My main use case for Cisco Secure Access is providing access to private resources. For example, we have outstaff or any external partners, and we don't want to provide them wide access to our network. Cisco Secure Access provides us the opportunity to give access granularly, exactly for the resources that are needed for our partners, outstaff, and so on. It's one of the scenarios, and of course, besides ZTNA, we use internet access, which provides us the opportunity to control users through a web proxy and apply some policies to control them.
Regarding whether the deployment of Cisco Secure Access has impacted the help desk ticket volume and the end-user experience, I believe it has improved significantly. For example, we have two separate infrastructures; it is a hybrid one. In Ukraine, we have infrastructure in local data centers, and in Europe, we have it in the cloud with Google. To have access to private resources, we needed two different profiles of VPN. Using Cisco Secure Access and building IPsec tunnels between Cisco ASA and Cisco Secure Access, we can combine these two separate infrastructures and use only one account to access resources in Ukraine, in local data centers, and in Europe.