Log in
E-mail
Password
Show password
Remember
Forgot password ?
Become a member for free
Sign up
Sign up
New member
Sign up for FREE
New customer
Discover our services
Settings
Settings
Dynamic quotes 
OFFON

CISCO SYSTEMS, INC.

(CSCO)
  Report
SummaryQuotesChartsNewsRatingsCalendarCompanyFinancialsConsensusRevisions 
SummaryMost relevantAll NewsAnalyst Reco.Other languagesPress ReleasesOfficial PublicationsSector newsMarketScreener Strategies

Cisco : Five Key Questions for a Zero Trust Security Deployment

10/25/2021 | 12:04pm EST

You may be considering applying zero trust principles across your organization, but are unclear on where to start or how changes will impact the user experience. We had these considerations in mind as Cisco IT moved from a traditional model of perimeter and VPN security to a model based on zero trust. Our goal was to improve security and create a better access experience for our 100,000+ users.

We explored many questions in our journey to adopt zero trust principles across Cisco. The five key questions presented here, along with insights on how we answered them within Cisco IT, can help your organization plan and undertake a similar journey.

1. What advantages do you expect to gain from implementing zero trust?

Begin by clearly defining what you want to gain from the move to zero trust. For Cisco IT, our primary goals were to increase security for remote work and simplify application access for users.

To improve security, we apply zero trust controls to establish trust for both the user and device with every access attempt before permitting that access to proceed. User trust is based by verifying the entered credentials (i.e., username and password) and successful completion of a multifactor authentication (MFA) step. The device is also verified to confirm that it is registered with Cisco IT and that it is up-to-date and healthy, through a check by the Duo Device Health application.

Users are able to conduct more of their work anywhere because zero trust allows secure remote access to corporate applications that previously required a direct connection to the Cisco network. If the user's device does not meet our security requirements, the Duo Device Health application provides clear steps so the user can make needed changes without contacting our helpdesk.

2. Do you have executive buy-in for a zero trust strategy?

To maximize the protections gained, a zero trust deployment needs broad reach across applications and users. Executive support of the new security model will be essential for achieving this reach. We found that involving IT and security stakeholders at the start of our project planning was vital to encourage executive support. As a result, we obtained sponsorship from both the Cisco CIO and chief security and trust officer.

3. Do you fully understand the zero trust model and the changes it will require in your IT environment?

Developing a detailed rollout plan is essential for a successful zero trust deployment that improves security across the IT environment. Our planning included these steps:

  • Inventory all desktop and mobile endpoints that will need to be configured and managed.
  • Ensure that enforced requirements align with corporate security policies and standards.
  • Conduct a pilot project with a small number of users and a limited set of applications to verify the architecture, access processes, and device configurations.
  • After a successful pilot, gradually roll out zero trust access to more users and applications for a smooth transition.
  • Create a process to onboard applications into the zero trust program, including prerequisites, a testing environment, and support resources.

4. Have you identified a strategy for using zero trust to improve the overall user experience?

Planning is also important to create a zero trust deployment that improves the user experience. We found success with an incremental introduction strategy.

  • Find an area to focus on first; we chose the remote work use case.
  • Try to generate user excitement about the benefits to be gained; for Cisco users, it was the ease of borderless access to corporate applications. Also emphasize the value of improved security for the enterprise.
  • Gradually expand use cases and ask users to nominate applications for the program, adding them over time.

5. What is your long-term vision for zero trust?

Throughout the program, regularly review your long-term vision and goals for zero trust to ensure efforts are still in alignment. With zero trust now in place for our internal users, we plan to extend the model to extranet users and users in acquired companies.

Our long-term vision is to apply zero trust principles to secure all access across our applications and environment. It begins by validating users when they access on-premises or cloud-hosted applications, and validating devices when they attempt connection to the Cisco network. Eventually, we will apply zero trust to how applications, services, and microservices communicate with one another.

What questions are guiding exploration of a zero trust deployment in your organization?

For more information: Zero Trust at Scale

Share:


Disclaimer

Cisco Systems Inc. published this content on 25 October 2021 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 25 October 2021 16:03:03 UTC.


© Publicnow 2021
All news about CISCO SYSTEMS, INC.
12/01TECHNOLOGY FOR GOOD : Bringing ICU Patients and Families Together via Webex
PU
12/01CISCO : NCR accelerates towards zero-trust with Cisco ACI and AlgoSec
PU
12/01Datagroup Takes Internet Speeds to New Heights Across Ukraine with Cisco Routed Optical..
AQ
12/01CISCO : Growing Ransomware Dangers Demand Layered Defense of Your Endpoints
PU
12/01Verizon Business, Cisco bolster enterprise agility with managed service offerings
AQ
11/30CISCO : “Who Said That?” A Technical Intro to Speaker Diarization
PU
11/30CISCO : Enabling Workers in the Mine
PU
11/30Amazon's cloud unit launches new chips to take on Intel, Nvidia
RE
11/30CISCO : Service Opportunities for Midsize/Small Service Providers Are Key to Competitive D..
PU
11/30CISCO : Zero Trust framework improves workforce security and productivity, while cutting s..
PU
More news
Analyst Recommendations on CISCO SYSTEMS, INC.
More recommendations
Financials (USD)
Sales 2022 52 752 M - -
Net income 2022 12 216 M - -
Net cash 2022 18 814 M - -
P/E ratio 2022 19,0x
Yield 2022 2,71%
Capitalization 232 B 232 B -
EV / Sales 2022 4,04x
EV / Sales 2023 3,75x
Nbr of Employees 79 500
Free-Float 99,9%
Chart CISCO SYSTEMS, INC.
Duration : Period :
Cisco Systems, Inc. Technical Analysis Chart | CSCO | US17275R1023 | MarketScreener
Technical analysis trends CISCO SYSTEMS, INC.
Short TermMid-TermLong Term
TrendsNeutralNeutralBullish
Income Statement Evolution
Consensus
Sell
Buy
Mean consensus OUTPERFORM
Number of Analysts 28
Last Close Price 55,03 $
Average target price 62,50 $
Spread / Average Target 13,6%
EPS Revisions
Managers and Directors
Charles H. Robbins Chairman & Chief Executive Officer
Richard Scott Herren Chief Financial Officer & Executive VP
Jacqueline Guichelaar Group Chief Information Officer & Senior VP
Roland Acra Chief Technology Officer & Senior Vice President
Maria Martinez Chief Operating Officer & Executive Vice President
Sector and Competitors
1st jan.Capi. (M$)
CISCO SYSTEMS, INC.22.55%232 095
MOTOROLA SOLUTIONS, INC.48.88%42 761
ARISTA NETWORKS, INC.70.78%38 122
FOXCONN INDUSTRIAL INTERNET CO., LTD.-17.75%34 868
ERICSSON-6.64%33 482
NOKIA OYJ55.97%31 278