We use the solution for authentications and accounting services.

Secure Access
Beyond IdentityExternal reviews
External reviews are not included in the AWS star rating for the product.
An easy to access and user-friendly solution for authentication
What is our primary use case?
How has it helped my organization?
We use the tool in the Finance and IT sectors. We provide Cisco Secure Access solutions to various clients, including government agencies, to enhance network security.
What is most valuable?
The most valuable feature is the authentication feature.
For how long have I used the solution?
I have been using Cisco Secure Access for two years.
What do I think about the stability of the solution?
The product is stable.
I rate the solution’s stability a ten out of ten.
What do I think about the scalability of the solution?
The solution’s scalability is good. More than 50 admin users use this solution. I rate the solution’s scalability a ten out of ten.
How are customer service and support?
I received support from the team for Cisco Secure Access related to web services. There were occasional delays of up to two working days. With our live chat options or by contacting a specialist directly, we were able to address any issues. Additionally, Cisco provides resources and lessons that can be beneficial in such situations.
How would you rate customer service and support?
Positive
How was the initial setup?
The initial setup is easy.
What's my experience with pricing, setup cost, and licensing?
The tool is expensive. It costs around 25,000-30,000 per year. There is an additional cost for monitoring, setup, or hardware.
What other advice do I have?
In the Secure Access process, we manage authentication for corporate data, resources, and user policies to ensure that transactions are conducted securely. This involves verifying user identities and ensuring access is granted only to authorized individuals.
Sometimes, authentication takes only two or five minutes. Cisco is easy to access and is user-friendly. There is a brand policy, value, and nearability.
Overall, I rate the solution a ten out of ten.