Professional Documents
Culture Documents
2019
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Shift in IT Landscape
Users, devices and apps are everywhere
Remote Users,
Contractors & Cloud
Third-Parties Applications
Evolving Perimeter
Personal & Hybrid
Mobile Devices Infrastructure
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Business Challenges
Increased access, attack surface & gaps in visibility
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Securing Access
Access happens everywhere – how do you get visibility & ensure secure access?
+ Databases
SaaS
User & Device Access Application & Workload Access Network Access
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Securing Access
Access happens everywhere – how do you get visibility & ensure secure access?
+ Databases
SaaS
User & Device Access Application & Workload Access Network Access
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Threats Today, As a Result
A new approach to security is needed – zero trust – to address identity,
app & network threats.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Enabling Secure Access
Take a zero-trust approach to security to secure access across your entire IT environment.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
What’s Different in a
Zero-Trust Approach
The Traditional Approach
Trust is based on the network location Enables attackers to move laterally within Doesn’t extend security to the
that an access request is coming from. a network to get to the crown jewels. new perimeter.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
How Cisco Verifies Trust
Establishing trust before granting access or allowing connections
in your environment:
Verify users’ Gain device visibility & Enforce access policies for
identities establish trust every app
Multi-factor authentication Endpoint health & management Adaptive & role-based access
(MFA) status controls
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Workloads
How to Verify Trust
Gain visibility into what’s Contain breaches & Alert or block communication
running & minimize lateral if policy is violated
what’s critical movement
BY WITH BY
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Workplace
How to Verify Trust
Grant the right level Classify & segment users, Contain infected endpoints
of network access to devices & apps on your and revoke network access
users and devices network
WITH WITH BY
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Duo for Workforce
Ensure only the right users and
secure devices can access
applications.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Extended Protection
Complementary products to extend trust for any app, any workload & any network.
+ Extend Trust
Umbrella AMP Next-Generation Firewall AnyConnect ACI
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Extend to Any Integration
Our technical partnerships make it easy to integrate security with your existing platforms.
Learn more about Duo partners Learn more about Cisco partners
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Zero Trust
Secure the Workforce Secure Your Workloads Secure the Workplace
With Duo With Tetration With Software-Defined Access
All Corp IT Data Center Corporate Network
Apps Servers
WAN
Application Network Traffic
Routing Wireless
Access
+ Databases
SaaS