<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Casb on Security in 45 | Cisco Security Podcast</title><link>https://www.securityin45.com/tags/casb/</link><description>Recent content in Casb on Security in 45 | Cisco Security Podcast</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.securityin45.com/tags/casb/index.xml" rel="self" type="application/rss+xml"/><item><title>SASE vs SSE vs ZTNA: Understanding the Key Differences</title><link>https://www.securityin45.com/blog/2026-03-30-sase-vs-sse-vs-ztna-comparison/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2026-03-30-sase-vs-sse-vs-ztna-comparison/</guid><description>&lt;p&gt;If you have spent any time evaluating modern security architectures, you have probably run into a wall of overlapping acronyms: SASE, SSE, ZTNA, SWG, CASB, DLP. Each vendor defines them slightly differently, analyst firms keep refining the categories, and the marketing noise makes it genuinely difficult to understand what you actually need to buy, build, or migrate toward.&lt;/p&gt;
&lt;p&gt;The confusion is not accidental. These frameworks evolved over several years as Gartner and other analysts tried to keep pace with how organizations were shifting from on-premises data centers to cloud-first, hybrid workforces. The result is a set of nested concepts that are easy to conflate but critical to distinguish when you are making architecture and procurement decisions.&lt;/p&gt;</description></item><item><title>Endpoint Detection and Response: Zero Trust Security With Cisco</title><link>https://www.securityin45.com/blog/2024-10-02-securing-the-endpoint-user-with-chad-buey-and-eric-howard/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-securing-the-endpoint-user-with-chad-buey-and-eric-howard/</guid><description>&lt;pre&gt;&lt;code&gt; Endpoint security has evolved from a simple antivirus checkbox into a critical battleground in modern cybersecurity defense. With attacks becoming increasingly sophisticated—from fileless malware to zero-day exploits—organizations can no longer rely on traditional perimeter defenses alone. The shift toward [zero trust](/pillars/zero-trust/) security principles means every endpoint must be verified, monitored, and controlled, regardless of whether it's in the office, at home, or anywhere in between. In this episode, Mike and Andres explore how Cisco Secure Endpoint addresses these challenges with a comprehensive platform that combines prevention, detection, and response capabilities into a single, integrated solution.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Endpoint Detection and Response (EDR)&lt;/strong&gt; — How advanced threat detection works beyond signature-based detection&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Endpoint Protection Platform (EPP)&lt;/strong&gt; — Real-time malware and ransomware protection capabilities&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust Security&lt;/strong&gt; — The principles behind modern endpoint security architecture&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vulnerability Management&lt;/strong&gt; — Identifying and prioritizing endpoint vulnerabilities for patching&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Data Loss Prevention (&lt;a href="https://www.securityin45.com/glossary/"&gt;DLP&lt;/a&gt;)&lt;/strong&gt; — Protecting sensitive data from exfiltration&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Network Access Control (NAC)&lt;/strong&gt; — Enforcing device health and identity-based access policies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Centralized Management&lt;/strong&gt; — Unified administration and visibility across endpoint fleets&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Integration Strategy&lt;/strong&gt; — How Cisco Secure Endpoint works within a broader security ecosystem&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="endpoint-protection-platform-the-first-line-of-defense"&gt;Endpoint Protection Platform: The First Line of Defense&lt;/h3&gt;
&lt;p&gt;An Endpoint Protection Platform (EPP) is the foundational layer of endpoint security, designed to prevent threats from ever executing on your devices. Think of it as your security team&amp;rsquo;s first checkpoint—it examines files, processes, and network communications in real time to block known malware, viruses, and ransomware before they can cause damage.&lt;/p&gt;</description></item><item><title>Zero Trust Network Access: Cisco Secure Access Explained</title><link>https://www.securityin45.com/blog/2024-10-02-secure-access-with-david-keller-and-justin-murphy/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-secure-access-with-david-keller-and-justin-murphy/</guid><description>&lt;pre&gt;&lt;code&gt; The traditional perimeter-based security model is dead. As organizations embrace hybrid work, cloud-first strategies, and multi-device workforces, the old castle-and-moat approach simply doesn't cut it anymore. [Zero Trust](/pillars/zero-trust/) Network Access has emerged as the gold standard for modern enterprise security, but understanding how to implement it effectively requires grappling with complex architectural concepts and integration challenges. This episode dives deep into how Cisco Secure Access brings Zero Trust principles to life through an integrated platform that assumes no user or device is trustworthy by default.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cisco Secure Services Edge (SSE):&lt;/strong&gt; The foundational platform combining network access control (NAC), identity-based access control (IBAC), and endpoint security&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Secure Web Gateway (SWG):&lt;/strong&gt; Web-based threat protection against malware, phishing, and ransomware&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cloud Access Security Broker (&lt;a href="https://www.securityin45.com/glossary/"&gt;CASB&lt;/a&gt;):&lt;/strong&gt; Safeguarding cloud applications and data from unauthorized access&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust Network Access (ZTNA):&lt;/strong&gt; Identity and device posture-based access control regardless of user location&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Secure Internet Gateway (SIG):&lt;/strong&gt; Defense against internet-based threats including DDoS and APTs&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Integration and ecosystem:&lt;/strong&gt; How Cisco Secure Access works seamlessly with other Cisco security solutions&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-cisco-secure-services-edge-sse"&gt;Understanding Cisco Secure Services Edge (SSE)&lt;/h3&gt;
&lt;p&gt;Cisco SSE represents a fundamental shift in how organizations think about network security. Rather than relying on IP addresses and network location to determine trust, SSE implements a multi-layered approach that evaluates every access request based on multiple factors.&lt;/p&gt;</description></item><item><title>Zero Trust Security Strategy: Expert Insights on Implementation</title><link>https://www.securityin45.com/blog/2024-10-02-xdr-with-briana-farro-nate-austin-and-matt-robertson/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-xdr-with-briana-farro-nate-austin-and-matt-robertson/</guid><description>&lt;pre&gt;&lt;code&gt; In an era where traditional perimeter-based security has become obsolete, organizations are racing to adopt a fundamentally different approach to protecting their digital assets. [Zero trust](/pillars/zero-trust/) security—a concept that's been around for over two decades—has finally moved from industry buzzword to business imperative, especially as remote work, cloud migration, and sophisticated threat actors have rendered castle-and-moat security architectures dangerously ineffective. But implementing zero trust isn't about buying a single product or flipping a switch; it's a strategic journey that requires careful planning, the right mix of technologies, and a commitment to continuous improvement. In this episode of Security in 45, hosts Mike Veedock and Andres Sarmiento explore what zero trust really means, how to approach implementation, and the critical technologies that make it work in practice.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The origins and evolution of zero trust as an industry concept&lt;/li&gt;
&lt;li&gt;Why zero trust is fundamentally different from traditional security models&lt;/li&gt;
&lt;li&gt;The role of multi-factor authentication (MFA) in zero trust strategies&lt;/li&gt;
&lt;li&gt;Endpoint protection and network segmentation as core pillars&lt;/li&gt;
&lt;li&gt;Real-world examples of zero trust in consumer and enterprise contexts&lt;/li&gt;
&lt;li&gt;The importance of balancing security with user experience&lt;/li&gt;
&lt;li&gt;Why a multi-vendor approach is essential to comprehensive zero trust deployment&lt;/li&gt;
&lt;li&gt;Practical considerations for planning and implementing zero trust initiatives&lt;/li&gt;
&lt;li&gt;Common pitfalls and how to avoid rushing implementation&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-zero-trust-beyond-the-buzzword"&gt;Understanding Zero Trust: Beyond the Buzzword&lt;/h3&gt;
&lt;p&gt;Zero trust isn&amp;rsquo;t a new invention—the concept emerged more than 20 years ago as security professionals recognized that the traditional model of &amp;ldquo;trust but verify&amp;rdquo; was fundamentally flawed. In a zero trust framework, the basic assumption is inverted: &lt;em&gt;nothing&lt;/em&gt; is trusted by default, whether it originates from inside or outside the network perimeter. Every access request, every user, every device, and every application must be verified and validated before granting access.&lt;/p&gt;</description></item></channel></rss>