In today’s modern work environment, where access happens everywhere, security is increasingly complex. With users, devices and clouds moving outside the traditional network, the perimeter has greatly expanded and created gaps in visibility – making organizations more susceptible to an attack. To reduce organizations’ vulnerabilities, Cisco has been working to build the most comprehensive and integrated security platform that covers customers whether they are working at headquarters, at a branch office or on-the-go.
A key pillar of that platform is zero-trust. With this model, we move from allowing all users, devices and workloads by default to one where organizations do not trust anything inside or outside their network perimeter. Access is only granted to authorized users, devices and workloads after establishing trust and preventing threats—all without a decline in the user experience.
Cisco has been investing in and building the most expansive zero-trust framework in the industry for securing access across the workforce, the workplace and the workload. It is what customers require in this evolving work environment, and the market is taking note. With that, I am proud to share that Cisco has been named a leader in The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019 report.
“[Cisco] spent significant time and expense to realign much of its security portfolio to enable or enhance zero trust for its customers.”
– The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019
We believe this recognition is a validation of Cisco’s multi-year zero-trust vision and strategy. We have long led this market with SD-access and segmentation technologies in our network infrastructure. With the acquisition of Duo last year, we were able to add an additional layer of security with its authentication and adaptive policy technology and extend trusted access to multi-and hybrid-cloud environments. Then with the addition of Tetration, we have been able to ensure that our customers’ cloud applications remain secure.
These products have come together to create the most comprehensive framework for securing access across three key fronts:
With Cisco Zero Trust, you can ensure secure, trusted access wherever it happens. Start your zero-trust journey today by signing up for a free Duo trial; demoing Tetration and learning more about SD-Access.
Download the report today! The Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Q4 2019
Source: blogs.cisco.com
Tetration Insight Webinar Series – Click here Do you really understand the dependencies of your critical apps? Are your critical apps properly segmented and protected regardless of where they are running? Do you have the tools to highlight application vulnerabilities and threats? Have you implemented a true Zero Trust security model in your data center? Attend this webinar series to learn how Cisco Tetration can provide you with the visibility and security you need. Each of these one-hour webinars will focus on a different aspect of Tetration. Intro to Tetration Platforms & Technology: Imagine having the power at your fingertips to gain application insight into your data center –providing you with a clear and accurate view of application communications and its dependencies. With its naturally cloud-agnostic software sensors, Cisco Tetration unlocks the power of your data in a multi-cloud world, allowing you to segment your applications wherever you choose to place your workloads. Now you can automatically generate and enforce your policies wherever the workload resides based on the needs of your applications. Intro to Cloud Workload Protection: “Cloud Workloads” are different from “End-User-Endpoints” and therefore have different security concerns and requirements. To address that, Cisco has Tetration, a Cloud Workload Protection platform specifically designed for addressing these new cloud and data center security concerns, such as Security Policy Discovery, Segmentation, Enforcement and Workload Forensics. This session will provide an introduction to Cisco Tetration and some of these applied use cases that fit into the category of Cloud Workload Protection. Tetration Breach Forensics, Vulnerability, and Threat Intelligence Features: Tetration is a full-stack workload protection solution with numerous workload security features in a single platform. In addition to enforcing Zero Trust network policy on a workload, Tetration understands workload posture via a native vulnerability and process hash threat intelligence. Tetration also records every network connection and can detect malicious process behaviour by baseline a workload’s behaviour in conjunction with an innovative rule engine. In this session we’re going to take a deeper look at Tetration’s “Forensics”, “Vulnerability”, and “Threat Intelligence” features by looking at a real-world breach example caught by Tetration in the public cloud. Tetration Role in a Zero Trust World: With the shift in IT landscape, where users, devices and applications are no longer tethered to physical or network boundaries; a new approach is needed to for trust-based access control. The new paradigm of access control requires that nothing should be trusted by default. The trust has to be established, consistently verified, and enforced closest to the assets, users and devices that the businesses care about and want to protect. Cisco Zero Trust model provides this solution for workload, workforce and workplace with consistent zero-trust policy. This session will focus on how Cisco Tetration fits in the Cisco Zero trust model to provide application and workload security and access control.
Cisco Tetration overview