Introducing G2.ai, the future of software buying.Try now
Cisco Secure Access
Save to My Lists
Claimed
Claimed

Top Rated Cisco Secure Access Alternatives

Okta
(962)
4.5 out of 5
BetterCloud
(469)
4.4 out of 5

Cisco Secure Access Reviews & Product Details

Cisco Secure Access Overview

What is Cisco Secure Access?

Cisco Secure Access is a comprehensive solution that ensures secure access to networks and protects against unauthorized access. It is used for network authentication, enforcing access policies, managing user identities, securing remote access, and providing secure connectivity for devices. Users have praised its robust security measures, seamless integration with existing systems, user-friendly interface, and reliable network performance.

Cisco Secure Access Details
Show LessShow More
Product Description
Cisco Secure Access, a Security Service Edge (SSE) solution, is a converged cloud security solution, grounded in zero trust. It enforces modern cybersecurity, while radically reducing risk and delighting both end-users and IT staff. By providing seamless and secure access from anything to anywhere, it enables a frictionless end-user experience, lowers risk with tighter security and granular controls, and simplifies IT operations.

Seller
Description

Cisco delivers intent-based networking across the branch, WAN, and cloud. We provide end-to-end security, automation, and analytics with award-winning services and support.

Overview Provided by:

Cisco Secure Access Media

Product Avatar Image

Have you used Cisco Secure Access before?

Answer a few questions to help the Cisco Secure Access community

G2 reviews are authentic and verified.

There are not enough reviews of Cisco Secure Access for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Okta Logo
Okta
4.5
(962)
Okta is The World’s Identity Company™. As the leading independent Identity partner, we free everyone to safely use any technology — anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.
2
BetterCloud Logo
BetterCloud
4.4
(469)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
3
ThreatLocker Logo
ThreatLocker
4.8
(284)
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Schedule a free product demonstration and ThreatLocker will show you how.
4
Absolute Secure Access Logo
Absolute Secure Access
4.7
(222)
Absolute Secure Access delivers modern remote access for highly mobile workforces without sacrificing productivity. It provides reliable network connectivity for users to securely access critical resources in the public cloud, private data centers, or on-premises -- even in challenging environments. It is the only solution that proactively optimizes and improves the employee experience while offering deep visibility, control, and analytics to IT administrators.
5
FortiClient Logo
FortiClient
4.4
(207)
FortiClient Fabric Agent integrates endpoints into the Security Fabric and provides endpoint telemetry, including user identity, protection status, risk scores, unpatched vulnerabilities, security events, and more.
6
Trend Vision One Logo
Trend Vision One
4.7
(205)
Trend Micro Vision One (XDR) collects and correlates deep activity data across multiple vectors - email, endpoints, servers, cloud workloads, and networks - enabling a level of detection and investigation that is difficult or impossible to achieve with SIEM or individual point solutions.
7
GoodAccess Logo
GoodAccess
4.7
(154)
GoodAccess is a Zero Trust cybersecurity platform (SASE/SSE) built for medium-sized businesses (50–5000+ employees). It enables rapid, low-code/no-code deployment—without hardware or expert staff—to secure remote and hybrid teams. With identity-based access, BYOD protection, network segmentation, and full visibility, GoodAccess simplifies enterprise-grade security for modern, multi-cloud environments.
8
Check Point Harmony SASE Logo
Check Point Harmony SASE
4.7
(126)
Check Point Harmony SASE is a converged networking and network security platform which connects all users, in the office or remote, to all resources, located on-prem, cloud, SaaS or web. It delivers secure Zerto Trust Network Access (ZTNA) connectivity along web protection capabilities including Internet access control, malware protection, data loss prevention(DLP), and sandboxing, as well as a firewall as a service. The solution employs a hybrid architecture, combining on-device and cloud-based protections, which delivers market leading security and performance.
9
Check Point CloudGuard Network Security Logo
Check Point CloudGuard Network Security
4.5
(126)
Check Point CloudGuard Network Security for private and public cloud platforms is designed to protect assets in the cloud against the most sophisticated threats.
10
NordLayer Logo
NordLayer
4.3
(117)
A stress-free way to secure your network.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Cisco Secure Access