Trust Analytics and Anti-Spoofing Protection: It’s Already in Your Network
Trust Analytics protects your organization from ransomware with AI/ML-based anti-spoofing technology by lowering a device's Trust Score when it exhibits unusual behavior typical of a rogue device attacking the network.
Firewalling and VPN in the Remote Work Era
A misleading statement from one area of the information security industry falsely argues that the U.S. Government is “sounding the alarm around VPN security.” Actually, the government is acknowledging that remote security solutions like VPN as well as cloud and workload firewalling are now more critical than ever.
Better Security with Trusted Access
In 2019, a better security posture begins with continuous threat detection and continuously verifying trust. At Cisco, we call our trust-centric approach to security Cisco Trusted Access.
The Zero Trust Games are here!
Every year at RSA Conference, a pitched battle ensues for the heart and soul of the security practitioner. Or at least for the mind: there’s the word cloud of topics that show up most often in the CFP submissions, but there are more slogans, phrases and concepts that meet in the expo hall to fight for supremacy. Zero Trust is the newest kid on the block and will probably be the one with the biggest variety of gladiators in the ring.
New Year, Same Reality: How Much Will Security Actually Change in 2019
The union of Cisco and Duo Security in 2018 means that IT and security teams have a comprehensive solution to address the challenges heading into 2019.
Forrester’s Zero Trust or Gartner’s Lean Trust?
Whether you tell your boardroom that you’re going to adopt zero trust or lean trust, you need to decide how and where to start your multi-year journey. This blog explores 2 common approaches to zero trust, Forrester's Zero Trust eXtented (ZTX) and Gartner's CARTA approach, and how Cisco can help you on your journey to better trust-centric security.