Cisco Safe Entry brings adaptive, contextual, identity-driven safety to each connection.
Safety used to begin with IP addresses and finish with firewall guidelines. That world is historical past.
Immediately, IPs are disposable, gadgets roam, and customers spin up from wherever on the planet. But many SSE options nonetheless deal with safety as primarily a community challenge and don’t adequately embrace id as foundational.
Cisco’s altering that. Identification is the brand new perimeter, and with Cisco Identification Intelligence, Safe Entry brings steady, adaptive entry choices to each person, system, and software.
The Blind Spot: Static View of Identification, Habits, and Posture in a Dynamic World
Most SSE platforms assume a person is only a login. Authenticate as soon as, and also you’re good for the session. However id and identity-based dangers aren’t static. Belief ranges shift. Consumer conduct fluctuates. Posture modifications. Danger will increase. Attackers love to cover behind trusted credentials that haven’t been adjusted to mirror these dynamic modifications.
A non-identity-aware SSE can’t sustain as a result of it treats id as static versus a residing sign. It fails to correlate indicators from logins, behaviors, and gadgets that deviate from typical patterns or pointers.
When id, conduct, and posture verifications keep static, attackers transfer sooner.
Cisco Identification Intelligence: Leverage Consumer Belief Stage to Scale back Danger
Cisco Safe Entry integrates with Cisco Identification Intelligence (CII) to make SSE identity-focused, risk-aware and self-adjusting. Insurance policies can allow entry choices to evolve dynamically based mostly on stay id knowledge, not guesswork.
In September of this 12 months, Cisco prolonged Safe Entry integration with CII past person belief ranges being seen within the Safe Entry dashboard. Insurance policies for ZTNA-protected non-public visitors can now outline when a person’s entry must be blocked or reauthenticated, based mostly on a person belief profile that adjusts dynamically with person conduct and posture. For instance, a coverage might outline that when a person’s belief degree is untrusted, entry must be blocked.
As a safeguard, directors have the choice to bypass blocking an untrusted person, for a selected period of time. Think about an government who’s touring to a convention. She connects to an airport Wi-Fi community which she doesn’t usually use, with an IP tackle that’s questionable, to log right into a delicate/crucial software, and she or he just lately needed to reset her password.
These occasions mixed would make her seem “untrusted.” This feature permits an administrator to bypass the block, restore the manager’s entry, so she will proceed her convention actions.
The administrator might allow, for all ZTNA-protected non-public visitors, a functionality that prompts reauthentication in accordance with person belief degree. At decrease person belief ranges, reauthentication will happen extra steadily. For instance, let’s say a person doing her work and has a belief degree of “favorable,” however over time, conduct or posture modifications trigger her belief degree to lower to “impartial.” This may immediate her reauthentication to happen extra steadily.
With this functionality, Safe Entry is more and more utilizing dynamic belief knowledge to complement the group’s skill to implement least-privilege entry controls, heighten safety, and scale back threat.
Consumer and Entity Habits Analytics: Detect Anomalous Habits
Safe Entry’s Consumer and Entity Habits Analytics (UEBA), additionally obtainable in September this 12 months, can detect anomalous file operations and unattainable journey that might point out an insider menace. That menace might come from an precise insider with malicious intent or an outsider impersonating a sound person.
Directors can set Safe Entry insurance policies to detect when file uploads, downloads, or deletes exceed the extent deemed acceptable for a company. Moreover, Safe Entry can detect unattainable journey, equivalent to a person attempting to login from San Jose and Paris at occasions that aren’t doable, suggesting a stolen credential.
Directors now have clear visibility into these dangerous behaviors that will point out account compromise or malicious conduct by way of detailed UEBA experiences and “high dangerous customers” within the dashboard most important display screen.
We are going to proceed increasing UEBA such that sooner or later, the behavioral/analytics knowledge will inform automated motion (as chosen by the client and outlined in coverage) to extend safety safety.
Steady Posture: Adapt to Excessive-Danger Posture Adjustments
Cisco Safe Entry steady system posture function, launched in September, allows organizations to detect any discount in endpoint posture compliance throughout a stay session and shortly react by ending the session to keep away from undue threat. For instance, if the native firewall is disabled half means by way of a session, Safe Entry will determine the motion and might routinely terminate the session.
This functionality gives a fast response to any change that represents an elevated endpoint threat in the course of ongoing person actions. The detection and adaptive response are captured and offered within the person’s exercise logs for directors.
Now and Going Ahead: Cisco Guides Your Journey to Dynamic, Adaptive Entry
Immediately, Safe Entry is enriched with id intelligence, person and entity conduct analytics (UEBA), and steady system posture evaluation. Organizations can profit now from highly effective options—equivalent to insurance policies that modify entry based mostly on belief profiles, detection of anomalous person conduct, and automatic responses to dangerous system modifications—empowering them to implement granular, risk-aware safety at scale.
Trying forward, continued Cisco innovation will convey these capabilities nearer collectively, leading to ever-more refined adaptive entry controls that enhance the power to reply swiftly to threats, tailor entry insurance policies for evolving safety wants, and scale back enterprise threat. Our dedication to enriching Safe Entry functionality is unwavering, as is our dedication to assist our prospects stay a step (or two or three steps) forward in in the present day’s dynamic menace panorama.
Click on right here to study extra about Safe Entry and its many capabilities.
We’d love to listen to what you assume! Ask a query and keep linked with Cisco Safety on social media.
Cisco Safety Social Media
LinkedInFacebookInstagramX


















