

Google Cloud Identity-Aware Proxy and Cisco Secure Access are notable competitors in the cloud security and networking category. Cisco Secure Access emerges as a strong contender due to its exceptional security measures and network capabilities.
Features: Google Cloud Identity-Aware Proxy includes data processing capabilities, reliable identity management, and scalability, allowing businesses a smooth transition to cloud environments. It offers intuitive navigation and robust security controls. Cisco Secure Access provides DNS security, ZTNA, and advanced threat protection, essential for businesses focusing on comprehensive security.
Room for Improvement: Google Cloud Identity-Aware Proxy could benefit from an enhanced user interface with drag-and-drop functionalities, alongside improved documentation to simplify its use. Cisco Secure Access could enhance its range of integration options and adjust its pricing model to improve competitiveness, particularly in cost-sensitive markets. Easing the steep learning curve would also attract smaller businesses.
Ease of Deployment and Customer Service: Google Cloud Identity-Aware Proxy offers flexibility with private, public, and hybrid cloud deployments, complemented by responsive technical support for paid versions. Cisco Secure Access supports various deployment models with integration advantages in on-premises and hybrid cloud environments. Simplifying access to technical support and enhancing knowledge resources could further improve user experiences.
Pricing and ROI: Google Cloud Identity-Aware Proxy is often perceived as expensive but delivers high ROI through its comprehensive features and flexibility. Cisco Secure Access is considered premium-priced but valued by users who obtain discounts or require strong security, particularly when integrating with existing Cisco solutions.
At Amazon, we knew exactly how much it would cost if a fulfillment center was down for an hour.
The AI features further contribute by expediting threat detection and incident response, ensuring tangible returns through operational savings.
From my point of view, the biggest return on investment when using Cisco Secure Access is the security it provides, and I believe the best word to describe it is best security, ensuring our protection.
This stems from their original business in networking, integrating router and switch operations, as well as security devices.
Although Cisco is reliable, the process to raise a support ticket has become more complex, requiring specific user accounts and access to specialized platforms.
Our engineers are very satisfied with the features, technical assistance, and documentation provided by Cisco.
We turn the traffic to the Cisco Secure Access cloud, and we can manage and apply the policies that are necessary, making it very easy to scale the solution.
I would rate scalability at eight to nine out of ten.
Cisco Secure Access scales with the growing needs of our company.
Cisco is renowned for their reliability, and their products perform well under high data usage.
I rate the stability of Cisco Secure Access as ten out of ten.
The solution is stable enough, and I did not experience any latency or performance issues.
Modernization is needed, specifically in the enhancement of security features and functionality.
Previously, sending an email would automatically create a ticket, but now it requires accessing specific portals, making the process complicated.
Prices are high when compared to competitors, which makes it challenging to position the product with customers.
The solution is cheaper than premium options such as Palo Alto, existing Cisco licenses facilitate replacing previous solutions with Cisco Secure Access smoothly and affordably.
Renewal prices have been surprisingly high.
Cisco is known for being a premium product, and its pricing reflects this.
It eliminates the hassle of switching on VPNs and provides a direct connection to resources via Cisco Secure Access.
They are sending the traffic encrypted and categorizing the traffic based on the type, whether web traffic or internet traffic, and doing the security mechanism that is needed for the traffic type.
The main feature of interest to me and the customers is DNS security and Integrated Secure Web Control (ISWC).
| Product | Market Share (%) |
|---|---|
| Cisco Secure Access | 2.6% |
| Google Cloud Platform Cloud Identity-Aware Proxy | 2.5% |
| Other | 94.9% |


| Company Size | Count |
|---|---|
| Small Business | 7 |
| Midsize Enterprise | 1 |
| Large Enterprise | 10 |
| Company Size | Count |
|---|---|
| Small Business | 17 |
| Midsize Enterprise | 12 |
| Large Enterprise | 19 |
Cisco Secure Access is a comprehensive Security Service Edge (SSE) solution (a key component of a SASE solution) that addresses the complexities of securing a hybrid enterprise. Cloud-delivered and grounded in zero trust, it delivers a unique blend of user simplicity and IT efficiency for frictionless, secure access to all applications—SaaS (with gen AI), private apps, and the internet—regardless of user location or device. Secure Access protects users, data, and devices against relentless, sophisticated, and constantly evolving threats including AI-driven attacks and identity breaches.
Provides all core SSE components (ZTNA, SWG, CASB, and FWaaS) plus extended capabilities.
Includes VPN-as-a-Service (VPNaaS), data loss prevention (DLP), AI Assistant, visibility/control/guardrails for generative AI use, digital experience monitoring (DEM), reserved IP, remote browser isolation (RBI), DNS-layer security, flexible security enforcement (in cloud or on-premises), policy verification, and more.
Protects users as they seamlessly access resources and apps with no extra steps needed, regardless of protocol, port, or level of customization
Simplifies IT operations through a single client, single dashboard, single license, and unified policies.
Lowers risk with least privilege, granular controls backed with unmatched threat intelligence of Cisco Talos.
Eases interoperability with other products from Cisco and third-party vendors with common administrative controls, data structures, and policy management.
Robust integrations
Integrates with Cisco Identity Intelligence to protect against the startling increase in identity-based attacks.
Integrates with many SAML Identity Providers (IDPs) such as AD, Azure AD, Okta, Ping, etc.
Integrates with Cisco offerings including SD-WAN, Splunk, XDR, Thousand Eyes, third party technologies such as Menlo RBI, Chrome Enterprise Browser, and AppOmni for SSPM.
Google Cloud Identity-Aware Proxy offers scalable, user-friendly identity management with efficient data processing and seamless integration, providing reliable access management and collaboration across platforms.
Identity-Aware Proxy by Google Cloud provides a secure and intuitive interface for managing user identities and controlling access to applications. It integrates with platforms like Amazon and Microsoft to facilitate real-time collaboration. With support for Kubernetes, CI/CD, and BigQuery, it enhances performance by enabling secure and efficient data processing. Users find the pricing appealing as it allows for flexible deployments. Despite its strengths, improvements are sought in user intuitiveness, enhanced security, and documentation. Challenges such as stability, regional availability, and data management persist, highlighting the need for more refined integration and storage options.
What are the key features of Google Cloud Identity-Aware Proxy?In industries leveraging Google Cloud Identity-Aware Proxy, companies manage identities to enhance security and streamline operations. Educational institutions apply its secure online teaching capabilities, while tech firms utilize its integration with CI/CD for deploying container platforms. Enterprises harness its potential for managing resources, automating processes, and hosting applications, ensuring seamless data access across devices for collaborative projects.
We monitor all ZTNA reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.