Cisco Secure White Paper: Zero Trust at Scale
Learn how to enable zero-trust security at scale with Cisco Secure. This white paper offers an in-depth look at the subject, plus a glimpse of how Cisco rolled it out across their own IT ecosystem.
Zero Trust is a security model that requires verification of users and devices every time they access an application, rather than assuming trust based on their location within the network. This approach is crucial in today's evolving threat landscape, where traditional perimeter defenses are often insufficient. According to the 2021 Data Breach Investigation Report by Verizon, over 50% of data breaches involve compromised credentials, highlighting the need for a more robust security framework.
How does Cisco implement Zero Trust?
Cisco's implementation of Zero Trust involves several key steps: verifying the user, confirming the device's health, ensuring that a Cisco-managed device is used, and allowing access to applications without a VPN. This process is continuous, meaning every access request undergoes these checks. Cisco has successfully secured over 100,000 users and 120,000 devices within a five-month timeframe, utilizing tools like Duo for enhanced security and visibility.
What challenges does Zero Trust address?
The Zero Trust model addresses several challenges, including the complexity of managing remote access for a distributed workforce and the need for consistent security across various applications. It helps eliminate confusion around VPN usage, as users often struggle to remember which applications require VPN access. By providing a seamless experience and ensuring that both users and devices meet security requirements, Zero Trust enhances productivity and reduces the burden on IT teams.