NEWSLETTER
Thursday, June 5, 2025
The Novum Times
No Result
View All Result
  • Home
  • World
    • USA
    • United Kingdom
    • India
    • China
    • Europe
    • Africa
    • Middle East
    • Asia Pacific
    • Canada
    • Australia
  • Politics
  • Business
  • Health
  • Economy
  • Sports
  • Entertainment
  • Technology
  • Cryptocurrency
  • Gossips
  • Travel
  • Lifestyle
  • Home
  • World
    • USA
    • United Kingdom
    • India
    • China
    • Europe
    • Africa
    • Middle East
    • Asia Pacific
    • Canada
    • Australia
  • Politics
  • Business
  • Health
  • Economy
  • Sports
  • Entertainment
  • Technology
  • Cryptocurrency
  • Gossips
  • Travel
  • Lifestyle
No Result
View All Result
The Novum Times
No Result
View All Result

Revolutionizing SSE: AI powered Access and Security Integration

by The Novum Times
30 June 2023
in Business
Reading Time: 3 mins read
A A
Home Business
Share on FacebookShare on TwitterShare on Whatsapp


As businesses move further into their digital transformation journey, the complexities of cloud security will continue to evolve. Traditional security practices, with their complex and layered rules, have long been the foundation of security systems. However, the advances in Artificial Intelligence (AI) are shifting the paradigm in the way we will interact and set expectations with our security solutions. Let’s explore how these developments will streamline the implementation of security policies and their implications on managing AI-generated content with modern SSE and SASE solutions.

I.  Unifying the Private Access, Internet Access, VPN Access, and ZTNA Experience in SSE

To set the stage, let’s take a common example. A company needs a security policy that allows an executive to access public internet websites from their office laptop but restricts their access to the Jira dashboard hosted within the company’s private data center.

Traditionally, the Admin would need to create a multifaceted policy to meet this requirement. First, the admin will need to determine whether the policy involves a ZTNA-based access, VPN-based access, or a public internet-based app access. They would need to confirm the user’s group, location, and device, and then create policies to grant or restrict access accordingly. Second, the Admin will also need to create sub-policies that need to be configured meticulously for security controls like the Firewall, IPS, SWG or DNS that will be required to be carried out along each access path selected. This process involves multiple steps and leads to an unnecessary cognitive burden on the Admin. In addition, a slight misconfiguration could potentially pose a security risk or degraded experience to the users. However, there is a more streamlined approach available. This is where intent-based security with unified management steps in.

In an intent-based security system, the Admin simply needs to define the intent: “executives should be able to access public websites but not the Jira dashboard.”

The system analyzes and interprets this intent, generating the necessary underlying configurations to enforce it.

This approach abstracts away the complexity of underlying access and security controls configuration. It also offers a single point of configuration, regardless of whether the policy is being set up via a user interface, API, or command-line interpreter. The emphasis is on the intent, not the specific security controls or the access method. In fact, instead of working through a configuration UI, the intent could be stated in a plain sentence, letting the system understand and implement it.

By utilizing Generative AI techniques in tandem with the principles of few-shot learning, these intent-based security policies can be efficiently transformed into actionable policy directives.

II. Addressing the challenge of AI-Generated content with AI-Assisted DLP

As workplaces increasingly adopt tools like ChatGPT and other Generative AI (GenAI) platforms, interesting challenges for data protection are emerging. Care must be taken when handling sensitive data within GenAI tools, as unintentional data leaks could occur. Leading Firewall and Data Loss Prevention (DLP) vendors, such as Cisco, have introduced functionality to prevent sensitive data from being inadvertently shared with these AI applications. 

But let’s flip the scenario:

What if someone uses one of the content-generating AI tools to create a document or source code that finds its way into the company’s legal documents or product? The potential legal ramifications of such actions could be severe. Cases have been reported where AI has been used inappropriately, leading to potential sanctions. Furthermore, there needs to be a mechanism to detect deliberate variations of these documents and source codes that may have been copied and pasted into the company’s product.

Owing to the sophisticated internal representation for text in large language models (LLMs), it’s possible to accurately facilitate these DLP use-cases.

Cisco’s Secure Access has Security Assistant in Beta version that uses LLMs to not only create policies based on intent but can also detect ChatGPT and AI-generated source code, including its’ variants, along with providing sufficient context around who, when and from where this content may have been generated.

In summary – The next-gen cybersecurity landscape, with its unified management and intent-based security policies, is here. It’s poised to revolutionize how we implement and manage security, even as we grapple with new challenges posed by AI-generated content.

For more information on Cisco Secure Access check out:

1.    Introducing Cisco Secure Access: Better for users, easier for IT, safer for everyone

2.    Protect your hybrid workforce with cloud-agile security

We’d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!

Cisco Secure Social Channels

InstagramFacebookTwitterLinkedIn

Share:



Source link

Tags: accessIntegrationpoweredRevolutionizingsecuritySSE

Related Posts

7 Safety Tips For Using A Dumpster Rental

7 Safety Tips For Using A Dumpster Rental

by The Novum Times
10 November 2023
0

Construction projects create a lot of waste. According to Industrial Safety & Hygiene News (ISHN), construction and demolition activities account...

Worker Is Crushed by a Robot That Mistook Him for a Box

Worker Is Crushed by a Robot That Mistook Him for a Box

by The Novum Times
10 November 2023
0

Police are investigating a horrific incident that occurred in South Korea when a man was crushed to death by an...

‘Murder Is The Case’ Keefe D Faces For Allegedly Killing Tupac

‘Murder Is The Case’ Keefe D Faces For Allegedly Killing Tupac

by The Novum Times
10 November 2023
0

by Cedric 'BIG CED' Thornton November 9, 2023 Keefe D is the only living person who was in the vehicle...

Cisco and Rockwell strengthen OT/ICS security with visibility for converged plantwide ethernet (CPwE)

Cisco and Rockwell strengthen OT/ICS security with visibility for converged plantwide ethernet (CPwE)

by The Novum Times
9 November 2023
0

The turtle, protected by its hard shell, is a good metaphor for the security model used in most industrial networks....

Michael Oher Allegedly Received 8K In Proceeds From ‘The Blind Side’ Film Despite Claiming He Never Saw Profits From His Story

Michael Oher Allegedly Received $138K In Proceeds From ‘The Blind Side’ Film Despite Claiming He Never Saw Profits From His Story

by The Novum Times
9 November 2023
0

by Iman Milner November 9, 2023 Michael Oher, the subject of the 2009 film The Blind Side, allegedly received more...

Next Post

Financial Conduct Authority enables firms to provide mortgage breathing space

Artist mixes history and myth with Contemporary Calgary exhibit

CATEGORIES

  • Africa
  • Asia Pacific
  • Australia
  • Business
  • Canada
  • China
  • Cryptocurrency
  • Economy
  • Entertainment
  • Europe
  • Gossips
  • Health
  • India
  • Lifestyle
  • Mental Health
  • Middle East
  • News
  • Opinions
  • Politics
  • Sports
  • Technology
  • Travel
  • United Kingdom
  • USA

CATEGORIES

  • Africa
  • Asia Pacific
  • Australia
  • Business
  • Canada
  • China
  • Cryptocurrency
  • Economy
  • Entertainment
  • Europe
  • Gossips
  • Health
  • India
  • Lifestyle
  • Mental Health
  • Middle East
  • News
  • Opinions
  • Politics
  • Sports
  • Technology
  • Travel
  • United Kingdom
  • USA

Browse by Tag

Biden Bitcoin Business Canada case Channel China court Cup day dead deal Death Diplomat free global Health Home India Jammu Kashmir killed latest Life Live man National News NPR people Police POLITICO Russia South Time Times Top Tourism Trump U.S UAE Ukraine war world Years
  • About Us
  • Advertise With Us
  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact Us

Copyright © 2023 Novum Times.
Novum Times is not responsible for the content of external sites.

No Result
View All Result
  • Home
  • World
    • USA
    • United Kingdom
    • India
    • China
    • Europe
    • Africa
    • Middle East
    • Asia Pacific
    • Canada
    • Australia
  • Politics
  • Business
  • Health
  • Economy
  • Sports
  • Entertainment
  • Technology
  • Cryptocurrency
  • Gossips
  • Travel
  • Lifestyle

Copyright © 2023 Novum Times.
Novum Times is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In