Cisco Secure Access is a converged cloud Security Service Edge (SSE) solution that is better for users, easier for IT, and safer for everyone. It enforces modern cybersecurity while providing a seamless and frictionless experience as users connect from anything to anywhere, via a common access approach.
Cisco Secure Access simplifies IT and InfoSec operations through a single, cloud-managed console, unified client, centralized policy creation, and aggregated reporting. Cisco Secure Access extensive security capabilities include:
Clientless Zero Trust Network Access (ZTNA)
Client Zero Trust Network Access (ZTNA)
VPN as a Service (VPNaaS)
Digital Experience Monitoring (DEM)
Firewall as a Service (FWaaS)
Intrusion Prevention System (IPS)
Domain Name System (DNS) Security
Secure Web Gateway (SWG)
Multimode Malware Protection
Cloud Access Security Broker (CASB)
Data Loss Prevention (DLP)
Remote Browser Isolation (RBI)
The future of network security is evolving to a modern, more dynamic IT architecture born in the cloud. IT Teams have more users, devices, applications, and data to secure than ever before, and existing security models are falling short. With the rapid rise in remote and hybrid workers, organizations need a more efficient and secure way to connect users from wherever they are, to the internet, SaaS apps, and private applications. As a result, security teams are transitioning from a traditional decentralized security approach to a more centralized cloud-based security architecture.
Join one of our Cisco Secure Access hands-on workshops to gain insight into new zero trust technology innovations that can vastly improve your security efficacy. You’ll leave with a clear understanding of how Cisco’s zero trust SSE solution can de-risk your environment with more granular controls, deliver a human-centric experience, and simplify IT operations.
The goal of this dCloud hands-on lab environment and set of scenarios is to provide a Field Engineer or Advanced Systems Engineer with the skills and methodology required to successfully install and configure XDR.
By completing the lab scenarios included, you will prepare yourself for any upcoming XDR related customer implementations, Proof-of-Concept/Proof-of-Value (POC/POV) installations, or customer demonstrations.
The lab scenarios will provide you with the required XDR knowledge by walking you through successful integration of multiple data sources, configuration of the XDR console, as well as additional device configuration that may be required within a customer environment.
Once you have completed all lab scenarios, you should be familiar with the deployment of XDR prior to performing these tasks in a customer’s production environment.
In this course you will learn how to go from zero to SASE! Best of all, you're going to get some hands on practice with:
- Cisco Umbrella
- Cisco Secure Endpoint
- Cisco AnyConnect Secure Mobility Client
- Cisco SD-WAN powered by Viptela
- Cisco SD-WAN powered by Meraki
- Cisco ThousandEyes
In this course you will learn how to go from zero to SASE! Best of all, you're going to get some hands on practice with:
This lab will focus on Umbrella's SASE capabilities. You will be deploying Umbrella from DNS to SWG. We'll utilize Cisco's dCloud environment to provide you with all the components you need to deploy Umbrella using a SASE architecture.
Cisco Secure Workload (formerly Tetration) seamlessly delivers zero-trust microsegmentation across any workload, environment, or location from a single console.
In the lab, Cisco Secure Workload is used to
protect invoice application- SIWAPP, using Zero Trust micro segmentation.
Agents are pre-installed on the workloads making up the application. Secure
Workload automatically discover and suggest segmentation policies based on
traffic flows. Utilizing an agent, Secure Workload provides visibility into the
application workload runtime, enabling the detection of vulnerable packages and
vulnerable container images
Stay Ahead of Attackers
Cyber threats move fast—can you respond even faster? Join our Rapid Incident Response Workshop and master the art of detecting and neutralizing threats in minutes, not weeks. Get hands-on with Cisco XDR, tackle live threat scenarios, sharpen your threat triage skills, and connect with cybersecurity experts. Whether you're in IT, security operations, or threat hunting, this workshop will arm you with the tools and insights to stay ahead of cyber adversaries. Don't just react—hunt threats with confidence!