Leaderboard for Cisco Secure Access
Check out the members with the highest scores who have reviewed Cisco Secure Access.
#1. reviewer9216065
1195
Points
Sr. Cloud Security Architect at a tech services company
Reviewed Cisco Secure Access:
Secure access has simplified VPN replacement and reveals where migration paths still need work#2. Mohamed Fouad
1100
Points
Cybersecurity Team Leader at EMAK For Computer Manufacturing (ECM)
Reviewed Cisco Secure Access:
Security has protected remote access with rapid threat updates and precise AI-assisted log analysis#3. Ajinkya Mohod
630
Points
Cloud Security Engineer at Punch Powertrain nv
Reviewed Cisco Secure Access:
Provides conditional and application-level access while enabling seamless threat visibility#4. AnikIslam
375
Points
Senior Executive at Lakdhanavi Limited
Reviewed Cisco Secure Access:
An easy to access and user-friendly solution for authentication#5. Bharath _Kumar
315
Points
Solution Architect at Velocis Systems
Reviewed Cisco Secure Access:
Secure remote access has protected distributed users and simplified hybrid application connectivity#6. Nader Elmansi
310
Points
Presales System Engineer at Logicom Sales Inc
Reviewed Cisco Secure Access:
Cloud security has simplified branch access and strengthens data protection for daily work#7. Kartik Amin
245
Points
Network Operations Engineer at Redex IT Limited
Reviewed Cisco Secure Access:
Secure access has unified zero trust and web protection while AI assistance automates tasks#8. Aruna Udawatte
210
Points
Director -Digital Transformation at Convergence
Reviewed Cisco Secure Access:
Maintaining top security with comprehensive updates and support#9. reviewer2634264
180
Points
Manager, Network & Security at a financial services firm
Reviewed Cisco Secure Access:
Secure access has strengthened banking audits and simplified managing multi‑layer protections#10. Mahesh Bhadoriya
175
Points
Technical Manager at Allianz Cloud Private Limited
Reviewed Cisco Secure Access:
Unified security has protected our network and email and provides automated zero trust controls









