Cisco Secure Access is a comprehensive Security Service Edge (SSE) solution (a key component of a SASE solution) that addresses the complexities of securing a hybrid enterprise. Cloud-delivered and grounded in zero trust, it delivers a unique blend of user simplicity and IT efficiency for frictionless, secure access to all applications—SaaS (with gen AI), private apps, and the internet—regardless of user location or device. Secure Access protects users, data, and devices against relentless, sophisticated, and constantly evolving threats including AI-driven attacks and identity breaches.



| Product | Market Share (%) |
|---|---|
| Cisco Secure Access | 3.5% |
| Prisma Access by Palo Alto Networks | 14.3% |
| Netskope | 11.9% |
| Other | 70.3% |
| Type | Title | Date | |
|---|---|---|---|
| Category | Secure Access Service Edge (SASE) | Dec 30, 2025 | Download |
| Product | Reviews, tips, and advice from real users | Dec 30, 2025 | Download |
| Comparison | Cisco Secure Access vs Prisma Access by Palo Alto Networks | Dec 30, 2025 | Download |
| Comparison | Cisco Secure Access vs Netskope | Dec 30, 2025 | Download |
| Comparison | Cisco Secure Access vs Zscaler Zero Trust Exchange Platform | Dec 30, 2025 | Download |
| Title | Rating | Mindshare | Recommending | |
|---|---|---|---|---|
| Fortinet FortiGate | 4.2 | N/A | 92% | 580 interviewsAdd to research |
| Cisco Umbrella | 4.4 | N/A | 97% | 122 interviewsAdd to research |
| Company Size | Count |
|---|---|
| Small Business | 7 |
| Large Enterprise | 9 |
| Company Size | Count |
|---|---|
| Small Business | 120 |
| Midsize Enterprise | 64 |
| Large Enterprise | 238 |
Provides all core SSE components (ZTNA, SWG, CASB, and FWaaS) plus extended capabilities.
Includes VPN-as-a-Service (VPNaaS), data loss prevention (DLP), AI Assistant, visibility/control/guardrails for generative AI use, digital experience monitoring (DEM), reserved IP, remote browser isolation (RBI), DNS-layer security, flexible security enforcement (in cloud or on-premises), policy verification, and more.
Protects users as they seamlessly access resources and apps with no extra steps needed, regardless of protocol, port, or level of customization
Simplifies IT operations through a single client, single dashboard, single license, and unified policies.
Lowers risk with least privilege, granular controls backed with unmatched threat intelligence of Cisco Talos.
Eases interoperability with other products from Cisco and third-party vendors with common administrative controls, data structures, and policy management.
Robust integrations
Integrates with Cisco Identity Intelligence to protect against the startling increase in identity-based attacks.
Integrates with many SAML Identity Providers (IDPs) such as AD, Azure AD, Okta, Ping, etc.
Integrates with Cisco offerings including SD-WAN, Splunk, XDR, Thousand Eyes, third party technologies such as Menlo RBI, Chrome Enterprise Browser, and AppOmni for SSPM.
1. IBM 2. Microsoft 3. Amazon 4. Google 5. Apple 6. Cisco Systems 7. Oracle 8. Intel 9. HP Inc. 10. Dell Technologies 11. Verizon Communications 12. AT&T 13. Comcast 14. T-Mobile 15. Sprint 16. Vodafone 17. Orange 18. BT Group 19. Deutsche Telekom 20. Telefonica 21. Nokia 22. Ericsson 23. Samsung Electronics 24. Sony 25. Panasonic 26. LG Electronics 27. Siemens 28. General Electric 29. Ford Motor Company 30. General Motors 31. Toyota Motor Corporation 32. Volkswagen Group
| Author info | Rating | Review Summary |
|---|---|---|
| Manager, Network at Duracell International, Inc. | 4.0 | We use Cisco Secure Access for security and access management, appreciating its ease of use and reliability. Although integration with more third-party products would improve it, we've achieved great ROI after switching from Palo Alto and deploying it on Microsoft Azure. |
| Network Operations Engineer at a media company with 1,001-5,000 employees | 4.0 | I've used Cisco Secure Access for five years and find it reliable, secure, and feature-rich, though it's expensive and has a steep learning curve, making it difficult for smaller businesses or less experienced professionals to adopt easily. |
| Head Of Security Engineering Principle Architect at a tech services company with 11-50 employees | 3.5 | Cisco Secure Access is a scalable, VPN-replacement solution that integrates well in Cisco environments, offers strong support and cloud features, but faces challenges with non-Cisco migrations and could improve AI differentiation and third-party integrations. |
| Senior Architect at Sempra | 4.5 | In our energy business, Cisco Secure Access protects remote sites and data transfer with valuable features like a firewall for IDP and Zero Trust Network Access. Despite needing some improvements from competitors, it offers excellent security and better ROI than previous solutions. |
| Enterprise Architect at a manufacturing company with 10,001+ employees | 3.5 | My main use for Cisco Secure Access is remote access, valuing its posture checking and Zero Trust capabilities. However, we struggle with integration and licensing complexities. Improved ROI would require consolidating our access platforms rather than Cisco issues. |
| Director, Network Services at a healthcare company with 10,001+ employees | 4.0 | I use Cisco Secure Access primarily for secure network access due to past malware issues. While it works well without causing problems, understanding risk implications in healthcare is challenging. Achieving better ROI insights is essential for improvement. |
| System Engineer at a tech services company with 51-200 employees | 4.5 | Cisco Secure Access primarily serves our DNS functionality needs, offering strong protection against threats like phishing and ransomware. Despite some migration challenges from Umbrella, its cloud-based single-console management and integration with solutions like Splunk offer significant benefits. |
| IT Site Administrator at Acushnet Holdings Corp | 4.5 | In my experience, Cisco Secure Access effectively manages switching and wireless networks, offering a user-friendly GUI and robust protection against threats like phishing and ransomware. However, I find the licensing process to be confusing. |