cisco trusted access

March 25, 2019

SECURITY

The One-Two Punch of User and Device Trust

Multi-factor authentication (MFA) is a proven method through which to ensure you’re verifying the identity of users who are accessing applications. It uses strong two-factor authentication to ensure your users are who they say they are. But trusting users is only one component of the trusted access…

March 6, 2019

SECURITY

Better Security with Trusted Access

Better. As we think about security in 2019, let’s consider the theme for this year’s RSA Conference: Better But as RSAC asks, what defines better?  It is better security tools?  Better threat intelligence, Better machine learning classifiers?  Yes.  And more. Much like RSAC suggests, bet…

February 27, 2019

SECURITY

The Zero Trust Games are here!

Every year at RSA Conference, a pitched battle ensues for the heart and soul of the security practitioner. Or at least for the mind: there’s the word cloud of topics that show up most often in the CFP submissions, but there are more slogans, phrases and concepts that meet in the expo hall to fight f…

February 4, 2019

SECURITY

Protecting Cisco AnyConnect VPN & Cloud Applications With Duo’s MFA

This blog post is the first in a three-part series on how Duo’s MFA integrates with Cisco AnyConnect VPN. Organizations are facing a major technology shift. They’re in the process of moving many of their on-premises workloads and applications to the cloud. But the transition to cloud isn’t as simple…

January 25, 2019

SECURITY

New Year, Same Reality: How Much Will Security Actually Change in 2019

If we look back at the security landscape of 2018, there were some interesting highs and lows.  There were a number of large-scale breaches in the news attributed to hackers, involving notable companies. All indications for 2019 don’t show any signs of this activity stopping or slowing down. In fact…

January 14, 2019

SECURITY

Forrester’s Zero Trust or Gartner’s Lean Trust?

Zero trust is misnamed There’s been many management approaches that include the “Zero” term. In shipping, there was “Zero Inventory”. In manufacturing, there was “Zero Defects”. In environmental planning, there’s “Zero Waste”. So, it’s not surprising that the security industry has adopted “Zero Trus…

January 8, 2019

SECURITY

Moving Towards The Zero Trust Cybersecurity Framework – A Practical Approach

The original Zero Trust model was conceived by Forrester, and leveraged by Google as part of their BeyondCorp initiative. Gartner has their framework called Continuous Adaptive Risk and Trust Assessment (aka. CARTA). These trust-centric approaches shift access decisions based on network topology to…