Cisco Secure White Paper: Zero Trust at Scale
Learn how to enable zero-trust security at scale with Cisco Secure. This white paper offers an in-depth look at the subject, plus a glimpse of how Cisco rolled it out across their own IT ecosystem.
What is Zero Trust and why is it important?
Zero Trust is a security framework that requires verification of users and devices every time they access applications, rather than relying on traditional perimeter defenses. It is important because, according to the 2021 Data Breach Investigation Report by Verizon, over 50% of data breaches are due to compromised credentials. With the rise of remote work and cloud applications, ensuring that both users and devices meet security requirements is crucial for protecting sensitive information.
How did Cisco implement Zero Trust?
Cisco's transition to a Zero Trust architecture involved several key steps. They focused on verifying user identity, confirming device health, and allowing access to applications without a VPN. The implementation was completed in five months, securing over 100,000 users and 120,000 devices. Key components included deploying user and device trust certificates, utilizing Duo for multi-factor authentication, and conducting real-time health checks on devices.
What challenges did Cisco face during the Zero Trust deployment?
Cisco faced challenges such as ensuring consistent browser behavior across different operating systems and managing the complexities of VPN access for a remote workforce. They addressed these by conducting proofs of concept, engaging with application teams for security audits, and focusing on a small core team to streamline communication and decision-making. This approach helped them identify and prioritize the most-used applications for a smoother transition.
Cisco Secure White Paper: Zero Trust at Scale
published by AMS.NET
AMS.NET is an innovative technology solution provider delivering business outcomes to organizations for more than 30 years. We provide VoIP, Collaboration, Switching, Wireless, Security, Data Center, Video Surveillance, and more. For more information, visit www.ams.net.