cisco trusted access

March 25, 2019

SECURITY

The One-Two Punch of User and Device Trust

2 min read

The combination of user trust plus device trust is the one-two punch to minimize risk and ensure your applications are only accessible by devices you allow.

March 6, 2019

SECURITY

Better Security with Trusted Access

3 min read

In 2019, a better security posture begins with continuous threat detection and continuously verifying trust.  At Cisco, we call our trust-centric approach to security Cisco Trusted Access.

February 27, 2019

SECURITY

The Zero Trust Games are here!

2 min read

Every year at RSA Conference, a pitched battle ensues for the heart and soul of the security practitioner. Or at least for the mind: there’s the word cloud of topics that show up most often in the CFP submissions, but there are more slogans, phrases and concepts that meet in the expo hall to fight for supremacy. Zero Trust is the newest kid on the block and will probably be the one with the biggest variety of gladiators in the ring.

February 4, 2019

SECURITY

Protecting Cisco AnyConnect VPN & Cloud Applications With Duo’s MFA

3 min read

Adding Duo’s multi-factor authentication (MFA) to VPN solutions, like Cisco AnyConnect, enables secure access to all applications. This is the first in a three-part series.

January 25, 2019

SECURITY

New Year, Same Reality: How Much Will Security Actually Change in 2019

3 min read

The union of Cisco and Duo Security in 2018 means that IT and security teams have a comprehensive solution to address the challenges heading into 2019.

January 14, 2019

SECURITY

Forrester’s Zero Trust or Gartner’s Lean Trust?

4 min read

Whether you tell your boardroom that you’re going to adopt zero trust or lean trust, you need to decide how and where to start your multi-year journey. This blog explores 2 common approaches to zero trust, Forrester's Zero Trust eXtented (ZTX) and Gartner's CARTA approach, and how Cisco can help you on your journey to better trust-centric security.

January 8, 2019

SECURITY

Moving Towards The Zero Trust Cybersecurity Framework – A Practical Approach

3 min read

The original Zero Trust model was conceived by Forrester, and leveraged by Google as part of their BeyondCorp initiative. Gartner has their framework called CARTA. These trust-centric approaches shift access decisions based on network topology to authorized users and devices. In this blog we will explore what you should consider when moving to a Zero Trust framework and how to get started.