Reducing Help Desk Tickets With Cisco’s User Protection Suite

Reducing Help Desk Tickets With Cisco’s User Protection Suite

Challenges with help desk tickets Things don’t always go as planned for your employees, especially remote workers. They may not be able to login to their accounts, have forgotten their password, are unable to access an application or are facing connectivity issues. While there are many benefits of help desk tickets, there are also hidden costs. When tickets start to pile up, as they have done since the rise of remote work, that means a…

Read More

You’ve Heard the Security Service Edge (SSE) Story Before, but We Re-Wrote It!

You’ve Heard the Security Service Edge (SSE) Story Before, but We Re-Wrote It!

In our previous blog post, we discussed how Cisco has reimagined Zero Trust, delivering an in-office experience for users and things from anywhere accessing resources everywhere. You’re probably thinking “Ok, but how? How exactly has Cisco reimagined Zero Trust Access?” You’re in the right place to get a look into the technical details. In this blog post, I’ll unpack some of the technological components that allow us to leapfrog legacy approaches, and in doing so,…

Read More

Layered Protection for RADIUS With Cisco

Layered Protection for RADIUS With Cisco

Dream world for the CISO Organizations have a wide variety of resources to protect. And some resources are easier to protect than others. However, it’s not the easy stuff that keeps a CISO up at night. Before we dive into the more challenging examples, let’s consider a scenario that allows a CISO to sleep peacefully. In this scenario, when a worker “goes to work” (either in the office or remotely), they open their corporate laptop…

Read More

Seamless Secure Work on a Plane

Seamless Secure Work on a Plane

Frequent travelers – this blog is for you. Let’s start off by walking through the experience of the remote worker that is always on the move. This traveler has the perfectly packed bag. They know exactly what time to show up at the airport to walk directly onto the plane. And their accumulated miles are a prized possession. However, one thing this frequent traveler can’t control is the work experience once they’re on that plane….

Read More

How to Monitor Network Traffic: Findings from the Cisco Cyber Threat Trends Report

How to Monitor Network Traffic: Findings from the Cisco Cyber Threat Trends Report

The threat landscape is full of moving targets. Over time, popular tools, tactics, and procedures change. Malicious techniques fall out of fashion, only to come roaring back months, if not years, later. All the while, security practitioners monitor network traffic and adapt their defenses to protect their users and networks. Keeping on top of these trends is one of the most challenging tasks for any security team. One great area to look for trends is…

Read More

Cisco Secure Access Wins Global Security Service Edge Customer Value Leadership Award

Cisco Secure Access Wins Global Security Service Edge Customer Value Leadership Award

It’s one thing to claim leadership in cloud security; it’s another to have that leadership acknowledged by industry experts. That’s why we’re thrilled to announce our recent recognition by Frost & Sullivan as the 2024 Customer Value Leader in the Global Security Service Edge Industry. This expert analyst award is a testament to both our commitment to innovation and our unique ability to partner with security leaders to navigate the complexity of securing cloud environments….

Read More

Complexity drives more than security risk. Secure Access can help with that too.

Complexity drives more than security risk. Secure Access can help with that too.

Modern networks are complex, often involving hybrid work models and a mix of first- and third-party applications and infrastructure. In response, organizations have adopted security service edge (SSE) solutions, such as Cisco Secure Access, to protect users regardless of where they are located or what they are accessing. This reliance on third-party infrastructure doesn’t only drive security risk, it also increases the likelihood of performance outages and disruptions. Oftentimes, these disruptions are the result of…

Read More

Mitigating Lateral Movement with Zero Trust Access

Mitigating Lateral Movement with Zero Trust Access

Security service edge (SSE) technology was created to protect remote and branch users with a unified, cloud-delivered security stack. To understand how SSE solutions protect organizations and their users, it’s worthwhile to analyze attacker techniques, as well as the protections and controls SSE solutions use to disrupt them. It’s useful to use the MITRE ATT&CK framework. MITRE ATT&CK is a large knowledgebase of attacker techniques that cybersecurity experts use to describe the attack kill chains…

Read More

Cisco Live Melbourne SOC Report

Cisco Live Melbourne SOC Report

Executive Summary. 1 The Team… 2 Team Leaders. 2 Core Infrastructure and Threat Hunting. 2 Threat Hunting. 2 Build and Operation. 2 SOC Architecture. 2 Cisco Secure Access Enables ZTNA for SOC Admins. 4 Powering XDR with the Cisco Secure Portfolio. 6 Analyst Stories. 9 New Domain Investigations. 9 Mirai Botnet Attempts. 11 Log4j Attempts. 14 SERVER-WEBAPP LB-Link Multiple BLRouters command injection attempt (1:62009:1) Dinkar Sharma, Aditya Sankar 16 Threat hunting and Noise reduction in…

Read More

Drive Your Cybersecurity Platform Transformation: Lead the Way With SSE

Drive Your Cybersecurity Platform Transformation: Lead the Way With SSE

By shifting from point-solutions to a cybersecurity platform approach, IT and security teams significantly improve their efficiency and security outcomes. Security Service Edge (SSE) projects are often an excellent first step in taking a platform-centric security approach. SSE optimizes hybrid work with secure, high-performance, application access that is coupled with integrated threat defense and data protection. Cloud-delivered, it simplifies deployment its operational elasticity flexibly grows with you. Guiding principles for successfully adopting a cybersecurity platform…

Read More
1 2