Cisco Secure Access is not installed for VPN as a service; the customer using the VPN side is using it for access into the core network, so it functions as a landing point and an on-ramp into the core.
Cisco Secure Access
Cisco Systems, Inc.External reviews
External reviews are not included in the AWS star rating for the product.
Secure web access has centralized control but content filtering still needs major improvement
What is our primary use case?
What is most valuable?
The reason for this is centralized firewall control for people going out to the internet, so you can manage it. The essential ROI we are looking for with Cisco Secure Access is secure access to the internet, and in reality, this is the key factor where we can control access based upon various aspects such as AD group, plus we have a single portal where we can see what is going on and easy management.
What needs improvement?
The other issues we are having are around Talos and content filtering functionality; the Talos database is insufficient because Cisco Secure Access web gateway database is not big enough to hold every URL, leading to numerous problems with URLs not being categorized correctly and a slow turnaround for recategorization requests. Therefore, improvements with content filtering and Talos integration are significant for us, and we are speaking regularly to the Cisco teams about this.
Another significant issue involves a parent-child problem we have with the URLs; if they match multiple URL categories, then the rule base only looks at the first category, so it does not match multiple categories, resulting in a lot of problems around the Talos content filtering integration.
For how long have I used the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
The support team assigned to us is very good, so I would rate them an eight or a nine, but if you are raising a TAC case, it can be hit or miss regarding the knowledge of the TAC engineer that picks it up; on the whole, it is quite good, probably a six or a seven. However, there have been times when it has been lower due to the confusion between Cisco Secure Access and Secure Connect, especially when integrating Meraki support cases. Many of the Meraki engineers did not recognize Cisco Secure Access and only knew about Secure Connect, leading to some communication problems between Meraki and Cisco.
How would you rate customer service and support?
Positive
What other advice do I have?
Adding a new site is easy now that the framework is in place.
Regarding licensing, the Essentials license, being the entry-level option, is somewhat lacking in my opinion; you lose a lot of the Layer 7 functionality that customers are looking for today. When talking about secure access, you typically expect next-gen firewall type features, and Layer 7 is quite key for that, which you do not get much of with the Essentials, but the Advantage license has a lot more and seems a lot more robust. We would definitely be looking to push the Advantage license in the future rather than Essentials.
I rate Cisco Secure Access a six at the moment; it is developing, and we can see that progress is happening. Its potential is there, but if I am being perfectly honest, I think it is a little immature at the moment and needs some work to develop some features.
Unified remote access and web controls have simplified management but still need finer role rights
What is our primary use case?
My use case for Cisco Secure Access is to replace our on-premises, not site-to-site, remote access SSL VPN as we are going from on-premises to cloud service.
The second use case is to replace our Umbrella service, as we currently use Umbrella and will migrate to Cisco Secure Access as well, along with all the policies.
What is most valuable?
I consider the most valuable feature of Cisco Secure Access to be that it merged everything into one dashboard, the Cisco Secure Access dashboard. Previously, we had web access in one location and remote access in another, and we could not link them to each other. Now everything is in one place, and we can base the access control on usernames because we have the Azure Active Directory integration. We can also build policies based on that and can see or identify the impacted users.
Cisco Secure Access benefits our organization by offering Points of Presence close to our employees because we are spread across the world. Until now, we had only European gateways, so traffic had to go from India, for example, over to Europe and then sometimes back, which was delaying a lot. With Cisco Secure Access, we have a presence close to the user.
What needs improvement?
What we really find challenging is that we do not have granular role-based access control models. The only options we have are full admin or read-only. We have different departments in the company that have different responsibilities. While we as a networking team are full admins, we do not want to manage the policies regarding which websites are allowed and what is not allowed. That should be managed by our compliance team.
The granular access issue is coming from the product limitation at the moment, as it does not offer us the option to tell it that a particular role can only manage websites, allowed sites, and blocked sites. Categories or something similar are not possible.
If I had to improve the product, that would definitely be role-based access control. Though from another point of view, this limitation may also be a benefit because it forces us to implement our own front-end to use API calls. Using API, you can limit the access to that particular key.
What do I think about the stability of the solution?
I would rate Cisco Secure Access as very stable until now. We have not seen any service degradation during the maintenance activities that Cisco performs, which seems to happen frequently because we receive notification messages. However, we do not experience any service degradation, so that feels stable at the moment.
What do I think about the scalability of the solution?
I find the scalability of Cisco Secure Access is working well at the moment. The main benefit is that we do not need to care for hardware anymore in the future, such as lifecycle management. However, the migration is a little challenging because the technical background that we had, such as the routing and what happens there, is not really visible to us in the cloud service. Those are the challenges, but we are working with TAC and onboarding people that are assigned to us at the moment from Cisco.
How are customer service and support?
My experience with Cisco's technical support is good because the person assigned to us is guiding us. He understands what our use case is and he is guiding us on what we should configure and what we should not configure.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
Before, we were using Cisco Firepower as SSL gateways.
How was the initial setup?
I would describe my experience deploying Cisco Secure Access as working well, though we are hitting bugs. I have the feeling that whenever we explore a new product from Cisco, we hit a bug. At the moment, we are dealing with challenges because a new feature that was implemented is to support multi-tenancy. When we originally started, that feature was not available, so we had only one organization. Now we have a multi-organization feature, so we were migrated to it. However, we feel that with this migration, something was left behind that is not working properly. In our original organization, we have issues applying permissions for users, and we always have to raise TAC cases with the people who help us resolve it. They are currently working on that.
What was our ROI?
I have not seen a return on investment yet, as we are still building. We are in an extended pilot phase at the moment, where one country, India, is migrated to this solution, and we are deploying one by one, starting with less critical sites first, and then we will see.
Which other solutions did I evaluate?
We did not evaluate any other solutions before. It was basically a move recommendation by Cisco since we stuck with Cisco, as we had a subscription before. With the contract renewal, Cisco pushed us in a direction where we could keep using the old environment for free as part of the renewal, but we decided to go straight to the new product and migrate.
What other advice do I have?
We use VPN as a Service for our users to remote access our company, and web browsing is going through Cisco Secure Access as well. I am not using the AI Assist feature in Cisco Secure Access yet. I am not aware of VPNaaS in Cisco Secure Access. We are not using Zero Trust yet, as that will be a stage three. First, we want to get rid of the on-premises VPN gateways and then start developing Zero Trust, so it is not in use at the moment. I am not sure what Hybrid Private Access means, but what we have is an integration from Cisco Secure Access to our SD-WAN, where the Cisco Secure Access Points of Presence are directly connected with our SD-WAN cloud, optimizing the communication. I am not sure if that is what is meant by Hybrid Private Access. I would rate this product overall a six out of ten.
Secure access has simplified VPN replacement and reveals where migration paths still need work
What is our primary use case?
The product also optimizes firewall capabilities for geographically distributed operators and enhances proxy-based architectures with Secure Web Gateways and CASB for cloud or SaaS applications. By integrating with identity providers like Azure Entra ID or Okta, Cisco Secure Access facilitates the transition from VPN to ZTNA while ensuring compliance with principles like least privilege access.
Additionally, it incorporates identity and device risk scores for dynamic access policies to respond to varying risk thresholds. The service is particularly useful for managing old VPN infrastructure replacements, firewall optimizations, and bridging the gaps between old and new secure access technologies.
The product also addresses unique geographical challenges, such as ensuring secure internet access for oil rigs in remote locations. Furthermore, Cisco Secure Access's multi-tenancy and Policy Verification features are crucial for managing multi-organization environments and ensuring policy accuracy, respectively.
Hybrid Private Access is particularly useful in regions where replacing existing gear isn't feasible due to cost concerns. Lastly, the product's AI-driven features like AI Access and AI Assistant ease policy management and triage, reducing the time and efforts needed in these processes.
What is most valuable?
The integration with identity providers facilitates this transition and aligns with Zero Trust Network Access principles. The platform offers capabilities like Secure Web Gateways, Firewall-as-a-Service, and CASB for enhanced cloud-based functionality. Its Policy Verification runs checks to prevent policy misconfigurations, a necessary feature for managing multi-organization environments.
Moreover, the product's AI-driven capabilities streamline policy management and triage, enhancing operational efficiency. Hybrid Private Access and multi-tenancy capabilities make it resource-efficient and particularly useful for unique geographical challenges. The product is scalable, adjusting to new requirements easily, and is backed by robust technical support.
What needs improvement?
Furthermore, while the AI capabilities of Cisco Secure Access are useful, they are not seen as major differentiators compared to competitors such as Palo Alto.
Additionally, though the existing threat intelligence is sufficient for most use cases, extending the integration scope with other tools, especially concerning AI supply chain risk management, could enhance its functionality.
For how long have I used the solution?
What do I think about the stability of the solution?
What do I think about the scalability of the solution?
How are customer service and support?
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
How was the initial setup?
What about the implementation team?
What was our ROI?
What's my experience with pricing, setup cost, and licensing?
Which other solutions did I evaluate?
What other advice do I have?
Regarding the multi-organization management capability, it is akin to multi-tenancy, helpful for service provider infrastructures with multiple clients or single customers with diverse business units. It brings intuitive infrastructure management without providing unique features compared to competitors.
AI supply chain risk management, while theoretically beneficial, may not give an edge unless thorough integrations with additional tools are pursued. Furthermore, the choice of not implementing low-cost workflows was based on a need for higher security enhancements.
I would rate this review overall at a seven out of ten.
Experience shows promise in security and integration, while setup and UI need refinement
What is most valuable?
Managing Cisco Secure Access through the single cloud management console will not be difficult if you experience it once. This means once you have hands-on experience, you know how to operate it. In the first time, you might have a challenge because you need to understand the system. However, once you understand it, it will not be difficult anymore.
I find the zero trust approach helpful and beneficial in securing standard applications, which means you are accessing the applications directly instead of giving privilege to access the network itself. This is very beneficial in the context of security and is very effective.
Regarding the threat detection and response capabilities, because it's integrated in the cloud, users don't have to configure it to integrate with Talos. The feed that it has is already there, detecting malware and blocking it by itself from the Cisco Secure Access. The Intel is there, and we do not need to manually integrate with Talos.
What needs improvement?
My personal thinking about Cisco Secure Access is that because I'm also catching up on this solutioning, I'm not really seeing any improvement because I'm still learning. So far, it's good; I do not have any comment on this.
Regarding features about the UI, the pricing, and the learning curve of Cisco Secure Access that can be improved, the AI is already embedded in the solution. Because I haven't explored much and am not an expert, the features might be there, but I haven't tested them out.
When it comes to thoughts on the pricing, setup cost, and licensing cost of Cisco Secure Access, I cannot comment as I only did SSE for Cisco and did not have experience with other products. In terms of price comparisons, I cannot provide much insight.
The more competitive the pricing for Cisco Secure Access becomes, the better it would be for customers.
What do I think about the stability of the solution?
Throughout my experience with Cisco Secure Access, I have had some stability and reliability issues, including lagging when accessing the portal. Sometimes the response is fast, and sometimes it's slow, with response information that can be either correct or wrong. However, I consider these minor issues because they recover in a few minutes afterwards, though there are still glitches present.
How are customer service and support?
In evaluating my experience with the technical support and customer service of Cisco Secure Access, during the POC, we did not leverage tech support at that particular moment; instead, we engaged directly with the SE team, the Cisco System Engineer teams.
How would you rate customer service and support?
Positive
How was the initial setup?
Regarding the experience with the initial setup of Cisco Secure Access, it is important to communicate with the customers on the requirements, so they understand and prepare whatever we need to set up the POC. We need to communicate effectively with them and let them know what we need. Once our requirement is fulfilled, we can proceed. The key point is that communication with the customer must be maintained.
Once we have all of the requirements, the setup of the product itself is not that difficult. The first time requires understanding many things, but after the deployment and gaining experience, it becomes quite straightforward.
Which other solutions did I evaluate?
I give Cisco Secure Access a seven because I did study other products as well. While I haven't deployed any other SSE product, I went for the training. The way of deploying and the solution is quite seamless, but that's my current assessment without hands-on experience with the other products.
What other advice do I have?
As a partner with Cisco, this relationship is more related to the partners agreements, which is why we are selling Cisco Secure Access.
My impressions of Cisco Secure Access on protecting organizations from threats such as phishing or ransomware attacks are based on my recent POC. There aren't many use cases I have shown to the customer, but I can confirm that the solution is effective.
I would evaluate my experience with the Cisco team as an eight on a scale of one to 10, where 10 is the best.
My advice for other users who would like to start working with Cisco Secure Access is to find a good service integrator. As I come from the service integrator background, my advice to end users is to collaborate with a reliable SI that has the expected expertise on the solutions they are going to purchase and enroll.
The overall rating for Cisco Secure Access is 7 out of 10.
Posture checking and user tagging enhance security, but has integration complexities
What is our primary use case?
My main use case for Cisco Secure Access is remote access.
How has it helped my organization?
As an aerospace company, security is highly important for us, and we have various security schemas across the company. We try not to treat everybody as the highest schema, so Cisco Secure Access gives us the ability to detect and put users where they need to go and not just shove everybody into the whole secure area.
What is most valuable?
I find the posture checking feature of Cisco Secure Access the most valuable, and I also appreciate the ability to tag clients to place them into the right segment.
We're just getting started with Zero Trust Network Access, and we have a long way to go in that aspect. We haven't expanded any usage; more of the posture and things we've done more with technology.
They've protected us from threats like phishing and ransomware.
What needs improvement?
The only improvement I see for Cisco Secure Access is the way that we're using it; we're not fully integrating it into our client consoles, which affects the user experience. That's more of an internal issue than a Cisco issue.
I struggle with the integration of CASB functionality for exposing Shadow IT within our organization. As a company of engineers, they tend to do smart things and just go around you, so it's always a challenge for us.
Regarding the integration with Cisco Talos, it's something that we're not utilizing as best as we can. We should leverage Talos more.
From a licensing perspective, Cisco can improve. It gets very complicated about what's included and what's not included. The way that we're using Cisco Secure Access today, it doesn't scale with the growing needs of our organization, however, if we leveraged more of the cloud services, it would fit better.
For how long have I used the solution?
I have been using Cisco Secure Access for seven years.
What do I think about the stability of the solution?
Cisco Secure Access has been pretty stable. I can't really speak to downtime or performance issues much; I know we've had a few. I don't have the details to say whether it was a Cisco problem or an internal issue.
What do I think about the scalability of the solution?
The way that we're using Cisco Secure Access today, it doesn't scale with the growing needs of our organization, however, if we leveraged more of the cloud services, it would fit better.
How are customer service and support?
I don't really get involved with customer service and technical support. From a cloud team perspective, I'm aware of generally how we approach it. On a scale of one to ten, I would give customer service and technical support an eight.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
Prior to adopting Cisco Secure Access, I have used another solution.
How was the initial setup?
I wasn't involved in the deployment of Cisco Secure Access. That said, I'm not aware of major issues.
What was our ROI?
I don't see ROI with Cisco Secure Access right now; it's more of an internal issue. We have too many access platforms, and we need to consolidate. If we could solidify our access platform and eliminate non-duplication, the ROI would look much better than it does right now. That's our problem, not a Cisco issue.
What's my experience with pricing, setup cost, and licensing?
I don't get involved in pricing scenarios; however, from a licensing perspective, Cisco can improve. It gets very complicated about what's included and what's not included.
Which other solutions did I evaluate?
We're definitely looking at more SaaS-based solutions such as Zscaler and Palo Alto before selecting Cisco Secure Access, dabbling in them yet never fully committing.
What other advice do I have?
We did not purchase the solution via AWS Marketplace.
We consider a change since we're trying to achieve a user experience that's lighter weight.
I'm not an administrator, so I can't really speak to the ease or difficulty of managing Cisco Secure Access through a single cloud-managed console.
I would advise other potential customers or organizations considering Cisco Secure Access to take a closer look. They've added some features in the last year or so that have advanced significantly. They've caught up from the market where other people were ahead of them. I rate Cisco Secure Access seven out of ten.
Has a focus on DNS security features while more global coverage is needed
What is our primary use case?
I use this solution for securing security controls like Secure Security Control (SSC) for local Internet breakouts. It offers a unified security policy across Google sites, providing secure web gateways, DNS and web security filtering, and multi-malware protection. These features are essential for comprehensive security.
What is most valuable?
The main feature of interest to me and the customers is DNS security and Integrated Secure Web Control (ISWC).
What needs improvement?
There is a need for improved global coverage since the service relies on the cloud provider's data centers. We are seeking more granular and global coverage to meet our demands.
Modernization is needed, specifically in the enhancement of security features and functionality. Utilizing AI-oriented features is also important, considering what other vendors offer and their marketing strategies.
What do I think about the scalability of the solution?
According to the vendor's claims, the solution is adaptable and scalable. I would rate scalability at eight to nine out of ten.
How are customer service and support?
I am not able to read their resources, but I understand they have a good support organization. This stems from their original business in networking, integrating router and switch operations, as well as security devices. I assume the same organization now bridges into customer support.
How would you rate customer service and support?
Neutral
Which solution did I use previously and why did I switch?
Cisco is not well accepted in the market since they are somewhat behind their competitors.
How was the initial setup?
I would rate the initial setup at seven out of ten. The commercial aspects are significant here, primarily the recognition level compared to other dedicated suppliers approaching the market with stronger messages.
What about the implementation team?
I am on the presale side, and the delivery aspect is handled by other people in the organization.
What's my experience with pricing, setup cost, and licensing?
Prices are determined in the Compass. I do not refer to the suggested detail or the suggested list price, however, it is highly case-oriented. In the competitive landscape, they offer some advantages with Cisco deal IDs. However, renewal prices have been surprisingly high.
What other advice do I have?
They have a strong brand and are supported by Cisco's traditional organization.
I would rate them seven out of ten overall.