I support the US government. From a customer perspective, the use cases tend to be where we are guarding edge devices that we don't have necessarily 100% positive command and control. The devices have data transport that traverses in some cases ISPs, so we can't really control who's adjacent to those networks. We often deploy in those types of environments. Where we can use dark fiber, we prefer to, but that's not always an option.
Systems Architect at a tech services company with 11-50 employees
Top-rate support, good pricing, and easy setup
Pros and Cons
- "Any tool that provides telemetry through logging is a particularly good fit for us because we have to really automate our monitoring."
- "If the FTD devices themselves, the Firepower Threat Detection system, those are the firewalls themselves, the individual appliances, weren't so tightly coupled to FMC, I'd probably appreciate them as a product more."
What is our primary use case?
What is most valuable?
I'm probably pretty agnostic with respect to that. We have a federal mandate to reach these next-generation firewall requirements. Stateful packet inspection and things of that nature are the things that we're interested in. We have some programs adjacent to us that definitely do that, but my programs don't require that.
We get a significant discount with Cisco, and their support is definitely top-rate.
What needs improvement?
Cisco does a decent job with logging. Sometimes you may need to tweak a few settings, but with their more recent products that support Python and Java among others, you now have more programmatic control in the latest versions of IOS.
If the FTD devices themselves, the Firepower Threat Detection system, those are the firewalls themselves, the individual appliances, weren't so tightly coupled to FMC, I'd probably appreciate them as a product more. The learning curve was a little higher just because it's a large departure from their original ASA devices. If they could be managed individually as easily as they can be managed through FMC, I'd probably be a bigger fan.
For how long have I used the solution?
I have used Cisco products for decades at this point. With respect to ASAs and FTDs, FTDs are fairly new, but I have used ASAs for the better part of a decade.
Buyer's Guide
Cisco Secure Access
December 2025
Learn what your peers think about Cisco Secure Access. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,310 professionals have used our research since 2012.
How are customer service and support?
It is definitely top-rate. In fact, I know that my particular group didn't even have a service agreement in place for the better part of a year and those guys were still very responsive to emails and communications.
How would you rate customer service and support?
Positive
How was the initial setup?
We've been using them so long, it's hard to remember being a newbie, but I don't find their products particularly hard to set up. They have great documentation.
In our deployments, all of our web-based access to any of those devices is actually cut off. We do everything through a secure socket. The only situation where we are compelled to use a web interface is for the FMC, specifically for configuration; however, our management is primarily conducted at the console level whenever possible.
We don't find them hard to manage, especially as a group. The bigger challenge was managing them outside of their FMC product. They prefer to be federated to some extent, and they really weren't designed to be individually managed. They prefer to be managed from a central location. But if you have an environment that lends itself to central management, for the most part, it's not an issue.
What about the implementation team?
We acquire through an organization, and we are the ones that implement.
What's my experience with pricing, setup cost, and licensing?
Price-wise, we get a significant discount with Cisco. I actually prefer Juniper products. From a professional perspective, I prefer Palo Alto and Juniper probably more than I do anybody else. But I can't make the argument when we get 50% and 60% discounts, which we don't get from Juniper or Palo Alto.
What other advice do I have?
Because we operate with what could only be called a skeleton crew, a monitoring solution to the extent possible is dependent heavily on logging, which these applications allow. We do a heavy amount of logging and we do a great deal of log parsing through ELK stack and SolarWinds and Splunk. Any tool that provides telemetry through logging is a particularly good fit for us because we have to really automate our monitoring. We don't have the manpower to sit there and look at multiple applications and things on a regular basis. It all has to come to a central location and has to be pretty automated, red light, green light type stuff.
If you have the budget, make sure to get a solid understanding of what's out there. There might be some other products that you might prefer, but if your budget is constrained, you can make it work with Cisco products for sure.
I would rate the solution a 10 out of 10.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Sep 10, 2025
Flag as inappropriateCloud Security Engineer at a manufacturing company with 1,001-5,000 employees
Provides conditional and application-level access while enabling seamless threat visibility
Pros and Cons
- "Cisco Secure Access provides application-level access, removes the dependency of VPN, and user authentications are continuously based on identity, device, and risk, which is an add-on there."
- "Managing Cisco Secure Access in a single cloud management console is moderate in difficulty."
What is our primary use case?
Cisco Secure Access is used as a security tool within the tenant as a firewall and serves as a cloud-delivered Zero Trust access platform. It is used for Microsoft Intune as conditional access, Global Secure Access, and from Defender for Cloud Apps, working behind before it.
Cisco Secure Access provides application-level access. Usually, it's full network access, but with this tool, application-level access can be given. It removes the dependency of VPN, and then user authentications are continuously based on identity, device, and risk, which is an add-on there.
The Zero Trust Network Access feature is being used.
What is most valuable?
Cisco AnyConnect is used as a VPN tool for SASE purposes.
The integration of CASB functionality for exposing shadow IT within the company is smooth. Technical skill and knowledge are needed to evaluate, analyze, and deep dive on those things. From the tool's response, it is very good, and there is visibility on everything that is needed or necessary.
The integration of Cisco Talos influences threat detection and response capabilities. The integration of Cisco Talos is similar to every Cisco Umbrella, and the experience has been smooth. The knowledge, their KB, and FAQs are very good, and their support is very good. When in trouble, readily available documents or information are accessible.
What needs improvement?
Managing Cisco Secure Access in a single cloud management console is moderate in difficulty. Technical skills or an understanding at a base level or moderate level are needed to make it work, configure, and integrate it. The difficulty level is somewhere between easy and difficult.
For how long have I used the solution?
Cisco Secure Access has been used for one and a half years.
What do I think about the stability of the solution?
The product has been stable with no crashes or downtime so far, and the SLA is good.
What do I think about the scalability of the solution?
Cisco Secure Access is scalable.
How are customer service and support?
The technical support of Cisco is good and up to the mark.
How would you rate customer service and support?
Positive
How was the initial setup?
Regarding deployment and installation, it is straightforward, but having basics is necessary.
What other advice do I have?
No negative aspects have been observed so far; everything seems good. The review rating for this product is 9 out of 10.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Last updated: Nov 21, 2025
Flag as inappropriateBuyer's Guide
Cisco Secure Access
December 2025
Learn what your peers think about Cisco Secure Access. Get advice and tips from experienced pros sharing their opinions. Updated: December 2025.
879,310 professionals have used our research since 2012.
Pre-Sales Solution Partner at a computer software company with 11-50 employees
Has a focus on DNS security features while more global coverage is needed
Pros and Cons
- "The main feature of interest to me and the customers is DNS security and Integrated Secure Web Control (ISWC)."
- "I use this solution for securing security controls like Secure Security Control (SSC) for local Internet breakouts."
- "There is a need for improved global coverage since the service relies on the cloud provider's data centers."
- "Cisco is not well accepted in the market since they are somewhat behind their competitors."
What is our primary use case?
I use this solution for securing security controls like Secure Security Control (SSC) for local Internet breakouts. It offers a unified security policy across Google sites, providing secure web gateways, DNS and web security filtering, and multi-malware protection. These features are essential for comprehensive security.
What is most valuable?
The main feature of interest to me and the customers is DNS security and Integrated Secure Web Control (ISWC).
What needs improvement?
There is a need for improved global coverage since the service relies on the cloud provider's data centers. We are seeking more granular and global coverage to meet our demands.
Modernization is needed, specifically in the enhancement of security features and functionality. Utilizing AI-oriented features is also important, considering what other vendors offer and their marketing strategies.
What do I think about the scalability of the solution?
According to the vendor's claims, the solution is adaptable and scalable. I would rate scalability at eight to nine out of ten.
How are customer service and support?
I am not able to read their resources, but I understand they have a good support organization. This stems from their original business in networking, integrating router and switch operations, as well as security devices. I assume the same organization now bridges into customer support.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
Cisco is not well accepted in the market since they are somewhat behind their competitors.
How was the initial setup?
I would rate the initial setup at seven out of ten. The commercial aspects are significant here, primarily the recognition level compared to other dedicated suppliers approaching the market with stronger messages.
What about the implementation team?
I am on the presale side, and the delivery aspect is handled by other people in the organization.
What's my experience with pricing, setup cost, and licensing?
Prices are determined in the Compass. I do not refer to the suggested detail or the suggested list price, however, it is highly case-oriented. In the competitive landscape, they offer some advantages with Cisco deal IDs. However, renewal prices have been surprisingly high.
What other advice do I have?
They have a strong brand and are supported by Cisco's traditional organization.
I would rate them seven out of ten overall.
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Google
Disclosure: My company has a business relationship with this vendor other than being a customer. reseller
Director -Digital Transformation at a tech vendor with 11-50 employees
Maintaining top security with comprehensive updates and support
Pros and Cons
- "The most valuable feature of Cisco Secure Access is the level of security it provides."
- "The main issue with pricing is that it is higher compared to other competitors, making it challenging to work with customers unless they specifically request Cisco."
What is our primary use case?
We primarily use Cisco Secure Access based on customer requirements, especially in the BFSI sector. They require Cisco Secure Access for their external branches and remote users. We mostly work with BFSI sectors who need Cisco Secure Access for their network. We have been resellers and integrators for this solution for more than eight years.
What is most valuable?
The most valuable feature of Cisco Secure Access is the level of security it provides. Cisco's dedication to the security industry is evident with how it remains up-to-date on current situations and recent attacks. Updates are frequent, and firmware upgrades are delivered promptly. It is very easy to stay updated, which is crucial for maintaining security.
What needs improvement?
The main area for improvement is pricing. Prices are high when compared to competitors, which makes it challenging to position the product with customers. If Cisco wants to enhance its product position in regions like South Asia, it needs to consider its pricing strategies seriously.
For how long have I used the solution?
We have been working with Cisco Secure Access for more than eight years.
What was my experience with deployment of the solution?
Implementation is very easy. Even if challenges arise, relevant documentation is readily available.
What do I think about the stability of the solution?
The solution is stable enough, and I did not experience any latency or performance issues.
What do I think about the scalability of the solution?
Cisco Secure Access is scalable. I did not find any issues with scalability, and we did not receive any negative feedback from customers.
How are customer service and support?
Our engineers are very satisfied with the features, technical assistance, and documentation provided by Cisco.
How would you rate customer service and support?
Positive
How was the initial setup?
This solution is very easy to install.
What about the implementation team?
Implementation requires two people. For maintenance, the same number of people is involved.
What's my experience with pricing, setup cost, and licensing?
The main issue with pricing is that it is higher compared to other competitors, making it challenging to work with customers unless they specifically request Cisco. Also, the discount rates provided by Cisco for Asian countries are not sufficient.
Which other solutions did I evaluate?
Apart from Cisco, we also deal with Palo Alto, Fortinet, FortiGate, and Check Point.
What other advice do I have?
My overall rating for Cisco Secure Access is nine out of ten. Although I could rate it ten out of ten, the pricing factor brings it down to nine. In terms of technical support, I would rate it nine out of ten.
Disclosure: My company has a business relationship with this vendor other than being a customer. Reseller
General Manager at a tech vendor with 51-200 employees
Effortless user connectivity and simplified deployment transform network access
Pros and Cons
- "I rate the stability of Cisco Secure Access as ten out of ten."
- "Having been associated with Cisco for more than fifteen to twenty years, I find it increasingly difficult to get tech support these days. Although Cisco is reliable, the process to raise a support ticket has become more complex, requiring specific user accounts and access to specialized platforms."
What is our primary use case?
Our primary use case for Cisco Secure Access is seamless connectivity for users, whether they are inside our corporate network or accessing it externally over the internet. The users do not have to switch on VPNs and reconnect. They can directly connect to Cisco Secure Access using Zero Trust Network Access (ZTNA) and access all resources as if they are inside the corporate network.
What is most valuable?
The main feature I appreciate in Cisco Secure Access is the ZTNA feature, which provides excellent connectivity for remote users. We have been using Cisco Umbrella for several years, and this additional feature of ZTNA has enhanced our connectivity experience significantly. Seamless connectivity, whether inside or outside the corporate network, is a standout feature. It eliminates the hassle of switching on VPNs and provides a direct connection to resources via Cisco Secure Access.
What needs improvement?
At this moment, I am unable to comment on areas for improvement as we are just starting to work with the solution. However, I find that the complex procedure for raising support tickets is a significant drawback. Previously, sending an email would automatically create a ticket, but now it requires accessing specific portals, making the process complicated.
For how long have I used the solution?
We have been using Cisco Secure Access for only a month since it is not yet fully deployed.
What was my experience with deployment of the solution?
Even a basic IT person can deploy the policies for Cisco Secure Access, making it a very user-friendly and efficient setup. We have deployed it for about one hundred users so far, with a target of one thousand users.
What do I think about the stability of the solution?
I rate the stability of Cisco Secure Access as ten out of ten.
What do I think about the scalability of the solution?
I would rate the scalability nine out of ten. There is always room for improvement.
How are customer service and support?
Having been associated with Cisco for more than fifteen to twenty years, I find it increasingly difficult to get tech support these days. Although Cisco is reliable, the process to raise a support ticket has become more complex, requiring specific user accounts and access to specialized platforms.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Having tested only FortiGate and Sophos before, I prefer Cisco Secure Access based on my experience. I find Cisco provides a better experience.
How was the initial setup?
The setup for Cisco Secure Access is straightforward and can be accomplished easily by IT staff with basic knowledge. The deployment process is smooth and does not pose any major issues.
What's my experience with pricing, setup cost, and licensing?
Cisco is known for being a premium product, and its pricing reflects this. Although competitive, a more flexible pricing model could attract more companies, especially those with smaller user bases.
Which other solutions did I evaluate?
Solutions such as FortiGate, Zscaler, Palo Alto, and Sophos provide similar security access features. However, based on my evaluation, Cisco Secure Access offers a more favorable experience.
What other advice do I have?
In terms of overall rating, I give Cisco Secure Access a nine. I would definitely recommend it to other users.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Other
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Senior Presale Consultant at a tech services company with 51-200 employees
Experience shows promise in security and integration, while setup and UI need refinement
Pros and Cons
- "I find the zero trust approach helpful and beneficial in securing standard applications, which means you are accessing the applications directly instead of giving privilege to access the network itself."
- "Throughout my experience with Cisco Secure Access, I have had some stability and reliability issues, including lagging when accessing the portal."
What is most valuable?
Managing Cisco Secure Access through the single cloud management console will not be difficult if you experience it once. This means once you have hands-on experience, you know how to operate it. In the first time, you might have a challenge because you need to understand the system. However, once you understand it, it will not be difficult anymore.
I find the zero trust approach helpful and beneficial in securing standard applications, which means you are accessing the applications directly instead of giving privilege to access the network itself. This is very beneficial in the context of security and is very effective.
Regarding the threat detection and response capabilities, because it's integrated in the cloud, users don't have to configure it to integrate with Talos. The feed that it has is already there, detecting malware and blocking it by itself from the Cisco Secure Access. The Intel is there, and we do not need to manually integrate with Talos.
What needs improvement?
My personal thinking about Cisco Secure Access is that because I'm also catching up on this solutioning, I'm not really seeing any improvement because I'm still learning. So far, it's good; I do not have any comment on this.
Regarding features about the UI, the pricing, and the learning curve of Cisco Secure Access that can be improved, the AI is already embedded in the solution. Because I haven't explored much and am not an expert, the features might be there, but I haven't tested them out.
When it comes to thoughts on the pricing, setup cost, and licensing cost of Cisco Secure Access, I cannot comment as I only did SSE for Cisco and did not have experience with other products. In terms of price comparisons, I cannot provide much insight.
The more competitive the pricing for Cisco Secure Access becomes, the better it would be for customers.
What do I think about the stability of the solution?
Throughout my experience with Cisco Secure Access, I have had some stability and reliability issues, including lagging when accessing the portal. Sometimes the response is fast, and sometimes it's slow, with response information that can be either correct or wrong. However, I consider these minor issues because they recover in a few minutes afterwards, though there are still glitches present.
How are customer service and support?
In evaluating my experience with the technical support and customer service of Cisco Secure Access, during the POC, we did not leverage tech support at that particular moment; instead, we engaged directly with the SE team, the Cisco System Engineer teams.
How would you rate customer service and support?
Positive
How was the initial setup?
Regarding the experience with the initial setup of Cisco Secure Access, it is important to communicate with the customers on the requirements, so they understand and prepare whatever we need to set up the POC. We need to communicate effectively with them and let them know what we need. Once our requirement is fulfilled, we can proceed. The key point is that communication with the customer must be maintained.
Once we have all of the requirements, the setup of the product itself is not that difficult. The first time requires understanding many things, but after the deployment and gaining experience, it becomes quite straightforward.
Which other solutions did I evaluate?
I give Cisco Secure Access a seven because I did study other products as well. While I haven't deployed any other SSE product, I went for the training. The way of deploying and the solution is quite seamless, but that's my current assessment without hands-on experience with the other products.
What other advice do I have?
As a partner with Cisco, this relationship is more related to the partners agreements, which is why we are selling Cisco Secure Access.
My impressions of Cisco Secure Access on protecting organizations from threats such as phishing or ransomware attacks are based on my recent POC. There aren't many use cases I have shown to the customer, but I can confirm that the solution is effective.
I would evaluate my experience with the Cisco team as an eight on a scale of one to 10, where 10 is the best.
My advice for other users who would like to start working with Cisco Secure Access is to find a good service integrator. As I come from the service integrator background, my advice to end users is to collaborate with a reliable SI that has the expected expertise on the solutions they are going to purchase and enroll.
The overall rating for Cisco Secure Access is 7 out of 10.
Disclosure: My company has a business relationship with this vendor other than being a customer. Partner
Last updated: Aug 12, 2025
Flag as inappropriateSenior Executive at a import and exporter with 10,001+ employees
An easy to access and user-friendly solution for authentication
Pros and Cons
- "The most valuable feature is the authentication feature."
- "I received support from the team for Cisco Secure Access related to web services. There were occasional delays of up to two working days."
What is our primary use case?
We use the solution for authentications and accounting services.
How has it helped my organization?
We use the tool in the Finance and IT sectors. We provide Cisco Secure Access solutions to various clients, including government agencies, to enhance network security.
What is most valuable?
The most valuable feature is the authentication feature.
For how long have I used the solution?
I have been using Cisco Secure Access for two years.
What do I think about the stability of the solution?
The product is stable.
I rate the solution’s stability a ten out of ten.
What do I think about the scalability of the solution?
The solution’s scalability is good. More than 50 admin users use this solution. I rate the solution’s scalability a ten out of ten.
How are customer service and support?
I received support from the team for Cisco Secure Access related to web services. There were occasional delays of up to two working days. With our live chat options or by contacting a specialist directly, we were able to address any issues. Additionally, Cisco provides resources and lessons that can be beneficial in such situations.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is easy.
What's my experience with pricing, setup cost, and licensing?
The tool is expensive. It costs around 25,000-30,000 per year. There is an additional cost for monitoring, setup, or hardware.
What other advice do I have?
In the Secure Access process, we manage authentication for corporate data, resources, and user policies to ensure that transactions are conducted securely. This involves verifying user identities and ensuring access is granted only to authorized individuals.
Sometimes, authentication takes only two or five minutes. Cisco is easy to access and is user-friendly. There is a brand policy, value, and nearability.
Overall, I rate the solution a ten out of ten.
Which deployment model are you using for this solution?
On-premises
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Network security engineer at a computer software company with 1,001-5,000 employees
User-friendly and easy to manage by administrators
Pros and Cons
- "I would rate the scalability a ten out of ten."
- "It is expensive."
What is most valuable?
It's user-friendly and easy to manage by administrators, and the performance is very good. The security is good.
We can manage security, user channels, and all the functions on the Cisco feature, including VLAN and more.
What needs improvement?
Cisco Secure Access have to improve the security points.
For how long have I used the solution?
I have been using it for the last five years.
What do I think about the stability of the solution?
I would rate the stability a ten out of ten.
What do I think about the scalability of the solution?
It is a scalable solution.
There are around 200 people who use it in my company. We use firewall for WANs and Access Points is for the internal network. And there's guest Wi-Fi for guest flow.
I would rate the scalability a ten out of ten.
How are customer service and support?
The customer service and support are very good.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
We plan to change Cisco with another vendor.
How was the initial setup?
Cisco Secure Access is easy to install.
What's my experience with pricing, setup cost, and licensing?
It is expensive.
What other advice do I have?
Overall, I would rate it a ten out of ten.
Its performance is very good, and it's easy to manage. I will recommend it to other people.
Which deployment model are you using for this solution?
Public Cloud
Disclosure: My company does not have a business relationship with this vendor other than being a customer.
Buyer's Guide
Download our free Cisco Secure Access Report and get advice and tips from experienced pros
sharing their opinions.
Updated: December 2025
Product Categories
Secure Access Service Edge (SASE) Secure Web Gateways (SWG) Firewalls Cloud Access Security Brokers (CASB) ZTNA Domain Name System (DNS) SecurityPopular Comparisons
Fortinet FortiGate
Cisco Umbrella
Prisma Access by Palo Alto Networks
Zscaler Zero Trust Exchange Platform
Cloudflare One
Netskope
Cato SASE Cloud Platform
Check Point Harmony SASE (formerly Perimeter 81)
FortiSASE
Prisma SD-WAN
Axis Security
Absolute Secure Access
Secure Access – DNS Defense
Lumen SASE Solutions
Buyer's Guide
Download our free Cisco Secure Access Report and get advice and tips from experienced pros
sharing their opinions.
Quick Links
Learn More: Questions:
- What is the difference between point solutions (SD-WAN, NGFW, SWG, VPN) and SASE?
- What questions do you need to ask when choosing a Secure Access Service Edge (SASE) solution?
- When evaluating Secure Access Service Edge (SASE), what aspect do you think is the most important to look for?
- Has anyone ever heard of secureaccess.com?
- What is the difference between SASE and SD-WAN?
- What is the difference between SASE and CASB?
- What SASE solution does your company use?
- Why is SASE (Secure Access Service Edge) important?
- What SASE solution do you recommend?
- Why is Secure Access Service Edge (SASE) important for companies?
















