0% found this document useful (0 votes)
3 views

cisco-secure-access

Uploaded by

baraneet
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

cisco-secure-access

Uploaded by

baraneet
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

Click here or press enter for the accessibility optimised version

Cisco Secure Access


Better for users, easier for IT, and safer for everyone.

Contacts | Help | Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks
The way we work is
making cybersecurity
harder than ever
Cybersecurity should be a lot of things: resilient, robust, smart, proactive.
What it shouldn’t be is overly complicated, disjointed, ineffective, and
expensive — but it almost always is.
Why is cybersecurity so challenging?
The reality of hybrid work. IT cost and complexity.
Hybrid work is here to stay. Users and devices need to connect from Cybersecurity has a long history of adding a new security tool to deal
anywhere to everywhere. Ninety-one percent of employees are using with the latest threat. This helps mitigate the risk from that threat but
multiple networks to connect to work, and nearly one in three (29%) creates other problems. Organizations have accumulated dozens of
employees move between at least six networks weekly.* This makes security solutions that are disconnected from one another, difficult to
security professionals nervous. Four out of five organizations (82%) cite manage, and hard to integrate. This contributes to gaps in security
remote logins as a heightened threat vector, particularly the use of protection and increases IT complexity.
unsecured Wi-Fi networks, the inability to monitor threats across multiple
networks, and the use of unmanaged devices.*

Frustrated end users. Increased security vulnerabilities and risk.


It’s difficult to provide efficient connections to the internet as well as the With a more distributed workforce comes more risk. There are more
private and public SaaS apps that employees need to do their work. devices to secure (everything from BYOD employees to IoT devices like
Security teams struggle to provide the right control and protection of remote printers and sensors in industrial locations). Threats are evolving
access without adding friction that frustrates users. Frustrated users may every day, increasing in both frequency and sophistication. While
sidestep security processes, use unsanctioned cloud resources, or malware and phishing remain the most common attacks, in the past year,
engage in other forms of Shadow IT, which jeopardizes security and 37% of surveyed companies were impacted by credential stuffing, 32%
decreases productivity. had supply chain and social engineering attacks, and 27% suffered
cryptojacking incidents.*

* 2024 Cisco Cybersecurity Readiness Index


Click here or press enter for the accessibility optimised version

SSE answers today’s


cybersecurity problems
How Cisco Secure Access
solves modern security challenges

Contacts | Help | Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks
What is security service edge (SSE)?
An SSE solution helps organizations provide secure connectivity for a As a converged, cloud-delivered service that is grounded in zero trust
hybrid workforce, while protecting corporate resources from and managed centrally, SSE effectively secures today’s hyper-distributed
cyberattacks and data loss. It unifies multiple security functions into a environments while increasing productivity, reducing complexity,
single, cloud-delivered service that secures user access to the Internet, containing costs, and more.
public SaaS apps, and private apps, protecting them from sophisticated,
evolving threats.
What is Cisco Secure
Access?
Cisco Secure Access combines a unique level of user simplicity and IT
efficiency for frictionless access to all applications (not some), with modern
security that delights users and frustrates attackers. Using a cloud-centric
approach for enforcing security policies, grounded in zero trust, Secure
Access protects users, data, and devices as they securely access the
internet, SaaS apps, and all private apps, from on or off the corporate
network. By providing seamless and secure access from anything to
anywhere, it enables a seamless end-user experience, simplifies IT
operations, and lowers risk with granular controls and tighter security.

It’s security that’s…

Better for users. Easier for IT. Safer for everyone.


Click here or press enter for the accessibility optimised version

The problem:
frustrated end users

Contacts | Help | Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks
67%
of participants reported
failing to adhere to
cybersecurity policies
at least once, with an
average failure-to-
Too many connection methods, comply rate of 1 out of
every 20 job tasks.*
complicated security processes
User experience fatigue is real. While users care about security, they care more about
getting their work done effectively. They don’t want to have to guess the right process to Ensure user
connect (VPN for one app, but not for another) or repeat verification tasks over and over.
Too many steps and too many processes are time-consuming, confusing, and keep people productivity
from getting on with work.
is the 2nd top challenge
in securing the modern
* “Research: Why Employees Violate Cybersecurity Policies,” Harvard Business Review, 2022.
workplace**
** 2023 SSE Adoption Report, Axis in collaboration with Cybersecurity Insiders.
Secure Access helps users securely access
whatever they need to do their best work from
anywhere.
How does Cisco Secure
Access make things easier
for users?
Deliver a universal experience By enabling highly productive hybrid work environments.
While providing rigorous security, Secure Access also
with a zero trust approach that simplifies and improves the end user experience via a
single, common access approach that enables frictionless
seamlessly connects users and work. It’s a straightforward, hassle-free user experience for
things to any app via any port or happier, more productive users and teams.

protocol. Enable users to authenticate and go straight to the desired


app
Intelligently connect using the best protocol
Eliminate repetitive or cumbersome verification tasks
Deliver unmatched ease for workforce

With Cisco Secure Access, you could see a 50%


reduction in the number of steps to access private
applications.*

* User Interface (UI) design framework – Cisco 2023.


Click here or press enter for the accessibility optimised version

The problem:
IT complexity
and cost

Contacts | Help | Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks
78%
of organizations report
that high number of
security tools is driving
complexity.**

The complications of a Simplify


complex security ecosystem management
Today’s security teams manage an average of 76 tools, up from an average of 64 in 2019, and eliminate
yet only 36% say they’re “very confident” that controls are working as intended.* That’s
because using many security tools from multiple vendors increases complexity, leaves gaps complexity
in protection, and grows expense. Plus, security teams are often so overwhelmed with
alerts that they have no option but to leave many alerts unattended. These teams are is the 4th top challenge
skilled, experienced, and highly valued, but many are stretched thin and prone to burnout. in securing the modern
workplace†
* “Security Vendor Consolidation: Why Now and What’s the Benefit?”, Spiceworks 2022.
** Keys to Successful SSE, ESG global survey. June 2023.
† 2023 SSE Adoption Report, Axis in collaboration with Cybersecurity Insiders.
Secure Access delivers advanced security to
streamline and automate IT operations.
How does Cisco Secure Access make
security easier for IT?
Leverage a single, Streamline and automate operations for security and IT teams for efficiency gains and cost
cloud-managed reductions. This leads to more flexibility, higher agility, and greater resilience for IT and the
console to enable whole organization.
hybrid work through
simplified policy Lower costs: Consolidate licensing fees, reduce staffing requirements, eliminate hardware costs
creation, increased Higher efficiency: Deploy a single console and single client, simplify policy management, aggregate
visibility, and reporting, seamlessly integrate to 3rd-party solutions
aggregated reporting. Accelerate problem resolution: Experience Insights monitors the health and performance of endpoints,
apps, and network connectivity. Optimize user productivity and simplify troubleshooting to speed incident
resolution.
Simplify policy management: AI Assistant automatically converts conversational English into security
policies. Save time, improve operational efficiency, and reduce complexity.

Organizations early in SSE adoption report a 65% reduction in the time spent
creating and managing security policies and a 67% decrease in management of
services and physical appliances.*

* The Total Economic Impact ™ Of Cisco Umbrella Secure Internet Gateway (SIG) And Security Service Edge (SSE), Forrester, 2023.
Click here or press enter for the accessibility optimised version

The problem:
Increased security
vulnerabilities and risk

Contacts | Help | Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks
54%
of organizations
globally having a
cybersecurity
incident in the
past year, and
73% believe they
are likely to be
disrupted by a

The struggle to protect against cybersecurity


incident in the

expanding security threats next 12-24


months.**

Cyberattacks continue to evolve rapidly, increase in frequency, and grow


in sophistication, with attackers targeting the expanded threat surface.
With data breaches globally costing an average of $4.45 million ($9.48 $4.45M
million in the U.S.), this is big business for cybercriminals and
extraordinarily costly for organizations.* Lack of granular and context- Data breaches
based access control make it difficult to manage risks and adhere to cost organizations
acceptable use polices. Security policies are often inconsistent, which an average of
can lead to ineffective protection. $4.45 million.*

* Average cost of a data breach in the United States from 2006 to 2023, Statista.
** 2024 Cisco Cybersecurity Readiness Index
Secure Access enables end-to-end
security to mitigate risk across your
environment.
How is Cisco Secure Access
safer for everyone?
Via modern, ubiquitous security that just works. Tighten security and
control with a defense-in-depth architecture that applies granular
Enforce zero trust principles security controls and zero trust principles to secure against sophisticated
and apply granular security security threats. By mitigating security risk, you maintain business
continuity and avoid the reputation and financial impact of a breach.
controls. Leverage insights
Operationalize unmatched visibility: Cisco Talos-powered threat intelligence enables
from Cisco Talos, XDR, and rapid detection, with 550 billion security events and 2.8 million+ malware samples
processed daily.
Thousand Eyes. Reduce the attack surface: Enforce least privileged controls, validate posture, and
close security gaps in distributed environments.
Stop more threats: Block infected files, nefarious websites, phishing, ransomware,
and more.
Mitigate risk of using AI apps: Discover and control usage or attempted usage of 70+
generative AI applications. Block usage or create and enforce policies to control how
these apps are used.

* The Total Economic Impact™ Of Cisco Umbrella Secure Internet Cisco cloud security can reduce security incidents and associated
Gateway (SIG) And Security Service Edge (SSE), Forrester, 2023 remediation work by 30%*
Click here or press enter for the accessibility optimised version

Why start
your journey
toward SSE?

Contacts | Help | Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks
Experience
reimagined
Reimagine user experience and confidently connect
to anything in a way that gives you secure access to
any applications, over any network, anywhere users
work. Cisco Secure Access is for any security
leader who wants to:

Protect roaming users accessing the internet,


SaaS apps, and private apps
Protect users connecting from branch offices/
locations to that same wide variety of
destinations
Enable employees to easily get to the resources
they need, without hassle, with high productivity
Stop worrying about security breaches that bring
serious business risks
Decrease operational costs
Reduce IT complexity, relieving security teams to
devote more of their time to high impact tasks
Click here or press enter for the accessibility optimised version

A Cisco
Secure Access
story in action

Contacts | Help | Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks
Higher productivity for end-users.
Less complexity for IT staff.
Greater security resilience.
Imagine a large healthcare organization who
implements Cisco Secure Access. End-users and IT
staff both get simpler, streamlined, and safer work.
End-user Before: The user has to think about what access procedure might be appropriate for the app
they want to use and then try different methods. Some are dead-ends, and some require
multiple, time-consuming steps. Some access routes (traditional VPN) can impede the
performance of other applications, which nudges the user to get in and out of apps multiple
times. This leads to a high volume of authentication challenges in a typical multi-tasking
workday, creating a frustrated user with lower productivity.

After: Cisco Secure Access gives a similar user access experience across a large set of
applications and resources. Decisions about how they connect to the app are handled behind
the scenes, so users get to what they want more quickly. They avoid extra steps on the initial
connection and as they move from app to app.
Security leader/ Before: Admin/security teams deploy and manage a broad set of security tools. They must
learn separate consoles/UIs, create many sets of independent policies, and build integrations
admin/analyst between numerous solutions. Ongoing management takes many different screens, controls,
policies, reports, and alerts. All these manual steps, cross checking, and aggregation tasks
result in security gaps and slower detection/investigation.

After: One place to go to review or revise policies and controls. One place for aggregated
reporting and key investigation functions. Broad visibility across user activities spanning web
traffic, non-web internet traffic, SaaS apps, and private apps. Quick recognition of malicious
activities.
The organization The security posture of the entire organization is radically improved. Cisco Secure Access
enhances protection and control across the business by enforcing ZTNA principles and
overall applying granular security policies. By mitigating risk, organizations maintain business continuity
and avoid the reputation and financial impact of a breach.
Click here or press enter for the accessibility optimised version

The Cisco
Secure Access
difference
Discover how Cisco strengthens
your security resilience

Contacts | Help | Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks
Discover how Cisco strengthens Industry analysts typically define SSE as the
consolidation of multiple security capabilities in

your security resilience a single, cloud-delivered service that includes


secure web gateway (SWG), cloud access
security broker (CASB), zero trust network

Network-agnostic, single-vendor solution for access (ZTNA), and cloud firewall. Cisco
provides much more. In addition, Cisco Secure
consistent policy, zero-trust access, and a high- Access secures your workforce with a more
complete and robust set of capabilities that
performance experience. cut complexity, increase flexibility, and provide
security resilience in a multicloud world.
We do this in two ways.
1 Cisco Secure Access provides:

Secure private access: Securely protects all private apps, Cloud access security broker (CASB): Exposes
including non-standard ones that are multichannel, peer- shadow IT by providing the ability to detect and report
to-peer, or use alternate ports/protocols. on cloud applications in use across your environment to

Looking beyond Leverages seamlessly delivered Zero Trust Network


Access (ZTNA) and VPNaaS for the broadest private
better manage cloud adoption, risk reduction, and the
ability to restrict or block apps.

traditional SSE: application access.


Secure internet access: Secures internet access and
Firewall-as-a-Service (FWaaS): Blocks more by
seeing more with deep visibility and control for traffic
controls public SaaS applications/cloud service usage across all ports and protocols for increased security.
Why stop with a handful of capabilities? How
across networks, branch offices, and roaming users. Experience Insights: Monitors the health and
much simpler and safer would security be if
Unified console: Defines policy for any user to any app to performance of endpoints, apps, and network
you could also deliver pervasive threat
simplify the process of building security policies and drives connectivity for optimized user productivity and
intelligence, end-to-end visibility, and even
consistency in policy definition—all in a single console. simplified troubleshooting.
more from one security cloud platform? In
AI Assistant: Automatically converts conversational, DNS-layer security: Blocks internet requests to
addition to the core SSE capabilities outlined
English phrases into security policies to save time, malicious and unwanted destinations before a
on the previous page, Cisco Secure Access
improve operational efficiency, and reduce complexity. connection is even established—stopping threats over
provides remote browser isolation (RBI), data
App connectors: Provides secure connectivity and any port or protocol before they reach your network or
loss prevention (DLP), DNS-layer security,
simplifies administrative tasks in establishing connectivity endpoints.
cloud malware detection, and more.
to private applications. Remote browser isolation (RBI): Isolates web traffic
Full proxy/SWG: Provides deep, granular control of web from the user device and the threat, so that users can
traffic, including flexible policies for selective decryption safely access risky websites.
of encrypted traffic. Secure malware analytics: Combines advanced
Data loss prevention (DLP): Analyzes sensitive data inline sandboxing with threat intelligence in one unified
in real-time via SWG proxy and out-of-band via restful API solution to protect organizations from malware.
to guard against sensitive data leaving your organization, Cloud malware detection: Detects and removes
including when using generative AI applications. malware from cloud-based applications and ensures
that apps remain malware-free.
2

Delivering trust and


expertise at scale:
The Cisco Talos threat intelligence

2.8M+
Threat data collection: Enormous scale
organization is an elite group of security
and reach for inputs. 2.8 million+
experts devoted to providing superior
malware samples processed daily.
protection for our customers, products, and
services via:

200+
Threat analysis: Rapid speed of
correlation and detection. 200+ million
new vulnerabilities discovered
annually.

550B
Threat defense: Global distribution and
protection. 550 billion security events
every day.
Click here or press enter for the accessibility optimised version

With the Cisco Security


Cloud, Secure Access is
just the beginning
Imagine a global, cloud-delivered, integrated platform that
secures and connects organizations of any shape and size.

Contacts | Help | Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks
What is Cisco Security
Cloud?
Secure Access is built on the Cisco Security Cloud to tightly integrate
Cisco and 3rd-party protection for an impenetrable defense. Cisco
Security Cloud is the cloud-native platform that Cisco is building to
securely connect users, devices, and IoT to an organization's systems,
apps, and data—across multiple clouds and networks. This makes it
easier for organizations to realize the combined benefits from across the
entire Cisco security portfolio and common third-party solutions. Over
time, the Cisco Security Cloud will:

Unify policy management, Free organizations from vendor


product consoles, and lock-in with APIs for integration
dashboards to help security and a robust developer
work more efficiently from end ecosystem, so your
to end. environment can evolve along
with your business challenges.
Click here or press enter for the accessibility optimised version

Start your SSE journey


Modernize your defense with converged cloud security in a
single subscription.

cisco.com/go/secure-access

POWERED BY

Cookies Terms Privacy [ 1 ] [ 2 ]


Contacts | Help | Terms & Conditions | Privacy Statement | Cookie Policy | Trademarks

You might also like