Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":2452,"date":"2024-02-19T22:50:14","date_gmt":"2024-02-19T22:50:14","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/"},"modified":"2024-02-19T22:50:14","modified_gmt":"2024-02-19T22:50:14","slug":"cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/","title":{"rendered":"Cisco Secure Access Accelerates SSE Innovation with AI, User Experience Monitoring, and Identity Intelligence Jeff Scheaffer on February 19, 2024 at 1:00 pm"},"content":{"rendered":"

In a blog post last December, I said that the business and IT leaders with whom I meet always ask: How can I secure my highly distributed workforce, who gets more varied and decentralized all the\u2026 Read more on Cisco Blogs<\/a><\/em><\/p>\n

\u200b[[{“value”:”<\/p>\n

In a blog post last December, I said that the business and IT leaders with whom I meet always ask: How can I secure my highly distributed workforce, who gets more varied and decentralized all the time? How do I provide tight security without burdening them or impeding business?<\/em>\u00a0 That hasn\u2019t changed. This still drives conversations early and often.<\/p>\n

Yet this is never in isolation. Their focus on improving end users\u2019 experience sits right beside their need to make life easier for their IT and security teams. And of course, these leaders are intensely working to lower risk to the organization. Simply said, these leaders are saying that they want security that\u2019s better for users, easier for IT, and safer for everyone. <\/strong>Yet, that simple statement hasn\u2019t historically been easy to achieve.<\/p>\n

In June 2023, we introduced Cisco Secure Access<\/a>, a security service edge (SSE) solution that squarely answers these needs. And since June, we\u2019ve continued to aggressively add functionality to deepen and extend the ways that you can improve end user experience, simplify security management for IT, and tighten security for everyone. Today, I\u2019m thrilled to share capabilities that we announced at Cisco Live in Amsterdam just a few weeks ago.<\/p>\n

AI for Security: Increase security and lower complexity<\/strong>\u00a0 <\/strong><\/h2>\n

We\u2019re excited to announce the AI Assistant for Security in Secure Access. This is a generative AI capability that will simplify access policy creation by automatically converting conversational English prompts into security policies. It can take a multi-part prompt and create a sophisticated single policy. It can automatically break a complex prompt into multiple elements and create a set of recommended polices to cover an entire scenario. By default, the AI Assistant creates rules in a disabled state to ensure the administrator can tweak, test, and move rules to production only when they are ready to do so.<\/p>\n

Security administrators no longer need to understand the policy engine, formatting, and nomenclature for each security tool and manually create a large volume of policies. Using the AI Assistant in Secure Access, via the single console, security administrators can save significant time across policy creation and management tasks. Additionally, multi-person administrator groups can create a more consistent and effective policy set. And, all this pushes the needle on improved operational efficiency and reduced complexity.<\/p>\n

Security for AI: <\/strong>Mitigate risks of using generative AI applications<\/strong><\/h2>\n

My comments above highlight how Secure Access is using AI to enrich the security capability it provides. In addition, we announced our ability to help organizations safely use generative AI applications within their organizations to increase employee productivity without adding security risk.<\/p>\n

Secure Access AI Data Loss Prevention (DLP) functionality secures the use of Generative AI applications via discovery, block\/allow, granular control, and inline data loss prevention.<\/p>\n

Functionality includes:<\/p>\n

Discover and control use of 70 generative AI apps, including Bing AI, Google Bard, and ChatGPT \u2014 who\u2019s trying to use it, how frequently, and where.
\nBlock or allow multiple generative AI applications.
\nEnable the safe use of ChatGPT:
\nGranularly control which functions to allow \u2014 or not \u2014 and by whom.
\nUse DLP to ensure sensitive data is not leaked to the AI platform.
\nUse DLP to block the download of unsafe content from ChatGPT and notify the user.<\/p>\n

Policy management for both inline and out-of-band DLP is done via Secure Access\u2019s single, unified dashboard, so while it\u2019s tightening security, it\u2019s also keeping things simple for the IT\/security staff.<\/p>\n

Experience insights increases user productivity and IT efficiency<\/strong><\/h2>\n

Experience Insights is a set of digital experience monitoring (DEM) capabilities that enables IT\/security teams to improve user productivity by quickly revealing connectivity issues and providing the relevant details for faster resolution. It is embedded into Cisco Secure Access and powered by ThousandEyes functionality \u2014 at no extra cost \u2014 to enable rapid root cause identification and resolution.<\/p>\n

Experience Insights monitors the health of work-managed endpoints, their underlay and overlay connectivity, and the application performance of top SaaS applications, such as collaboration and productivity platforms.<\/p>\n

Example Insights:<\/p>\n

Endpoint performance: CPU, memory, Wi-Fi
\nNetwork performance: Endpoint to Secure Access to target destination, including local network, user last mile, Internet, and application network
\nApplication performance for top SaaS apps, such as Microsoft Office, Salesforce, Gmail, and Notion
\nCollaboration performance scores per user for Cisco Webex, Zoom, and Microsoft Teams
\nView user-specific events based on conditions, such as policy block<\/p>\n

Because it is a component of Cisco Secure Access, administrators have a single correlated view to manage the connectivity, security, and digital experiences of their workforce \u2014 regardless of where users or issues are located \u2014 to reduce mean-time-to-response (MTTR). This improves user satisfaction and makes administrators, help desk staff, and end users more productive.<\/p>\n

Experience Insights can be easily expanded to full ThousandEyes licenses with an extended set of monitoring capabilities and data sharing.<\/p>\n

Identity Intelligence sharpens security<\/strong><\/h2>\n

In the last year, we\u2019ve seen an upsurge in identity threats that hit many enterprises hard. In light of that, Cisco security is making identity central to its security strategy. We are pioneering new identity intelligence that is all about understanding and managing not only the who<\/em><\/strong> and what<\/em><\/strong> of access, but also the when<\/em><\/strong>, where<\/em><\/strong>, and how<\/em><\/strong> of interactions.<\/p>\n

Today, there is blind trust between authentication and access \u2014 a blank space where you can\u2019t easily see and respond to identity behaviors. By closing that space, we\u2019ll be able to move from asking, \u201cCAN the user get access to resource X?\u201d to the more important question, \u201cSHOULD the user get access based on current identity intelligence?\u201d<\/p>\n

In mid-2024, Secure Access will be using this deep Identity Intelligence to make smarter zero trust access decisions, empowering security teams to defend against identity-based attacks.\u00a0For example, Secure Access will be able to use data from existing identity and access management tools to enable administrators to clean up unused and vulnerable identities that leave a door cracked open for account takeover threats.<\/p>\n

Identity Intelligence in Secure Access will expose subtle shifts in identity posture by aggregating extended attributes and user behavior factors from a wide range of Cisco and third-party sources. This will give a clear picture of every identity and continuously track changes that empower administrators to create and enforce sophisticated Secure Access policies.<\/p>\n

This rich identity intelligence will allow your security team to block or challenge unusual identity behaviors based on risk. This could then initiate an incremental reduction in access rights or full session termination, quickly containing the impacts of a compromised identity.<\/p>\n

Infuse ISE\u2019s identity-based context into Secure Access<\/strong><\/h2>\n

The integration of Identity Services Engine (ISE) into Secure Access\u2019s VPNaaS capability is the first instantiation of ISE integration across Secure Access that will provide granular, identity-based, posture information to deepen visibility into what users are doing, when, and how.<\/p>\n

It will enable the administrator to use detailed, identity-based information to make proactive governance decisions (via policy). For example, you can know \u2014 on a per user basis \u2014 the device type used, its location, its state\/posture, is it managed or unmanaged, what\u2019s the time of day, and more. In the future, by using AI analytics, Secure Access will be able to detect anomalies in device posture and identity and then apply the correct policy.<\/p>\n

The upshot? You will be able to more precisely enforce the right policy, for the right user or device, at the right time.<\/p>\n

This is just the beginning. Cisco is driving toward common identity across products and capabilities, applied wherever users work, however they connect (wired or wireless), and whatever resources they access.<\/p>\n

Why Cisco? <\/strong><\/h2>\n

Scale matters in security, and Cisco has a proven track record with cloud-delivered security solutions. We have over 70 thousand cloud security customers, manage 220 million remote endpoints, and secure over 600 billion web requests per day. We know how to do security at scale. To learn more, register to see a live demo of Cisco Secure Access<\/a>.<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!<\/em><\/p>\n

Cisco Security Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0We’re improving Cisco Secure Access by adding functionality that improves end user experience, simplifies security management for IT and tightens security.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

In a blog post last December, I said that the business and IT leaders with whom I meet always ask: How can I secure my highly distributed workforce, who gets more varied and decentralized all the\u2026 Read more on Cisco Blogs<\/a><\/em><\/p>\n

\u200b[[{“value”:”<\/p>\n

In a blog post last December, I said that the business and IT leaders with whom I meet always ask: How can I secure my highly distributed workforce, who gets more varied and decentralized all the time? How do I provide tight security without burdening them or impeding business?<\/em>\u00a0 That hasn\u2019t changed. This still drives conversations early and often.<\/p>\n

Yet this is never in isolation. Their focus on improving end users\u2019 experience sits right beside their need to make life easier for their IT and security teams. And of course, these leaders are intensely working to lower risk to the organization. Simply said, these leaders are saying that they want security that\u2019s better for users, easier for IT, and safer for everyone. <\/strong>Yet, that simple statement hasn\u2019t historically been easy to achieve.<\/p>\n

In June 2023, we introduced Cisco Secure Access<\/a>, a security service edge (SSE) solution that squarely answers these needs. And since June, we\u2019ve continued to aggressively add functionality to deepen and extend the ways that you can improve end user experience, simplify security management for IT, and tighten security for everyone. Today, I\u2019m thrilled to share capabilities that we announced at Cisco Live in Amsterdam just a few weeks ago.<\/p>\n

AI for Security: Increase security and lower complexity<\/strong>\u00a0 <\/strong><\/h2>\n

We\u2019re excited to announce the AI Assistant for Security in Secure Access. This is a generative AI capability that will simplify access policy creation by automatically converting conversational English prompts into security policies. It can take a multi-part prompt and create a sophisticated single policy. It can automatically break a complex prompt into multiple elements and create a set of recommended polices to cover an entire scenario. By default, the AI Assistant creates rules in a disabled state to ensure the administrator can tweak, test, and move rules to production only when they are ready to do so.<\/p>\n

Security administrators no longer need to understand the policy engine, formatting, and nomenclature for each security tool and manually create a large volume of policies. Using the AI Assistant in Secure Access, via the single console, security administrators can save significant time across policy creation and management tasks. Additionally, multi-person administrator groups can create a more consistent and effective policy set. And, all this pushes the needle on improved operational efficiency and reduced complexity.<\/p>\n

Security for AI: <\/strong>Mitigate risks of using generative AI applications<\/strong><\/h2>\n

My comments above highlight how Secure Access is using AI to enrich the security capability it provides. In addition, we announced our ability to help organizations safely use generative AI applications within their organizations to increase employee productivity without adding security risk.<\/p>\n

Secure Access AI Data Loss Prevention (DLP) functionality secures the use of Generative AI applications via discovery, block\/allow, granular control, and inline data loss prevention.<\/p>\n

Functionality includes:<\/p>\n

Discover and control use of 70 generative AI apps, including Bing AI, Google Bard, and ChatGPT \u2014 who\u2019s trying to use it, how frequently, and where.
\nBlock or allow multiple generative AI applications.
\nEnable the safe use of ChatGPT:
\nGranularly control which functions to allow \u2014 or not \u2014 and by whom.
\nUse DLP to ensure sensitive data is not leaked to the AI platform.
\nUse DLP to block the download of unsafe content from ChatGPT and notify the user.<\/p>\n

Policy management for both inline and out-of-band DLP is done via Secure Access\u2019s single, unified dashboard, so while it\u2019s tightening security, it\u2019s also keeping things simple for the IT\/security staff.<\/p>\n

Experience insights increases user productivity and IT efficiency<\/strong><\/h2>\n

Experience Insights is a set of digital experience monitoring (DEM) capabilities that enables IT\/security teams to improve user productivity by quickly revealing connectivity issues and providing the relevant details for faster resolution. It is embedded into Cisco Secure Access and powered by ThousandEyes functionality \u2014 at no extra cost \u2014 to enable rapid root cause identification and resolution.<\/p>\n

Experience Insights monitors the health of work-managed endpoints, their underlay and overlay connectivity, and the application performance of top SaaS applications, such as collaboration and productivity platforms.<\/p>\n

Example Insights:<\/p>\n

Endpoint performance: CPU, memory, Wi-Fi
\nNetwork performance: Endpoint to Secure Access to target destination, including local network, user last mile, Internet, and application network
\nApplication performance for top SaaS apps, such as Microsoft Office, Salesforce, Gmail, and Notion
\nCollaboration performance scores per user for Cisco Webex, Zoom, and Microsoft Teams
\nView user-specific events based on conditions, such as policy block<\/p>\n

Because it is a component of Cisco Secure Access, administrators have a single correlated view to manage the connectivity, security, and digital experiences of their workforce \u2014 regardless of where users or issues are located \u2014 to reduce mean-time-to-response (MTTR). This improves user satisfaction and makes administrators, help desk staff, and end users more productive.<\/p>\n

Experience Insights can be easily expanded to full ThousandEyes licenses with an extended set of monitoring capabilities and data sharing.<\/p>\n

Identity Intelligence sharpens security<\/strong><\/h2>\n

In the last year, we\u2019ve seen an upsurge in identity threats that hit many enterprises hard. In light of that, Cisco security is making identity central to its security strategy. We are pioneering new identity intelligence that is all about understanding and managing not only the who<\/em><\/strong> and what<\/em><\/strong> of access, but also the when<\/em><\/strong>, where<\/em><\/strong>, and how<\/em><\/strong> of interactions.<\/p>\n

Today, there is blind trust between authentication and access \u2014 a blank space where you can\u2019t easily see and respond to identity behaviors. By closing that space, we\u2019ll be able to move from asking, \u201cCAN the user get access to resource X?\u201d to the more important question, \u201cSHOULD the user get access based on current identity intelligence?\u201d<\/p>\n

In mid-2024, Secure Access will be using this deep Identity Intelligence to make smarter zero trust access decisions, empowering security teams to defend against identity-based attacks.\u00a0For example, Secure Access will be able to use data from existing identity and access management tools to enable administrators to clean up unused and vulnerable identities that leave a door cracked open for account takeover threats.<\/p>\n

Identity Intelligence in Secure Access will expose subtle shifts in identity posture by aggregating extended attributes and user behavior factors from a wide range of Cisco and third-party sources. This will give a clear picture of every identity and continuously track changes that empower administrators to create and enforce sophisticated Secure Access policies.<\/p>\n

This rich identity intelligence will allow your security team to block or challenge unusual identity behaviors based on risk. This could then initiate an incremental reduction in access rights or full session termination, quickly containing the impacts of a compromised identity.<\/p>\n

Infuse ISE\u2019s identity-based context into Secure Access<\/strong><\/h2>\n

The integration of Identity Services Engine (ISE) into Secure Access\u2019s VPNaaS capability is the first instantiation of ISE integration across Secure Access that will provide granular, identity-based, posture information to deepen visibility into what users are doing, when, and how.<\/p>\n

It will enable the administrator to use detailed, identity-based information to make proactive governance decisions (via policy). For example, you can know \u2014 on a per user basis \u2014 the device type used, its location, its state\/posture, is it managed or unmanaged, what\u2019s the time of day, and more. In the future, by using AI analytics, Secure Access will be able to detect anomalies in device posture and identity and then apply the correct policy.<\/p>\n

The upshot? You will be able to more precisely enforce the right policy, for the right user or device, at the right time.<\/p>\n

This is just the beginning. Cisco is driving toward common identity across products and capabilities, applied wherever users work, however they connect (wired or wireless), and whatever resources they access.<\/p>\n

Why Cisco? <\/strong><\/h2>\n

Scale matters in security, and Cisco has a proven track record with cloud-delivered security solutions. We have over 70 thousand cloud security customers, manage 220 million remote endpoints, and secure over 600 billion web requests per day. We know how to do security at scale. To learn more, register to see a live demo of Cisco Secure Access<\/a>.<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!<\/em><\/p>\n

Cisco Security Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0We’re improving Cisco Secure Access by adding functionality that improves end user experience, simplifies security management for IT and tightens security.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":2453,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2452","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nCisco Secure Access Accelerates SSE Innovation with AI, User Experience Monitoring, and Identity Intelligence Jeff Scheaffer on February 19, 2024 at 1:00 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cisco Secure Access Accelerates SSE Innovation with AI, User Experience Monitoring, and Identity Intelligence Jeff Scheaffer on February 19, 2024 at 1:00 pm\" \/>\n<meta property=\"og:description\" content=\"In a blog post last December, I said that the business and IT leaders with whom I meet always ask: How can I secure my highly distributed workforce, who gets more varied and decentralized all the\u2026 Read more on Cisco Blogs \u200b[[{"value":" In a blog post last December, I said that the business and IT leaders with whom I meet always ask: How can I secure my highly distributed workforce, who gets more varied and decentralized all the time? How do I provide tight security without burdening them or impeding business?\u00a0 That hasn\u2019t changed. This still drives conversations early and often. Yet this is never in isolation. Their focus on improving end users\u2019 experience sits right beside their need to make life easier for their IT and security teams. And of course, these leaders are intensely working to lower risk to the organization. Simply said, these leaders are saying that they want security that\u2019s better for users, easier for IT, and safer for everyone. Yet, that simple statement hasn\u2019t historically been easy to achieve. In June 2023, we introduced Cisco Secure Access, a security service edge (SSE) solution that squarely answers these needs. And since June, we\u2019ve continued to aggressively add functionality to deepen and extend the ways that you can improve end user experience, simplify security management for IT, and tighten security for everyone. Today, I\u2019m thrilled to share capabilities that we announced at Cisco Live in Amsterdam just a few weeks ago. AI for Security: Increase security and lower complexity\u00a0 We\u2019re excited to announce the AI Assistant for Security in Secure Access. This is a generative AI capability that will simplify access policy creation by automatically converting conversational English prompts into security policies. It can take a multi-part prompt and create a sophisticated single policy. It can automatically break a complex prompt into multiple elements and create a set of recommended polices to cover an entire scenario. By default, the AI Assistant creates rules in a disabled state to ensure the administrator can tweak, test, and move rules to production only when they are ready to do so. Security administrators no longer need to understand the policy engine, formatting, and nomenclature for each security tool and manually create a large volume of policies. Using the AI Assistant in Secure Access, via the single console, security administrators can save significant time across policy creation and management tasks. Additionally, multi-person administrator groups can create a more consistent and effective policy set. And, all this pushes the needle on improved operational efficiency and reduced complexity. Security for AI: Mitigate risks of using generative AI applications My comments above highlight how Secure Access is using AI to enrich the security capability it provides. In addition, we announced our ability to help organizations safely use generative AI applications within their organizations to increase employee productivity without adding security risk. Secure Access AI Data Loss Prevention (DLP) functionality secures the use of Generative AI applications via discovery, block\/allow, granular control, and inline data loss prevention. Functionality includes: Discover and control use of 70 generative AI apps, including Bing AI, Google Bard, and ChatGPT \u2014 who\u2019s trying to use it, how frequently, and where. Block or allow multiple generative AI applications. Enable the safe use of ChatGPT: Granularly control which functions to allow \u2014 or not \u2014 and by whom. Use DLP to ensure sensitive data is not leaked to the AI platform. Use DLP to block the download of unsafe content from ChatGPT and notify the user. Policy management for both inline and out-of-band DLP is done via Secure Access\u2019s single, unified dashboard, so while it\u2019s tightening security, it\u2019s also keeping things simple for the IT\/security staff. Experience insights increases user productivity and IT efficiency Experience Insights is a set of digital experience monitoring (DEM) capabilities that enables IT\/security teams to improve user productivity by quickly revealing connectivity issues and providing the relevant details for faster resolution. It is embedded into Cisco Secure Access and powered by ThousandEyes functionality \u2014 at no extra cost \u2014 to enable rapid root cause identification and resolution. Experience Insights monitors the health of work-managed endpoints, their underlay and overlay connectivity, and the application performance of top SaaS applications, such as collaboration and productivity platforms. Example Insights: Endpoint performance: CPU, memory, Wi-Fi Network performance: Endpoint to Secure Access to target destination, including local network, user last mile, Internet, and application network Application performance for top SaaS apps, such as Microsoft Office, Salesforce, Gmail, and Notion Collaboration performance scores per user for Cisco Webex, Zoom, and Microsoft Teams View user-specific events based on conditions, such as policy block Because it is a component of Cisco Secure Access, administrators have a single correlated view to manage the connectivity, security, and digital experiences of their workforce \u2014 regardless of where users or issues are located \u2014 to reduce mean-time-to-response (MTTR). This improves user satisfaction and makes administrators, help desk staff, and end users more productive. Experience Insights can be easily expanded to full ThousandEyes licenses with an extended set of monitoring capabilities and data sharing. Identity Intelligence sharpens security In the last year, we\u2019ve seen an upsurge in identity threats that hit many enterprises hard. In light of that, Cisco security is making identity central to its security strategy. We are pioneering new identity intelligence that is all about understanding and managing not only the who and what of access, but also the when, where, and how of interactions. Today, there is blind trust between authentication and access \u2014 a blank space where you can\u2019t easily see and respond to identity behaviors. By closing that space, we\u2019ll be able to move from asking, \u201cCAN the user get access to resource X?\u201d to the more important question, \u201cSHOULD the user get access based on current identity intelligence?\u201d In mid-2024, Secure Access will be using this deep Identity Intelligence to make smarter zero trust access decisions, empowering security teams to defend against identity-based attacks.\u00a0For example, Secure Access will be able to use data from existing identity and access management tools to enable administrators to clean up unused and vulnerable identities that leave a door cracked open for account takeover threats. Identity Intelligence in Secure Access will expose subtle shifts in identity posture by aggregating extended attributes and user behavior factors from a wide range of Cisco and third-party sources. This will give a clear picture of every identity and continuously track changes that empower administrators to create and enforce sophisticated Secure Access policies. This rich identity intelligence will allow your security team to block or challenge unusual identity behaviors based on risk. This could then initiate an incremental reduction in access rights or full session termination, quickly containing the impacts of a compromised identity. Infuse ISE\u2019s identity-based context into Secure Access The integration of Identity Services Engine (ISE) into Secure Access\u2019s VPNaaS capability is the first instantiation of ISE integration across Secure Access that will provide granular, identity-based, posture information to deepen visibility into what users are doing, when, and how. It will enable the administrator to use detailed, identity-based information to make proactive governance decisions (via policy). For example, you can know \u2014 on a per user basis \u2014 the device type used, its location, its state\/posture, is it managed or unmanaged, what\u2019s the time of day, and more. In the future, by using AI analytics, Secure Access will be able to detect anomalies in device posture and identity and then apply the correct policy. The upshot? You will be able to more precisely enforce the right policy, for the right user or device, at the right time. This is just the beginning. Cisco is driving toward common identity across products and capabilities, applied wherever users work, however they connect (wired or wireless), and whatever resources they access. Why Cisco? Scale matters in security, and Cisco has a proven track record with cloud-delivered security solutions. We have over 70 thousand cloud security customers, manage 220 million remote endpoints, and secure over 600 billion web requests per day. We know how to do security at scale. To learn more, register to see a live demo of Cisco Secure Access. We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social! Cisco Security Social Channels InstagramFacebookTwitterLinkedIn Share Share: "}]]\u00a0\u00a0We're improving Cisco Secure Access by adding functionality that improves end user experience, simplifies security management for IT and tightens security.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-19T22:50:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16582047-OmbUrO.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Cisco Secure Access Accelerates SSE Innovation with AI, User Experience Monitoring, and Identity Intelligence Jeff Scheaffer on February 19, 2024 at 1:00 pm\",\"datePublished\":\"2024-02-19T22:50:14+00:00\",\"dateModified\":\"2024-02-19T22:50:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/\"},\"wordCount\":1438,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16582047-OmbUrO.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/\",\"name\":\"Cisco Secure Access Accelerates SSE Innovation with AI, User Experience Monitoring, and Identity Intelligence Jeff Scheaffer on February 19, 2024 at 1:00 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16582047-OmbUrO.gif\",\"datePublished\":\"2024-02-19T22:50:14+00:00\",\"dateModified\":\"2024-02-19T22:50:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16582047-OmbUrO.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16582047-OmbUrO.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cisco Secure Access Accelerates SSE Innovation with AI, User Experience Monitoring, and Identity Intelligence Jeff Scheaffer on February 19, 2024 at 1:00 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cisco Secure Access Accelerates SSE Innovation with AI, User Experience Monitoring, and Identity Intelligence Jeff Scheaffer on February 19, 2024 at 1:00 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/","og_locale":"en_US","og_type":"article","og_title":"Cisco Secure Access Accelerates SSE Innovation with AI, User Experience Monitoring, and Identity Intelligence Jeff Scheaffer on February 19, 2024 at 1:00 pm","og_description":"In a blog post last December, I said that the business and IT leaders with whom I meet always ask: How can I secure my highly distributed workforce, who gets more varied and decentralized all the\u2026 Read more on Cisco Blogs \u200b[[{\"value\":\" In a blog post last December, I said that the business and IT leaders with whom I meet always ask: How can I secure my highly distributed workforce, who gets more varied and decentralized all the time? How do I provide tight security without burdening them or impeding business?\u00a0 That hasn\u2019t changed. This still drives conversations early and often. Yet this is never in isolation. Their focus on improving end users\u2019 experience sits right beside their need to make life easier for their IT and security teams. And of course, these leaders are intensely working to lower risk to the organization. Simply said, these leaders are saying that they want security that\u2019s better for users, easier for IT, and safer for everyone. Yet, that simple statement hasn\u2019t historically been easy to achieve. In June 2023, we introduced Cisco Secure Access, a security service edge (SSE) solution that squarely answers these needs. And since June, we\u2019ve continued to aggressively add functionality to deepen and extend the ways that you can improve end user experience, simplify security management for IT, and tighten security for everyone. Today, I\u2019m thrilled to share capabilities that we announced at Cisco Live in Amsterdam just a few weeks ago. AI for Security: Increase security and lower complexity\u00a0 We\u2019re excited to announce the AI Assistant for Security in Secure Access. This is a generative AI capability that will simplify access policy creation by automatically converting conversational English prompts into security policies. It can take a multi-part prompt and create a sophisticated single policy. It can automatically break a complex prompt into multiple elements and create a set of recommended polices to cover an entire scenario. By default, the AI Assistant creates rules in a disabled state to ensure the administrator can tweak, test, and move rules to production only when they are ready to do so. Security administrators no longer need to understand the policy engine, formatting, and nomenclature for each security tool and manually create a large volume of policies. Using the AI Assistant in Secure Access, via the single console, security administrators can save significant time across policy creation and management tasks. Additionally, multi-person administrator groups can create a more consistent and effective policy set. And, all this pushes the needle on improved operational efficiency and reduced complexity. Security for AI: Mitigate risks of using generative AI applications My comments above highlight how Secure Access is using AI to enrich the security capability it provides. In addition, we announced our ability to help organizations safely use generative AI applications within their organizations to increase employee productivity without adding security risk. Secure Access AI Data Loss Prevention (DLP) functionality secures the use of Generative AI applications via discovery, block\/allow, granular control, and inline data loss prevention. Functionality includes: Discover and control use of 70 generative AI apps, including Bing AI, Google Bard, and ChatGPT \u2014 who\u2019s trying to use it, how frequently, and where. Block or allow multiple generative AI applications. Enable the safe use of ChatGPT: Granularly control which functions to allow \u2014 or not \u2014 and by whom. Use DLP to ensure sensitive data is not leaked to the AI platform. Use DLP to block the download of unsafe content from ChatGPT and notify the user. Policy management for both inline and out-of-band DLP is done via Secure Access\u2019s single, unified dashboard, so while it\u2019s tightening security, it\u2019s also keeping things simple for the IT\/security staff. Experience insights increases user productivity and IT efficiency Experience Insights is a set of digital experience monitoring (DEM) capabilities that enables IT\/security teams to improve user productivity by quickly revealing connectivity issues and providing the relevant details for faster resolution. It is embedded into Cisco Secure Access and powered by ThousandEyes functionality \u2014 at no extra cost \u2014 to enable rapid root cause identification and resolution. Experience Insights monitors the health of work-managed endpoints, their underlay and overlay connectivity, and the application performance of top SaaS applications, such as collaboration and productivity platforms. Example Insights: Endpoint performance: CPU, memory, Wi-Fi Network performance: Endpoint to Secure Access to target destination, including local network, user last mile, Internet, and application network Application performance for top SaaS apps, such as Microsoft Office, Salesforce, Gmail, and Notion Collaboration performance scores per user for Cisco Webex, Zoom, and Microsoft Teams View user-specific events based on conditions, such as policy block Because it is a component of Cisco Secure Access, administrators have a single correlated view to manage the connectivity, security, and digital experiences of their workforce \u2014 regardless of where users or issues are located \u2014 to reduce mean-time-to-response (MTTR). This improves user satisfaction and makes administrators, help desk staff, and end users more productive. Experience Insights can be easily expanded to full ThousandEyes licenses with an extended set of monitoring capabilities and data sharing. Identity Intelligence sharpens security In the last year, we\u2019ve seen an upsurge in identity threats that hit many enterprises hard. In light of that, Cisco security is making identity central to its security strategy. We are pioneering new identity intelligence that is all about understanding and managing not only the who and what of access, but also the when, where, and how of interactions. Today, there is blind trust between authentication and access \u2014 a blank space where you can\u2019t easily see and respond to identity behaviors. By closing that space, we\u2019ll be able to move from asking, \u201cCAN the user get access to resource X?\u201d to the more important question, \u201cSHOULD the user get access based on current identity intelligence?\u201d In mid-2024, Secure Access will be using this deep Identity Intelligence to make smarter zero trust access decisions, empowering security teams to defend against identity-based attacks.\u00a0For example, Secure Access will be able to use data from existing identity and access management tools to enable administrators to clean up unused and vulnerable identities that leave a door cracked open for account takeover threats. Identity Intelligence in Secure Access will expose subtle shifts in identity posture by aggregating extended attributes and user behavior factors from a wide range of Cisco and third-party sources. This will give a clear picture of every identity and continuously track changes that empower administrators to create and enforce sophisticated Secure Access policies. This rich identity intelligence will allow your security team to block or challenge unusual identity behaviors based on risk. This could then initiate an incremental reduction in access rights or full session termination, quickly containing the impacts of a compromised identity. Infuse ISE\u2019s identity-based context into Secure Access The integration of Identity Services Engine (ISE) into Secure Access\u2019s VPNaaS capability is the first instantiation of ISE integration across Secure Access that will provide granular, identity-based, posture information to deepen visibility into what users are doing, when, and how. It will enable the administrator to use detailed, identity-based information to make proactive governance decisions (via policy). For example, you can know \u2014 on a per user basis \u2014 the device type used, its location, its state\/posture, is it managed or unmanaged, what\u2019s the time of day, and more. In the future, by using AI analytics, Secure Access will be able to detect anomalies in device posture and identity and then apply the correct policy. The upshot? You will be able to more precisely enforce the right policy, for the right user or device, at the right time. This is just the beginning. Cisco is driving toward common identity across products and capabilities, applied wherever users work, however they connect (wired or wireless), and whatever resources they access. Why Cisco? Scale matters in security, and Cisco has a proven track record with cloud-delivered security solutions. We have over 70 thousand cloud security customers, manage 220 million remote endpoints, and secure over 600 billion web requests per day. We know how to do security at scale. To learn more, register to see a live demo of Cisco Secure Access. We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social! Cisco Security Social Channels InstagramFacebookTwitterLinkedIn Share Share: \"}]]\u00a0\u00a0We're improving Cisco Secure Access by adding functionality that improves end user experience, simplifies security management for IT and tightens security.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/","og_site_name":"JHC","article_published_time":"2024-02-19T22:50:14+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16582047-OmbUrO.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/"},"author":{"name":"","@id":""},"headline":"Cisco Secure Access Accelerates SSE Innovation with AI, User Experience Monitoring, and Identity Intelligence Jeff Scheaffer on February 19, 2024 at 1:00 pm","datePublished":"2024-02-19T22:50:14+00:00","dateModified":"2024-02-19T22:50:14+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/"},"wordCount":1438,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16582047-OmbUrO.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/","url":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/","name":"Cisco Secure Access Accelerates SSE Innovation with AI, User Experience Monitoring, and Identity Intelligence Jeff Scheaffer on February 19, 2024 at 1:00 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16582047-OmbUrO.gif","datePublished":"2024-02-19T22:50:14+00:00","dateModified":"2024-02-19T22:50:14+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16582047-OmbUrO.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/02\/16582047-OmbUrO.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-accelerates-sse-innovation-with-ai-user-experience-monitoring-and-identity-intelligence-jeff-scheaffer-on-february-19-2024-at-100-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Cisco Secure Access Accelerates SSE Innovation with AI, User Experience Monitoring, and Identity Intelligence Jeff Scheaffer on February 19, 2024 at 1:00 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=2452"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2452\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/2453"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=2452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=2452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=2452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}