Woman watching screen

Cisco User Protection Suite

Licenses

Stronger, simpler user protection, made easy

The Cisco User Protection Essentials and Advantage tiers allow you to select the secure access features that will connect and protect your users, anywhere they work. 

Security featuresEssentialsAdvantage

Secure Access Essentials

Protect users and resources anywhere work is achieved using a converged set of security service edge (SSE) capabilities.

This includes:

  • Secure Internet Access (secure web gateway and DNS security)
  • Secure Private Access (integrated Zero Trust Network Access and VPNaaS)

 

Additional capabilities include:

  • Digital experience monitoring
  • Cloud access security broker (CASB)
  • Firewall-as-a-Service (FWaaS) Layer 3 and Layer 4
  • Remote browser isolation for risky traffic
  • Secure malware analytics
  

Secure Access Advantage

Includes Secure Access Essentials (Secure Internet Access and Secure Private Access), plus:

  • Firewall-as-a-Service (FWaaS) Layer 7
  • Advanced remote browser isolation (RBI)
  • Data loss prevention (DLP), including generative AI applications

 

  

Cisco Duo Advantage

Includes advanced identity security solution with Identity Intelligence, multi-factor authentication (MFA), passwordless, single sign-on (SSO), risk-based authentication, Passport, and device trust and health policies.

  ;

Cisco Secure Email Threat Defense

Harnesses AI-powered detection that identify the intent and risk of advanced email threats, like BEC and account compromise.

  

Cisco Secure Endpoint Advantage

Detect, respond, and recover from attacks with our cloud-native solution, and reduce remediation times by as much as 85%.

  

Cisco Identity Services Engine (ISE) Premier

Enhance network security by evaluating posture and creating security policies for all devices accessing the network.

  

See stronger, safer user protection in action

Watch a demo and see how ​you can simplify and streamline cybersecurity for your users.

Seamless, secure user access made simple

Threats come from everywhere. A total of 80% of breaches result from targeting users, either from stolen credentials, social engineering, privilege misuse, or user error. Protect your users anywhere.