14c3569f-b90f-4a78-8cf9-f22c10208f34

Zero Trust at Scale

In 2020, Cisco set out to move from a traditional network-based perimeter and VPN model to a zero trust framework. Dubbed ‘borderless’ internally, the core goal was to give users a secure, uniform experience accessing applications, wherever the user or application is located. Using the features of Duo Beyond, our team set out to improve security and create a better experience for our 100,000+ users - a fundamental shift that took place in less than five months.

What does Zero Trust at Cisco look like?

When we think about zero trust at Cisco, four things need to happen everytime someone tries to access an application:

1. We verify the user
2. We confirm that the device is up-to-date and healthy
3. We validate that a Cisco-managed device is being used
4. The application can be accessed without the VPN

And when we say every time, we mean it. Not once a day, not for one application, but continuously.

FILL OUT YOUR DETAILS AND DOWNLOAD YOUR COPY TODAY

By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice.

By submitting this form, you are confirming you are an adult of 18 years or older and you agree to Cisco contacting you with marketing-related emails or by telephone. You may unsubscribe at any time. Cisco websites and communications are subject to their Privacy Notice.