- I use this cheap Android tablet more than my iPad Pro - and don't regret it
- Change these 10 iOS settings right now to instantly get better iPhone battery life
- How to clear the cache on your Windows 11 PC (and why you shouldn't wait to do it)
- These Sony headphones deliver premium sound and comfort - without the premium price
- The LG soundbar I prefer for my home theater slaps with immersive audio - and it's not the newest model
Leveraging Zero Trust Capabilities for Government

Since 2020, there has been a dizzying number of cybersecurity directives and orders from governments around the world. Fortunately, at Cisco, we work closely with our local and federal governments not only in a thought leadership and consulting capacity, but also as a solution provider. Our focus is simple, and that is to figure out how we can help all our partners and customers better protect themselves from the ever-changing threat landscape, not only with new technologies, but also with utilizing existing ones. This is especially true when discussing rising threat levels across our most critical industries. At the heart of our response is the National Institute for Standards in Technology (NIST). While NIST is a domestic agency, it has global influence on paths and practices to defending our water sources, power grids, electoral processes, and more. NIST’s special publication (SP) 800 207 on zero trust has continued to provide much of the foundation for many of these orders.
With this in mind, Cisco has recently announced an extension of our security campaign that focuses on security resilience for government. Unfortunately, increasingly sophisticated attackers and attack vectors are targeting our federal, public sector and critical infrastructure customers, but with the right framework and solutions, risk can be mitigated. Cisco looks at this through the four core tenants of our zero trust capabilities:
- Establish trust
- Enforce trust-based access
- Continuously verify trust
- Respond to change in trust
Only with an approach leveraging these four capabilities can we provide secure access for users, end-user devices, APIs, IoT, microservices, containers, and more. You can find a deeper dive into our approach, in our thought leadership paper on security resilience for government.
This month, we are announcing our partner-facing suite of campaign assets that enable you, our partners, to leverage this work by co-branding and customizing to support your differentiated approach with your customers. We provide the products and capabilities empowering you to create the relevant messaging and use cases for your individual customers. Please review the assets on Marketing Velocity Central (specifically the Firewall and Zero Trust Partner Campaigns) and Marketing Velocity Learning.
While there is no single silver bullet solution, a comprehensive and layered approach, founded on our zero trust capabilities, can better prepare us for these ever-changing attack vectors of the future.
We’d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with #CiscoPartners on social!
Cisco Partners Facebook | @CiscoPartners Twitter | Cisco Partners LinkedIn
Share: