The AI access feature of Cisco Secure Access is really interesting. I do not think it is really there yet; the product has to mature a bit more for us to give it an honest evaluation. However, from what I have seen in the upcoming feature releases, I think it is a really interesting way to go for the AI agents in the solution. We do not use VPNaaS in Cisco Secure Access. I do not know how it has impacted incident resolution time because we have only used the Experience Insights feature in a proof of concept stage, and I have not yet done it in a full rollout. The AI assistant feature in Cisco Secure Access has helped with the documentation and with administrative duties. We have not integrated Cisco Identity Intelligence with Secure Access. Everybody has a need for a VPN; VPN is not as secure as it once was because the market is moving fast. Cisco Secure Access and ZTNA is the way forward to ensure easy access and secure access to your preferred on-premises or cloud instances. I would suggest to customers that they allow us to help them by choosing ZTNA rather than VPN. I rate Cisco Secure Access an eight because an easier license structure, easier pricing structure, and better pricing structure would bring it to a ten.
Head Of IT at a non-profit with 501-1,000 employees
Real User
Top 20
Feb 11, 2026
AI Assist is quite good at how it can collect information from various sources and pull it all together to give an answer. It can also resolve issues further down the line, so it appears quite powerful. Cisco Secure Access is rated an 8 overall. It is good at what it does at a fundamental level, but when it comes to trying to customize it slightly for what is needed, because it is a cloud-based solution, it is much harder. There are some features that are missing from it that used to exist in the older platforms. The overall review rating for Cisco Secure Access is 8.
Network Technician at a tech services company with 501-1,000 employees
MSP
Top 20
Feb 11, 2026
Since I started using Cisco Secure Access, I have noticed positive impacts on my organization. My advice for others looking into using Cisco Secure Access would be to try it; it is very nice to have in a good environment, such as service providers. I would give this product a rating of 8 out of 10.
Manager, Infrastructure Services at a energy/utilities company with 1,001-5,000 employees
Real User
Top 10
Feb 11, 2026
The attack we faced had a big impact. I am not using the AI assistant feature in Cisco Secure Access yet, as we have started looking at it, but it has to go through risk assessment first. I am not using any other AI tools in Cisco Secure Access. We were deploying AI endpoint but that has been paused. I do use VPNaaS in Cisco Secure Access. The transition from VPN to ZTNA with Cisco Secure Access has just been more secure for me. It is more secure because VPNs are easy. If somebody compromises a VPN, you get traditional full access to things, whereas ZTNA allows isolating access to an individual system, providing limited access. I am not using the location enforcement by location features of Cisco Secure Access yet, but it is on the roadmap to deploy. My experience with the Experience Insight feature, called DEM, is not good. I find the integration between Cisco Secure Access and ThousandEyes does not work well and does not deliver what it is supposed to. In fact, we have not been able to get it to work, making it pretty useless right now. I have integrated Cisco Identity Intelligence in Cisco Secure Access, which is influenced by security. It is all tied to the identity, the root trust. That is where we are using it for. My experience with the multi-organization management capability of Cisco Secure Access in terms of usability and efficiency seems okay for the limited usage we have for the multi-tenant. I cannot really comment if it is good or bad. I would rate this review a 10 overall.
Network Security Manager at Gamma Telecom Infrastructure
Real User
Top 20
Feb 11, 2026
Deployment of Cisco Secure Access now takes around half an hour to add a new site now that we have the baseline in place. Adding a new site is easy now that the framework is in place. Regarding licensing, the Essentials license, being the entry-level option, is somewhat lacking in my opinion; you lose a lot of the Layer 7 functionality that customers are looking for today. When talking about secure access, you typically expect next-gen firewall type features, and Layer 7 is quite key for that, which you do not get much of with the Essentials, but the Advantage license has a lot more and seems a lot more robust. We would definitely be looking to push the Advantage license in the future rather than Essentials. I rate Cisco Secure Access a six at the moment; it is developing, and we can see that progress is happening. Its potential is there, but if I am being perfectly honest, I think it is a little immature at the moment and needs some work to develop some features.
Senior Manager at a retailer with 10,001+ employees
Real User
Top 20
Feb 11, 2026
The issue from last week was that during planned maintenance, you specifically performed posture checks and updates that had compatibility issues with Cortex. We were not really notified about what it was going to affect. In the morning, when users tried to log on, nobody was able to log in, and we had to get the right people from Cisco on the call to diagnose the faults. I think that is probably an improvement area, so people know what sort of works took place and where we need to concentrate to investigate the issue. After it was identified, I think it was spot on, and we were back up and running. To make it a ten, I think it is both ways. I have not explored the product to its full extent, so once we make use of it more, then maybe we will face a few more challenges with integration. Other than that, for now, it is an eight for us. What would help me explore it more is really about getting everybody on board from our side; it is not to say it is a Cisco issue. It is more us trying to inform people about what else we can do with this product. We do not want to rock the boat, but we want to do it in a phased manner. Cisco could help me with onboarding more users and features. My overall review rating for Cisco Secure Access is eight out of ten.
The help desk ticket volume and end-user experience have been impacted by Cisco Secure Access deployment such that it may take two to three months, with a reduction of two times. We are just starting to use the AI assistant feature in Cisco Secure Access. At this moment, I cannot answer how effective AI supply chain risk management is specifically for the pre-enforcement controls for developers downloading AI models because I have no experience. I use ZTNA in Cisco Secure Access every day. Cisco Secure Access is client-based or clientless, depending on business requirements. It is always difficult to transition the mindset of the company to Zero Trust and least privilege principles, but after deep dive work, it works. After integrating identity management and ISE in the company, everybody starts to use all policies and begins understanding the security policies; it is a unified solution for all business segments, not just IT, which has greatly benefited the entire company and influenced its development. We do not use the Experience Insights feature, Digital Experience Monitoring, or DEM powered by ThousandEyes of Cisco Secure Access at this moment in our company. In comparison to past years, Cisco Secure Access has improved very well at this moment. It is very flexible, a very competitive solution, very helpful, and very secure; it includes everything a business needs, and the pricing is also available. I advise other companies considering Cisco Secure Access to first evaluate their business requirements, then make a demo to compare with other solutions, and subsequently try to step-by-step migrate all their services and policies, ensuring they achieve the best solution for their IT and security teams. I would rate this review a nine overall.
Cisco Secure Access is more than a mature product at this point. Cisco capitalized on the experience with Umbrella, which was basically the previous product, and expanded with capabilities to provide a very effective connection for remote workers wherever they are and using technology such as QUIC, which is adopted by Google. It provides not just security, but also very effective communication wherever the user is working from. I would rate Cisco Secure Access as a nine out of ten because I believe there is always room for improvement, and I am really looking forward to what is coming regarding agentic AI, as I think Cisco Secure Access will play a lead role for that.
Solution Architect at a financial services firm with 1,001-5,000 employees
Real User
Top 20
Feb 11, 2026
I do not use the AI Assist feature of Cisco Secure Access yet. I do not use VPN as a service for Cisco Secure Access, but we use AnyConnect. We do not use the Experience Insights feature of Cisco Secure Access, like the digital experience monitoring powered by ThousandEyes. I have only integrated the ISE, the Cisco Identity Secure Engine, with Cisco Secure Access so far. The ISE has impacted our incident resolution time. The impact comes from the nice dashboard of ISE, which allows us to view the problem and generates reports on the issue, so it helps the resolution time. I am aware of the pricing and licensing. Comparing to other vendors, I find the licensing part for Zscaler much easier, while from the price perspective, I would say Cisco is more affordable; however, Cisco Secure Access offers different products to achieve the same goal, whereas Zscaler is all-in-one and much easier to integrate. We need more of a hybrid cloud model for Cisco Secure Access, as many companies still operate on-premises and require that traffic for on-premises applications stays local instead of routing through the cloud. I would rate this review a 10.
Manager, Network & Security at a financial services firm with 10,001+ employees
Real User
Top 5
Feb 11, 2026
I do not currently use it as a VPN as a service. I plan to use it for the hybrid private access feature, but it has not been adopted yet. We have started a proof of concept for using ZTNA because we were using other products from the Zero Trust perspective, but we are currently in the phase of running a proof of concept to roll out this functionality as well. I would rate this product an overall score of eight out of ten.
Junior Information Technology Consultant Security at a tech services company with 10,001+ employees
Real User
Top 5
Feb 11, 2026
I definitely use VPNs in Cisco Secure Access. The transition from VPN to ZTNA with Cisco Secure Access has not really influenced users. People use the VPN to connect so they can directly access their on-premises apps. ZTNA is more for contractors and everything for the browser, but we do not really use it. I use it in a client-based manner. I am not really using the hybrid private access feature for varying the enforcement location for ZTNA private traffic right now. My experience with the Insight feature, particularly digital experience and monitoring, is positive since ThousandEyes is already included in Cisco Secure Access. Customers can see a lot of details and monitoring, and they appreciate it. They do not usually use it, but they can see everything. So this is good. It has impacted the incident resolution time since we have not had an incident regarding our customers. So, I would say it has potentially helped. I have not integrated Cisco Identity Intelligence at this time. For everything overall regarding Cisco Secure Access, I would rate it an eight. It is not a bad product, but for certain things, there is definitely room for improvement.
Network Security Engineer at IT-Services der Sozialversicherung GmbH
Real User
Top 10
Feb 11, 2026
In my company, from the beginning, we have used only Cisco Secure Access with no other options. From the start, it was Secure Client and AnyConnect. I would rate this product a 10 out of 10.
Product Owner at a retailer with 10,001+ employees
Real User
Top 10
Feb 11, 2026
I would evaluate the AI access feature of Cisco Secure Access for providing deep visibility and control over AI applications, tools, and large language models by saying we will keep an eye on it and talk to our partner manager about the use cases of the AI implementation. My advice to others looking into using Cisco Secure Access is that it is a good solution. I gave this review a rating of nine out of ten.
Cyber Security Manager at a non-profit with 501-1,000 employees
Real User
Top 10
Feb 11, 2026
The impact of the Secure Access deployment on help desk ticket volume and the end user experience has been a big improvement overall. We previously used Check Point, and migrating to Cisco has been a very positive experience. Our account team on the Cisco side has played a significant role in our customer success journey, resulting in low ticket numbers; after an initial peak of incidents due to teething issues, we now experience very low ticket numbers on a day-to-day basis. Regarding the AI Access feature of Cisco Secure Access for providing deep visibility and control over AI applications, tools, and large language models, we are not currently using it as we do not incorporate any application layer integrations within Cisco Secure Access at the moment. However, it is something we are working towards, as I believe it is a relatively new feature. The AI Access feature is on our wish list, and we certainly intend to implement it. We know we need to do more around the DSPM functionality, which Cisco is working on, so as that stack builds from Cisco's side, we will look for an entry point to ensure full coverage that the tool provides. Currently, it is probably a little early for us to jump in, but in six months, we might consider it. We are not using the Hybrid Private Access feature for varying enforcement locations of ZTNA private traffic; we are aware of it, but it requires integration with Security Cloud, which we have not completed yet. This feature is on our wish list. We do not use the DEM feature, which is Digital Experience Monitoring, but we utilize ThousandEyes, which is installed on the Cisco client. Transitioning to Zero Trust and least-privileged principles has been made easier from some perspectives with Cisco Secure Access. The identity-first approach is a significant part of this journey, and I know Cisco's ongoing improvements over the next twelve months will benefit this process. The traditional VPN is phasing out, with ZTNA being the new standard; however, some of our legacy infrastructure poses challenges in fully adopting ZTNA. For companies considering Cisco Secure Access as their main solution, I advise starting the conversation early. Transitioning is not straightforward; it takes time. With all the ongoing changes in the product and AI integrations, early planning is crucial. While migration can occur quickly, incorporating add-ons and extras requires more time to effectively integrate into the product. We still have not fully utilized features we have had for a year, as we are still assessing their impact and exploring potential duplication with existing tools. Regarding how Secure Access has helped prevent users from uploading sensitive and proprietary information to LLMs, we have not utilized that feature; we currently use Microsoft Defender Purview for this purpose. I understand it is a relatively new feature in Cisco, but we have not adopted it to that level yet. I would rate this product overall as a nine out of ten.
Technical Product Owner at a tech vendor with 10,001+ employees
MSP
Top 20
Feb 10, 2026
We use VPN as a Service for our users to remote access our company, and web browsing is going through Cisco Secure Access as well. I am not using the AI Assist feature in Cisco Secure Access yet. I am not aware of VPNaaS in Cisco Secure Access. We are not using Zero Trust yet, as that will be a stage three. First, we want to get rid of the on-premises VPN gateways and then start developing Zero Trust, so it is not in use at the moment. I am not sure what Hybrid Private Access means, but what we have is an integration from Cisco Secure Access to our SD-WAN, where the Cisco Secure Access Points of Presence are directly connected with our SD-WAN cloud, optimizing the communication. I am not sure if that is what is meant by Hybrid Private Access. I would rate this product overall a six out of ten.
Ts Senior Technical Consultant at a tech vendor with 10,001+ employees
Consultant
Top 10
Feb 10, 2026
My advice to other companies thinking of deploying or getting Cisco Secure Access is to thoroughly assess their needs and goals, as it is crucial for maximizing the benefits. I gave this review a rating of 9.
The impact of Cisco Secure Access on our help desk ticket volume and the end-user experience has been evolving. I do not have numbers for the help desk, but I think it is going in the right direction. The deployment of Cisco Secure Access requires that if you do the internet part, you have to get the customer involved. They have to know which applications work well with a proxy and so on. For the ZTNA part and the client part, it is the same. You have to know your traffic patterns and so on, and you may have to start with a bigger, more allowing rule set and turn it down afterwards. My advice to other companies considering Cisco Secure Access is to look over their needs and see what great opportunities it can bring to the company. The single pane of glass could be beneficial. You will also get your services together in one appliance, and not so spread out. I would rate this solution an 8 out of 10.
Deputy CISO at a transportation company with 10,001+ employees
Real User
Top 10
Feb 10, 2026
I decided to use Cisco for a specific reason because historically we have used a lot of solutions by Cisco. At that moment, according to the functionality of Cisco Secure Access, it was one of the best solutions on the market. Cisco Secure Access definitely utilizes the hybrid private access feature, with the configuration of conditional access and so on. Regarding the integration of Cisco Identity Intelligence with Cisco Secure Access, I am not sure. The usability and efficiency of multi-organization management in Cisco Secure Access is quite high-level. Overall, I evaluate the AI applications in Cisco Secure Access positively as I don't have any bad experience. The AI Assistant in Cisco Secure Access is helpful sometimes, especially if it is something simple. I use the AI Assistant feature of Cisco Secure Access just during the configuration of the policy. Cisco Secure Access is both a client-based and client-less solution. It depends on the case and situation. For some resources, for example, that store some sensitive information, I prefer agent-based. The influence of Cisco Secure Access on the transition from VPN to ZTNA regarding users is that we just want to simplify the process of accessing private resources, and it only improves the user experience. The deployment of Cisco Secure Access has improved the help desk ticket volume and end-user experience by allowing us to combine hybrid infrastructure and reducing complexity with a simpler, unified access solution. Overall, I believe Cisco Secure Access deserves a rating of eight out of ten. It is a fast-growing solution, and I understand that it is in the process of developing, but your team is so responsible, and they are ready to help at any moment.
System Architect at a insurance company with 1,001-5,000 employees
Real User
Top 20
Feb 10, 2026
I do not know yet how Cisco Secure Access deployment has impacted help desk ticket volume and end-user experience. We do not have many tickets at the moment, so it appears the customers are happy. We are in the rollout process and have not fully rolled out yet, but at the moment it looks good. We received positive feedback from our service desk. At the moment, we are not using the AI assistant feature in Cisco Secure Access. We use the API, but not the AI. I would evaluate the effectiveness of AI supply chain risk management by stating that we do not use it, so I do not know at the moment. We do not use the VPNaaS Cisco Secure Access feature. We use ZTNA. Cisco Secure Access has affected our transition to Zero Trust and least privilege principles as we started with small applications, not everything, but we can roll it out to different customers and it works well at the moment. We are not using the hybrid private access feature for varying the enforcement location for ZTNA private traffic at the moment. It is only with customers' business devices, so no private devices. I use the Experience Insights feature, which is the Digital Experience Monitoring or DEM. It looks very interesting and you get a lot of information. Currently it is only for interest. We have not integrated Cisco Identity Intelligence with Cisco Secure Access at the moment. The advice I would give to other companies that are considering this solution is to do a proof of concept first. Try all your applications you want to deploy and then you will succeed. Cisco Secure Access has not helped prevent users uploading sensitive and proprietary information to LLMs because we do not block this or check it. I would rate this review as a 9 out of 10.
I cannot speak to how Cisco Secure Access deployment has impacted the help desk ticket volume and end-user experience because I'm in pre-sales. I am not using the AI assistant feature yet, but I am planning to in the near future. I haven't tried it, so I can't really evaluate it. Regarding how it affected my transition to Zero Trust; since the transition is usually a customer project that takes a lot of time, our engineers know how to do it, but the customer is very reluctant to put the information into the solution that gives the security and the least privilege principles that we need; we can make the rules, but we need the information into the rules from the customer to make sure that the least privilege is working, and it's a tricky part. It depends on the customer if I'm using a hybrid private access, since we are delivering it to many different sectors in the business-to-business area. I'm not sure about varying the enforcement location for ZTNA Private Access. I have no experience with the Experience Insight feature, which is a digital experience monitoring. I don't think I have integrated Cisco Identity Intelligence with Cisco Secure Access. I think the multi-organization management capability of Cisco Secure Access is moving in the right direction in terms of visibility and efficiency. My experience is that Cisco has been in an area where there have been many different solutions for security, and now they are converging, but they are moving into more of a 360 view, and I have more or less everything in the same platform, so Cisco is moving in the right direction. There is nothing else more technical I would like to add. My overall rating for this product is an eight.
Network Security Engineer at a manufacturing company with 5,001-10,000 employees
Real User
Top 5
Feb 10, 2026
I do believe those vulnerabilities are covered now with Cisco Secure Access, as the support and patch support is better. There is nothing that comes to mind that they can improve regarding vulnerabilities because as a Cisco product, I expect any vulnerabilities to be addressed quickly, and they do. They communicate clearly about what is going to happen and what needs to be done. With the previous product, there was often uncertainty about patch availability. I am not using the AI Assistant feature in Cisco Secure Access. Regarding VPNaaS, the answer is probably not. I am not using the hybrid private access feature in Cisco Secure Access, but it is something we are considering, although progress is slow due to the regulations of where I work. I have integrated Cisco Identity Intelligence with Cisco Secure Access and am in the process of doing it with some identity elements there. The integration of Cisco Identity Intelligence has not influenced my identity management and security measures at the moment, as it is still a work in progress coming from a legacy solution where there was no identity management. I am trying to improve my IAM management. I cannot specify what would make it a 10 since I have not fully deployed it and do not know all the capabilities; it might also be related to limitations specific to my company. The reason it is only an eight and not a 10 could be due to my company's specific limitations; for instance, always-on access and AI chatbots would be features I would appreciate having. My overall rating for this review is eight.
System Engineer & Principal at a insurance company with 1,001-5,000 employees
Real User
Top 10
Feb 9, 2026
From my perspective, it was the right decision to move to that platform, as I expect the product to be ideal for having secure access to your network system, especially as we will see a transition from mostly on-premise to mostly cloud. My relationship with Cisco is that my company is a long-time user of Cisco software and hardware. I have been working with Cisco since about 2003, and I am quite satisfied with dealing with Cisco. There are many advantages. We have documentation, we have events such as this one, and we have partners in Germany that we can work with. My advice to any companies considering Cisco Secure Access is to plan it. Talk to your Cisco partners and your Cisco representatives; I think it is worth it. I rate this product overall as a 10.
Ask for references and friends feedback. We work with Palo Alto and we work with Zscaler. Zscaler started the proxies, the cloud proxies. We are very much aligned with Cisco. It's a good product, but the major flaw is the way they are calculating and giving the costing to the customer. The units consumption pricing is not that great. My overall review rating for this product is an eight out of ten.
Multi-organization might be a feature on Cisco Secure Access, but my clients are private companies that haven't merged with any other organizations, so they have their own devices and networks. I haven't used those features. I would rate this product an 8 overall.
Multi-organization might be a feature on Cisco Secure Access, but my clients are private companies that haven't merged with any other organizations, so they have their own devices and networks. I haven't used those features. I would rate this product an 8 overall.
Systems Architect at Realtime Technical Solutions, LLC
Real User
Top 10
Sep 8, 2025
Because we operate with what could only be called a skeleton crew, a monitoring solution to the extent possible is dependent heavily on logging, which these applications allow. We do a heavy amount of logging and we do a great deal of log parsing through ELK stack and SolarWinds and Splunk. Any tool that provides telemetry through logging is a particularly good fit for us because we have to really automate our monitoring. We don't have the manpower to sit there and look at multiple applications and things on a regular basis. It all has to come to a central location and has to be pretty automated, red light, green light type stuff. If you have the budget, make sure to get a solid understanding of what's out there. There might be some other products that you might prefer, but if your budget is constrained, you can make it work with Cisco products for sure. I would rate the solution a 10 out of 10.
Senior Presale Consultant at Bridgenet Solutions Sdn Bhd
Consultant
Top 20
Aug 12, 2025
As a partner with Cisco, this relationship is more related to the partners agreements, which is why we are selling Cisco Secure Access. My impressions of Cisco Secure Access on protecting organizations from threats such as phishing or ransomware attacks are based on my recent POC. There aren't many use cases I have shown to the customer, but I can confirm that the solution is effective. I would evaluate my experience with the Cisco team as an eight on a scale of one to 10, where 10 is the best. My advice for other users who would like to start working with Cisco Secure Access is to find a good service integrator. As I come from the service integrator background, my advice to end users is to collaborate with a reliable SI that has the expected expertise on the solutions they are going to purchase and enroll. The overall rating for Cisco Secure Access is 7 out of 10.
My advice to other organizations considering Cisco Secure Access is that they should definitely give it a try. It's overall a good product. If you have other Cisco products, it integrates efficiently, and if you need any visibility or easy manageability, it's a very good product. Cisco Secure Access overall is a great product. I would rate it an eight out of ten.
The advice I would give to other organizations considering Cisco Secure Access is to implement it as it's pretty straightforward. I would rate Cisco Secure Access a nine out of ten.
Director, Network Services at a healthcare company with 10,001+ employees
Real User
Top 10
Jun 9, 2025
Cisco is a rock-solid company and a leader in the network space, and I believe they will always provide the right level of support. I would rate Cisco Secure Access an eight out of ten.
We have been implementing different tools over the past months for protection and security against AI and new technology coming from the cloud. In terms of Cisco Secure Access's ability to provide secure access via standard HTTP2 and optionally QUIC protocol, I expect that Cisco will improve these features and protocols over the next couple of years. I expect that Cisco will continue to prove itself as we see other technologies doing similar work. Overall, I would rate Cisco Secure Access a nine out of ten.
In the Secure Access process, we manage authentication for corporate data, resources, and user policies to ensure that transactions are conducted securely. This involves verifying user identities and ensuring access is granted only to authorized individuals. Sometimes, authentication takes only two or five minutes. Cisco is easy to access and is user-friendly. There is a brand policy, value, and nearability. Overall, I rate the solution a ten out of ten.
Cisco Secure Access is a comprehensive Security Service Edge (SSE) solution (a key component of a SASE solution) that addresses the complexities of securing a hybrid enterprise. Cloud-delivered and grounded in zero trust, it delivers a unique blend of user simplicity and IT efficiency for frictionless, secure access to all applications—SaaS (with gen AI), private apps, and the internet—regardless of user location or device. Secure Access protects users, data, and devices against relentless,...
The AI access feature of Cisco Secure Access is really interesting. I do not think it is really there yet; the product has to mature a bit more for us to give it an honest evaluation. However, from what I have seen in the upcoming feature releases, I think it is a really interesting way to go for the AI agents in the solution. We do not use VPNaaS in Cisco Secure Access. I do not know how it has impacted incident resolution time because we have only used the Experience Insights feature in a proof of concept stage, and I have not yet done it in a full rollout. The AI assistant feature in Cisco Secure Access has helped with the documentation and with administrative duties. We have not integrated Cisco Identity Intelligence with Secure Access. Everybody has a need for a VPN; VPN is not as secure as it once was because the market is moving fast. Cisco Secure Access and ZTNA is the way forward to ensure easy access and secure access to your preferred on-premises or cloud instances. I would suggest to customers that they allow us to help them by choosing ZTNA rather than VPN. I rate Cisco Secure Access an eight because an easier license structure, easier pricing structure, and better pricing structure would bring it to a ten.
AI Assist is quite good at how it can collect information from various sources and pull it all together to give an answer. It can also resolve issues further down the line, so it appears quite powerful. Cisco Secure Access is rated an 8 overall. It is good at what it does at a fundamental level, but when it comes to trying to customize it slightly for what is needed, because it is a cloud-based solution, it is much harder. There are some features that are missing from it that used to exist in the older platforms. The overall review rating for Cisco Secure Access is 8.
Since I started using Cisco Secure Access, I have noticed positive impacts on my organization. My advice for others looking into using Cisco Secure Access would be to try it; it is very nice to have in a good environment, such as service providers. I would give this product a rating of 8 out of 10.
The attack we faced had a big impact. I am not using the AI assistant feature in Cisco Secure Access yet, as we have started looking at it, but it has to go through risk assessment first. I am not using any other AI tools in Cisco Secure Access. We were deploying AI endpoint but that has been paused. I do use VPNaaS in Cisco Secure Access. The transition from VPN to ZTNA with Cisco Secure Access has just been more secure for me. It is more secure because VPNs are easy. If somebody compromises a VPN, you get traditional full access to things, whereas ZTNA allows isolating access to an individual system, providing limited access. I am not using the location enforcement by location features of Cisco Secure Access yet, but it is on the roadmap to deploy. My experience with the Experience Insight feature, called DEM, is not good. I find the integration between Cisco Secure Access and ThousandEyes does not work well and does not deliver what it is supposed to. In fact, we have not been able to get it to work, making it pretty useless right now. I have integrated Cisco Identity Intelligence in Cisco Secure Access, which is influenced by security. It is all tied to the identity, the root trust. That is where we are using it for. My experience with the multi-organization management capability of Cisco Secure Access in terms of usability and efficiency seems okay for the limited usage we have for the multi-tenant. I cannot really comment if it is good or bad. I would rate this review a 10 overall.
Deployment of Cisco Secure Access now takes around half an hour to add a new site now that we have the baseline in place. Adding a new site is easy now that the framework is in place. Regarding licensing, the Essentials license, being the entry-level option, is somewhat lacking in my opinion; you lose a lot of the Layer 7 functionality that customers are looking for today. When talking about secure access, you typically expect next-gen firewall type features, and Layer 7 is quite key for that, which you do not get much of with the Essentials, but the Advantage license has a lot more and seems a lot more robust. We would definitely be looking to push the Advantage license in the future rather than Essentials. I rate Cisco Secure Access a six at the moment; it is developing, and we can see that progress is happening. Its potential is there, but if I am being perfectly honest, I think it is a little immature at the moment and needs some work to develop some features.
The issue from last week was that during planned maintenance, you specifically performed posture checks and updates that had compatibility issues with Cortex. We were not really notified about what it was going to affect. In the morning, when users tried to log on, nobody was able to log in, and we had to get the right people from Cisco on the call to diagnose the faults. I think that is probably an improvement area, so people know what sort of works took place and where we need to concentrate to investigate the issue. After it was identified, I think it was spot on, and we were back up and running. To make it a ten, I think it is both ways. I have not explored the product to its full extent, so once we make use of it more, then maybe we will face a few more challenges with integration. Other than that, for now, it is an eight for us. What would help me explore it more is really about getting everybody on board from our side; it is not to say it is a Cisco issue. It is more us trying to inform people about what else we can do with this product. We do not want to rock the boat, but we want to do it in a phased manner. Cisco could help me with onboarding more users and features. My overall review rating for Cisco Secure Access is eight out of ten.
The help desk ticket volume and end-user experience have been impacted by Cisco Secure Access deployment such that it may take two to three months, with a reduction of two times. We are just starting to use the AI assistant feature in Cisco Secure Access. At this moment, I cannot answer how effective AI supply chain risk management is specifically for the pre-enforcement controls for developers downloading AI models because I have no experience. I use ZTNA in Cisco Secure Access every day. Cisco Secure Access is client-based or clientless, depending on business requirements. It is always difficult to transition the mindset of the company to Zero Trust and least privilege principles, but after deep dive work, it works. After integrating identity management and ISE in the company, everybody starts to use all policies and begins understanding the security policies; it is a unified solution for all business segments, not just IT, which has greatly benefited the entire company and influenced its development. We do not use the Experience Insights feature, Digital Experience Monitoring, or DEM powered by ThousandEyes of Cisco Secure Access at this moment in our company. In comparison to past years, Cisco Secure Access has improved very well at this moment. It is very flexible, a very competitive solution, very helpful, and very secure; it includes everything a business needs, and the pricing is also available. I advise other companies considering Cisco Secure Access to first evaluate their business requirements, then make a demo to compare with other solutions, and subsequently try to step-by-step migrate all their services and policies, ensuring they achieve the best solution for their IT and security teams. I would rate this review a nine overall.
Cisco Secure Access is more than a mature product at this point. Cisco capitalized on the experience with Umbrella, which was basically the previous product, and expanded with capabilities to provide a very effective connection for remote workers wherever they are and using technology such as QUIC, which is adopted by Google. It provides not just security, but also very effective communication wherever the user is working from. I would rate Cisco Secure Access as a nine out of ten because I believe there is always room for improvement, and I am really looking forward to what is coming regarding agentic AI, as I think Cisco Secure Access will play a lead role for that.
I do not use the AI Assist feature of Cisco Secure Access yet. I do not use VPN as a service for Cisco Secure Access, but we use AnyConnect. We do not use the Experience Insights feature of Cisco Secure Access, like the digital experience monitoring powered by ThousandEyes. I have only integrated the ISE, the Cisco Identity Secure Engine, with Cisco Secure Access so far. The ISE has impacted our incident resolution time. The impact comes from the nice dashboard of ISE, which allows us to view the problem and generates reports on the issue, so it helps the resolution time. I am aware of the pricing and licensing. Comparing to other vendors, I find the licensing part for Zscaler much easier, while from the price perspective, I would say Cisco is more affordable; however, Cisco Secure Access offers different products to achieve the same goal, whereas Zscaler is all-in-one and much easier to integrate. We need more of a hybrid cloud model for Cisco Secure Access, as many companies still operate on-premises and require that traffic for on-premises applications stays local instead of routing through the cloud. I would rate this review a 10.
I do not currently use it as a VPN as a service. I plan to use it for the hybrid private access feature, but it has not been adopted yet. We have started a proof of concept for using ZTNA because we were using other products from the Zero Trust perspective, but we are currently in the phase of running a proof of concept to roll out this functionality as well. I would rate this product an overall score of eight out of ten.
I definitely use VPNs in Cisco Secure Access. The transition from VPN to ZTNA with Cisco Secure Access has not really influenced users. People use the VPN to connect so they can directly access their on-premises apps. ZTNA is more for contractors and everything for the browser, but we do not really use it. I use it in a client-based manner. I am not really using the hybrid private access feature for varying the enforcement location for ZTNA private traffic right now. My experience with the Insight feature, particularly digital experience and monitoring, is positive since ThousandEyes is already included in Cisco Secure Access. Customers can see a lot of details and monitoring, and they appreciate it. They do not usually use it, but they can see everything. So this is good. It has impacted the incident resolution time since we have not had an incident regarding our customers. So, I would say it has potentially helped. I have not integrated Cisco Identity Intelligence at this time. For everything overall regarding Cisco Secure Access, I would rate it an eight. It is not a bad product, but for certain things, there is definitely room for improvement.
In my company, from the beginning, we have used only Cisco Secure Access with no other options. From the start, it was Secure Client and AnyConnect. I would rate this product a 10 out of 10.
I would evaluate the AI access feature of Cisco Secure Access for providing deep visibility and control over AI applications, tools, and large language models by saying we will keep an eye on it and talk to our partner manager about the use cases of the AI implementation. My advice to others looking into using Cisco Secure Access is that it is a good solution. I gave this review a rating of nine out of ten.
The impact of the Secure Access deployment on help desk ticket volume and the end user experience has been a big improvement overall. We previously used Check Point, and migrating to Cisco has been a very positive experience. Our account team on the Cisco side has played a significant role in our customer success journey, resulting in low ticket numbers; after an initial peak of incidents due to teething issues, we now experience very low ticket numbers on a day-to-day basis. Regarding the AI Access feature of Cisco Secure Access for providing deep visibility and control over AI applications, tools, and large language models, we are not currently using it as we do not incorporate any application layer integrations within Cisco Secure Access at the moment. However, it is something we are working towards, as I believe it is a relatively new feature. The AI Access feature is on our wish list, and we certainly intend to implement it. We know we need to do more around the DSPM functionality, which Cisco is working on, so as that stack builds from Cisco's side, we will look for an entry point to ensure full coverage that the tool provides. Currently, it is probably a little early for us to jump in, but in six months, we might consider it. We are not using the Hybrid Private Access feature for varying enforcement locations of ZTNA private traffic; we are aware of it, but it requires integration with Security Cloud, which we have not completed yet. This feature is on our wish list. We do not use the DEM feature, which is Digital Experience Monitoring, but we utilize ThousandEyes, which is installed on the Cisco client. Transitioning to Zero Trust and least-privileged principles has been made easier from some perspectives with Cisco Secure Access. The identity-first approach is a significant part of this journey, and I know Cisco's ongoing improvements over the next twelve months will benefit this process. The traditional VPN is phasing out, with ZTNA being the new standard; however, some of our legacy infrastructure poses challenges in fully adopting ZTNA. For companies considering Cisco Secure Access as their main solution, I advise starting the conversation early. Transitioning is not straightforward; it takes time. With all the ongoing changes in the product and AI integrations, early planning is crucial. While migration can occur quickly, incorporating add-ons and extras requires more time to effectively integrate into the product. We still have not fully utilized features we have had for a year, as we are still assessing their impact and exploring potential duplication with existing tools. Regarding how Secure Access has helped prevent users from uploading sensitive and proprietary information to LLMs, we have not utilized that feature; we currently use Microsoft Defender Purview for this purpose. I understand it is a relatively new feature in Cisco, but we have not adopted it to that level yet. I would rate this product overall as a nine out of ten.
We use VPN as a Service for our users to remote access our company, and web browsing is going through Cisco Secure Access as well. I am not using the AI Assist feature in Cisco Secure Access yet. I am not aware of VPNaaS in Cisco Secure Access. We are not using Zero Trust yet, as that will be a stage three. First, we want to get rid of the on-premises VPN gateways and then start developing Zero Trust, so it is not in use at the moment. I am not sure what Hybrid Private Access means, but what we have is an integration from Cisco Secure Access to our SD-WAN, where the Cisco Secure Access Points of Presence are directly connected with our SD-WAN cloud, optimizing the communication. I am not sure if that is what is meant by Hybrid Private Access. I would rate this product overall a six out of ten.
My advice to other companies thinking of deploying or getting Cisco Secure Access is to thoroughly assess their needs and goals, as it is crucial for maximizing the benefits. I gave this review a rating of 9.
The impact of Cisco Secure Access on our help desk ticket volume and the end-user experience has been evolving. I do not have numbers for the help desk, but I think it is going in the right direction. The deployment of Cisco Secure Access requires that if you do the internet part, you have to get the customer involved. They have to know which applications work well with a proxy and so on. For the ZTNA part and the client part, it is the same. You have to know your traffic patterns and so on, and you may have to start with a bigger, more allowing rule set and turn it down afterwards. My advice to other companies considering Cisco Secure Access is to look over their needs and see what great opportunities it can bring to the company. The single pane of glass could be beneficial. You will also get your services together in one appliance, and not so spread out. I would rate this solution an 8 out of 10.
I decided to use Cisco for a specific reason because historically we have used a lot of solutions by Cisco. At that moment, according to the functionality of Cisco Secure Access, it was one of the best solutions on the market. Cisco Secure Access definitely utilizes the hybrid private access feature, with the configuration of conditional access and so on. Regarding the integration of Cisco Identity Intelligence with Cisco Secure Access, I am not sure. The usability and efficiency of multi-organization management in Cisco Secure Access is quite high-level. Overall, I evaluate the AI applications in Cisco Secure Access positively as I don't have any bad experience. The AI Assistant in Cisco Secure Access is helpful sometimes, especially if it is something simple. I use the AI Assistant feature of Cisco Secure Access just during the configuration of the policy. Cisco Secure Access is both a client-based and client-less solution. It depends on the case and situation. For some resources, for example, that store some sensitive information, I prefer agent-based. The influence of Cisco Secure Access on the transition from VPN to ZTNA regarding users is that we just want to simplify the process of accessing private resources, and it only improves the user experience. The deployment of Cisco Secure Access has improved the help desk ticket volume and end-user experience by allowing us to combine hybrid infrastructure and reducing complexity with a simpler, unified access solution. Overall, I believe Cisco Secure Access deserves a rating of eight out of ten. It is a fast-growing solution, and I understand that it is in the process of developing, but your team is so responsible, and they are ready to help at any moment.
I do not know yet how Cisco Secure Access deployment has impacted help desk ticket volume and end-user experience. We do not have many tickets at the moment, so it appears the customers are happy. We are in the rollout process and have not fully rolled out yet, but at the moment it looks good. We received positive feedback from our service desk. At the moment, we are not using the AI assistant feature in Cisco Secure Access. We use the API, but not the AI. I would evaluate the effectiveness of AI supply chain risk management by stating that we do not use it, so I do not know at the moment. We do not use the VPNaaS Cisco Secure Access feature. We use ZTNA. Cisco Secure Access has affected our transition to Zero Trust and least privilege principles as we started with small applications, not everything, but we can roll it out to different customers and it works well at the moment. We are not using the hybrid private access feature for varying the enforcement location for ZTNA private traffic at the moment. It is only with customers' business devices, so no private devices. I use the Experience Insights feature, which is the Digital Experience Monitoring or DEM. It looks very interesting and you get a lot of information. Currently it is only for interest. We have not integrated Cisco Identity Intelligence with Cisco Secure Access at the moment. The advice I would give to other companies that are considering this solution is to do a proof of concept first. Try all your applications you want to deploy and then you will succeed. Cisco Secure Access has not helped prevent users uploading sensitive and proprietary information to LLMs because we do not block this or check it. I would rate this review as a 9 out of 10.
I cannot speak to how Cisco Secure Access deployment has impacted the help desk ticket volume and end-user experience because I'm in pre-sales. I am not using the AI assistant feature yet, but I am planning to in the near future. I haven't tried it, so I can't really evaluate it. Regarding how it affected my transition to Zero Trust; since the transition is usually a customer project that takes a lot of time, our engineers know how to do it, but the customer is very reluctant to put the information into the solution that gives the security and the least privilege principles that we need; we can make the rules, but we need the information into the rules from the customer to make sure that the least privilege is working, and it's a tricky part. It depends on the customer if I'm using a hybrid private access, since we are delivering it to many different sectors in the business-to-business area. I'm not sure about varying the enforcement location for ZTNA Private Access. I have no experience with the Experience Insight feature, which is a digital experience monitoring. I don't think I have integrated Cisco Identity Intelligence with Cisco Secure Access. I think the multi-organization management capability of Cisco Secure Access is moving in the right direction in terms of visibility and efficiency. My experience is that Cisco has been in an area where there have been many different solutions for security, and now they are converging, but they are moving into more of a 360 view, and I have more or less everything in the same platform, so Cisco is moving in the right direction. There is nothing else more technical I would like to add. My overall rating for this product is an eight.
I do believe those vulnerabilities are covered now with Cisco Secure Access, as the support and patch support is better. There is nothing that comes to mind that they can improve regarding vulnerabilities because as a Cisco product, I expect any vulnerabilities to be addressed quickly, and they do. They communicate clearly about what is going to happen and what needs to be done. With the previous product, there was often uncertainty about patch availability. I am not using the AI Assistant feature in Cisco Secure Access. Regarding VPNaaS, the answer is probably not. I am not using the hybrid private access feature in Cisco Secure Access, but it is something we are considering, although progress is slow due to the regulations of where I work. I have integrated Cisco Identity Intelligence with Cisco Secure Access and am in the process of doing it with some identity elements there. The integration of Cisco Identity Intelligence has not influenced my identity management and security measures at the moment, as it is still a work in progress coming from a legacy solution where there was no identity management. I am trying to improve my IAM management. I cannot specify what would make it a 10 since I have not fully deployed it and do not know all the capabilities; it might also be related to limitations specific to my company. The reason it is only an eight and not a 10 could be due to my company's specific limitations; for instance, always-on access and AI chatbots would be features I would appreciate having. My overall rating for this review is eight.
From my perspective, it was the right decision to move to that platform, as I expect the product to be ideal for having secure access to your network system, especially as we will see a transition from mostly on-premise to mostly cloud. My relationship with Cisco is that my company is a long-time user of Cisco software and hardware. I have been working with Cisco since about 2003, and I am quite satisfied with dealing with Cisco. There are many advantages. We have documentation, we have events such as this one, and we have partners in Germany that we can work with. My advice to any companies considering Cisco Secure Access is to plan it. Talk to your Cisco partners and your Cisco representatives; I think it is worth it. I rate this product overall as a 10.
Ask for references and friends feedback. We work with Palo Alto and we work with Zscaler. Zscaler started the proxies, the cloud proxies. We are very much aligned with Cisco. It's a good product, but the major flaw is the way they are calculating and giving the costing to the customer. The units consumption pricing is not that great. My overall review rating for this product is an eight out of ten.
Multi-organization might be a feature on Cisco Secure Access, but my clients are private companies that haven't merged with any other organizations, so they have their own devices and networks. I haven't used those features. I would rate this product an 8 overall.
Multi-organization might be a feature on Cisco Secure Access, but my clients are private companies that haven't merged with any other organizations, so they have their own devices and networks. I haven't used those features. I would rate this product an 8 overall.
No negative aspects have been observed so far; everything seems good. The review rating for this product is 9 out of 10.
Because we operate with what could only be called a skeleton crew, a monitoring solution to the extent possible is dependent heavily on logging, which these applications allow. We do a heavy amount of logging and we do a great deal of log parsing through ELK stack and SolarWinds and Splunk. Any tool that provides telemetry through logging is a particularly good fit for us because we have to really automate our monitoring. We don't have the manpower to sit there and look at multiple applications and things on a regular basis. It all has to come to a central location and has to be pretty automated, red light, green light type stuff. If you have the budget, make sure to get a solid understanding of what's out there. There might be some other products that you might prefer, but if your budget is constrained, you can make it work with Cisco products for sure. I would rate the solution a 10 out of 10.
As a partner with Cisco, this relationship is more related to the partners agreements, which is why we are selling Cisco Secure Access. My impressions of Cisco Secure Access on protecting organizations from threats such as phishing or ransomware attacks are based on my recent POC. There aren't many use cases I have shown to the customer, but I can confirm that the solution is effective. I would evaluate my experience with the Cisco team as an eight on a scale of one to 10, where 10 is the best. My advice for other users who would like to start working with Cisco Secure Access is to find a good service integrator. As I come from the service integrator background, my advice to end users is to collaborate with a reliable SI that has the expected expertise on the solutions they are going to purchase and enroll. The overall rating for Cisco Secure Access is 7 out of 10.
My advice to other organizations considering Cisco Secure Access is that they should definitely give it a try. It's overall a good product. If you have other Cisco products, it integrates efficiently, and if you need any visibility or easy manageability, it's a very good product. Cisco Secure Access overall is a great product. I would rate it an eight out of ten.
The advice I would give to other organizations considering Cisco Secure Access is to implement it as it's pretty straightforward. I would rate Cisco Secure Access a nine out of ten.
Cisco is a rock-solid company and a leader in the network space, and I believe they will always provide the right level of support. I would rate Cisco Secure Access an eight out of ten.
We have been implementing different tools over the past months for protection and security against AI and new technology coming from the cloud. In terms of Cisco Secure Access's ability to provide secure access via standard HTTP2 and optionally QUIC protocol, I expect that Cisco will improve these features and protocols over the next couple of years. I expect that Cisco will continue to prove itself as we see other technologies doing similar work. Overall, I would rate Cisco Secure Access a nine out of ten.
In terms of overall rating, I give Cisco Secure Access a nine. I would definitely recommend it to other users.
They have a strong brand and are supported by Cisco's traditional organization. I would rate them seven out of ten overall.
Overall, I would rate it a ten out of ten. Its performance is very good, and it's easy to manage. I will recommend it to other people.
In the Secure Access process, we manage authentication for corporate data, resources, and user policies to ensure that transactions are conducted securely. This involves verifying user identities and ensuring access is granted only to authorized individuals. Sometimes, authentication takes only two or five minutes. Cisco is easy to access and is user-friendly. There is a brand policy, value, and nearability. Overall, I rate the solution a ten out of ten.