Saturday, February 7, 2026
HomeHealthcareDynamic use of identification, conduct, & posture knowledge in SSE

Dynamic use of identification, conduct, & posture knowledge in SSE

Cisco Safe Entry brings adaptive, contextual, identity-driven safety to each connection.

Safety used to start out with IP addresses and finish with firewall guidelines. That world is historical past.

At present, IPs are disposable, units roam, and customers spin up from wherever on the planet. But many SSE options nonetheless deal with safety as primarily a community concern and don’t adequately embrace identification as foundational.

Cisco’s altering that. Identification is the brand new perimeter, and with Cisco Identification Intelligence, Safe Entry brings steady, adaptive entry selections to each consumer, gadget, and utility.

Most SSE platforms assume a consumer is only a login. Authenticate as soon as, and also you’re good for the session. However identification and identity-based dangers aren’t static. Belief ranges shift. Person conduct fluctuates. Posture modifications. Threat will increase. Attackers love to cover behind trusted credentials that haven’t been adjusted to replicate these dynamic modifications.

A non-identity-aware SSE can’t sustain as a result of it treats identification as static versus a residing sign. It fails to correlate indicators from logins, behaviors, and units that deviate from typical patterns or tips.

When identification, conduct, and posture verifications keep static, attackers transfer quicker.

Cisco Safe Entry integrates with Cisco Identification Intelligence (CII) to make SSE identity-focused, risk-aware and self-adjusting. Insurance policies can allow entry selections to evolve dynamically based mostly on dwell identification knowledge, not guesswork.

In September of this yr, Cisco prolonged Safe Entry integration with CII past consumer belief ranges being seen within the Safe Entry dashboard. Insurance policies for ZTNA-protected personal visitors can now outline when a consumer’s entry ought to be blocked or reauthenticated, based mostly on a consumer belief profile that adjusts dynamically with consumer conduct and posture. For instance, a coverage could outline that when a consumer’s belief stage is untrusted, entry ought to be blocked.

As a safeguard, directors have the choice to bypass blocking an untrusted consumer, for a selected period of time. Think about an government who’s touring to a convention. She connects to an airport Wi-Fi community which she doesn’t usually use, with an IP handle that’s questionable, to log right into a delicate/important utility, and she or he lately needed to reset her password.

These occasions mixed would make her seem “untrusted.” This feature permits an administrator to bypass the block, restore the manager’s entry, so she will proceed her convention actions.

The administrator could allow, for all ZTNA-protected personal visitors, a functionality that prompts reauthentication in line with consumer belief stage. At decrease consumer belief ranges, reauthentication will happen extra continuously. For instance, let’s say a consumer doing her work and has a belief stage of “favorable,” however over time, conduct or posture modifications trigger her belief stage to lower to “impartial.” This might immediate her reauthentication to happen extra continuously.

With this functionality, Safe Entry is more and more utilizing dynamic belief knowledge to counterpoint the group’s potential to implement least-privilege entry controls, heighten safety, and scale back threat.

Safe Entry’s Person and Entity Habits Analytics (UEBA), additionally accessible in September this yr, can detect anomalous file operations and unattainable journey that might point out an insider menace. That menace could come from an precise insider with malicious intent or an outsider impersonating a legitimate consumer.

Directors can set Safe Entry insurance policies to detect when file uploads, downloads, or deletes exceed the extent deemed acceptable for a corporation. Moreover, Safe Entry can detect unattainable journey, akin to a consumer making an attempt to login from San Jose and Paris at instances that aren’t attainable, suggesting a stolen credential.

Directors now have clear visibility into these dangerous behaviors that will point out account compromise or malicious conduct through detailed UEBA studies and “high dangerous customers” within the dashboard important display screen.

We are going to proceed increasing UEBA such that sooner or later, the behavioral/analytics knowledge will inform automated motion (as chosen by the client and outlined in coverage) to extend safety safety.

Cisco Safe Entry steady gadget posture function, launched in September, allows organizations to detect any discount in endpoint posture compliance throughout a dwell session and shortly react by ending the session to keep away from undue threat. For instance, if the native firewall is disabled half approach by means of a session, Safe Entry will determine the motion and might routinely terminate the session.

This functionality gives a fast response to any change that represents an elevated endpoint threat in the course of ongoing consumer actions.  The detection and adaptive response are captured and introduced within the consumer’s exercise logs for directors.

At present, Safe Entry is enriched with identification intelligence, consumer and entity conduct analytics (UEBA), and steady gadget posture evaluation. Organizations can profit now from highly effective options—akin to insurance policies that modify entry based mostly on belief profiles, detection of anomalous consumer conduct, and automatic responses to dangerous gadget modifications—empowering them to implement granular, risk-aware safety at scale.

Wanting forward, continued Cisco innovation will convey these capabilities nearer collectively, leading to ever-more refined adaptive entry controls that enhance the flexibility to reply swiftly to threats, tailor entry insurance policies for evolving safety wants, and scale back enterprise threat. Our dedication to enriching Safe Entry functionality is unwavering, as is our dedication to assist our prospects stay a step (or two or three steps) forward in right this moment’s dynamic menace panorama.

Click on right here to study extra about Safe Entry and its many capabilities.


We’d love to listen to what you suppose! Ask a query and keep related with Cisco Safety on social media.

Cisco Safety Social Media

LinkedIn
Fb
Instagram
X


RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments