Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


New Cisco Architecture Attempts To Redefine Access

'Secure Borderless Networks' promises easy, secure access from anywhere at any time

SAN FRANCISCO -- RSA Conference 2010 -- Cisco Systems today promised to create a network environment that enables users to securely log in using any device, from anywhere, using a simple, common, nearly-transparent access method.

The new architecture, called Secure Borderless Networks (SBN), is Cisco's attempt to move the complexities of remote and local access deeper into the network so that end users no longer have to use very different access processes for different devices or remote locations. It also recognizes the inevitability of a wide variety of handheld and portable devices being added to the corporate network.

"It doesn't matter where you are or what device you're using," says Tom Gillis, vice president and general manager of Cisco's Security Technology business unit. "It just works."

As a first step toward the new architecture, Cisco today is rolling out Cisco AnyConnect Secure Mobility, a package of enhanced products that redefines the company's approach to mobile access and virtual private networks.

The product bundle centers around AnyConnect 2.5, a small bit of software that contains a connection manager that logs the user onto the corporate network in a common fashion from any location. "It's always on and always running" on any device, including a variety of smartphones, Gillis says.

AnyConnect 2.5's secure access is enabled by Cisco's Adaptive Security Appliance 8.3, a security gateway that provides a common access point for a wide variety of systems and devices.

The third piece of the package is the Cisco IronPort S-Series, which is being merged with the recently acquired ScanSafe software-as-a-service (SaaS) offering to provide a SaaS-based method of access control that can distinguish between different types of applications, giving the user a common method of accessing the data that he is authorized to use.

Cisco also says it has enhanced its TrustSec strategy to offer identity management and granular control over policy to maximize persistent security from any location. TrustSec, which now includes Cisco Network Admission Control (NAC) and Identity-Based Networking Services (IBNS), offers integrated device profiling and guest access services for 802.1X environments.

"The idea is to simplify the creation and enforcement of access policy so that it's built less around devices and more around you, the user," Gillis says. "What we're doing is introducing a set of higher-level constructs that works on top of the existing infrastructure and policies so that you can express a policy that's independent of the device."

Gillis says he has been alpha-testing the new technology on the Cisco internal network, using a variety of handheld and desktop devices. "What it means for me as a user is that I no longer think about where I am -- whether I'm on the corporate network or on the VPN. It just works."

Gillis walked through a scenario in which he was able to make a smooth transition between voice, video and a variety of applications, using a variety of devices, from multiple locations -- all without having to log onto the network more than once.

The AnyConnect Secure Mobility bundle, which is the first step toward that scenario, will be delivered by the end of the second quarter.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
State of SMB Insecurity by the Numbers
Ericka Chickowski, Contributing Writer,  10/17/2019
Tor Weaponized to Steal Bitcoin
Dark Reading Staff 10/18/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-10-22
Information Leakage in PPPoE Packet Padding in AVM Fritz!Box 7490 with Firmware versions Fritz!OS 6.80 and 6.83 allows physically proximate attackers to view slices of previously transmitted packets or portions of memory via via unspecified vectors.
PUBLISHED: 2019-10-22
Apache Traffic Server is vulnerable to HTTP/2 setting flood attacks. Earlier versions of Apache Traffic Server didn't limit the number of setting frames sent from the client using the HTTP/2 protocol. Users should upgrade to Apache Traffic Server 7.1.7, 8.0.4, or later versions.
PUBLISHED: 2019-10-22
The Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface is vulnerable to Argument Injection via special characters in the username field. Upon successful exploitation, a remote unauthenticated user can create a local system user with sudo privileges, and use that user to login to the...
PUBLISHED: 2019-10-22
The Sangoma Session Border Controller (SBC) 2.3.23-119 GA web interface is vulnerable to an authentication bypass via an argument injection vulnerability involving special characters in the username field. Upon successful exploitation, a remote unauthenticated user can login into the device's admin ...
PUBLISHED: 2019-10-22
GNU libidn2 before 2.2.0 fails to perform the roundtrip checks specified in RFC3490 Section 4.2 when converting A-labels to U-labels. This makes it possible in some circumstances for one domain to impersonate another. By creating a malicious domain that matches a target domain except for the inclusi...