Secure access has simplified VPN replacement and reveals where migration paths still need work
What is our primary use case?
Cisco Secure Access serves as a major replacement for traditional VPNs with a VPN-as-a-Service offering. This is particularly useful for clients with aging VPN architectures who face challenges in scaling out.
The product also optimizes firewall capabilities for geographically distributed operators and enhances proxy-based architectures with Secure Web Gateways and CASB for cloud or SaaS applications. By integrating with identity providers like Azure Entra ID or Okta, Cisco Secure Access facilitates the transition from VPN to ZTNA while ensuring compliance with principles like least privilege access.
Additionally, it incorporates identity and device risk scores for dynamic access policies to respond to varying risk thresholds. The service is particularly useful for managing old VPN infrastructure replacements, firewall optimizations, and bridging the gaps between old and new secure access technologies.
The product also addresses unique geographical challenges, such as ensuring secure internet access for oil rigs in remote locations. Furthermore, Cisco Secure Access's multi-tenancy and Policy Verification features are crucial for managing multi-organization environments and ensuring policy accuracy, respectively.
Hybrid Private Access is particularly useful in regions where replacing existing gear isn't feasible due to cost concerns. Lastly, the product's AI-driven features like AI Access and AI Assistant ease policy management and triage, reducing the time and efforts needed in these processes.
What is most valuable?
Cisco Secure Access offers numerous valuable features. The VPN-as-a-Service replaces traditional VPNs, providing global secure access without installing solutions at each location, allowing geographically distributed operators to benefit from scalability and optimization.
The integration with identity providers facilitates this transition and aligns with Zero Trust Network Access principles. The platform offers capabilities like Secure Web Gateways, Firewall-as-a-Service, and CASB for enhanced cloud-based functionality. Its Policy Verification runs checks to prevent policy misconfigurations, a necessary feature for managing multi-organization environments.
Moreover, the product's AI-driven capabilities streamline policy management and triage, enhancing operational efficiency. Hybrid Private Access and multi-tenancy capabilities make it resource-efficient and particularly useful for unique geographical challenges. The product is scalable, adjusting to new requirements easily, and is backed by robust technical support.
What needs improvement?
Despite being a value-for-money product, there are a few areas for improvement. Transitioning for customers from Palo Alto to Cisco Secure Access has its challenges, primarily due to previous infrastructure setups and migration paths. Cisco Secure Access may not seamlessly integrate into such settings, although it performs well in a Cisco-based environment.
Furthermore, while the AI capabilities of Cisco Secure Access are useful, they are not seen as major differentiators compared to competitors such as Palo Alto.
Additionally, though the existing threat intelligence is sufficient for most use cases, extending the integration scope with other tools, especially concerning AI supply chain risk management, could enhance its functionality.
For how long have I used the solution?
The first time I came across Cisco Secure Access, it used to be called a different solution. It was a combination of multiple solutions. First they started with
Cisco Duo, and then they expanded into Cisco Secure
Firewalls over close to three years. They conducted a lot of branding changes and naming convention changes after that.
What do I think about the stability of the solution?
While the product offers strong overall stability, there were occasional issues, particularly involving Linux devices. However, these hiccups were more related to endpoint-client interactions rather than being vendor-specific problems. Overall, the solution is stable, but improvements could further enhance reliability.
What do I think about the scalability of the solution?
The scalability of Cisco Secure Access is a strong feature. Initially driven by the need for improved scalability over traditional VPNs, it has proven to scale seamlessly alongside infrastructural growth. Effective collaboration with account teams ensures a robust and flexible solution designed to meet future scaling requirements without significant issues.
How are customer service and support?
The technical support from Cisco is exceptional. They provide geographically distributed, responsive support with strict SLAs. The purchase of premium support ensures rapid response times, upholding high-quality service delivery across the board. The commitment to excellent service reflects positively on client experiences.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I used to work for Deloitte until six months ago. Currently, this is about managing our own internal infrastructure and then managing that of a couple of our operators and partners. Reselling is not something I am doing currently. I used to do that until June of this year.
How was the initial setup?
Installation and deployment of Cisco Secure Access are straightforward. Comprehensive and publicly available documentation supports this, backed by assigned account managers and optional professional services. Despite anticipating complexities by procuring external services, they were unnecessary due to the clear and simplified setup process offered by the existing resources.
What about the implementation team?
We had an account manager who was assigned to us and then we also purchased some professional services for day zero and day one, in case we got stuck.
What was our ROI?
The integrated capabilities of Cisco Secure Access deliver significant ROI through reduced mean time to detect (MTTD) and mean time to respond (MTTR). The resource efficiency is notably improved as fewer personnel are needed for triage and system management. The AI features further contribute by expediting threat detection and incident response, ensuring tangible returns through operational savings.
What's my experience with pricing, setup cost, and licensing?
Cisco Secure Access offers good value for money. Existing product relationships provide cost advantages, ensuring reasonable pricing without overcharging. Although the solution is cheaper than premium options such as Palo Alto, existing Cisco licenses facilitate replacing previous solutions with Cisco Secure Access smoothly and affordably.
Which other solutions did I evaluate?
If you were a Cisco house in the past, I would certainly use that. If you are coming from something with a Palo Alto firewall infrastructure, I would prefer going with Palo Alto. It is more about the widespread adoption. When ten different people are doing the same thing, then I guess the other five people would do the same thing.
What other advice do I have?
While client-based solutions serve corporate employees, clientless options cater to third-party contractors and onboarding procedures without equipment. These options ensure seamless transitions to full client-based systems for long-term corporate users.
Regarding the multi-organization management capability, it is akin to multi-tenancy, helpful for service provider infrastructures with multiple clients or single customers with diverse business units. It brings intuitive infrastructure management without providing unique features compared to competitors.
AI supply chain risk management, while theoretically beneficial, may not give an edge unless thorough integrations with additional tools are pursued. Furthermore, the choice of not implementing low-cost workflows was based on a need for higher security enhancements.
I would rate this review overall at a seven out of ten.
Secure access has unified zero trust and web protection while AI assistance automates tasks
What is our primary use case?
I use Cisco Secure Access for Secure Access Service Edge (SASE), which provides me with secure identity-based access to applications and the internet from anywhere. I don't have to rely on traditional VPN architectures. Cisco Secure Access provides Zero Trust Network Access (ZTNA), Secure Web Gateway, Cloud Security Broker, and Firewall as a Service all into one platform, which is beneficial.
I use it for firewalling, security, and Zero Trust Network Access.
What is most valuable?
I have worked with Cisco AI Defense product and Cisco AI Access, focusing on control access and data protection for data in transport and stationary states.
I have used the AI Assistant, which is a Cisco feature where AI helps to automate redundant tasks so that I don't have to configure each small detail manually. It is a bulk configuration feature.
I have used Cisco Identity Intelligence, which provides User-ID and Content-ID based network access control. It uses protocols such as LDAP to authenticate with products such as Active Directory to authenticate users. It is a good feature and is already integrated.
What needs improvement?
From a feature perspective, I have not experienced any issues, drawbacks, or shortcomings. However, the cost of Cisco's products and licensing is high. My clients usually prefer cheaper options if possible. Mid-size or smaller businesses typically cannot afford Cisco Secure Access. Additionally, there is a steep learning curve, as it is very intensive. Someone with significant knowledge can work on it, but a new professional would have to spend considerable time to get accustomed to it. It is hard to find engineers who can work on it. Overall, we get what we pay for, as it is a pretty good feature and service.
The pricing of Cisco's products and licensing is higher than competitors. If they could be more reasonable, that would help. The support offered for two years also has higher costs. Overall, the client's IT budget gets affected.
For how long have I used the solution?
I started using Cisco Secure Access when I was in the US, which was approximately five years ago.
What do I think about the stability of the solution?
From my experience, Cisco Secure Access is very stable and has not crashed. Cisco is renowned for their reliability, and their products perform well under high data usage. It is very resilient, and I have not seen it go down, crash, hang, or experience any other issues.
What do I think about the scalability of the solution?
Cisco Secure Access is very scalable. It has high availability, so it can be deployed in pairs and scaled quickly.
How are customer service and support?
The quality and speed of the support are very good. Cisco is excellent with their support. When I create a TAC case for any issue, they respond quickly and schedule a call. They help resolve issues as soon as possible through screen sharing. Cisco TAC is very competent.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
I have not worked on the same offering from Palo Alto, so I cannot compare what is better there or here. What I appreciate about Cisco is that everything they do is precise and works well without any issues. I found that there are not many bugs. I have heard that Palo Alto has many bugs that need to be fixed and require a TAC case to resolve. In my experience with Cisco, I haven't had issues with bugs that I had to escalate. On the few occasions when there was a bug, the solution and patch usually fixed the issue, which they had already posted on their website indicating which patch version would resolve it. That is the advantage, as it works flawlessly.
I have not used Palo Alto's offering, so I cannot make a comparison. I have only used Cisco's.
How was the initial setup?
Deploying Cisco Secure Access on the machine is very easy. If we follow the steps, they are seamless and run smoothly.
Policy verification is done before deploying, similar to Juniper's approach. With Cisco switches, if we put a command, it applies immediately without asking for confirmation. With Juniper, we have to put the command and then only after we hit commit does the command apply. Cisco Secure Access has the same feature where before applying the configuration, it verifies and checks if it would cause any issues and provides results based on that.
What about the implementation team?
One person can complete the deployment.
What was our ROI?
It was challenging to learn because, as mentioned, it has a significant learning curve and requires considerable training to become proficient.
What's my experience with pricing, setup cost, and licensing?
Cisco Secure Access regularly requires patches that need to be installed. During downtime or after hours, patches need to be applied. The system gets rebooted occasionally to clear caches and improve CPU performance.
Which other solutions did I evaluate?
I am not certain what VPN as a Service or VPNAaS means. I have not heard of this term.
What other advice do I have?
Multi-organization might be a feature on Cisco Secure Access, but my clients are private companies that haven't merged with any other organizations, so they have their own devices and networks. I haven't used those features.
I would rate this product an 8 overall.
Which deployment model are you using for this solution?
Hybrid Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Provides conditional and application-level access while enabling seamless threat visibility
What is our primary use case?
Cisco Secure Access is used as a security tool within the tenant as a firewall and serves as a cloud-delivered Zero Trust access platform. It is used for
Microsoft Intune as conditional access, Global Secure Access, and from Defender for Cloud Apps, working behind before it.
Cisco Secure Access provides application-level access. Usually, it's full network access, but with this tool, application-level access can be given. It removes the dependency of VPN, and then user authentications are continuously based on identity, device, and risk, which is an add-on there.
The Zero Trust Network Access feature is being used.
What is most valuable?
Cisco AnyConnect is used as a VPN tool for
SASE purposes.
The integration of CASB functionality for exposing shadow IT within the company is smooth. Technical skill and knowledge are needed to evaluate, analyze, and deep dive on those things. From the tool's response, it is very good, and there is visibility on everything that is needed or necessary.
The integration of Cisco Talos influences threat detection and response capabilities. The integration of Cisco Talos is similar to every Cisco Umbrella, and the experience has been smooth. The knowledge, their KB, and FAQs are very good, and their support is very good. When in trouble, readily available documents or information are accessible.
What needs improvement?
Managing Cisco Secure Access in a single cloud management console is moderate in difficulty. Technical skills or an understanding at a base level or moderate level are needed to make it work, configure, and integrate it. The difficulty level is somewhere between easy and difficult.
For how long have I used the solution?
Cisco Secure Access has been used for one and a half years.
What do I think about the stability of the solution?
The product has been stable with no crashes or downtime so far, and the SLA is good.
What do I think about the scalability of the solution?
Cisco Secure Access is scalable.
How are customer service and support?
The technical support of Cisco is good and up to the mark.
How would you rate customer service and support?
How was the initial setup?
Regarding deployment and installation, it is straightforward, but having basics is necessary.
What other advice do I have?
No negative aspects have been observed so far; everything seems good. The review rating for this product is 9 out of 10.
Integrating multiple security solutions on a single platform enhances threat protection
What is our primary use case?
For Cisco Secure Access, my main use cases are the DNS functionality. Previously, we used Umbrella in the DNS stack functionality, and currently, we are using Cisco Secure Access.
How has it helped my organization?
Cisco Secure Access benefits my company by being a platform that integrates more than one solution, making it possible for us to have other solutions in the same platform, allowing us to manage SWG, the DNS part, and firewall.
What is most valuable?
The feature of Cisco Secure Access I appreciate the most is the DNS functionality. It's the main function that we are using currently.
The impact Cisco Secure Access has on protecting my company from threats such as phishing and ransomware is significant.
We utilize it extensively, especially the DNS part, which is very important. Even when we educate our users, the attackers become more advanced each day. They sometimes can use emails and other methods to attempt to attack our company, and Cisco Secure Access can help us protect our users, especially with the incredible DNS part.
The best part of managing Cisco Secure Access through its single cloud management console is that we can purchase as needed and add more products to this platform as necessary, within our budget.
My perception of Cisco Secure Access's ability to provide secure access via standard HTTP2, and optionally the QUIC protocol, is that the platform is very complete, and the objective is to deliver a full stack of resources regarding security. We are offering this solution to our clients, and the adoption rate is incredibly high. They are very satisfied.
I have noticed that in recent years, particularly over the last year, Cisco has significantly improved the platform by consolidating more solutions within the Cisco Secure Access ecosystem. It is important for Cisco to bring more products. For us and our clients, it is easier to have a single pane of glass to manage all the solutions when discussing security. The platform being in the cloud also makes it easier as we don't have to have something on-premise in our environment for the solution.
We have numerous integrations, including Splunk and other solutions that can be integrated into the same platform. This is particularly beneficial when discussing the solution's benefits.
What needs improvement?
The worst part was the migration from Umbrella to Cisco Secure Access; we experienced some difficulties during that process.
Improving Cisco Secure Access is difficult for me to discuss in detail as I'm not the administrator of the platform.
For how long have I used the solution?
I have been using Cisco Secure Access for more than two years, since it was launched.
What do I think about the stability of the solution?
Regarding the stability and reliability of Cisco Secure Access, at least in Brazil, we don't hear about availability or stability problems. If a client has issues with the internet connection, it might not be the best way to deliver the solutions, however, this is a worldwide situation. We don't have problems with internet connections, especially in the offices, so it is not a problem.
What do I think about the scalability of the solution?
Cisco Secure Access scales effectively with the growing needs of my company because we are talking about a cloud solution. It is easy to scale as necessary, especially when we discuss the DNS functionalities.
We turn the traffic to the Cisco Secure Access cloud, and we can manage and apply the policies that are necessary, making it very easy to scale the solution.
How are customer service and support?
I don't have direct experience with customer service and technical support, as I don't work in the administration of the solution. TAC is a worldwide service recognized as fantastic. We also have experience with other hardware and software, and my understanding of it is good. It provides good service.
How would you rate customer service and support?
Which solution did I use previously and why did I switch?
My company did not consider other solutions before choosing Cisco Secure Access. We are a Cisco partner.
However, our clients always evaluate other solutions. We work extensively to show the value of the solution since we have competitors, however, Cisco Secure Access has the advantage of delivering multiple solutions in the same single pane of glass.
How was the initial setup?
We had a migration from Cisco Umbrella. There were some problems. However, the process now is easier as the solution is in the cloud and we can add more solutions and activate them in the portal. It's easy now.
What was our ROI?
The biggest return on investment when using Cisco Secure Access is consolidating multiple solutions into a single pane of glass. We have competitors offering alternative solutions; however, they don't deliver the same level of integration as Cisco, which consolidates all solutions simultaneously through a single console.
What's my experience with pricing, setup cost, and licensing?
Regarding pricing, the setup cost, and the licensing of Cisco Secure Access, being from Brazil, the cost for us is a very important point. Sometimes we show the solution for our clients, but the price can be problematic.
We try to overcome this challenge by presenting the value and importance, especially for today's infrastructure to have more security, avoiding downtime, loss of data, and similar issues. The Cisco products are amazing, but especially in Brazil, when discussing the price, it remains a challenge.
What other advice do I have?
We're a Cisco partner.
On a scale of one to ten, I rate Cisco Secure Access a nine.
Which deployment model are you using for this solution?
Public Cloud
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Amazon Web Services (AWS)