Cisco Safe Entry brings adaptive, contextual, identity-driven safety to each connection.
Safety used to begin with IP addresses and finish with firewall guidelines. That world is historical past.
Right now, IPs are disposable, gadgets roam, and customers spin up from anyplace on the planet. But many SSE options nonetheless deal with safety as primarily a community concern and don’t adequately embrace id as foundational.
Cisco’s altering that. Identification is the brand new perimeter, and with Cisco Identification Intelligence, Safe Entry brings steady, adaptive entry selections to each person, gadget, and software.
The Blind Spot: Static View of Identification, Habits, and Posture in a Dynamic World
Most SSE platforms assume a person is only a login. Authenticate as soon as, and also you’re good for the session. However id and identity-based dangers aren’t static. Belief ranges shift. Person habits fluctuates. Posture adjustments. Danger will increase. Attackers love to cover behind trusted credentials that haven’t been adjusted to replicate these dynamic adjustments.
A non-identity-aware SSE can’t sustain as a result of it treats id as static versus a residing sign. It fails to correlate alerts from logins, behaviors, and gadgets that deviate from typical patterns or tips.
When id, habits, and posture verifications keep static, attackers transfer quicker.
Cisco Identification Intelligence: Leverage Person Belief Stage to Scale back Danger
Cisco Safe Entry integrates with Cisco Identification Intelligence (CII) to make SSE identity-focused, risk-aware and self-adjusting. Insurance policies can allow entry selections to evolve dynamically primarily based on reside id information, not guesswork.
In September of this yr, Cisco prolonged Safe Entry integration with CII past person belief ranges being seen within the Safe Entry dashboard. Insurance policies for ZTNA-protected non-public visitors can now outline when a person’s entry must be blocked or reauthenticated, primarily based on a person belief profile that adjusts dynamically with person habits and posture. For instance, a coverage could outline that when a person’s belief degree is untrusted, entry must be blocked.
As a safeguard, directors have the choice to bypass blocking an untrusted person, for a selected period of time. Take into account an govt who’s touring to a convention. She connects to an airport Wi-Fi community which she doesn’t usually use, with an IP handle that’s questionable, to log right into a delicate/important software, and he or she just lately needed to reset her password.
These occasions mixed would make her seem “untrusted.” This feature permits an administrator to bypass the block, restore the manager’s entry, so she will be able to proceed her convention actions.
The administrator could allow, for all ZTNA-protected non-public visitors, a functionality that prompts reauthentication in response to person belief degree. At decrease person belief ranges, reauthentication will happen extra steadily. For instance, let’s say a person doing her work and has a belief degree of “favorable,” however over time, habits or posture adjustments trigger her belief degree to lower to “impartial.” This may immediate her reauthentication to happen extra steadily.
With this functionality, Safe Entry is more and more utilizing dynamic belief information to counterpoint the group’s skill to implement least-privilege entry controls, heighten safety, and cut back threat.
Person and Entity Habits Analytics: Detect Anomalous Habits
Safe Entry’s Person and Entity Habits Analytics (UEBA), additionally obtainable in September this yr, can detect anomalous file operations and unattainable journey that would point out an insider menace. That menace could come from an precise insider with malicious intent or an outsider impersonating a sound person.
Directors can set Safe Entry insurance policies to detect when file uploads, downloads, or deletes exceed the extent deemed acceptable for a corporation. Moreover, Safe Entry can detect unattainable journey, equivalent to a person attempting to login from San Jose and Paris at occasions that aren’t doable, suggesting a stolen credential.
Directors now have clear visibility into these dangerous behaviors that will point out account compromise or malicious habits through detailed UEBA studies and “high dangerous customers” within the dashboard principal display.
We are going to proceed increasing UEBA such that sooner or later, the behavioral/analytics information will inform automated motion (as chosen by the shopper and outlined in coverage) to extend safety safety.
Steady Posture: Adapt to Excessive-Danger Posture Modifications
Cisco Safe Entry steady gadget posture characteristic, launched in September, permits organizations to detect any discount in endpoint posture compliance throughout a reside session and rapidly react by ending the session to keep away from undue threat. For instance, if the native firewall is disabled half manner by way of a session, Safe Entry will determine the motion and might robotically terminate the session.
This functionality supplies a fast response to any change that represents an elevated endpoint threat in the midst of ongoing person actions. The detection and adaptive response are captured and offered within the person’s exercise logs for directors.
Now and Going Ahead: Cisco Guides Your Journey to Dynamic, Adaptive Entry
Right now, Safe Entry is enriched with id intelligence, person and entity habits analytics (UEBA), and steady gadget posture evaluation. Organizations can profit now from highly effective options—equivalent to insurance policies that alter entry primarily based on belief profiles, detection of anomalous person habits, and automatic responses to dangerous gadget adjustments—empowering them to implement granular, risk-aware safety at scale.
Trying forward, continued Cisco innovation will carry these capabilities nearer collectively, leading to ever-more subtle adaptive entry controls that enhance the flexibility to reply swiftly to threats, tailor entry insurance policies for evolving safety wants, and cut back enterprise threat. Our dedication to enriching Safe Entry functionality is unwavering, as is our dedication to assist our prospects stay a step (or two or three steps) forward in right this moment’s dynamic menace panorama.
Click on right here to be taught extra about Safe Entry and its many capabilities.
We’d love to listen to what you suppose! Ask a query and keep linked with Cisco Safety on social media.
Cisco Safety Social Media
