What is our primary use case?
Our main use cases for Cisco Secure Access focus on information security direction in companies like banks, and we are implementing it in on-premise or cloud systems while integrating it into third-party vendors, particularly with information security teams.
What is most valuable?
I appreciate the posturing feature of Cisco Secure Access because it is very useful, especially when our company needs a hybrid system combining on-premise and cloud systems to work together with security; there are many features, and while I cannot tell you specific ones because it is part of the business, I basically value all of them.
I can provide that these features of Cisco Secure Access benefit not only our company but also the business that implements this approach, as our company is a professional team who knows how it works, and we are implementing what they need; our benefit is that we know it very well, and Cisco also supports us in this direction while we develop our IT and security knowledge.
When we started to use features such as AI assistance in Cisco Secure Access, it became very helpful for the IT and infosec staff because they have more visibility, and as an operational team, it saves them time.
I evaluate the AI Access feature of Cisco Secure Access as very new at this moment since we are just starting in a testing regime; we are now working on trusting everything about how it works, but I can say that deep dive visibility is more available now than it was before with these AI assistance features.
We are integrating Cisco Identity Intelligence with Cisco Secure Access, and it is the engine of everything.
This integration influences our identity management and security measures to be 100% better than they were before.
What needs improvement?
Cisco Secure Access could be improved with fewer bugs; we need to address less software bugs, as there are technical issues and errors in the software, which we are trying to resolve to achieve a more stable version that companies can use without issues, but it is a working process, and we understand this.
For how long have I used the solution?
We started to use Cisco Secure Access about two years ago, especially in the government and financial sector, so we have two years of experience.
How are customer service and support?
Technical support from Cisco is very helpful.
I would rate technical support a nine and customer service a 7.5.
The ratings reflect our region; it is not a global assessment, but in our region, it is this way.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
Prior to adopting Cisco Secure Access, we were using another solution to address similar needs.
How was the initial setup?
My experience deploying Cisco Secure Access is that it is very intuitive for a technical team, though the challenge lies in understanding the underlying processes; once that knowledge is acquired, deploying Cisco Secure Access becomes much easier, and if the team does not understand how the underlay routes work, that presents complexity.
What was our ROI?
I have not seen a return on investment with Cisco Secure Access.
What's my experience with pricing, setup cost, and licensing?
Setup costs and pricing for Cisco Secure Access are not our case since we are doing it ourselves, and I think the pricing and licensing are acceptable and comparable to other solutions.
Which other solutions did I evaluate?
We are using Cloudflare, and I believe the factors that led us to consider a change involve the different approaches of Cloudflare compared to Cisco Secure Access, which depend on business requirements.
Before choosing Cisco Secure Access, we considered using Palo Alto Prisma, and compared to Cisco, Palo Alto is a more expensive option for business, which is one of the most differentiated reasons why we are using Cisco Secure Access at this moment.
What other advice do I have?
The help desk ticket volume and end-user experience have been impacted by Cisco Secure Access deployment such that it may take two to three months, with a reduction of two times.
We are just starting to use the AI assistant feature in Cisco Secure Access.
At this moment, I cannot answer how effective AI supply chain risk management is specifically for the pre-enforcement controls for developers downloading AI models because I have no experience.
I use ZTNA in Cisco Secure Access every day.
Cisco Secure Access is client-based or clientless, depending on business requirements.
It is always difficult to transition the mindset of the company to Zero Trust and least privilege principles, but after deep dive work, it works.
After integrating identity management and ISE in the company, everybody starts to use all policies and begins understanding the security policies; it is a unified solution for all business segments, not just IT, which has greatly benefited the entire company and influenced its development.
We do not use the Experience Insights feature, Digital Experience Monitoring, or DEM powered by ThousandEyes of Cisco Secure Access at this moment in our company.
In comparison to past years, Cisco Secure Access has improved very well at this moment.
It is very flexible, a very competitive solution, very helpful, and very secure; it includes everything a business needs, and the pricing is also available.
I advise other companies considering Cisco Secure Access to first evaluate their business requirements, then make a demo to compare with other solutions, and subsequently try to step-by-step migrate all their services and policies, ensuring they achieve the best solution for their IT and security teams. I would rate this review a nine overall.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partnership