trusted access

November 14, 2023

SECURITY

ESG Survey results reinforce the multi-faceted benefits of SSE

Analyst survey by Enterprise Strategy Group (ESG) reveals how Security Service Edge (SSE) solutions protect the hybrid workforce and internal resources while simplifying IT complexity and enhancing the user experience.

February 3, 2022

NETWORKING

Reimagining Hybrid Work: Create, Manage, Collaborate with the Network for the Future

Cisco is leading the charge in Hybrid Work with networking innovations in Wi-Fi 6E Access Points, Silicon One Catalyst Switches, and Private 5G.

August 19, 2021

NETWORKING

Catalyst 9000 Simplifies Network-Based Threat Detection Using Inline Security Telemetry

The capability to stream full telemetry information directly from Catalyst switches provides operational status of the network as well as Deep Packet Inspection of traffic flows so that Cisco DNA Center can detect the true purposes of device-to-device communications and thwart the spread of attacks on IoT devices.

July 20, 2021

NETWORKING

Trust Analytics and Anti-Spoofing Protection: It’s Already in Your Network

Trust Analytics protects your organization from ransomware with AI/ML-based anti-spoofing technology by lowering a device's Trust Score when it exhibits unusual behavior typical of a rogue device attacking the network.

May 14, 2020

SECURITY

Firewalling and VPN in the Remote Work Era

A misleading statement from one area of the information security industry falsely argues that the U.S. Government is “sounding the alarm around VPN security.” Actually, the government is acknowledging that remote security solutions like VPN as well as cloud and workload firewalling are now more critical than ever.

March 25, 2019

SECURITY

The One-Two Punch of User and Device Trust

The combination of user trust plus device trust is the one-two punch to minimize risk and ensure your applications are only accessible by devices you allow.

March 6, 2019

SECURITY

Better Security with Trusted Access

In 2019, a better security posture begins with continuous threat detection and continuously verifying trust.  At Cisco, we call our trust-centric approach to security Cisco Trusted Access.