Sign in Agent Mode
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Secure Access

Beyond Identity

Reviews from AWS customer

9 AWS reviews

External reviews

9 reviews
from and

External reviews are not included in the AWS star rating for the product.


3-star reviews ( Show all reviews )

    Tejas Jain

Secure access has simplified VPN replacement and reveals where migration paths still need work

  • December 29, 2025
  • Review from a verified AWS customer

What is our primary use case?

Cisco Secure Access serves as a major replacement for traditional VPNs with a VPN-as-a-Service offering. This is particularly useful for clients with aging VPN architectures who face challenges in scaling out.

The product also optimizes firewall capabilities for geographically distributed operators and enhances proxy-based architectures with Secure Web Gateways and CASB for cloud or SaaS applications. By integrating with identity providers like Azure Entra ID or Okta, Cisco Secure Access facilitates the transition from VPN to ZTNA while ensuring compliance with principles like least privilege access.

Additionally, it incorporates identity and device risk scores for dynamic access policies to respond to varying risk thresholds. The service is particularly useful for managing old VPN infrastructure replacements, firewall optimizations, and bridging the gaps between old and new secure access technologies.

The product also addresses unique geographical challenges, such as ensuring secure internet access for oil rigs in remote locations. Furthermore, Cisco Secure Access's multi-tenancy and Policy Verification features are crucial for managing multi-organization environments and ensuring policy accuracy, respectively.

Hybrid Private Access is particularly useful in regions where replacing existing gear isn't feasible due to cost concerns. Lastly, the product's AI-driven features like AI Access and AI Assistant ease policy management and triage, reducing the time and efforts needed in these processes.

What is most valuable?

Cisco Secure Access offers numerous valuable features. The VPN-as-a-Service replaces traditional VPNs, providing global secure access without installing solutions at each location, allowing geographically distributed operators to benefit from scalability and optimization.

The integration with identity providers facilitates this transition and aligns with Zero Trust Network Access principles. The platform offers capabilities like Secure Web Gateways, Firewall-as-a-Service, and CASB for enhanced cloud-based functionality. Its Policy Verification runs checks to prevent policy misconfigurations, a necessary feature for managing multi-organization environments.

Moreover, the product's AI-driven capabilities streamline policy management and triage, enhancing operational efficiency. Hybrid Private Access and multi-tenancy capabilities make it resource-efficient and particularly useful for unique geographical challenges. The product is scalable, adjusting to new requirements easily, and is backed by robust technical support.

What needs improvement?

Despite being a value-for-money product, there are a few areas for improvement. Transitioning for customers from Palo Alto to Cisco Secure Access has its challenges, primarily due to previous infrastructure setups and migration paths. Cisco Secure Access may not seamlessly integrate into such settings, although it performs well in a Cisco-based environment.

Furthermore, while the AI capabilities of Cisco Secure Access are useful, they are not seen as major differentiators compared to competitors such as Palo Alto.

Additionally, though the existing threat intelligence is sufficient for most use cases, extending the integration scope with other tools, especially concerning AI supply chain risk management, could enhance its functionality.

For how long have I used the solution?

The first time I came across Cisco Secure Access, it used to be called a different solution. It was a combination of multiple solutions. First they started with Cisco Duo, and then they expanded into Cisco Secure Firewalls over close to three years. They conducted a lot of branding changes and naming convention changes after that.

What do I think about the stability of the solution?

While the product offers strong overall stability, there were occasional issues, particularly involving Linux devices. However, these hiccups were more related to endpoint-client interactions rather than being vendor-specific problems. Overall, the solution is stable, but improvements could further enhance reliability.

What do I think about the scalability of the solution?

The scalability of Cisco Secure Access is a strong feature. Initially driven by the need for improved scalability over traditional VPNs, it has proven to scale seamlessly alongside infrastructural growth. Effective collaboration with account teams ensures a robust and flexible solution designed to meet future scaling requirements without significant issues.

How are customer service and support?

The technical support from Cisco is exceptional. They provide geographically distributed, responsive support with strict SLAs. The purchase of premium support ensures rapid response times, upholding high-quality service delivery across the board. The commitment to excellent service reflects positively on client experiences.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

I used to work for Deloitte until six months ago. Currently, this is about managing our own internal infrastructure and then managing that of a couple of our operators and partners. Reselling is not something I am doing currently. I used to do that until June of this year.

How was the initial setup?

Installation and deployment of Cisco Secure Access are straightforward. Comprehensive and publicly available documentation supports this, backed by assigned account managers and optional professional services. Despite anticipating complexities by procuring external services, they were unnecessary due to the clear and simplified setup process offered by the existing resources.

What about the implementation team?

We had an account manager who was assigned to us and then we also purchased some professional services for day zero and day one, in case we got stuck.

What was our ROI?

The integrated capabilities of Cisco Secure Access deliver significant ROI through reduced mean time to detect (MTTD) and mean time to respond (MTTR). The resource efficiency is notably improved as fewer personnel are needed for triage and system management. The AI features further contribute by expediting threat detection and incident response, ensuring tangible returns through operational savings.

What's my experience with pricing, setup cost, and licensing?

Cisco Secure Access offers good value for money. Existing product relationships provide cost advantages, ensuring reasonable pricing without overcharging. Although the solution is cheaper than premium options such as Palo Alto, existing Cisco licenses facilitate replacing previous solutions with Cisco Secure Access smoothly and affordably.

Which other solutions did I evaluate?

If you were a Cisco house in the past, I would certainly use that. If you are coming from something with a Palo Alto firewall infrastructure, I would prefer going with Palo Alto. It is more about the widespread adoption. When ten different people are doing the same thing, then I guess the other five people would do the same thing.

What other advice do I have?

While client-based solutions serve corporate employees, clientless options cater to third-party contractors and onboarding procedures without equipment. These options ensure seamless transitions to full client-based systems for long-term corporate users.

Regarding the multi-organization management capability, it is akin to multi-tenancy, helpful for service provider infrastructures with multiple clients or single customers with diverse business units. It brings intuitive infrastructure management without providing unique features compared to competitors.

AI supply chain risk management, while theoretically beneficial, may not give an edge unless thorough integrations with additional tools are pursued. Furthermore, the choice of not implementing low-cost workflows was based on a need for higher security enhancements.

I would rate this review overall at a seven out of ten.


    Ahmad Kamarul Zaman Zakaria

Experience shows promise in security and integration, while setup and UI need refinement

  • August 12, 2025
  • Review provided by PeerSpot

What is most valuable?

Managing Cisco Secure Access through the single cloud management console will not be difficult if you experience it once. This means once you have hands-on experience, you know how to operate it. In the first time, you might have a challenge because you need to understand the system. However, once you understand it, it will not be difficult anymore.

I find the zero trust approach helpful and beneficial in securing standard applications, which means you are accessing the applications directly instead of giving privilege to access the network itself. This is very beneficial in the context of security and is very effective.

Regarding the threat detection and response capabilities, because it's integrated in the cloud, users don't have to configure it to integrate with Talos. The feed that it has is already there, detecting malware and blocking it by itself from the Cisco Secure Access. The Intel is there, and we do not need to manually integrate with Talos.

What needs improvement?

My personal thinking about Cisco Secure Access is that because I'm also catching up on this solutioning, I'm not really seeing any improvement because I'm still learning. So far, it's good; I do not have any comment on this.

Regarding features about the UI, the pricing, and the learning curve of Cisco Secure Access that can be improved, the AI is already embedded in the solution. Because I haven't explored much and am not an expert, the features might be there, but I haven't tested them out.

When it comes to thoughts on the pricing, setup cost, and licensing cost of Cisco Secure Access, I cannot comment as I only did SSE for Cisco and did not have experience with other products. In terms of price comparisons, I cannot provide much insight.

The more competitive the pricing for Cisco Secure Access becomes, the better it would be for customers.

What do I think about the stability of the solution?

Throughout my experience with Cisco Secure Access, I have had some stability and reliability issues, including lagging when accessing the portal. Sometimes the response is fast, and sometimes it's slow, with response information that can be either correct or wrong. However, I consider these minor issues because they recover in a few minutes afterwards, though there are still glitches present.

How are customer service and support?

In evaluating my experience with the technical support and customer service of Cisco Secure Access, during the POC, we did not leverage tech support at that particular moment; instead, we engaged directly with the SE team, the Cisco System Engineer teams.

How would you rate customer service and support?

Positive

How was the initial setup?

Regarding the experience with the initial setup of Cisco Secure Access, it is important to communicate with the customers on the requirements, so they understand and prepare whatever we need to set up the POC. We need to communicate effectively with them and let them know what we need. Once our requirement is fulfilled, we can proceed. The key point is that communication with the customer must be maintained.

Once we have all of the requirements, the setup of the product itself is not that difficult. The first time requires understanding many things, but after the deployment and gaining experience, it becomes quite straightforward.

Which other solutions did I evaluate?

I give Cisco Secure Access a seven because I did study other products as well. While I haven't deployed any other SSE product, I went for the training. The way of deploying and the solution is quite seamless, but that's my current assessment without hands-on experience with the other products.

What other advice do I have?

As a partner with Cisco, this relationship is more related to the partners agreements, which is why we are selling Cisco Secure Access.

My impressions of Cisco Secure Access on protecting organizations from threats such as phishing or ransomware attacks are based on my recent POC. There aren't many use cases I have shown to the customer, but I can confirm that the solution is effective.

I would evaluate my experience with the Cisco team as an eight on a scale of one to 10, where 10 is the best.

My advice for other users who would like to start working with Cisco Secure Access is to find a good service integrator. As I come from the service integrator background, my advice to end users is to collaborate with a reliable SI that has the expected expertise on the solutions they are going to purchase and enroll.

The overall rating for Cisco Secure Access is 7 out of 10.


    reviewer2721249

Posture checking and user tagging enhance security, but has integration complexities

  • June 11, 2025
  • Review from a verified AWS customer

What is our primary use case?

My main use case for Cisco Secure Access is remote access.

How has it helped my organization?

As an aerospace company, security is highly important for us, and we have various security schemas across the company. We try not to treat everybody as the highest schema, so Cisco Secure Access gives us the ability to detect and put users where they need to go and not just shove everybody into the whole secure area.

What is most valuable?

I find the posture checking feature of Cisco Secure Access the most valuable, and I also appreciate the ability to tag clients to place them into the right segment.

We're just getting started with Zero Trust Network Access, and we have a long way to go in that aspect. We haven't expanded any usage; more of the posture and things we've done more with technology.

They've protected us from threats like phishing and ransomware.

What needs improvement?

The only improvement I see for Cisco Secure Access is the way that we're using it; we're not fully integrating it into our client consoles, which affects the user experience. That's more of an internal issue than a Cisco issue.

I struggle with the integration of CASB functionality for exposing Shadow IT within our organization. As a company of engineers, they tend to do smart things and just go around you, so it's always a challenge for us.

Regarding the integration with Cisco Talos, it's something that we're not utilizing as best as we can. We should leverage Talos more.

From a licensing perspective, Cisco can improve. It gets very complicated about what's included and what's not included. The way that we're using Cisco Secure Access today, it doesn't scale with the growing needs of our organization, however, if we leveraged more of the cloud services, it would fit better.

For how long have I used the solution?

I have been using Cisco Secure Access for seven years.

What do I think about the stability of the solution?

Cisco Secure Access has been pretty stable. I can't really speak to downtime or performance issues much; I know we've had a few. I don't have the details to say whether it was a Cisco problem or an internal issue.

What do I think about the scalability of the solution?

The way that we're using Cisco Secure Access today, it doesn't scale with the growing needs of our organization, however, if we leveraged more of the cloud services, it would fit better.

How are customer service and support?

I don't really get involved with customer service and technical support. From a cloud team perspective, I'm aware of generally how we approach it. On a scale of one to ten, I would give customer service and technical support an eight.

How would you rate customer service and support?

Positive

Which solution did I use previously and why did I switch?

Prior to adopting Cisco Secure Access, I have used another solution.

How was the initial setup?

I wasn't involved in the deployment of Cisco Secure Access. That said, I'm not aware of major issues.

What was our ROI?

I don't see ROI with Cisco Secure Access right now; it's more of an internal issue. We have too many access platforms, and we need to consolidate. If we could solidify our access platform and eliminate non-duplication, the ROI would look much better than it does right now. That's our problem, not a Cisco issue.

What's my experience with pricing, setup cost, and licensing?

I don't get involved in pricing scenarios; however, from a licensing perspective, Cisco can improve. It gets very complicated about what's included and what's not included.

Which other solutions did I evaluate?

We're definitely looking at more SaaS-based solutions such as Zscaler and Palo Alto before selecting Cisco Secure Access, dabbling in them yet never fully committing.

What other advice do I have?

We did not purchase the solution via AWS Marketplace.

We consider a change since we're trying to achieve a user experience that's lighter weight.

I'm not an administrator, so I can't really speak to the ease or difficulty of managing Cisco Secure Access through a single cloud-managed console.

I would advise other potential customers or organizations considering Cisco Secure Access to take a closer look. They've added some features in the last year or so that have advanced significantly. They've caught up from the market where other people were ahead of them. I rate Cisco Secure Access seven out of ten.


    Ken Harada

Has a focus on DNS security features while more global coverage is needed

  • January 27, 2025
  • Review provided by PeerSpot

What is our primary use case?

I use this solution for securing security controls like Secure Security Control (SSC) for local Internet breakouts. It offers a unified security policy across Google sites, providing secure web gateways, DNS and web security filtering, and multi-malware protection. These features are essential for comprehensive security.

What is most valuable?

The main feature of interest to me and the customers is DNS security and Integrated Secure Web Control (ISWC).

What needs improvement?

There is a need for improved global coverage since the service relies on the cloud provider's data centers. We are seeking more granular and global coverage to meet our demands.

Modernization is needed, specifically in the enhancement of security features and functionality. Utilizing AI-oriented features is also important, considering what other vendors offer and their marketing strategies.

What do I think about the scalability of the solution?

According to the vendor's claims, the solution is adaptable and scalable. I would rate scalability at eight to nine out of ten.

How are customer service and support?

I am not able to read their resources, but I understand they have a good support organization. This stems from their original business in networking, integrating router and switch operations, as well as security devices. I assume the same organization now bridges into customer support.

How would you rate customer service and support?

Neutral

Which solution did I use previously and why did I switch?

Cisco is not well accepted in the market since they are somewhat behind their competitors.

How was the initial setup?

I would rate the initial setup at seven out of ten. The commercial aspects are significant here, primarily the recognition level compared to other dedicated suppliers approaching the market with stronger messages.

What about the implementation team?

I am on the presale side, and the delivery aspect is handled by other people in the organization.

What's my experience with pricing, setup cost, and licensing?

Prices are determined in the Compass. I do not refer to the suggested detail or the suggested list price, however, it is highly case-oriented. In the competitive landscape, they offer some advantages with Cisco deal IDs. However, renewal prices have been surprisingly high.

What other advice do I have?

They have a strong brand and are supported by Cisco's traditional organization.

I would rate them seven out of ten overall.


showing 1 - 4