<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Secure-Access on Security in 45 | Cisco Security Podcast</title><link>https://www.securityin45.com/tags/secure-access/</link><description>Recent content in Secure-Access on Security in 45 | Cisco Security Podcast</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://www.securityin45.com/tags/secure-access/index.xml" rel="self" type="application/rss+xml"/><item><title>SASE vs SSE vs ZTNA: Understanding the Key Differences</title><link>https://www.securityin45.com/blog/2026-03-30-sase-vs-sse-vs-ztna-comparison/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2026-03-30-sase-vs-sse-vs-ztna-comparison/</guid><description>&lt;p&gt;If you have spent any time evaluating modern security architectures, you have probably run into a wall of overlapping acronyms: SASE, SSE, ZTNA, SWG, CASB, DLP. Each vendor defines them slightly differently, analyst firms keep refining the categories, and the marketing noise makes it genuinely difficult to understand what you actually need to buy, build, or migrate toward.&lt;/p&gt;
&lt;p&gt;The confusion is not accidental. These frameworks evolved over several years as Gartner and other analysts tried to keep pace with how organizations were shifting from on-premises data centers to cloud-first, hybrid workforces. The result is a set of nested concepts that are easy to conflate but critical to distinguish when you are making architecture and procurement decisions.&lt;/p&gt;</description></item><item><title>Zero Trust Architecture: Cisco Secure Access Simplification</title><link>https://www.securityin45.com/blog/2024-11-01-s2-e2-simplicity-with-sse-cisco-secure-access-discussion-with-david-keller-and-j/</link><pubDate>Fri, 01 Nov 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-11-01-s2-e2-simplicity-with-sse-cisco-secure-access-discussion-with-david-keller-and-j/</guid><description>&lt;pre&gt;&lt;code&gt; # Zero Trust Architecture: Cisco Secure Access Simplification
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;In an era where remote work, hybrid cloud deployments, and encrypted traffic have become the norm, enterprise security teams face an unprecedented challenge: how do you maintain robust &lt;a href="https://www.securityin45.com/pillars/zero-trust/"&gt;zero trust&lt;/a&gt; access controls without overwhelming administrators and end users with complexity? Cisco&amp;rsquo;s Secure Access and User Suite represents a significant step toward solving this problem by consolidating multiple security tools and connectivity solutions into a unified platform. In a recent episode of Security in 45, hosts Mike Veedock and Andres Sarmiento explored the latest updates and vision for this platform, revealing how organizations can simplify their security posture while maintaining the strict access controls that zero trust demands.&lt;/p&gt;</description></item><item><title>Zero Trust Network Access: Cisco Secure Access Explained</title><link>https://www.securityin45.com/blog/2024-10-02-secure-access-with-david-keller-and-justin-murphy/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-secure-access-with-david-keller-and-justin-murphy/</guid><description>&lt;pre&gt;&lt;code&gt; The traditional perimeter-based security model is dead. As organizations embrace hybrid work, cloud-first strategies, and multi-device workforces, the old castle-and-moat approach simply doesn't cut it anymore. [Zero Trust](/pillars/zero-trust/) Network Access has emerged as the gold standard for modern enterprise security, but understanding how to implement it effectively requires grappling with complex architectural concepts and integration challenges. This episode dives deep into how Cisco Secure Access brings Zero Trust principles to life through an integrated platform that assumes no user or device is trustworthy by default.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cisco Secure Services Edge (SSE):&lt;/strong&gt; The foundational platform combining network access control (NAC), identity-based access control (IBAC), and endpoint security&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Secure Web Gateway (SWG):&lt;/strong&gt; Web-based threat protection against malware, phishing, and ransomware&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Cloud Access Security Broker (&lt;a href="https://www.securityin45.com/glossary/"&gt;CASB&lt;/a&gt;):&lt;/strong&gt; Safeguarding cloud applications and data from unauthorized access&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Zero Trust Network Access (ZTNA):&lt;/strong&gt; Identity and device posture-based access control regardless of user location&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Secure Internet Gateway (SIG):&lt;/strong&gt; Defense against internet-based threats including DDoS and APTs&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Integration and ecosystem:&lt;/strong&gt; How Cisco Secure Access works seamlessly with other Cisco security solutions&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-cisco-secure-services-edge-sse"&gt;Understanding Cisco Secure Services Edge (SSE)&lt;/h3&gt;
&lt;p&gt;Cisco SSE represents a fundamental shift in how organizations think about network security. Rather than relying on IP addresses and network location to determine trust, SSE implements a multi-layered approach that evaluates every access request based on multiple factors.&lt;/p&gt;</description></item><item><title>Zero Trust Security Strategy: Expert Insights on Implementation</title><link>https://www.securityin45.com/blog/2024-10-02-xdr-with-briana-farro-nate-austin-and-matt-robertson/</link><pubDate>Wed, 02 Oct 2024 00:00:00 +0000</pubDate><guid>https://www.securityin45.com/blog/2024-10-02-xdr-with-briana-farro-nate-austin-and-matt-robertson/</guid><description>&lt;pre&gt;&lt;code&gt; In an era where traditional perimeter-based security has become obsolete, organizations are racing to adopt a fundamentally different approach to protecting their digital assets. [Zero trust](/pillars/zero-trust/) security—a concept that's been around for over two decades—has finally moved from industry buzzword to business imperative, especially as remote work, cloud migration, and sophisticated threat actors have rendered castle-and-moat security architectures dangerously ineffective. But implementing zero trust isn't about buying a single product or flipping a switch; it's a strategic journey that requires careful planning, the right mix of technologies, and a commitment to continuous improvement. In this episode of Security in 45, hosts Mike Veedock and Andres Sarmiento explore what zero trust really means, how to approach implementation, and the critical technologies that make it work in practice.
&lt;/code&gt;&lt;/pre&gt;
&lt;h2 id="what-this-episode-covers"&gt;What This Episode Covers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The origins and evolution of zero trust as an industry concept&lt;/li&gt;
&lt;li&gt;Why zero trust is fundamentally different from traditional security models&lt;/li&gt;
&lt;li&gt;The role of multi-factor authentication (MFA) in zero trust strategies&lt;/li&gt;
&lt;li&gt;Endpoint protection and network segmentation as core pillars&lt;/li&gt;
&lt;li&gt;Real-world examples of zero trust in consumer and enterprise contexts&lt;/li&gt;
&lt;li&gt;The importance of balancing security with user experience&lt;/li&gt;
&lt;li&gt;Why a multi-vendor approach is essential to comprehensive zero trust deployment&lt;/li&gt;
&lt;li&gt;Practical considerations for planning and implementing zero trust initiatives&lt;/li&gt;
&lt;li&gt;Common pitfalls and how to avoid rushing implementation&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="deep-dive"&gt;Deep Dive&lt;/h2&gt;
&lt;h3 id="understanding-zero-trust-beyond-the-buzzword"&gt;Understanding Zero Trust: Beyond the Buzzword&lt;/h3&gt;
&lt;p&gt;Zero trust isn&amp;rsquo;t a new invention—the concept emerged more than 20 years ago as security professionals recognized that the traditional model of &amp;ldquo;trust but verify&amp;rdquo; was fundamentally flawed. In a zero trust framework, the basic assumption is inverted: &lt;em&gt;nothing&lt;/em&gt; is trusted by default, whether it originates from inside or outside the network perimeter. Every access request, every user, every device, and every application must be verified and validated before granting access.&lt;/p&gt;</description></item></channel></rss>