Re-Imagining Zero Trust With an In-Office Experience, Everywhere

Re-Imagining Zero Trust With an In-Office Experience, Everywhere

Let’s be honest. Most people don’t trust zero trust. For users, when they hear the words ‘zero trust’, it sounds like it might take longer to log into work. And if you’re in IT or IT security, you may have more products to buy and integrate into your existing — already complicated — security stack. And of course, then there are the audits. Maybe that’s why so many zero trust projects are stalled. No matter…

Read More

Cisco Extends SSE innovation with Mobile Zero Trust and Flexible Resource Connectors

Cisco Extends SSE innovation with Mobile Zero Trust and Flexible Resource Connectors

Recently, when I speak with business and IT leaders around the globe, there is a common question that permeates the discussion. How can I provide the additional security necessary to protect my distributed workforce without burdening end users and slowing down the business? This isn’t a simple question to answer, especially with the significant changes in the typical IT environment over the last couple of years. To address this challenge, Cisco has developed innovative ways…

Read More

Cisco Secure Access Extends SSE Innovation with Mobile Zero Trust and Flexible Resource Connectors

Cisco Extends SSE innovation with Mobile Zero Trust and Flexible Resource Connectors

Recently, when I speak with business and IT leaders around the globe, there is a common question that permeates the discussion. How can I provide the additional security necessary to protect my distributed workforce without burdening end users and slowing down the business? This isn’t a simple question to answer, especially with the significant changes in the typical IT environment over the last couple of years. To address this challenge, Cisco has developed innovative ways…

Read More

Gain control over OT remote access with session monitoring, recording, and termination

Gain control over OT remote access with session monitoring, recording, and termination

Zero Trust Network Access (ZTNA) is a secure remote access service. It verifies remote users and grants them access to the right resources at the right times based on identity and context policies. This is part 3 in our blog series about ZTNA for operational technology (OT). Check out Part 1 for why ZTNA beats out always-on VPNs for OT remote access and Part 2 for how ZTNA reduces the attack surface by restricting access…

Read More

Cisco and Rockwell strengthen OT/ICS security with visibility for converged plantwide ethernet (CPwE)

Cisco and Rockwell strengthen OT/ICS security with visibility for converged plantwide ethernet (CPwE)

The turtle, protected by its hard shell, is a good metaphor for the security model used in most industrial networks. The industrial DMZ (iDMZ) is the shell that protects the soft, vulnerable center—the industrial control systems (ICS) the business depends on. But while the iDMZ blocks most threats, some will inevitably slip through. When they do, they can move sideways from device to device, potentially causing downtime and information leakage. Giving traffic free rein once…

Read More

OT remote access: can you trust your technician’s laptop?

OT remote access: can you trust your technician’s laptop?

Zero Trust Network Access (ZTNA) is a secure remote access service that verifies remote users and grants access only to specific resources at specific times based on identity and context policies. This is part 2 in our ZTNA blog series for operational environments. Read the first blog here. Right now, somewhere in the world a robot arm needs a firmware upgrade, a wind turbine is stalled, and a highway message sign is displaying gibberish. If…

Read More