size: 28px;\n    color: #4D3B7A;\n    margin-right: 20px;\n    min-width: 90px;\n    text-align: right;\n  }\n\n  .tldr-content ul {\n    margin: 0;\n    padding-left: 20px;\n    color: #4D3B7A;\n    font-size: 15px;\n    line-height: 1.7;\n  }\n\n  .tldr-content li {\n    margin-bottom: 8px;\n  }\n\n  .tldr-content strong {\n    font-weight: 600;\n    color: #4D3B7A;\n  }\n<\/style>\n\n<div class=\"tldr-box\">\n  <div class=\"tldr-title\">TL;DR<\/div>\n  <div class=\"tldr-content\">\n    <ul>\n      <li><strong>Definition:<\/strong> Cisco\u2019s Firepower Threat Defense (FTD) is a unified next-gen firewall image combining ASA firewalling with IPS, malware defense, URL filtering, and VPN support.<\/li>\n      <li><strong>Core Features:<\/strong> Stateful firewalling, Snort 3 IPS, application visibility, AMP malware defense, URL filtering, VPN, and centralized logging.<\/li>\n      <li><strong>Management:<\/strong> Managed via Firepower Device Manager (FDM) for small setups or Cisco FMC for enterprise-scale deployments.<\/li>\n      <li><strong>ASA vs FTD:<\/strong> ASA = classic stateful firewall. FTD = ASA + next-gen capabilities in one platform.<\/li>\n      <li><strong>Configuration:<\/strong> Requires Smart Licensing, policy setup, IPS tuning, and VPN configuration (see Cisco FTD guide).<\/li>\n      <li><strong>Performance:<\/strong> Hardware sizing must account for IPS\/TLS inspection; datasheets show reduced throughput when features are enabled.<\/li>\n      <li><strong>Compliance Role:<\/strong> Supports PCI DSS, HIPAA, SOX, ISO 27001, and GDPR through access controls, logging, and VPN traffic encryption.<\/li>\n      <li><strong>Business Takeaway:<\/strong> FTD is both a security upgrade and a compliance enabler.<\/li>\n    <\/ul>\n  <\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_Is_Firepower_Threat_Defense\"><\/span>What Is Firepower Threat Defense?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"876\" height=\"493\" src=\"https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080206\/image-7.png\" alt=\"\" class=\"wp-image-3958\" srcset=\"https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080206\/image-7.png 876w, https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080206\/image-7-711x400.png 711w, https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080206\/image-7-768x432.png 768w\" sizes=\"auto, (max-width: 876px) 100vw, 876px\" \/><\/figure>\n\n\n\n<p>At its simplest, <strong>Firepower Threat Defense<\/strong> is Cisco\u2019s unified software image that runs on their next-generation firewall appliances. It combines:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The ASA firewall engine (stateful firewalling, VPN support).<br><\/li>\n\n\n\n<li>FirePOWER services (intrusion prevention, application control, malware defense).<br><\/li>\n\n\n\n<li>Cisco Talos threat intelligence for real-time updates.<br><\/li>\n<\/ul>\n\n\n\n<p>In other words, you get the old reliability of ASA plus the advanced capabilities you expect in a next-gen firewall.<\/p>\n\n\n\n<p>Firepower Threat Defense (FTD) is Cisco\u2019s next-generation firewall software image that merges ASA firewall features with advanced intrusion prevention, URL filtering, and malware defense, managed through Firepower Management Center (FMC) or Firepower Device Manager (FDM).<\/p>\n\n\n\n<p>This consolidation means businesses no longer have to choose between security depth and management simplicity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Cisco_Firepower_Threat_Defense_Features\"><\/span>Cisco Firepower Threat Defense Features<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"876\" height=\"493\" src=\"https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080208\/image-8.png\" alt=\"\" class=\"wp-image-3959\" srcset=\"https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080208\/image-8.png 876w, https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080208\/image-8-711x400.png 711w, https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080208\/image-8-768x432.png 768w\" sizes=\"auto, (max-width: 876px) 100vw, 876px\" \/><\/figure>\n\n\n\n<p>One reason FTD has gained so much traction is the breadth of its features. Looking at the Cisco Firepower Threat Defense datasheet, here are the highlights:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Stateful firewalling:<\/strong> The core ASA function remains intact, offering robust policy-based access control.<br><\/li>\n\n\n\n<li><strong>Intrusion Prevention (IPS):<\/strong> Powered by <strong>Snort 3<\/strong>, the engine inspects traffic for known and emerging exploits.<br><\/li>\n\n\n\n<li><strong>Application Visibility and Control (AVC):<\/strong> Lets admins identify and block risky apps at the application layer.<br><\/li>\n\n\n\n<li><strong>Advanced Malware Protection (AMP):<\/strong> Integrates with Cisco\u2019s Talos intelligence to stop known malware and detect zero-day behavior.<br><\/li>\n\n\n\n<li><strong>URL filtering:<\/strong> Blocks malicious or policy-violating websites in real time.<br><\/li>\n\n\n\n<li><strong>VPN capabilities:<\/strong> Secure remote access and site-to-site VPNs for hybrid and remote-first businesses.<br><\/li>\n\n\n\n<li><strong>Centralized logging and reporting:<\/strong> Key for audits and compliance checks.<\/li>\n<\/ul>\n\n\n\n<p>These Cisco Firepower Threat Defense features are critical for businesses that must meet regulatory standards like PCI DSS, HIPAA, or ISO 27001. Instead of piecing together multiple products, FTD brings them together under one management umbrella.<\/p>\n\n\n\n<link href=\"https:\/\/fonts.googleapis.com\/css2?family=Poppins:wght@500;600&#038;display=swap\" rel=\"stylesheet\">\n\n<style>\n  .luxury-cta-container {\n    text-align: center;\n    margin: 40px 0;\n  }\n\n  .luxury-cta-button {\n    background: linear-gradient(135deg, #8B70D6, #A68FEF);\n    color: #fff;\n    padding: 16px 40px;\n    border: none;\n    border-radius: 12px;\n    font-family: 'Poppins', sans-serif;\n    font-weight: 600;\n    font-size: 18px;\n    cursor: pointer;\n    text-decoration: none;\n    display: inline-block;\n    box-shadow: 0 10px 30px rgba(166, 143, 239, 0.25);\n    transition: transform 0.3s ease, box-shadow 0.3s ease;\n  }\n\n  .luxury-cta-button:hover {\n    transform: translateY(-2px);\n    box-shadow: 0 15px 35px rgba(166, 143, 239, 0.35);\n  }\n<\/style>\n\n<div class=\"luxury-cta-container\">\n  <a href=\"https:\/\/chat.openai.com\/?q=Summarize%20this%20article%20from%20https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/\"\n     target=\"_blank\"\n     class=\"luxury-cta-button\">\n    Summarize This Article On ChatGPT\n  <\/a>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"What_Do_FTD_and_FMC_Stand_For\"><\/span>What Do FTD and FMC Stand For?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>FTD = Firepower Threat Defense.<\/strong><br><\/li>\n\n\n\n<li><strong>FMC = Firepower Management Center<\/strong>.<br><\/li>\n<\/ul>\n\n\n\n<p>The <strong>Cisco FMC is the brain of the operation<\/strong>. It provides centralized policy management, reporting, and monitoring for multiple FTD devices. For small deployments, you can manage FTD locally using the Firepower Device Manager (FDM). For large enterprises, FMC is essential.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Manager<\/strong><\/td><td><strong>Best For<\/strong><\/td><td><strong>Pros<\/strong><\/td><td><strong>Cons<\/strong><\/td><\/tr><tr><td><strong>FMC<\/strong><\/td><td>Large multi-device deployments<\/td><td>Centralized policies, advanced reporting<\/td><td>Higher learning curve<\/td><\/tr><tr><td><strong>FDM<\/strong><\/td><td>Small deployments<\/td><td>On-box simplicity<\/td><td>Limited feature set<\/td><\/tr><tr><td><strong>Cloud-delivered FMC<\/strong><\/td><td>Hybrid\/remote environments<\/td><td>Cloud onboarding, zero-touch setup<\/td><td>Requires subscription<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>For enterprises, FMC wins. For SMBs, FDM is often enough.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_Firepower_Threat_Defense_Works\"><\/span>How Firepower Threat Defense Works?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"876\" height=\"493\" src=\"https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080239\/image-9.png\" alt=\"\" class=\"wp-image-3960\" srcset=\"https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080239\/image-9.png 876w, https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080239\/image-9-711x400.png 711w, https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080239\/image-9-768x432.png 768w\" sizes=\"auto, (max-width: 876px) 100vw, 876px\" \/><\/figure>\n\n\n\n<p>The easiest way to understand FTD is to follow a packet through it.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Ingress:<\/strong> Packet enters the firewall.<br><\/li>\n\n\n\n<li><strong>Policy lookup:<\/strong> FTD checks access control rules.<br><\/li>\n\n\n\n<li><strong>Inspection:<\/strong> Snort 3 engine inspects traffic for signatures and anomalies.<br><\/li>\n\n\n\n<li><strong>Malware and URL filtering:<\/strong> Requests are cross-checked against Talos feeds.<br><\/li>\n\n\n\n<li><strong>Decision:<\/strong> Allow, block, or log based on rules.<\/li>\n<\/ol>\n\n\n\n<p>This layered inspection lets FTD stop threats at multiple points, rather than relying on simple rule matching.<\/p>\n\n\n\n<p>From a management perspective, policies are pushed down from FMC to each device, keeping distributed networks consistent.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Firepower_Threat_Defense_vs_ASA\"><\/span>Firepower Threat Defense vs ASA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>This question pops up often: <em>What\u2019s the difference between Cisco ASA and Firepower Threat Defense?<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>ASA:<\/strong> Classic stateful firewall with VPN and NAT. No IPS or malware defense built-in.<br><\/li>\n\n\n\n<li><strong>FTD:<\/strong> ASA features plus IPS, malware defense, URL filtering, and application control.<\/li>\n<\/ul>\n\n\n\n<p>Think of ASA as a sturdy lock on your front door. FTD adds cameras, alarms, and motion sensors\u2014security for today\u2019s threats.<\/p>\n\n\n\n<p>Cisco is gradually steering customers away from ASA toward FTD. While ASA still receives updates, FTD is the future.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Deployment_Configuration_Essentials\"><\/span>Deployment &amp; Configuration Essentials<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"876\" height=\"493\" src=\"https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080241\/image-10.png\" alt=\"\" class=\"wp-image-3961\" srcset=\"https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080241\/image-10.png 876w, https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080241\/image-10-711x400.png 711w, https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080241\/image-10-768x432.png 768w\" sizes=\"auto, (max-width: 876px) 100vw, 876px\" \/><\/figure>\n\n\n\n<p>The <strong>Cisco Firepower Threat Defense configuration guide<\/strong> lays out deployment workflows. At a high level:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Choose your management model:<\/strong> FDM (local), FMC (centralized), or cloud-delivered FMC.<br><\/li>\n\n\n\n<li><strong>Set up licensing:<\/strong> Cisco Smart Licensing or Smart Licensing Satellite for air-gapped environments.<br><\/li>\n\n\n\n<li><strong>Define access policies:<\/strong> Start with default deny, then build granular rules.<br><\/li>\n\n\n\n<li><strong>Enable IPS and AVC policies:<\/strong> Tune Snort 3 rules for your environment.<br><\/li>\n\n\n\n<li><strong>Configure VPNs:<\/strong> Remote-access and site-to-site.<br><\/li>\n\n\n\n<li><strong>Enable logging and reporting:<\/strong> Critical for audits and troubleshooting.<\/li>\n<\/ol>\n\n\n\n<p>Common pitfalls include licensing errors, performance drops with <a href=\"https:\/\/www.purevpn.com\/jp\/blog\/ssl-vpn\/\" target=\"_blank\" rel=\"noreferrer noopener\">SSL decryption<\/a>, and upgrade blockers when configurations are stale. Document everything\u2014you\u2019ll thank yourself during audits.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Performance_and_Sizing_Considerations\"><\/span>Performance and Sizing Considerations<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Performance depends heavily on enabled features. An FTD 3100 series might hit multi-gigabit throughput in firewall-only mode, but enabling IPS and TLS decryption will reduce capacity.<\/p>\n\n\n\n<p>That\u2019s why the Cisco Firepower Threat Defense datasheet is essential during procurement. It provides tested numbers for each appliance under different feature sets.<\/p>\n\n\n\n<p><strong>Pro tip:<\/strong> Always size for worst-case throughput (all features on). It\u2019s better to oversize hardware than discover bottlenecks in production.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"IT_Compliance_and_Governance_Implications\"><\/span>IT Compliance and Governance Implications<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"876\" height=\"493\" src=\"https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080244\/image-11.png\" alt=\"\" class=\"wp-image-3962\" srcset=\"https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080244\/image-11.png 876w, https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080244\/image-11-711x400.png 711w, https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080244\/image-11-768x432.png 768w\" sizes=\"auto, (max-width: 876px) 100vw, 876px\" \/><\/figure>\n\n\n\n<p>Modern businesses don\u2019t just deploy security tools to keep hackers out. They deploy them to pass audits and meet customer expectations.<\/p>\n\n\n\n<p><strong>Firepower Threat Defense<\/strong> plays directly into compliance requirements:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>PCI DSS:<\/strong> Protects cardholder data with segmentation, logging, and intrusion prevention.<br><\/li>\n\n\n\n<li><strong>HIPAA:<\/strong> Ensures healthcare data integrity and confidentiality.<br><\/li>\n\n\n\n<li><strong>SOX:<\/strong> Provides audit trails and access control for financial reporting.<br><\/li>\n\n\n\n<li><a href=\"https:\/\/www.purevpn.com\/blog\/purevpn-parent-company-earns-iso-certification\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>ISO 27001<\/strong><\/a><strong> \/ <\/strong><a href=\"https:\/\/www.purevpn.com\/white-label\/gdpr-compliance-quick-start-guide-for-saas-providers\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>GDPR<\/strong><\/a><strong>:<\/strong> Addresses encryption, monitoring, and risk management.<\/li>\n<\/ul>\n\n\n\n<p>The ability to generate logs, enforce VPN connections, and block malicious content helps tick compliance boxes. But more importantly, it creates evidence\u2014something every auditor looks for.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Extending_Protection_Beyond_FTD_With_PureVPN\"><\/span>Extending Protection Beyond FTD With PureVPN<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Cisco FTD handles the perimeter and internal segmentation well. But businesses also need to secure <strong>data in transit<\/strong> across remote workers, branch offices, and SaaS applications. That\u2019s where VPNs step in.<\/p>\n\n\n\n<p>With <a href=\"https:\/\/www.purevpn.com\/white-label\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>PureVPN White Label<\/strong><\/a>, resellers and MSPs can:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Provide enterprise-grade VPN encryption under their own brand.<br><\/li>\n\n\n\n<li>Help clients meet compliance standards like HIPAA, <a href=\"https:\/\/www.purevpn.com\/white-label\/what-is-iso-compliance\/\" target=\"_blank\" rel=\"noreferrer noopener\">ISO 27001<\/a>, and GDPR.<br><\/li>\n\n\n\n<li>Bundle VPN with firewall deployments for a complete compliance package.<br><\/li>\n\n\n\n<li>Build recurring revenue through VPN subscriptions.<\/li>\n<\/ul>\n\n\n\n<p>Think of it as closing the loop: FTD secures the network edge, while VPN encryption secures traffic everywhere else. Together, businesses get a stronger compliance posture and end-to-end protection.<br><\/p>\n\n\n\n<div class=\"wp-block-buttons text-center is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-color has-background has-link-color wp-element-button\" href=\"http:\/\/purevpn.com\/white-label\/\" style=\"color:#fdfafa;background-color:#b15aff\" target=\"_blank\" rel=\"noreferrer noopener\">Join PureVPN&#8217;s White Label Program<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:52px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<link href=\"https:\/\/fonts.googleapis.com\/css2?family=Poppins:wght@500;600&#038;display=swap\" rel=\"stylesheet\">\n\n<style>\n  .faq-container {\n    font-family: 'Poppins', sans-serif;\n    max-width: 700px;\n    margin: 40px auto;\n    background: #F9F7FF;\n    border: 1px solid #D9D2F5;\n    border-radius: 18px;\n    box-shadow: 0 10px 30px rgba(166, 143, 239, 0.12);\n    padding: 30px;\n  }\n\n  .faq-title {\n    font-size: 20px;\n    font-weight: 600;\n    color: #4D3B7A;\n    margin-bottom: 20px;\n    text-align: center;\n  }\n\n  .faq-item {\n    background: #FFFFFF;\n    border: 1px solid #E2DAFA;\n    border-radius: 12px;\n    margin-bottom: 12px;\n    overflow: hidden;\n    box-shadow: 0 5px 20px rgba(166, 143, 239, 0.08);\n  }\n\n  .faq-question {\n    background: #F3EEFF;\n    padding: 15px;\n    cursor: pointer;\n    font-weight: 500;\n    color: #4D3B7A;\n    display: flex;\n    justify-content: space-between;\n    align-items: center;\n    font-size: 15px;\n  }\n\n  .faq-question:hover {\n    background: #EDE6FF;\n  }\n\n  .faq-answer {\n    display: none;\n    padding: 15px;\n    color: #5a4b85;\n    font-size: 14px;\n    line-height: 1.6;\n    border-top: 1px solid #E2DAFA;\n  }\n\n  .faq-icon {\n    font-weight: 600;\n    font-size: 18px;\n    transition: transform 0.3s ease;\n  }\n\n  .faq-item.active .faq-icon {\n    transform: rotate(45deg);\n  }\n<\/style>\n\n<div class=\"faq-container\">\n  <div class=\"faq-title\">Frequently Asked Questions<\/div>\n\n  <div class=\"faq-item\">\n    <div class=\"faq-question\">\n      What is Firepower Threat Defense?\n      <span class=\"faq-icon\">+<\/span>\n    <\/div>\n    <div class=\"faq-answer\">\n      Cisco\u2019s unified next-gen firewall software that combines ASA firewalling with advanced intrusion prevention, malware defense, and URL filtering.\n    <\/div>\n  <\/div>\n\n  <div class=\"faq-item\">\n    <div class=\"faq-question\">\n      What do FTD and FMC stand for?\n      <span class=\"faq-icon\">+<\/span>\n    <\/div>\n    <div class=\"faq-answer\">\n      FTD = Firepower Threat Defense. FMC = Firepower Management Center, the centralized management platform for FTD.\n    <\/div>\n  <\/div>\n\n  <div class=\"faq-item\">\n    <div class=\"faq-question\">\n      What is the difference between Cisco FTD and ASA?\n      <span class=\"faq-icon\">+<\/span>\n    <\/div>\n    <div class=\"faq-answer\">\n      ASA is a classic stateful firewall. FTD merges ASA features with intrusion prevention, URL filtering, and malware defense into one unified platform.\n    <\/div>\n  <\/div>\n\n  <div class=\"faq-item\">\n    <div class=\"faq-question\">\n      What is FTD in security?\n      <span class=\"faq-icon\">+<\/span>\n    <\/div>\n    <div class=\"faq-answer\">\n      It\u2019s Cisco\u2019s next-generation firewall solution designed to protect enterprise networks with advanced inspection and real-time threat intelligence.\n    <\/div>\n  <\/div>\n<\/div>\n\n<script>\n  document.querySelectorAll('.faq-question').forEach(question => {\n    question.addEventListener('click', () => {\n      const item = question.parentElement;\n      const answer = question.nextElementSibling;\n      item.classList.toggle('active');\n\n      if (answer.style.display === 'block') {\n        answer.style.display = 'none';\n      } else {\n        document.querySelectorAll('.faq-answer').forEach(ans => ans.style.display = 'none');\n        document.querySelectorAll('.faq-item').forEach(it => it.classList.remove('active'));\n        item.classList.add('active');\n        answer.style.display = 'block';\n      }\n    });\n  });\n<\/script>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><strong>Firepower Threat Defense<\/strong> isn\u2019t just another firewall. It\u2019s Cisco\u2019s answer to the reality that threats now hide in applications, encrypted traffic, and <a href=\"https:\/\/www.purevpn.com\/blog\/news\/new-zero-day-vulnerability-hits-zyxel-devices\/\" target=\"_blank\" rel=\"noreferrer noopener\">zero-day exploits<\/a>. By merging ASA with NGFW features, Cisco gives businesses a tool that protects, reports, and helps satisfy compliance requirements.<\/p>\n\n\n\n<p>For IT leaders, FTD is both a security upgrade and a compliance enabler. For resellers and service providers, pairing it with PureVPN White Label creates a compelling offering: firewalls that protect the edge, and VPNs that protect the workforce.<\/p>\n\n\n\n<p>The lesson is clear. Modern networks need layered defense, not single-function tools. FTD is a strong layer, but businesses that add VPN encryption complete the picture.<\/p>\n\n\n\n<div class=\"wp-block-buttons text-center is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-color has-background has-link-color wp-element-button\" href=\"http:\/\/purevpn.com\/white-label\/\" style=\"color:#fdfafa;background-color:#b15aff\" target=\"_blank\" rel=\"noreferrer noopener\">Join PureVPN&#8217;s White Label Program<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:52px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<script type=\"application\/ld+json\">{\"@context\":\"https:\/\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"What is firepower threat defense?\",\"acceptedAnswer\":[{\"@type\":\"Answer\",\"text\":\"Cisco\u2019s unified next-gen firewall software that combines ASA firewalling with advanced intrusion prevention, malware defense, and URL filtering.\"}]},{\"@type\":\"Question\",\"name\":\"What do FTD and FMC stand for?\",\"acceptedAnswer\":[{\"@type\":\"Answer\",\"text\":\"FTD = Firepower Threat Defense. FMC = Firepower Management Center, the centralized management platform.\"}]},{\"@type\":\"Question\",\"name\":\"What is the difference between Cisco Firepower Threat Defense and ASA?\",\"acceptedAnswer\":[{\"@type\":\"Answer\",\"text\":\"ASA is a classic stateful firewall. FTD merges ASA features with intrusion prevention, URL filtering, and malware defense in one platform.\"}]},{\"@type\":\"Question\",\"name\":\"What is FTD in security?\",\"acceptedAnswer\":[{\"@type\":\"Answer\",\"text\":\"It\u2019s Cisco\u2019s next-generation firewall solution designed to protect enterprise networks with advanced inspection and real-time threat intelligence.\"}]}]}<\/script><!-- Generated by https:\/\/www.searchlogistics.com -->\n","protected":false},"excerpt":{"rendered":"<p>Traditional firewalls used to be enough for most businesses. Block or allow traffic, set some rules, and you were covered. But attacks today don\u2019t stop at ports or IP addresses. They hide inside encrypted traffic, exploit applications, and bypass legacy defenses. This is where Firepower Threat Defense (FTD) comes in. Cisco designed it to merge&#8230;<\/p>\n","protected":false},"author":3,"featured_media":3964,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[122],"tags":[667,668],"class_list":["post-3957","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-firepower-threat-defense","tag-ftd"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is Firepower Threat Defense (FTD) and How Does It Work? - PureVPN White label<\/title>\n<meta name=\"description\" content=\"Learn what Firepower Threat Defense (FTD) is, how it works, and why it\u2019s vital for unified firewalling, intrusion prevention, and security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Firepower Threat Defense (FTD) and How Does It Work? - PureVPN White label\" \/>\n<meta property=\"og:description\" content=\"Learn what Firepower Threat Defense (FTD) is, how it works, and why it\u2019s vital for unified firewalling, intrusion prevention, and security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/\" \/>\n<meta property=\"og:site_name\" content=\"PureVPN White label\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-01T08:05:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-02T08:38:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080841\/Copy-of-Port-Forwarding-2025-09-01T125725.870.png\" \/>\n\t<meta property=\"og:image:width\" content=\"876\" \/>\n\t<meta property=\"og:image:height\" content=\"493\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"duresham\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"duresham\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/\",\"url\":\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/\",\"name\":\"What Is Firepower Threat Defense (FTD) and How Does It Work? - PureVPN White label\",\"isPartOf\":{\"@id\":\"https:\/\/www.purevpn.com\/white-label\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080841\/Copy-of-Port-Forwarding-2025-09-01T125725.870.png\",\"datePublished\":\"2025-09-01T08:05:00+00:00\",\"dateModified\":\"2025-09-02T08:38:09+00:00\",\"author\":{\"@id\":\"https:\/\/www.purevpn.com\/white-label\/#\/schema\/person\/d75943d96d9bdd3277bc60adaf00f44c\"},\"description\":\"Learn what Firepower Threat Defense (FTD) is, how it works, and why it\u2019s vital for unified firewalling, intrusion prevention, and security\",\"breadcrumb\":{\"@id\":\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#primaryimage\",\"url\":\"https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080841\/Copy-of-Port-Forwarding-2025-09-01T125725.870.png\",\"contentUrl\":\"https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080841\/Copy-of-Port-Forwarding-2025-09-01T125725.870.png\",\"width\":876,\"height\":493,\"caption\":\"Minimalistic illustration of firepower threat defense showing a shield with a flame, laptop terminal, and gears representing firewall protection and system control.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.purevpn.com\/white-label\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is Firepower Threat Defense (FTD) and How Does It Work?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.purevpn.com\/white-label\/#website\",\"url\":\"https:\/\/www.purevpn.com\/white-label\/\",\"name\":\"Purevpn White label\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.purevpn.com\/white-label\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.purevpn.com\/white-label\/#\/schema\/person\/d75943d96d9bdd3277bc60adaf00f44c\",\"name\":\"duresham\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.purevpn.com\/white-label\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/676e150b24efe0726f53fef31f98d1da?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/676e150b24efe0726f53fef31f98d1da?s=96&d=mm&r=g\",\"caption\":\"duresham\"},\"url\":\"https:\/\/www.purevpn.com\/white-label\/author\/duresham\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is Firepower Threat Defense (FTD) and How Does It Work? - PureVPN White label","description":"Learn what Firepower Threat Defense (FTD) is, how it works, and why it\u2019s vital for unified firewalling, intrusion prevention, and security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/","og_locale":"en_US","og_type":"article","og_title":"What Is Firepower Threat Defense (FTD) and How Does It Work? - PureVPN White label","og_description":"Learn what Firepower Threat Defense (FTD) is, how it works, and why it\u2019s vital for unified firewalling, intrusion prevention, and security","og_url":"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/","og_site_name":"PureVPN White label","article_published_time":"2025-09-01T08:05:00+00:00","article_modified_time":"2025-09-02T08:38:09+00:00","og_image":[{"width":876,"height":493,"url":"https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080841\/Copy-of-Port-Forwarding-2025-09-01T125725.870.png","type":"image\/png"}],"author":"duresham","twitter_card":"summary_large_image","twitter_misc":{"Written by":"duresham","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/","url":"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/","name":"What Is Firepower Threat Defense (FTD) and How Does It Work? - PureVPN White label","isPartOf":{"@id":"https:\/\/www.purevpn.com\/white-label\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#primaryimage"},"image":{"@id":"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#primaryimage"},"thumbnailUrl":"https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080841\/Copy-of-Port-Forwarding-2025-09-01T125725.870.png","datePublished":"2025-09-01T08:05:00+00:00","dateModified":"2025-09-02T08:38:09+00:00","author":{"@id":"https:\/\/www.purevpn.com\/white-label\/#\/schema\/person\/d75943d96d9bdd3277bc60adaf00f44c"},"description":"Learn what Firepower Threat Defense (FTD) is, how it works, and why it\u2019s vital for unified firewalling, intrusion prevention, and security","breadcrumb":{"@id":"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#primaryimage","url":"https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080841\/Copy-of-Port-Forwarding-2025-09-01T125725.870.png","contentUrl":"https:\/\/d1jxermyrliwoo.cloudfront.net\/wp-content\/uploads\/2025\/09\/01080841\/Copy-of-Port-Forwarding-2025-09-01T125725.870.png","width":876,"height":493,"caption":"Minimalistic illustration of firepower threat defense showing a shield with a flame, laptop terminal, and gears representing firewall protection and system control."},{"@type":"BreadcrumbList","@id":"https:\/\/www.purevpn.com\/white-label\/what-is-firepower-threat-defense\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.purevpn.com\/white-label\/"},{"@type":"ListItem","position":2,"name":"What Is Firepower Threat Defense (FTD) and How Does It Work?"}]},{"@type":"WebSite","@id":"https:\/\/www.purevpn.com\/white-label\/#website","url":"https:\/\/www.purevpn.com\/white-label\/","name":"Purevpn White label","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.purevpn.com\/white-label\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.purevpn.com\/white-label\/#\/schema\/person\/d75943d96d9bdd3277bc60adaf00f44c","name":"duresham","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.purevpn.com\/white-label\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/676e150b24efe0726f53fef31f98d1da?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/676e150b24efe0726f53fef31f98d1da?s=96&d=mm&r=g","caption":"duresham"},"url":"https:\/\/www.purevpn.com\/white-label\/author\/duresham\/"}]}},"_links":{"self":[{"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/posts\/3957","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/comments?post=3957"}],"version-history":[{"count":2,"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/posts\/3957\/revisions"}],"predecessor-version":[{"id":3971,"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/posts\/3957\/revisions\/3971"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/media\/3964"}],"wp:attachment":[{"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/media?parent=3957"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/categories?post=3957"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.purevpn.com\/white-label\/wp-json\/wp\/v2\/tags?post=3957"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}