Simplifying Zero Trust Security for the Modern Workplace

0
44
Simplifying Zero Trust Security for the Modern Workplace


Organizations face an evolving array of cyber threats today. As attackers have turn into extra refined, you will need to undertake a complete safety technique that features a layered method and elevated safety for the fashionable office. That contains the house workplace, department, campus, espresso store, or wherever in between. 

Cisco’s Enhanced User Protection Suite: 

Cisco is proud to announce the most recent enhancement to our User Protection Suite, with the addition of Cisco’s Identity Services Engine (ISE). The upgraded suite is designed to supply complete office safety and assist organizations implement zero belief entry. This ensures safety for the hybrid work power and delivers seamless and safe entry to purposes and knowledge from wherever, on any system. 

Organizations use Cisco’s User Protection Suite as a vital instrument to ship layered safety and guarantee frictionless entry for his or her customers in all places. That means defending customers at moments of vulnerability, together with their inbox, credentials, and entry to purposes and gadgets, in addition to safety for gadgets that can’t have an agent, like cameras, printers, or unmanaged gadgets.  

According to Talos Quarterly Incident Response Trends Report, we proceed to see attackers use legitimate accounts as a high method to achieve preliminary entry, accounting for 66% of engagements. From there the attacker can perform malicious actions to achieve entry to extra delicate data and transfer laterally. With the addition of ISE to the User Protection Suite, Cisco offers your group with this enhanced stage of visibility into all customers and gadgets accessing the community, whereas conserving customers on the heart of your safety technique. 

User Protection Suite Capabilities:  

Cisco’s User Protection Suite contains the important thing capabilities mandatory to guard customers and gadgets. Let’s think about a selected instance: phishing. An assault ceaselessly begins with attackers sending a malicious e-mail containing malware to compromise the system or try steal a consumer’s credentials. From there, the attacker may attempt to entry the community, growing entry to delicate knowledge and harm to the group.  

With the User Protection Suite, organizations have the layers of safety essential to cease an assault. This contains stopping lateral motion, securing consumer identities, blocking malicious emails, and enhancing system safety. 

Zero Trust Access: Ease the transition to ZTNA 

Cisco Secure Access permits organizations to undertake Security Service Edge (SSE) with built-in Zero Trust Network Access (ZTNA) and VPN-as-a-service. Other options require customers to guess tips on how to entry their sources, for instance is a VPN required or not? With Secure Access, Cisco does the work for customers behind the scenes to guard consumer entry to all purposes. And with ISE and Secure Access working collectively, Cisco can guarantee constant enforcement of entry insurance policies for all customers and gadgets, together with IoT gadgets and BYOD. 

Identity Security: Comprehensive id visibility and safety 

Because attackers are utilizing legitimate accounts to entry company sources, it’s essential to have full visibility into the id ecosystem and have robust id protections in place. With Cisco Identity Intelligence, Cisco can ingest knowledge throughout your atmosphere, together with your id suppliers, SaaS purposes, HR sources, and others to find out present id vulnerabilities. Additionally, it’s essential to handle these vulnerabilities. Duo offers versatile authentication choices on an in depth set of use circumstances, together with legacy purposes, to allow seamless entry for trusted customers and cease attackers from logging in. 

AI-powered Email Security: 

Email continues to be a crucial assault vector for malicious actors. Attackers leverage AI to create convincing e-mail phishing assaults and exploit new instruments like people who create malicious QR codes. Once a sound account is compromised, unhealthy actors can launch social engineering assaults, like Business Email Compromise (BEC) that result in fraud or knowledge breach. Secure Email Threat Defense  makes use of refined AI powered detectors to determine and block rising emails threats together with Business Email Compromise (BEC), malicious QR codes, and different superior threats.  

Endpoint Protection, Detection & Response:  

Secure Endpoint protects endpoints from a variety of assaults, together with ransomware and rising threats. With highly effective EDR capabilities, it offers deep endpoint visibility, detects and blocks lateral motion and exfiltration makes an attempt, and reduces the assault floor. Working with Duo, it ensures solely wholesome gadgets can entry company sources and stop entry when a risk is detected. This helps restrict the harm and cease an attacker from persevering with to escalate privileges to additional harm a company. 

Device Access Control: 

Cisco Identity Services Engine (ISE) can authenticate and authorize all gadgets that connect with the community. ISE assigns tags to those gadgets, together with company gadgets, BYOD, and IoT gadgets, like cameras and printers. Those tags are built-in into Secure Access to allow organizations to create and implement safety insurance policies throughout gadgets and customers. This helps organizations observe the ideas of least-privileged entry and make sure that a thermometer that’s linked to the community can not achieve entry to the client database. 

Learn More 

To discover the completely different tiers of Cisco’s User Protection Suite, try the User Protection Suite At-A-Glance. And to study extra about how these options may help you obtain zero belief to your office, join with an knowledgeable immediately. 


We’d love to listen to what you suppose. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!

Cisco Security Social Channels

Instagram
Facebook
Twitter
LinkedIn

Share:

LEAVE A REPLY

Please enter your comment!
Please enter your name here