Executive Overview
John Kindervag talks to Wolfgang Goerlich, Cisco Advisory CISO about Cisco's Zero Trust approach
Wolf explains how Cisco is positioned to tackle the shift from traditional perimeter-based segmentation to the “connect from anywhere” model of today. Segmentation and access policy enforcement have moved to the edge at the point of connection outside of the organization, to provide maximum insulation from threats
For The Rest Of The Story
Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam.
How Cisco Enables Zero Trust Security
At Cisco, we recognize that zero trust is a mindset, a strategy that forges a path towards better security. One that spans users, devices, networks, and apps, and includes a set of core capabilities and use cases. Hear Cisco’s recommendations for zero trust and see how our solutions establish trust, enforce trust-based access, continuously verify trust-based access, and respond to changes in trust to protect your business.
Cisco Zero Trust in Action: Unified Access Policy & Segmentation at Scale
See how Cisco ISE uses Security Group Tags (SGTs) to establish trust and enforce trust-based access based on user type (employee vs. contractor) and then integrates this with the Secure Workload access policy. Our solution works for applications that are on premises, as well as in the cloud and can be deployed in both agentless and agent-based implementations.
Additional Resources