Cisco Safe Entry brings adaptive, contextual, identity-driven safety to each connection.
Safety used to start out with IP addresses and finish with firewall guidelines. That world is historical past.
In the present day, IPs are disposable, units roam, and customers spin up from anyplace on the planet. But many SSE options nonetheless deal with safety as primarily a community situation and don’t adequately embrace identification as foundational.
Cisco’s altering that. Id is the brand new perimeter, and with Cisco Id Intelligence, Safe Entry brings steady, adaptive entry selections to each consumer, machine, and utility.
The Blind Spot: Static View of Id, Habits, and Posture in a Dynamic World
Most SSE platforms assume a consumer is only a login. Authenticate as soon as, and also you’re good for the session. However identification and identity-based dangers aren’t static. Belief ranges shift. Person conduct fluctuates. Posture modifications. Danger will increase. Attackers love to cover behind trusted credentials that haven’t been adjusted to replicate these dynamic modifications.
A non-identity-aware SSE can’t sustain as a result of it treats identification as static versus a dwelling sign. It fails to correlate indicators from logins, behaviors, and units that deviate from typical patterns or tips.
When identification, conduct, and posture verifications keep static, attackers transfer sooner.
Cisco Id Intelligence: Leverage Person Belief Stage to Cut back Danger
Cisco Safe Entry integrates with Cisco Id Intelligence (CII) to make SSE identity-focused, risk-aware and self-adjusting. Insurance policies can allow entry selections to evolve dynamically primarily based on stay identification knowledge, not guesswork.
In September of this yr, Cisco prolonged Safe Entry integration with CII past consumer belief ranges being seen within the Safe Entry dashboard. Insurance policies for ZTNA-protected personal site visitors can now outline when a consumer’s entry must be blocked or reauthenticated, primarily based on a consumer belief profile that adjusts dynamically with consumer conduct and posture. For instance, a coverage could outline that when a consumer’s belief stage is untrusted, entry must be blocked.
As a safeguard, directors have the choice to bypass blocking an untrusted consumer, for a selected period of time. Take into account an govt who’s touring to a convention. She connects to an airport Wi-Fi community which she doesn’t usually use, with an IP handle that’s questionable, to log right into a delicate/important utility, and she or he just lately needed to reset her password.
These occasions mixed would make her seem “untrusted.” This selection permits an administrator to bypass the block, restore the manager’s entry, so she will be able to proceed her convention actions.
The administrator could allow, for all ZTNA-protected personal site visitors, a functionality that prompts reauthentication in keeping with consumer belief stage. At decrease consumer belief ranges, reauthentication will happen extra steadily. For instance, let’s say a consumer doing her work and has a belief stage of “favorable,” however over time, conduct or posture modifications trigger her belief stage to lower to “impartial.” This may immediate her reauthentication to happen extra steadily.
With this functionality, Safe Entry is more and more utilizing dynamic belief knowledge to complement the group’s capacity to implement least-privilege entry controls, heighten safety, and cut back threat.
Person and Entity Habits Analytics: Detect Anomalous Habits
Safe Entry’s Person and Entity Habits Analytics (UEBA), additionally accessible in September this yr, can detect anomalous file operations and not possible journey that would point out an insider menace. That menace could come from an precise insider with malicious intent or an outsider impersonating a sound consumer.
Directors can set Safe Entry insurance policies to detect when file uploads, downloads, or deletes exceed the extent deemed acceptable for a company. Moreover, Safe Entry can detect not possible journey, equivalent to a consumer attempting to login from San Jose and Paris at occasions that aren’t doable, suggesting a stolen credential.
Directors now have clear visibility into these dangerous behaviors which will point out account compromise or malicious conduct through detailed UEBA studies and “high dangerous customers” within the dashboard fundamental display screen.
We are going to proceed increasing UEBA such that sooner or later, the behavioral/analytics knowledge will inform automated motion (as chosen by the shopper and outlined in coverage) to extend safety safety.
Steady Posture: Adapt to Excessive-Danger Posture Adjustments
Cisco Safe Entry steady machine posture function, launched in September, allows organizations to detect any discount in endpoint posture compliance throughout a stay session and rapidly react by ending the session to keep away from undue threat. For instance, if the native firewall is disabled half means via a session, Safe Entry will determine the motion and might mechanically terminate the session.
This functionality gives a fast response to any change that represents an elevated endpoint threat in the course of ongoing consumer actions. The detection and adaptive response are captured and offered within the consumer’s exercise logs for directors.
Now and Going Ahead: Cisco Guides Your Journey to Dynamic, Adaptive Entry
In the present day, Safe Entry is enriched with identification intelligence, consumer and entity conduct analytics (UEBA), and steady machine posture evaluation. Organizations can profit now from highly effective options—equivalent to insurance policies that regulate entry primarily based on belief profiles, detection of anomalous consumer conduct, and automatic responses to dangerous machine modifications—empowering them to implement granular, risk-aware safety at scale.
Trying forward, continued Cisco innovation will carry these capabilities nearer collectively, leading to ever-more subtle adaptive entry controls that enhance the power to reply swiftly to threats, tailor entry insurance policies for evolving safety wants, and cut back enterprise threat. Our dedication to enriching Safe Entry functionality is unwavering, as is our dedication to assist our clients stay a step (or two or three steps) forward in immediately’s dynamic menace panorama.
Click on right here to study extra about Safe Entry and its many capabilities.
We’d love to listen to what you suppose! Ask a query and keep linked with Cisco Safety on social media.
Cisco Safety Social Media
