Cisco SD-Access

Cisco SD-Access

About TrustRadius Scoring
Score 8.9 out of 100
Cisco Software-Defined Access (SD-Access)

Overview

Recent Reviews

Pros and Cons in a nutshell

8 out of 10
February 03, 2022
With a lot of branches to manage, Cisco SD Access automation helped in saving cost and useful time on operations. It also helped us in …
Continue reading

Cisco SD-Access Review

8 out of 10
November 25, 2021
Deploy this solution on a single customer and you will be truly amazed as it offers advanced features such as end-to-end segmentation, …
Continue reading

To one's own liking

7 out of 10
November 05, 2021
Cisco's SD-Access has reduced the downtime largely. [It] helped us in planning global expansion which can now be more agile. We are …
Continue reading
Read all reviews

Reviewer Pros & Cons

View all pros & cons

Video Reviews

Leaving a video review helps other professionals like you evaluate products. Be the first one in your network to record a review of Cisco SD-Access, and make your voice heard!

Pricing

View all pricing
N/A
Unavailable

What is Cisco SD-Access?

Cisco's Software-Defined Access (SD-Access) provides automated end-to-end segmentation to separate user, device and application traffic without redesigning the network. Cisco SD-Access automates user access policy so organizations can make sure the right policies are established for any user or…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting / Integration Services

Would you like us to let the vendor know that you want pricing?

2 people want pricing too

Alternatives Pricing

What is IBM Cloud Internet Services?

IBM Cloud Internet Services is a set of edge network services for securing internet-facing applications from DDoS attacks, data theft, and bot attacks, as well as optimizing their web apps or ensuring global responsiveness and the ongoing availability of their internet-facing applications.

What is Speedify VPN?

Speedify is a new kind of bonding VPN designed from the ground up for speed, security, and reliability. The vendor says Speedify's bonding protocol lets it do things no other VPN can: switching between Wi-Fi and Cellular without breaking sockets, and bonding connections together for speed…

Features Scorecard

No scorecards have been submitted for this product yet..

Product Details

What is Cisco SD-Access?

Cisco's Software-Defined Access (SD-Access) provides automated end-to-end segmentation to separate user, device and application traffic without redesigning the network. Cisco SD-Access automates user access policy so organizations can make sure the right policies are established for any user or device with any application across the network.

Cisco SD-Access Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo

Frequently Asked Questions

Cisco's Software-Defined Access (SD-Access) provides automated end-to-end segmentation to separate user, device and application traffic without redesigning the network. Cisco SD-Access automates user access policy so organizations can make sure the right policies are established for any user or device with any application across the network.

Reviewers rate Support Rating highest, with a score of 8.1.

The most common users of Cisco SD-Access are from Mid-sized Companies (51-1,000 employees) and the Computer Networking industry.

Comparisons

View all alternatives

Reviews and Ratings

 (14)

Ratings

Reviews

(1-8 of 8)
Companies can't remove reviews or game the system. Here's why
Score 8 out of 10
Vetted Review
Verified User
Review Source
  • Automation capabilities
  • Cost and time saving
  • Audit compliance fulfilment
  • There are controller bugs.
  • Cost is high.
  • Implementation is a bit complex, can be improved.
November 25, 2021

Cisco SD-Access Review

Score 8 out of 10
Vetted Review
Verified User
Review Source
  • Network security
  • Stability of the user experience
  • Effectiveness and efficiency
  • Network Visibility
  • Integration with third-party solution
  • Use of licenses makes the solution more expensive
  • DNA versions contain many bugs
Score 8 out of 10
Vetted Review
Verified User
Review Source
  • Security: Macro and micro segmentation
  • Configuration: LAN Automation and provisioning
  • Monitoring and telemetry: Network metrics and insights
  • Documentation: Working in this solution I realized there were missing information details about the fusion device support for nexus.
  • Fusion router: This roll in the fabric should be already integrated in the solution, right now it is configured manually.
  • Bugs: Unfortunately the solution still present a lot of bugs, mainly in the controller.
Ericson Aragoza | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User
Review Source
  • Better Network Segmentation and Management
  • Policy-based, security access across all applications and network environment
  • Continuous Monitoring and Threat mitigation
  • Internet Security can be better integrated
  • Security Analytics can be further refined to prevent false positives
September 24, 2021

Cisco SD-Access review

Score 9 out of 10
Vetted Review
Verified User
Review Source
  • Automation, pushing template-based configuration to multiple devices in one push saves time and manpower.
  • Assurance [helps trace] issues related to devices, clients, and provide the troubleshoot as [the] best practices.
  • Segmentation, with the use of the SGT tags, we are able to achieve segmentation and micro-segmentation securely.
  • There are some issues we are facing like the stability of the DNA center versions.
  • Need to simplify the licenses used for Devices and the DNA center which is hard to understand and explain further.
Sonu Kumar | TrustRadius Reviewer
Score 10 out of 10
Vetted Review
Verified User
Review Source
  • We may do the segmentation of the network and each single switch port is able to provide multiple virtual Vlan to its relevant IT equipment
  • After configuring the Cisco telephone to our office can able to connect laptop with desk phone using the LAN connection and gets the desired VLAN
  • Only after authorization user will able to gain network access
  • One time implementation is a bit complex hence it should be bit simpler