https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
    • Diversity, Equity & Inclusion
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
    • MSP 501 Information Center
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
    • Diversity, Equity & Inclusion
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
    • MSP 501 Information Center
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

From the Industry


Getty Images

Sponsor Content

continuous trusted access provides secure access for the workforce

From Zero Trust to Continuous Trusted Access

  • Written by Cisco Guest Blogger
  • June 9, 2022
Continuous Trusted Access provides secure access while maintaining a smooth user experience for the workforce.

The way we work and do business is changing. The information technology trends we have been seeing during the last 10 years have accelerated dramatically in the last two years because of the global pandemic. Organizations condensed projects that normally would take years into months, or even weeks. Adopting cloud solutions, redefining remote access controls, and enabling work from any device and any location all became top priorities as the world transitioned to working from home.

As the dust settles from this transition, IT environments are more complex than ever. There are far more variables to consider when assessing the context of a worker looking to securely access corporate resources. Assigning trust to users based on their presence on a corporate network or use of a managed device is too simplistic and not viable any longer.

How are we to move forward? The principles of zero trust provide a nice place to start. To summarize simply: “Trust is neither binary, nor permanent.” Given the explosion of complexity, one way to address the fleeting nature of trust would be to ask users to re-authenticate and re-authorize more frequently. Worried about trust? Boot workers out and have them re-establish that trust!

Obviously, shortening session lengths and forcing more friction will cause headaches for users, help desks and administrators alike. Moreover, the trend toward the consumerization of IT means that users expect, and deserve, seamless access experiences.

To provide secure access while maintaining a smooth user experience for the workforce, we are proud to announce our vision for Continuous Trusted Access.

To relieve the burden on end users, Continuous Trusted Access will consistently evaluate both user and device trustworthiness behind the scenes, applying the appropriate access experience based on current levels of risk. The goal is that by continuously assessing user risk both before and after login, we can respond more dynamically – expediting access in trusted scenarios and stepping up security requirements in risky ones.

The Continuous Trusted Access vision will be enacted by investing in features that evaluate context and risk both at the point of login, but also throughout an established session. To realize this vision, our first step will be to deliver a modernized take on Risk-Based Authentication – incorporating functionality that reflects the realities of corporate IT today. Our Risk-Based Authentication feature set will be available to all customers for preview later this summer. We will then continue to build risk assessment across the full session. It is not a simple problem to solve, but we have guiding tenants as we build our functionality:

Maintain User Privacy

Many companies feel justified collecting intrusive data in the name of security. However, we are taking the strong stance that privacy is a digital right. In cases where we collect contextual signals to inform risk decisions, the goal will be to preserve the highest levels of personal privacy. For example, instead of relying on GPS signals for location, our tools will focus on data that is more readily anonymized.

Foster an Open Ecosystem

We believe that to best evaluate risk and context continuously, we’re going to need to work together as an industry. Therefore, we are investing in open standards like the Shared Signals and Events framework, which provides easier mechanisms to share relevant signals between tools and vendors. We are proud that Cisco built the first reference architecture for Shared Signals and Events while simultaneously partnering with important companies like Box to encourage industry collaboration.

Innovate on Signals and Controls

In our pursuit of Continuous Trusted Access, we will be innovating on both the risk signal and control components of secure access. For signals, the plan is to develop new ways to detect and assess user context outside of traditional mechanisms like IP address. One way is to use a user’s Wi-Fi Fingerprint to intuit their working location and detect changes to that location when the Wi-Fi Fingerprint varies. This signal is a brand-new way to proxy location and patent-pending for Cisco Secure. For controls, we are adding new access experiences like Verified Push to provide strong security in cases with higher risk detected.

In an increasingly complicated world, Cisco Secure is building toward a future where organizations can realize the security ideals of zero trust without placing unnecessary friction on their users. We started this journey by delivering passwordless authentication, and we will continue by building more dynamic and continuous reactions to risk into our solutions. In the end, our goal is to help security teams be resilient and ready for anything.

To learn more about our efforts, please visit the Continuous Trusted Access page. And if you would like to stay up to date regarding our product developments, feel free to sign up for updates.

Ash Devata focuses on defining use cases and making it easy for you to learn, try and buy Duo products. Before joining Duo (part of Cisco Secure), Ash worked with companies such as RSA, EMC and Cisco in various product and marketing roles. Ash has a bachelor’s in engineering, master’s in business management and a stack of bibs he collected through occasional long-distance running.

This guest blog is part of a Channel Futures sponsorship.

Tags: Cloud Service Providers From the Industry Intelligence Cisco Sponsor Content

Most Recent


  • Jumper Cables
    The Gately Report: Synopsys to Jump-Start Investment in WhiteHat Security Partners
    Also, this week saw the first-ever rollout of a bug bounty program by a ransomware gang.
  • Conversation Intelligence Improves Outcomes for Contact Centers, Observe.AI Research Shows
    However, two-thirds of contact centers still rely on manual processes for critical workflows like agent coaching and quality assurance.
  • 2022 MSP 501 logo feature image size
    2022 Channel Futures MSP 501: Download the Complete List
    See who made our prestigious list this year, all in one place.
  • Cloud Roundup
    Heads Up, Partners: Google Cloud, New Relic Make Big Moves
    We’ve also got updates from Backblaze, Veritas, AWS, PwC and Pax8.

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • managed detection and response
    MDR Can Help SMBs Become More Cyber Resilient
  • solutions for cybersecurity expertise
    Short on Cybersecurity Expertise? No Problem
  • no organization is immune to ransomware
    No Organization Is Immune
  • cybersecurity trends research for MSPs
    Increased Cybersecurity Vulnerability = Increased MSP Opportunities

Upcoming Events

View all

MSP Summit

September 13, 2022 - September 16, 2022

Channel Partners Conference & Expo

May 1, 2023 - May 4, 2023

Galleries

View all

The Gately Report: Synopsys to Jump-Start Investment in WhiteHat Security Partners

June 30, 2022

Conversation Intelligence Improves Outcomes for Contact Centers, Observe.AI Research Shows

June 29, 2022

Heads Up, Partners: Google Cloud, New Relic Make Big Moves

June 28, 2022

Industry Perspectives

View all

How to Differentiate to Leverage 5G’s Revenue Opportunity

June 28, 2022

Why MSPs are Attractive Cyberattack Targets

June 24, 2022

IT Partner Programs Must Evolve to Meet Market Demands

June 21, 2022

Webinars

View all

VEP Platform for Delivery of uCPE, SD-WAN and SASE

June 29, 2022

The Digital Worker: How to Empower Customers with a Flexible, Scalable VDI Solution to Enable Remote Work

June 30, 2022

Growing Partner Revenue and Customer Satisfaction with Power Management Services

June 23, 2022

White Papers

View all

Work Goes Remote – (and Other Top ITOps Trends)

May 25, 2022

The New Bottom Line: How MSPs Can Meet the Healthcare Crisis While Evolving Their Businesses

April 19, 2022

How to build a Security Operations Center (on a budget)

April 4, 2022

Channel Futures TV

View all

Vonage a ‘Single Communications Stack Provider’ for Partners, Customers

IBM, Partners and the $1 Trillion Hybrid Cloud Opportunity

June 26, 2022

Agents Share ‘Secrets,’ Industry Opportunity

May 11, 2022

AT&T, Microsoft, Cisco, ThreatLocker on Unlocking Partner Potential

May 6, 2022

Twitter

ChannelFutures

.@scality unveils partner program enhancements. #storage dlvr.it/ST7vs0 https://t.co/F6WoFTYcNW

June 30, 2022
ChannelFutures

#Privateequity investors apparently aren’t worried about #inflation or #recession — at least not when it comes to d… twitter.com/i/web/status/1…

June 30, 2022
ChannelFutures

.@thrivenetworks buys Edge Technology Group, its fourth acquisition this year. dlvr.it/ST72zg https://t.co/4So6ppAsda

June 30, 2022
ChannelFutures

As Pride month comes to a close, we're taking some time to reflect. Take a look at this article from Buffy Naylor a… twitter.com/i/web/status/1…

June 30, 2022
ChannelFutures

New @MuleSoft #RPA offeirng aims to let business users build workflow automation #bots for @salesforce.… twitter.com/i/web/status/1…

June 30, 2022
ChannelFutures

#MSPs need to offer targeted #cybersecurity programs for SMBs, says @Malwarebytes. dlvr.it/ST67dZ https://t.co/brzfQ8sn9Q

June 30, 2022
ChannelFutures

.@zscaler, @Cisco, @symantec lead fast-growing #SSE market. @DellOroGroup dlvr.it/ST4pTV https://t.co/5j8cgkKboV

June 29, 2022
ChannelFutures

#ContactCenters using conversation intelligence were 10 times more likely to feel very prepared for the future,… twitter.com/i/web/status/1…

June 29, 2022

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X