Skip to Main Content
(Press Enter)

Security, Privacy, and Trust

Being trustworthy, transparent, and accountable is key to Cisco's approach to security and privacy.

Empowering People Through a Foundation of Security, Privacy, and Trust

Today, so much of our world is connected and generating data. We have unprecedented opportunities to boost human potential through artificial intelligence (AI) and technological innovation, but emerging and evolving capabilities make us more vulnerable unless we proactively address the security and risk challenges that come with innovation.

Our holistic approach to security and privacy sets us apart. The Cisco Trust Center offers thought leadership across our principles of trustworthiness, transparency, and accountability, and our Trust Portal provides customers with access to security, privacy, and compliance documents, offering assurance that Cisco solutions align with or exceed market security and privacy expectations.

Trustworthiness

We embed security and privacy throughout each stage of our solutions’ life cycle, safeguarding personal and confidential customer data by design and default. Our repeatable and measurable secure development life cycle process follows a security-by-design and privacy-by-design philosophy from product creation through end of life. This holistic approach empowers our customers with enhanced protection for their critical infrastructure, applications, and data, delivering a distinct advantage to help protect them and their customers.

  • Our Responsible AI Principles and Responsible AI Framework form a broad AI governance framework for those who develop, deploy, and use AI.
  • Cisco is a founding member of the Coalition for Secure AI, joining other industry-leading organizations dedicated to sharing best practices for secure AI deployment and collaborating on AI security research and product development.
  • Cisco is committed to securing AI technologies so that they are not only powerful and efficient, but also safe and reliable for users worldwide.
  • We help customers identify counterfeit or pirated products, since these can cause serious risks to network quality, performance, safety, and reliability.
  • We acquire companies that strengthen our technology and innovation portfolio and integrate them into Cisco through a trusted mergers and acquisitions cybersecurity approach.
  • Cisco regularly publishes resources to help users of all ages stay safe online. See our recent guides:
  • The Trustworthy Cloud spotlights our work with international governance organizations to develop and enhance mechanisms and leading practices that demonstrate compliance and facilitate safe international data flows.
    • This blog post shows how Webex by Cisco became the first collaboration suite to achieve European Union (EU) Cloud Code of Conduct Level 3 adherence.
  • With quantum computers rapidly advancing toward the capability to break current encryption methods, Cisco is committed to helping customers adopt quantum-safe encryption to safeguard their data and communications.
  • Cisco continues to respond to the rapid rise of sophisticated cyber attacks on legacy network infrastructure, focusing on the critical importance of updating software and maintaining hardware to support network resilience.

Transparency

We are transparent about the security and privacy approach we take across our solutions portfolio, including our compliance with global standards, certifications, and government regulations. We share our cyber-resilience strategies with organizations around the world with the intention of collectively raising the bar for global cybersecurity and trust.

Accountability

Cisco’s dedicated team of security and privacy experts supports our customers’ business resilience and continuity by being proactive and providing timely detection, notification, response, and remediation of security incidents.

  • Cisco Event Responses provide information about security events that have the potential for widespread impact on customer networks, applications, and devices.
  • We hold ourselves accountable for resolution of security and privacy incidents.
    • When issues arise with Cisco’s solutions, our global PSIRT responds swiftly, using a playbook with documented resolution procedures.
    • When security or privacy incidents occur, our Computer Security Incident Response Team and Data Incident Response Team perform 24/7 comprehensive incident investigation and prevention.
  • Cisco Talos is a proven and trusted threat intelligence research team comprising world-class researchers, analysts, and engineers.
    • Integrating Talos’ threat intelligence into Cisco’s security products, across the platform, heightens real-time visibility, improves threat detection, enables proactive defense, automates response, reduces false positives, and enhances behavioral detections. Talos’ efforts help customers, users, and the internet at large quickly protect their assets, including:
      • Talos Incident Response offers a full suite of proactive and emergency services to help organizations prepare, respond, and recover from a breach.
      • Intelligence Center provides access to expansive threat data and related information for domains, internet protocols, and files.
      • Talos Vulnerability Research investigates software and operating system vulnerabilities to discover them before malicious threat actors do. We provide this information to vendors so they can create patches and protect their customers as soon as possible.
      • The Talos Blog shares the latest threat research on malware campaigns, nation-state activity, and indicators of compromise, while the Threat Source newsletter offers a weekly recap of some of the biggest headlines in cybersecurity. The Beers with Talos podcast series explores all things security, while Talos Takes breaks down complex issues for listeners.
      • The Talos Year in Review is an annual analysis of key incident trends that affect organizations. The 2025 report will be available early in 2026.
  • The Cisco Online Privacy Statement — also available in summary form — captures our commitment and approach to maintaining strong protections for our customers, solutions, and company.
    • Cisco supports the G20’s “data free flow with trust” initiative to enable trustworthy data transfers across borders, and we have certified our privacy program against internationally recognized privacy standards. Cisco’s global privacy program, policies, and practices have been approved by EU and UK privacy regulators as providing the requisite “additional safeguards” for protecting privacy, fundamental rights, and freedoms of individuals under General Data Protection Regulation (GDPR).
    • Cisco’s EU Binding Corporate Rules — Controller enable legal international transfers of EU and UK Personal Information throughout Cisco’s global operations.
    • For customers in the European Union, European Economic Area, Switzerland, the United Kingdom, Kingdom of Saudi Arabia, or Turkey who prefer contractual commitments of adherence to privacy requirements, Cisco offers Standard Contractual Clauses, which are incorporated into our Data Protection Agreement.
    • Cisco’s global privacy program is also certified under the Global CBPR Forum’s Cross Border Privacy Rules (CBPRs) and Privacy Recognition for Processors, providing a framework for organizations to help protect personal data transferred among participating member economies.
    • Cisco is EU/UK/Swiss–US Data Privacy Framework certified, enabling personal data from the European Union, European Economic Area, United Kingdom (and Gibraltar), and Switzerland to be processed in the United States.