Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":2786,"date":"2024-03-19T19:53:18","date_gmt":"2024-03-19T19:53:18","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/"},"modified":"2024-03-19T19:53:18","modified_gmt":"2024-03-19T19:53:18","slug":"cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/","title":{"rendered":"Cisco Secure Access named Leader in Zero Trust Network Access Andrew Akers on March 19, 2024 at 12:00 pm"},"content":{"rendered":"

Zero Trust Network Access (ZTNA) is a critical component to increase productivity and reduce risk in today\u2019s hyper-distributed environments. Cisco Secure Access provides a modern form of zero trust a\u2026 Read more on Cisco Blogs<\/a><\/span><\/p>\n

\u200b[[“value”:”<\/p>\n

Zero Trust Network Access (ZTNA) is a critical component to increase productivity and reduce risk in today\u2019s hyper-distributed environments. Cisco Secure Access provides a modern form of zero trust access that utilizes a new architecture to deliver a unique level of security and user convenience.\u00a0\u00a0<\/p>\n

We\u2019re proud to announce that our innovative security service edge (SSE) solution, Cisco Secure Access,<\/a> has been named an Overall Leader in the KuppingerCole Zero Trust Network Access (ZTNA) Leadership Compass. The report highlights Cisco as a leader in all four of the evaluation categories: overall, product, innovation, and market leadership.\u00a0<\/p>\n

Why is ZTNA so important?\u00a0<\/strong><\/h2>\n

Security leaders play a critical role in empowering organizations to connect and protect teams from anywhere, without compromising on security or convenience. ZTNA<\/a> uses least privilege principles, contextual insights, and client or clientless-based methods to deny access by default and only allows access to apps or resources as appropriate.\u00a0\u00a0\u00a0<\/p>\n

\u201cZero Trust Network Access (ZTNA) is becoming increasingly essential as organizations adapt to remote work, cloud adoption, and the growing sophistication of cyber threats. Unlike traditional perimeter-based security models, ZTNA treats every user, application, or resource as untrusted and enforces strict security, access control, and comprehensive auditing to ensure visibility and accountability of all user activities.\u201d-Alejandro Leal, KuppingerCole\u00a0<\/strong><\/h3>\n

Zero trust stands at the forefront of cybersecurity strategies, particularly as organizations navigate the complexities of remote work and increased cloud adoption. Cisco Secure Access offers a security service edge solution that embodies agility, connectivity, intelligence, and strength.\u00a0<\/p>\n

What sets Cisco Secure Access apart?\u00a0<\/strong><\/h2>\n

Recognizing the shift towards distributed and hybrid work models, Cisco Secure Access is engineered to modernize cybersecurity strategies, enabling organizations to implement zero trust with zero friction. It\u2019s forward-looking security architecture that stands resilient against evolving threats.\u00a0\u00a0<\/p>\n

\u201cCisco Secure Access is a compelling case for workforce access, remote work, and hybrid scenarios. It stands out as a leading solution in the realm of Zero Trust for workforce security. Overall, Cisco can deliver remote access security in on-premises, hybrid, and cloud formats. ZTNA capabilities are also available in Cisco Secure Connect, their unified SASE solution which provides the combination of both security and networking functionality.\u201d-Alejandro Leal, KuppingerCole\u00a0<\/strong><\/h3>\n

KuppingerCole\u2019s identity and security analysts have acknowledged the transformative power of Cisco Secure Access, highlighting its comprehensive approach to ZTNA. But Cisco Secure Access is a holistic solution that includes industry-leading ZTNA capabilities and much more, including:\u00a0\u00a0<\/p>\n

Security convergence in the cloud: Get core SSE capabilities, including ZTNA, secure web gateway (SWG), cloud access security broker (CASB), and firewall as-a-service (FWaaS) along with multimode data loss protection (DLP), VPN as a service, DNS security, remote browser isolation (RBI), experience insights (DEM) and sandboxing, all delivered from one dashboard and client.\u00a0\u00a0
\nDefense for users and resources from malware: Secure web gateway inspects web traffic, including encrypted, for protection. Files are scanned, known malicious content is blocked, and unknown files are sandboxed and analyzed. Controls can block specific activities and destinations that violate policy.\u00a0\u00a0
\nInsights that expose shadow IT and protect sensitive data: CASB functionality discovers and controls SaaS cloud apps in use, including generative AI, and reports reputation, compliance, and risk scores. DLP protects against data exfiltration, and cloud malware detection removes infected files.\u00a0\u00a0
\nTraffic monitoring and inspection: Firewall as a service with IPS examines non-web traffic at layers 3\u20137 and blocks threats. The DLP module identifies and blocks inappropriate ChatGPT prompts and replies. Experience insights (DEM) tracks the performance of endpoints, networks, and core SaaS apps for faster issue detection and remediation.\u00a0
\nTalos threat intelligence:
Cisco Talos<\/a>, a leading provider of cutting-edge security research globally, analyses 100s of billions of DNS requests and other telemetry data daily. It continuously runs AI, statistical, and machine learning models against this massive database to provide insight into cyber threats and improve time-to-detection. This helps security practitioners uncover malicious domains, IPs, and URLs before they\u2019re used in attacks and prioritize incident investigations.\u00a0<\/p>\n

Find out more about the leading edge of ZTNA\u00a0<\/strong><\/h2>\n

With Cisco Secure Access, the future of cybersecurity is already here. Join us on this journey and discover how Cisco Secure Access is not just responding to the call for simpler, stronger cybersecurity\u2014it\u2019s answering with a definitive, authoritative voice that resonates across the industry.\u00a0<\/p>\n

The KuppingerCole ZTNA Leadership Compass report can equip decision-makers with a deeper understanding of how ZTNA and Cisco Secure Access can amplify their security posture, reduce risk against sophisticated threats, and shape a robust security strategy for a distributed workforce.\u00a0\u00a0<\/p>\n

Download the report and see firsthand how Cisco Secure Access is redefining the ZTNA landscape with unmatched capabilities that safeguard your organization\u2019s digital future.<\/a>\u00a0\u00a0<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!<\/em><\/p>\n

Cisco Security Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“]]\u00a0\u00a0Discover why the security analysts at KuppingerCole named Cisco Secure Access a Leader in Zero Trust Network Access.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

Zero Trust Network Access (ZTNA) is a critical component to increase productivity and reduce risk in today\u2019s hyper-distributed environments. Cisco Secure Access provides a modern form of zero trust a\u2026 Read more on Cisco Blogs<\/a><\/span><\/p>\n

\u200b[[“value”:”<\/p>\n

Zero Trust Network Access (ZTNA) is a critical component to increase productivity and reduce risk in today\u2019s hyper-distributed environments. Cisco Secure Access provides a modern form of zero trust access that utilizes a new architecture to deliver a unique level of security and user convenience.\u00a0\u00a0<\/p>\n

We\u2019re proud to announce that our innovative security service edge (SSE) solution, Cisco Secure Access,<\/a> has been named an Overall Leader in the KuppingerCole Zero Trust Network Access (ZTNA) Leadership Compass. The report highlights Cisco as a leader in all four of the evaluation categories: overall, product, innovation, and market leadership.\u00a0<\/p>\n

Why is ZTNA so important?\u00a0<\/strong><\/h2>\n

Security leaders play a critical role in empowering organizations to connect and protect teams from anywhere, without compromising on security or convenience. ZTNA<\/a> uses least privilege principles, contextual insights, and client or clientless-based methods to deny access by default and only allows access to apps or resources as appropriate.\u00a0\u00a0\u00a0<\/p>\n

\u201cZero Trust Network Access (ZTNA) is becoming increasingly essential as organizations adapt to remote work, cloud adoption, and the growing sophistication of cyber threats. Unlike traditional perimeter-based security models, ZTNA treats every user, application, or resource as untrusted and enforces strict security, access control, and comprehensive auditing to ensure visibility and accountability of all user activities.\u201d-Alejandro Leal, KuppingerCole\u00a0<\/strong><\/h3>\n

Zero trust stands at the forefront of cybersecurity strategies, particularly as organizations navigate the complexities of remote work and increased cloud adoption. Cisco Secure Access offers a security service edge solution that embodies agility, connectivity, intelligence, and strength.\u00a0<\/p>\n

What sets Cisco Secure Access apart?\u00a0<\/strong><\/h2>\n

Recognizing the shift towards distributed and hybrid work models, Cisco Secure Access is engineered to modernize cybersecurity strategies, enabling organizations to implement zero trust with zero friction. It\u2019s forward-looking security architecture that stands resilient against evolving threats.\u00a0\u00a0<\/p>\n

\u201cCisco Secure Access is a compelling case for workforce access, remote work, and hybrid scenarios. It stands out as a leading solution in the realm of Zero Trust for workforce security. Overall, Cisco can deliver remote access security in on-premises, hybrid, and cloud formats. ZTNA capabilities are also available in Cisco Secure Connect, their unified SASE solution which provides the combination of both security and networking functionality.\u201d-Alejandro Leal, KuppingerCole\u00a0<\/strong><\/h3>\n

KuppingerCole\u2019s identity and security analysts have acknowledged the transformative power of Cisco Secure Access, highlighting its comprehensive approach to ZTNA. But Cisco Secure Access is a holistic solution that includes industry-leading ZTNA capabilities and much more, including:\u00a0\u00a0<\/p>\n

Security convergence in the cloud: Get core SSE capabilities, including ZTNA, secure web gateway (SWG), cloud access security broker (CASB), and firewall as-a-service (FWaaS) along with multimode data loss protection (DLP), VPN as a service, DNS security, remote browser isolation (RBI), experience insights (DEM) and sandboxing, all delivered from one dashboard and client.\u00a0\u00a0
\nDefense for users and resources from malware: Secure web gateway inspects web traffic, including encrypted, for protection. Files are scanned, known malicious content is blocked, and unknown files are sandboxed and analyzed. Controls can block specific activities and destinations that violate policy.\u00a0\u00a0
\nInsights that expose shadow IT and protect sensitive data: CASB functionality discovers and controls SaaS cloud apps in use, including generative AI, and reports reputation, compliance, and risk scores. DLP protects against data exfiltration, and cloud malware detection removes infected files.\u00a0\u00a0
\nTraffic monitoring and inspection: Firewall as a service with IPS examines non-web traffic at layers 3\u20137 and blocks threats. The DLP module identifies and blocks inappropriate ChatGPT prompts and replies. Experience insights (DEM) tracks the performance of endpoints, networks, and core SaaS apps for faster issue detection and remediation.\u00a0
\nTalos threat intelligence:
Cisco Talos<\/a>, a leading provider of cutting-edge security research globally, analyses 100s of billions of DNS requests and other telemetry data daily. It continuously runs AI, statistical, and machine learning models against this massive database to provide insight into cyber threats and improve time-to-detection. This helps security practitioners uncover malicious domains, IPs, and URLs before they\u2019re used in attacks and prioritize incident investigations.\u00a0<\/p>\n

Find out more about the leading edge of ZTNA\u00a0<\/strong><\/h2>\n

With Cisco Secure Access, the future of cybersecurity is already here. Join us on this journey and discover how Cisco Secure Access is not just responding to the call for simpler, stronger cybersecurity\u2014it\u2019s answering with a definitive, authoritative voice that resonates across the industry.\u00a0<\/p>\n

The KuppingerCole ZTNA Leadership Compass report can equip decision-makers with a deeper understanding of how ZTNA and Cisco Secure Access can amplify their security posture, reduce risk against sophisticated threats, and shape a robust security strategy for a distributed workforce.\u00a0\u00a0<\/p>\n

Download the report and see firsthand how Cisco Secure Access is redefining the ZTNA landscape with unmatched capabilities that safeguard your organization\u2019s digital future.<\/a>\u00a0\u00a0<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!<\/em><\/p>\n

Cisco Security Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“]]\u00a0\u00a0Discover why the security analysts at KuppingerCole named Cisco Secure Access a Leader in Zero Trust Network Access.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":2787,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2786","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nCisco Secure Access named Leader in Zero Trust Network Access Andrew Akers on March 19, 2024 at 12:00 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cisco Secure Access named Leader in Zero Trust Network Access Andrew Akers on March 19, 2024 at 12:00 pm\" \/>\n<meta property=\"og:description\" content=\"Zero Trust Network Access (ZTNA) is a critical component to increase productivity and reduce risk in today\u2019s hyper-distributed environments. Cisco Secure Access provides a modern form of zero trust a\u2026 Read more on Cisco Blogs \u200b[["value":" Zero Trust Network Access (ZTNA) is a critical component to increase productivity and reduce risk in today\u2019s hyper-distributed environments. Cisco Secure Access provides a modern form of zero trust access that utilizes a new architecture to deliver a unique level of security and user convenience.\u00a0\u00a0 We\u2019re proud to announce that our innovative security service edge (SSE) solution, Cisco Secure Access, has been named an Overall Leader in the KuppingerCole Zero Trust Network Access (ZTNA) Leadership Compass. The report highlights Cisco as a leader in all four of the evaluation categories: overall, product, innovation, and market leadership.\u00a0 Why is ZTNA so important?\u00a0 Security leaders play a critical role in empowering organizations to connect and protect teams from anywhere, without compromising on security or convenience. ZTNA uses least privilege principles, contextual insights, and client or clientless-based methods to deny access by default and only allows access to apps or resources as appropriate.\u00a0\u00a0\u00a0 \u201cZero Trust Network Access (ZTNA) is becoming increasingly essential as organizations adapt to remote work, cloud adoption, and the growing sophistication of cyber threats. Unlike traditional perimeter-based security models, ZTNA treats every user, application, or resource as untrusted and enforces strict security, access control, and comprehensive auditing to ensure visibility and accountability of all user activities.\u201d-Alejandro Leal, KuppingerCole\u00a0 Zero trust stands at the forefront of cybersecurity strategies, particularly as organizations navigate the complexities of remote work and increased cloud adoption. Cisco Secure Access offers a security service edge solution that embodies agility, connectivity, intelligence, and strength.\u00a0 What sets Cisco Secure Access apart?\u00a0 Recognizing the shift towards distributed and hybrid work models, Cisco Secure Access is engineered to modernize cybersecurity strategies, enabling organizations to implement zero trust with zero friction. It\u2019s forward-looking security architecture that stands resilient against evolving threats.\u00a0\u00a0 \u201cCisco Secure Access is a compelling case for workforce access, remote work, and hybrid scenarios. It stands out as a leading solution in the realm of Zero Trust for workforce security. Overall, Cisco can deliver remote access security in on-premises, hybrid, and cloud formats. ZTNA capabilities are also available in Cisco Secure Connect, their unified SASE solution which provides the combination of both security and networking functionality.\u201d-Alejandro Leal, KuppingerCole\u00a0 KuppingerCole\u2019s identity and security analysts have acknowledged the transformative power of Cisco Secure Access, highlighting its comprehensive approach to ZTNA. But Cisco Secure Access is a holistic solution that includes industry-leading ZTNA capabilities and much more, including:\u00a0\u00a0 Security convergence in the cloud: Get core SSE capabilities, including ZTNA, secure web gateway (SWG), cloud access security broker (CASB), and firewall as-a-service (FWaaS) along with multimode data loss protection (DLP), VPN as a service, DNS security, remote browser isolation (RBI), experience insights (DEM) and sandboxing, all delivered from one dashboard and client.\u00a0\u00a0 Defense for users and resources from malware: Secure web gateway inspects web traffic, including encrypted, for protection. Files are scanned, known malicious content is blocked, and unknown files are sandboxed and analyzed. Controls can block specific activities and destinations that violate policy.\u00a0\u00a0 Insights that expose shadow IT and protect sensitive data: CASB functionality discovers and controls SaaS cloud apps in use, including generative AI, and reports reputation, compliance, and risk scores. DLP protects against data exfiltration, and cloud malware detection removes infected files.\u00a0\u00a0 Traffic monitoring and inspection: Firewall as a service with IPS examines non-web traffic at layers 3\u20137 and blocks threats. The DLP module identifies and blocks inappropriate ChatGPT prompts and replies. Experience insights (DEM) tracks the performance of endpoints, networks, and core SaaS apps for faster issue detection and remediation.\u00a0 Talos threat intelligence: Cisco Talos, a leading provider of cutting-edge security research globally, analyses 100s of billions of DNS requests and other telemetry data daily. It continuously runs AI, statistical, and machine learning models against this massive database to provide insight into cyber threats and improve time-to-detection. This helps security practitioners uncover malicious domains, IPs, and URLs before they\u2019re used in attacks and prioritize incident investigations.\u00a0 Find out more about the leading edge of ZTNA\u00a0 With Cisco Secure Access, the future of cybersecurity is already here. Join us on this journey and discover how Cisco Secure Access is not just responding to the call for simpler, stronger cybersecurity\u2014it\u2019s answering with a definitive, authoritative voice that resonates across the industry.\u00a0 The KuppingerCole ZTNA Leadership Compass report can equip decision-makers with a deeper understanding of how ZTNA and Cisco Secure Access can amplify their security posture, reduce risk against sophisticated threats, and shape a robust security strategy for a distributed workforce.\u00a0\u00a0 Download the report and see firsthand how Cisco Secure Access is redefining the ZTNA landscape with unmatched capabilities that safeguard your organization\u2019s digital future.\u00a0\u00a0 We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social! Cisco Security Social Channels InstagramFacebookTwitterLinkedIn Share Share: "]]\u00a0\u00a0Discover why the security analysts at KuppingerCole named Cisco Secure Access a Leader in Zero Trust Network Access.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-19T19:53:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16624412-zx6MtN.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Cisco Secure Access named Leader in Zero Trust Network Access Andrew Akers on March 19, 2024 at 12:00 pm\",\"datePublished\":\"2024-03-19T19:53:18+00:00\",\"dateModified\":\"2024-03-19T19:53:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/\"},\"wordCount\":878,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16624412-zx6MtN.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/\",\"name\":\"Cisco Secure Access named Leader in Zero Trust Network Access Andrew Akers on March 19, 2024 at 12:00 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16624412-zx6MtN.gif\",\"datePublished\":\"2024-03-19T19:53:18+00:00\",\"dateModified\":\"2024-03-19T19:53:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16624412-zx6MtN.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16624412-zx6MtN.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cisco Secure Access named Leader in Zero Trust Network Access Andrew Akers on March 19, 2024 at 12:00 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cisco Secure Access named Leader in Zero Trust Network Access Andrew Akers on March 19, 2024 at 12:00 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/","og_locale":"en_US","og_type":"article","og_title":"Cisco Secure Access named Leader in Zero Trust Network Access Andrew Akers on March 19, 2024 at 12:00 pm","og_description":"Zero Trust Network Access (ZTNA) is a critical component to increase productivity and reduce risk in today\u2019s hyper-distributed environments. Cisco Secure Access provides a modern form of zero trust a\u2026 Read more on Cisco Blogs \u200b[[\"value\":\" Zero Trust Network Access (ZTNA) is a critical component to increase productivity and reduce risk in today\u2019s hyper-distributed environments. Cisco Secure Access provides a modern form of zero trust access that utilizes a new architecture to deliver a unique level of security and user convenience.\u00a0\u00a0 We\u2019re proud to announce that our innovative security service edge (SSE) solution, Cisco Secure Access, has been named an Overall Leader in the KuppingerCole Zero Trust Network Access (ZTNA) Leadership Compass. The report highlights Cisco as a leader in all four of the evaluation categories: overall, product, innovation, and market leadership.\u00a0 Why is ZTNA so important?\u00a0 Security leaders play a critical role in empowering organizations to connect and protect teams from anywhere, without compromising on security or convenience. ZTNA uses least privilege principles, contextual insights, and client or clientless-based methods to deny access by default and only allows access to apps or resources as appropriate.\u00a0\u00a0\u00a0 \u201cZero Trust Network Access (ZTNA) is becoming increasingly essential as organizations adapt to remote work, cloud adoption, and the growing sophistication of cyber threats. Unlike traditional perimeter-based security models, ZTNA treats every user, application, or resource as untrusted and enforces strict security, access control, and comprehensive auditing to ensure visibility and accountability of all user activities.\u201d-Alejandro Leal, KuppingerCole\u00a0 Zero trust stands at the forefront of cybersecurity strategies, particularly as organizations navigate the complexities of remote work and increased cloud adoption. Cisco Secure Access offers a security service edge solution that embodies agility, connectivity, intelligence, and strength.\u00a0 What sets Cisco Secure Access apart?\u00a0 Recognizing the shift towards distributed and hybrid work models, Cisco Secure Access is engineered to modernize cybersecurity strategies, enabling organizations to implement zero trust with zero friction. It\u2019s forward-looking security architecture that stands resilient against evolving threats.\u00a0\u00a0 \u201cCisco Secure Access is a compelling case for workforce access, remote work, and hybrid scenarios. It stands out as a leading solution in the realm of Zero Trust for workforce security. Overall, Cisco can deliver remote access security in on-premises, hybrid, and cloud formats. ZTNA capabilities are also available in Cisco Secure Connect, their unified SASE solution which provides the combination of both security and networking functionality.\u201d-Alejandro Leal, KuppingerCole\u00a0 KuppingerCole\u2019s identity and security analysts have acknowledged the transformative power of Cisco Secure Access, highlighting its comprehensive approach to ZTNA. But Cisco Secure Access is a holistic solution that includes industry-leading ZTNA capabilities and much more, including:\u00a0\u00a0 Security convergence in the cloud: Get core SSE capabilities, including ZTNA, secure web gateway (SWG), cloud access security broker (CASB), and firewall as-a-service (FWaaS) along with multimode data loss protection (DLP), VPN as a service, DNS security, remote browser isolation (RBI), experience insights (DEM) and sandboxing, all delivered from one dashboard and client.\u00a0\u00a0 Defense for users and resources from malware: Secure web gateway inspects web traffic, including encrypted, for protection. Files are scanned, known malicious content is blocked, and unknown files are sandboxed and analyzed. Controls can block specific activities and destinations that violate policy.\u00a0\u00a0 Insights that expose shadow IT and protect sensitive data: CASB functionality discovers and controls SaaS cloud apps in use, including generative AI, and reports reputation, compliance, and risk scores. DLP protects against data exfiltration, and cloud malware detection removes infected files.\u00a0\u00a0 Traffic monitoring and inspection: Firewall as a service with IPS examines non-web traffic at layers 3\u20137 and blocks threats. The DLP module identifies and blocks inappropriate ChatGPT prompts and replies. Experience insights (DEM) tracks the performance of endpoints, networks, and core SaaS apps for faster issue detection and remediation.\u00a0 Talos threat intelligence: Cisco Talos, a leading provider of cutting-edge security research globally, analyses 100s of billions of DNS requests and other telemetry data daily. It continuously runs AI, statistical, and machine learning models against this massive database to provide insight into cyber threats and improve time-to-detection. This helps security practitioners uncover malicious domains, IPs, and URLs before they\u2019re used in attacks and prioritize incident investigations.\u00a0 Find out more about the leading edge of ZTNA\u00a0 With Cisco Secure Access, the future of cybersecurity is already here. Join us on this journey and discover how Cisco Secure Access is not just responding to the call for simpler, stronger cybersecurity\u2014it\u2019s answering with a definitive, authoritative voice that resonates across the industry.\u00a0 The KuppingerCole ZTNA Leadership Compass report can equip decision-makers with a deeper understanding of how ZTNA and Cisco Secure Access can amplify their security posture, reduce risk against sophisticated threats, and shape a robust security strategy for a distributed workforce.\u00a0\u00a0 Download the report and see firsthand how Cisco Secure Access is redefining the ZTNA landscape with unmatched capabilities that safeguard your organization\u2019s digital future.\u00a0\u00a0 We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social! Cisco Security Social Channels InstagramFacebookTwitterLinkedIn Share Share: \"]]\u00a0\u00a0Discover why the security analysts at KuppingerCole named Cisco Secure Access a Leader in Zero Trust Network Access.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/","og_site_name":"JHC","article_published_time":"2024-03-19T19:53:18+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16624412-zx6MtN.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/"},"author":{"name":"","@id":""},"headline":"Cisco Secure Access named Leader in Zero Trust Network Access Andrew Akers on March 19, 2024 at 12:00 pm","datePublished":"2024-03-19T19:53:18+00:00","dateModified":"2024-03-19T19:53:18+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/"},"wordCount":878,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16624412-zx6MtN.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/","url":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/","name":"Cisco Secure Access named Leader in Zero Trust Network Access Andrew Akers on March 19, 2024 at 12:00 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16624412-zx6MtN.gif","datePublished":"2024-03-19T19:53:18+00:00","dateModified":"2024-03-19T19:53:18+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16624412-zx6MtN.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16624412-zx6MtN.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/cisco-secure-access-named-leader-in-zero-trust-network-access-andrew-akers-on-march-19-2024-at-1200-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Cisco Secure Access named Leader in Zero Trust Network Access Andrew Akers on March 19, 2024 at 12:00 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2786","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=2786"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2786\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/2787"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=2786"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=2786"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=2786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}