- Detected by Pingoru
- Apr 29, 2026, 06:53 PM UTC
- Resolved
- Apr 29, 2026, 09:54 PM UTC
- Duration
- 3h 1m
Affected: API
Timeline · 4 updates
-
investigating Apr 29, 2026, 06:53 PM UTC
We are currently investigating an issue impacting Cisco Secure Access onboarding. Due to a third-party provider outage affecting certificate issuance, onboarding of new organizations may fail or become stuck. Existing customers and active services remain unaffected and continue to operate normally. Our engineering team is actively working with the provider to restore normal onboarding. We will provide updates as more information becomes available.
-
investigating Apr 29, 2026, 08:53 PM UTC
We are actively working with third-party vendor to remediate the certificate provisioning issue. We will continue to provide updates as additional information becomes available.
-
monitoring Apr 29, 2026, 09:24 PM UTC
The third-party vendor has remediated the certificate provisioning issue. We are now seeing onboarding return to normal patterns.
-
resolved Apr 29, 2026, 09:54 PM UTC
The third-party vendor has resolved the certificate provisioning issue, and onboarding processes are now working as expected.
Read the full incident report →
- Detected by Pingoru
- Apr 27, 2026, 11:38 AM UTC
- Resolved
- Apr 27, 2026, 12:48 PM UTC
- Duration
- 1h 10m
Affected: Reserved IPWeb SecurityZero Trust Access
Timeline · 3 updates
-
investigating Apr 27, 2026, 11:38 AM UTC
We are currently observing multiple monitoring failures affecting services in the Europe (France) data center. As a result, customers may experience timeouts and connectivity issues. Impacted services include Identity Apps, ZTNA CLAP, BAP, SWG, Reserved IP. Our teams are initiating further investigation and will provide updates as more information becomes available. Thank you for your patience and understanding.
-
monitoring Apr 27, 2026, 12:30 PM UTC
We observed intermittent connectivity issues in the Europe (France) region impacting multiple services. Most services have now recovered, and no disruption to customer service is expected. We will continue to monitor the situation and provide updates as needed. Thank you for your patience and understanding.
-
resolved Apr 27, 2026, 12:48 PM UTC
All services in the Europe (France) data center are now healthy and fully operational. The recent connectivity and timeout issues have been resolved, and customers should no longer experience any disruptions. Thank you for your patience and understanding during this incident. If you have any questions or need assistance, please contact our support team.
Read the full incident report →
- Detected by Pingoru
- Apr 24, 2026, 07:35 PM UTC
- Resolved
- Apr 24, 2026, 07:35 PM UTC
- Duration
- —
Affected: Remote Access VPN
Timeline · 1 update
-
resolved Apr 24, 2026, 07:35 PM UTC
Between 17:20 UTC and 19:00 UTC, we experienced a network connectivity issue impacting services in the ap-southeast-1_1_1 data center. During this period, non-web traffic egressed using alternate public IP addresses instead of Reserved IPs. Customers relying on Reserved IP allowlisting may have experienced connectivity disruptions as a result. The issue has been fully resolved, and all services are operating normally. We’re Here to Help If you have any questions or need assistance, please contact our support team.
Read the full incident report →
- Detected by Pingoru
- Apr 21, 2026, 03:51 AM UTC
- Resolved
- Apr 21, 2026, 04:05 AM UTC
- Duration
- 14m
Affected: Policy Enforcement
Timeline · 2 updates
-
investigating Apr 21, 2026, 03:51 AM UTC
We are investigating a potential issue with the Cisco Secure Access service affecting customers connecting to the Israel (Tel Aviv) data center. Actual Impact: Policies may not have been applied due to a fail-open condition, which could impact the enforcement of security policies for affected users. Our engineering team is actively working to confirm the impact, identify the root cause, and implement a resolution. Updates and additional details will be provided as new information becomes available.
-
resolved Apr 21, 2026, 04:05 AM UTC
We are pleased to inform you that the issue affecting policy enforcement in the Asia Pacific (Hong Kong) data center has been resolved. The services is now operating normally. We apologize for any inconvenience caused and thank you for your patience. We’re Here to Help If you have any questions, please contact our support team. Thank you for your understanding as we improve your Cisco Secure Access experience.
Read the full incident report →
- Detected by Pingoru
- Apr 20, 2026, 03:08 AM UTC
- Resolved
- Apr 20, 2026, 04:02 AM UTC
- Duration
- 54m
Affected: Policy EnforcementPolicy Enforcement
Timeline · 4 updates
-
investigating Apr 20, 2026, 03:08 AM UTC
We are investigating a potential issue with the Cisco Secure Access service affecting customers connecting to the Asia Pacific (Hong Kong) data center. Actual Impact: Policies may not have been applied due to a fail-open condition, which could impact the enforcement of security policies for affected users. Our engineering team is actively working to confirm the impact, identify the root cause, and implement a resolution. Updates and additional details will be provided as new information becomes available.
-
investigating Apr 20, 2026, 03:39 AM UTC
We are still actively investigating the ongoing issue affecting policy enforcement in Asia Pacific (Hong Kong) and Israel (Tel Aviv). Our engineering team continues to work on confirming the full impact, identifying the root cause, and implementing a resolution. We will provide updates and additional details as new information becomes available. Thank you for your patience and understanding.
-
investigating Apr 20, 2026, 03:54 AM UTC
We are continuing to investigate the ongoing issue affecting policy enforcement in the Asia Pacific (Hong Kong) data center. Our engineering team has confirmed that the Israel (Tel Aviv) data center is not impacted.
-
resolved Apr 20, 2026, 04:02 AM UTC
We are pleased to inform you that the issue affecting policy enforcement in the Asia Pacific (Hong Kong) data center has been resolved. The services is now operating normally. We apologize for any inconvenience caused and thank you for your patience. We’re Here to Help If you have any questions, please contact our support team. Thank you for your understanding as we improve your Cisco Secure Access experience.
Read the full incident report →
- Detected by Pingoru
- Apr 15, 2026, 10:18 PM UTC
- Resolved
- Apr 15, 2026, 10:18 PM UTC
- Duration
- —
Affected: Remote Access VPN
Timeline · 1 update
-
resolved Apr 15, 2026, 10:18 PM UTC
We have successfully restored connectivity issues seen in US West 2 impacting private resource connections. All systems are now fully operational. We apologize for any inconvenience caused and thank you for your patience. We’re Here to Help If you have any questions or need assistance, please contact our support team.
Read the full incident report →
- Detected by Pingoru
- Apr 15, 2026, 09:50 AM UTC
- Resolved
- Apr 15, 2026, 09:50 AM UTC
- Duration
- —
Affected: Web Security
Timeline · 1 update
-
resolved Apr 15, 2026, 09:50 AM UTC
We experienced issues in the Frankfurt data center from 08:42 to 09:35 AM UTC, during which customers may have noticed brief connectivity interruptions or timeouts. The incident has now been resolved, and all services are operating normally. Thank you for your patience and understanding during this period.
Read the full incident report →
- Detected by Pingoru
- Apr 14, 2026, 11:08 PM UTC
- Resolved
- Apr 15, 2026, 04:13 AM UTC
- Duration
- 5h 4m
Affected: Policy EnforcementPolicy EnforcementPolicy EnforcementPolicy EnforcementPolicy EnforcementPolicy EnforcementPolicy Enforcement
Timeline · 6 updates
-
investigating Apr 14, 2026, 10:22 PM UTC
We are investigating intermittent traffic degradation in Secure Access Firewall as a Service (FWaaS) affecting policy-matched traffic across multiple regions.Users may experience latency or intermittent connectivity. We will provide updates as new information becomes available.
-
investigating Apr 14, 2026, 11:08 PM UTC
We are continuing to investigate intermittent traffic degradation in Cisco Secure Access Firewall as a Service (FWaaS) affecting multiple regions. Customers may experience intermittent outbound traffic drops, increased latency, and DNS resolution failures, impacting services such as ZTA-SPA, ZTA, RAV-VPN, and Network Tunnel Groups. Our engineering team is actively working to identify the root cause and implement mitigation measures. We will provide further updates as more information becomes available.
-
investigating Apr 14, 2026, 11:22 PM UTC
We are observing impact in an additional regions. Investigation is ongoing as we continue working to identify the root cause and mitigate the issue.
-
investigating Apr 15, 2026, 12:55 AM UTC
We are still investigating potential cause to the issue. We have escalated to our infrastructure provider to assist with the investigation. Impact appears contained to a subset of customers and a subset of our servers.
-
investigating Apr 15, 2026, 03:03 AM UTC
We are actively implementing mitigation steps and are seeing signs of recovery. Our teams continue working to restore full service as quickly as possible. Further updates will be provided as progress continues.
-
resolved Apr 15, 2026, 04:13 AM UTC
Intermittent traffic degradation in Cisco Secure Access Firewall as a Service (FWaaS) affecting multiple regions has been resolved. We apologize for any inconvenience caused and thank you for your patience. We’re Here to Help If you have any questions, please contact our support team. Thank you for your understanding as we improve your Cisco Secure Access experience.
Read the full incident report →
- Detected by Pingoru
- Apr 14, 2026, 09:57 PM UTC
- Resolved
- Apr 15, 2026, 12:26 AM UTC
- Duration
- 2h 29m
Affected: Dashboard
Timeline · 2 updates
-
identified Apr 14, 2026, 09:57 PM UTC
We are currently aware of an issue affecting multiple Secure Access organizations where the secure client and profiles fail to download via the internet security tab. This issue impacts new user setup but does not affect enforcement functionality. Workaround: Customers can download the secure client and profiles from alternative tabs (Zero Trust and VPN) within the dashboard to bypass the affected internet security tab.
-
resolved Apr 15, 2026, 12:26 AM UTC
This incident has been resolved and Customers can now successfully download Cisco secure clients and profiles without any errors. If you have any questions or need assistance, please contact our support team. Thank you for your understanding and support as we work to enhance your Cisco Secure Access experience.
Read the full incident report →
- Detected by Pingoru
- Apr 08, 2026, 05:00 AM UTC
- Resolved
- Apr 08, 2026, 12:47 PM UTC
- Duration
- 7h 46m
Affected: Zero Trust AccessZero Trust AccessZero Trust AccessZero Trust AccessZero Trust AccessZero Trust AccessZero Trust AccessZero Trust AccessZero Trust AccessZero Trust AccessZero Trust AccessZero Trust AccessZero Trust AccessZero Trust Access
Timeline · 8 updates
-
investigating Apr 08, 2026, 05:00 AM UTC
We are currently investigating reports of issues affecting Zero Trust Access enrollment for some users. We are aware that this may be impacting the ability to successfully enroll devices and are actively working to identify the cause. Our engineering team is prioritizing this investigation to restore full functionality as quickly as possible. We appreciate your patience and will provide further updates as soon as more information becomes available.
-
investigating Apr 08, 2026, 05:43 AM UTC
We are still actively investigating the issues affecting Zero Trust Access enrollment for some users within the Cisco Secure Access Dashboard. We appreciate your patience and will provide updates as soon as new information becomes available.
-
investigating Apr 08, 2026, 06:36 AM UTC
We are continuing to investigate this issue.
-
investigating Apr 08, 2026, 09:36 AM UTC
We are currently investigating an issue that appears to be affecting a limited number of customers. We are looking into the situation to confirm the extent of the impact and will provide further information as soon as possible.
-
identified Apr 08, 2026, 10:53 AM UTC
We have identified the root cause of the issue. Mitigation steps will be implemented to restore normal service as quickly as possible. Further updates will be provided as we make progress.
-
identified Apr 08, 2026, 12:13 PM UTC
We are continuing to work on a fix for this issue.
-
monitoring Apr 08, 2026, 12:38 PM UTC
A fix has been implemented and we are monitoring the results.
-
resolved Apr 08, 2026, 12:47 PM UTC
The issue affecting Zero Trust Access enrollment for some users is resolved. We’re Here to Help If you have any questions or need assistance, please contact our support team. Thank you for your understanding and support as we work to enhance your Cisco Secure Access experience.
Read the full incident report →
- Detected by Pingoru
- Apr 07, 2026, 06:52 PM UTC
- Resolved
- Apr 07, 2026, 07:29 PM UTC
- Duration
- 37m
Affected: Remote Access VPN
Timeline · 2 updates
-
investigating Apr 07, 2026, 06:52 PM UTC
We are investigating a potential VPN connectivity failure affecting customers connecting to the US East data center Our engineering team is actively working to confirm the impact, identify the root cause, and implement a resolution. We are committed to restoring full service as quickly as possible. Updates and additional details will be provided as new information becomes available. We appreciate your patience and understanding during this time
-
resolved Apr 07, 2026, 07:29 PM UTC
The issue affecting VPN connectivity for customers connecting to the US East data center has been resolved. All services are now operating normally. We’re Here to Help If you have any questions or need assistance, please contact our support team
Read the full incident report →
- Detected by Pingoru
- Apr 06, 2026, 03:18 AM UTC
- Resolved
- Apr 06, 2026, 03:18 AM UTC
- Duration
- —
Affected: Network Tunnel GroupsRemote Access VPNZero Trust Access
Timeline · 1 update
-
resolved Apr 06, 2026, 03:18 AM UTC
We are writing to inform you that we have resolved a brief period of service degradation affecting one of the vedc in Mexico Central (MXC111) data center. Between 02:30 and 02:43 UTC, some users may have experienced connectivity issue via RAVPN, Zero trust Access, and Network Tunnels. Our engineering team has confirmed that all systems are now fully restored and operating as expected. We are proactively notifying you of this event and no further action is needed regarding this specific occurrence. We’re Here to Help If you have any questions or need assistance, please contact our support team. Thank you for your understanding and support as we work to enhance your Cisco Secure Access experience.
Read the full incident report →
- Detected by Pingoru
- Apr 04, 2026, 05:55 AM UTC
- Resolved
- Apr 04, 2026, 07:46 AM UTC
- Duration
- 1h 50m
Affected: Dashboard
Timeline · 4 updates
-
investigating Apr 04, 2026, 05:55 AM UTC
We are currently experiencing an issue with the dashboard service affecting users globally. Actual Impact Webhook Alert notifications may be delayed or not delivered as expected. Our engineering team is actively working to confirm the impact, identify the root cause, and implement a resolution.Updates and additional details will be provided as new information becomes available.
-
identified Apr 04, 2026, 06:50 AM UTC
We have identified the issue affecting webhook alert notifications within the Dashboard service. Our engineering teams are actively working to restore full functionality as quickly as possible and will provide further updates as they become available. We apologize for any inconvenience caused and thank you for your patience.
-
identified Apr 04, 2026, 07:19 AM UTC
The issue affecting webhook alert notifications within the Dashboard service has been resolved. The services is now operating normally. We’re Here to Help If you have any questions, please contact our support team. Thank you for your understanding as we improve your Cisco Secure Access experience.
-
resolved Apr 04, 2026, 07:46 AM UTC
This incident has been resolved.
Read the full incident report →
- Detected by Pingoru
- Apr 01, 2026, 09:11 AM UTC
- Resolved
- Apr 01, 2026, 10:46 AM UTC
- Duration
- 1h 34m
Affected: Web Security
Timeline · 3 updates
-
investigating Apr 01, 2026, 09:11 AM UTC
We are currently investigating reports of timeouts affecting services in the London data center. Some users may experience delays or interruptions in their requests. Our team is actively working to identify the cause and restore full service as quickly as possible. Updates will be provided here as more information becomes available. Thank you for your patience and understanding.
-
identified Apr 01, 2026, 10:28 AM UTC
We are actively working to mitigate the current capacity constraints affecting connectivity in the London region. As mitigation steps are implemented, customers should begin to see improvements with connectivity and fewer timeouts. We will continue to monitor progress and provide updates as needed.
-
resolved Apr 01, 2026, 10:46 AM UTC
We are pleased to confirm that the connectivity and capacity issues in the London region have been fully resolved. All services are now operating normally, and customers should no longer experience timeouts or performance degradation. Thank you for your patience and understanding during this incident. If you have any questions or need assistance, please contact our support team.
Read the full incident report →
- Detected by Pingoru
- Mar 31, 2026, 05:05 PM UTC
- Resolved
- Mar 31, 2026, 05:05 PM UTC
- Duration
- —
Affected: Web Security
Timeline · 1 update
-
resolved Mar 31, 2026, 05:05 PM UTC
The issue affecting service reachability from the SWG proxy in ap-southeast-2_1_1 has been fully resolved. From 15:55 UTC to 16:45 UTC, customers in this data center may have experienced authentication and access disruptions due to a configuration issue impacting SAML authentication with the identity provider (IDP). Impact summary: IP surrogate sessions: Remained active and were not impacted. Cookie surrogate sessions: Were unable to be validated at the login gateway, requiring re-authentication and causing temporary access issues. All systems are now operating normally. We apologize for the inconvenience and appreciate your patience.
Read the full incident report →
- Detected by Pingoru
- Mar 30, 2026, 04:23 PM UTC
- Resolved
- Mar 30, 2026, 04:23 PM UTC
- Duration
- —
Affected: Policy Enforcement
Timeline · 1 update
-
resolved Mar 30, 2026, 04:23 PM UTC
Between approximately 15:04 and 15:41 UTC, customers may have experienced degraded performance in file scanning and Data Loss Prevention (DLP) processing. During this time, some customers may have experienced fail-open behavior, where file inspection requests timed out and certain files were not blocked as expected. The issue was limited to a subset of traffic in the US East region (sse-use-2-1-1) and did not affect all customers. The service has recovered, and we continue to monitor the environment to ensure stability. We’re Here to Help If you have any questions or need assistance, please contact our support team.
Read the full incident report →
- Detected by Pingoru
- Mar 28, 2026, 03:41 AM UTC
- Resolved
- Mar 28, 2026, 04:41 AM UTC
- Duration
- 59m
Affected: Zero Trust Access
Timeline · 3 updates
-
investigating Mar 28, 2026, 03:41 AM UTC
We are investigating an issue affecting system reporting in Cisco Secure Access – Zero Trust Access. At this time, there is no evidence of impact to customer traffic or access experience.
-
identified Mar 28, 2026, 04:17 AM UTC
We have identified the cause of the issue.The behavior was limited in scope and did not impact customer traffic, policy enforcement, or security.
-
resolved Mar 28, 2026, 04:41 AM UTC
This issue has been resolved. Cisco Secure Access – Zero Trust Access continues to operate normally with no impact to service functionality. We’re Here to Help If you have any questions, please contact our support team. Thank you for your understanding as we improve your Cisco Secure Access experience.
Read the full incident report →
- Detected by Pingoru
- Mar 24, 2026, 01:51 AM UTC
- Resolved
- Mar 24, 2026, 02:24 AM UTC
- Duration
- 33m
Affected: Network Tunnel Groups
Timeline · 2 updates
-
investigating Mar 24, 2026, 01:51 AM UTC
We are investigating a potential issue with VPN profile service affecting customers connecting to the all data center. Cannot create new VPN profiles nor modify the existing profiles, impacting VPN operations. Our engineering team is actively working to confirm the impact, identify the root cause, and implement a resolution. We are committed to restoring full service as quickly as possible. Updates and additional details will be provided as new information becomes available. We appreciate your patience and understanding during this time
-
resolved Mar 24, 2026, 02:24 AM UTC
The issue affecting VPN Profile has been resolved as of 02:23 UTC. All services are now operating normally. We apologize for any inconvenience caused and thank you for your patience. We’re Here to Help If you have any questions or need assistance, please contact our support team. Thank you for your understanding and support as we work to enhance your Cisco Secure Access experience.
Read the full incident report →
- Detected by Pingoru
- Mar 20, 2026, 07:23 AM UTC
- Resolved
- Mar 20, 2026, 08:33 AM UTC
- Duration
- 1h 10m
Affected: Network Tunnel GroupsNetwork Tunnel GroupsNetwork Tunnel Groups
Timeline · 4 updates
-
investigating Mar 20, 2026, 07:23 AM UTC
We are currently experiencing loss of network connectivity at our Jakarta, Mumbai, Chennai, Hyderabad and Hong Kong data center. We understand that this may be impacting your ability to access certain resources. Our engineering team is actively working to confirm the impact, identify the root cause, and implement a resolution. We are committed to restoring full service as quickly as possible. Updates and additional details will be provided as new information becomes available. We appreciate your patience and understanding during this time
-
investigating Mar 20, 2026, 08:01 AM UTC
We are still actively investigating the issue affecting access to the Network Tunnels. We appreciate your patience and will provide updates as soon as new information becomes available.
-
investigating Mar 20, 2026, 08:31 AM UTC
The connectivity issue affecting a subset of network tunnels in our Jakarta, Mumbai, Chennai, Hyderabad and Hong Kong has been resolved. All services are now operating normally. We apologize for any inconvenience caused and thank you for your patience. We’re Here to Help If you have any questions or need assistance, please contact our support team. Thank you for your understanding and support as we work to enhance your Cisco Secure Access experience.
-
resolved Mar 20, 2026, 08:33 AM UTC
The connectivity issue affecting a subset of network tunnels in our Jakarta, Mumbai, Chennai, Hyderabad and Hong Kong has been resolved.
Read the full incident report →
- Detected by Pingoru
- Mar 17, 2026, 08:02 PM UTC
- Resolved
- Mar 20, 2026, 09:36 PM UTC
- Duration
- 3d 1h
Affected: Zero Trust Access
Timeline · 3 updates
-
identified Mar 17, 2026, 08:02 PM UTC
We have identified an issue affecting Secure Access Client based ZTA where the private resource and profile change are intermittently not applied on the enforcement path. Our engineering teams are actively working to restore full functionality as quickly as possible. We will provide updates as more information becomes available. We apologize for any inconvenience caused and thank you for your patience. We’re Here to Help If you have any questions or need assistance, please contact our support team. Thank you for your understanding and support as we work to enhance your Cisco Secure Access experience.
-
identified Mar 17, 2026, 10:28 PM UTC
Immediate mitigation measures have been deployed and are successfully resolving the issue for impacted customers. We will continue to apply interim measures as needed to maintain service stability until a permanent fix is implemented by Thursday - March 19, 2026
-
resolved Mar 20, 2026, 09:36 PM UTC
The issue related to Secure Access Client based ZTA affecting private resource access has been resolved.
Read the full incident report →
- Detected by Pingoru
- Mar 17, 2026, 07:24 PM UTC
- Resolved
- Mar 17, 2026, 07:57 PM UTC
- Duration
- 32m
Affected: Policy Enforcement
Timeline · 2 updates
-
identified Mar 17, 2026, 07:24 PM UTC
We have identified an issue causing intermittent URL filtering failures for customers using the Intelligent Proxy with the DNS Advantage package, where the Intelligent Proxy feature is enabled and new rules have been created or updated. This specifically affects customers who have migrated from Umbrella to SSE. Impact: Customers may experience intermittent failures in URL filtering, which can lead to failed or blocked access to websites. Our team is actively working to restore full functionality.
-
resolved Mar 17, 2026, 07:57 PM UTC
The issue causing intermittent URL filtering failures for customers migrated from Umbrella to SSE using Intelligent Proxy with the DNS Advantage package, with recent policy changes, has been resolved. Service has been restored, and systems are operating normally. We’re Here to Help If you have any questions or need assistance, please contact our support team. Thank you for your understanding and support as we work to enhance your Cisco Secure Access experience.
Read the full incident report →
- Detected by Pingoru
- Mar 10, 2026, 05:14 AM UTC
- Resolved
- Mar 10, 2026, 05:52 AM UTC
- Duration
- 37m
Affected: DNS
Timeline · 2 updates
-
investigating Mar 10, 2026, 05:14 AM UTC
We are investigating a potential issue with the DNS Resolvers service affecting customers connecting to the Middle East data centers. Our engineering team is actively working to confirm the impact, identify the root cause, and implement a resolution. We are committed to restoring full service as quickly as possible. Updates and additional details will be provided as new information becomes available. We appreciate your patience and understanding during this time.
-
resolved Mar 10, 2026, 05:52 AM UTC
The issue affecting the DNS Resolvers service in the Middle East data center has been resolved. The service is now operating normally. We apologize for any inconvenience caused and thank you for your patience. We’re Here to Help: If you have any questions or need assistance, please contact our support team. Thank you for your understanding and support as we work to enhance your Cisco Secure Access experience.
Read the full incident report →
- Detected by Pingoru
- Mar 09, 2026, 02:09 AM UTC
- Resolved
- Mar 09, 2026, 05:31 AM UTC
- Duration
- 3h 22m
Affected: Dashboard
Timeline · 4 updates
-
investigating Mar 09, 2026, 02:09 AM UTC
We are investigating an issue currently affecting the Secure Access App Portal login. Users may be unable to log in to the App Portal dashboard at this time. You can still access your applications directly by using their specific URLs. Will provide further updates as progress is made.
-
identified Mar 09, 2026, 03:35 AM UTC
We have identified the root cause of the issue affecting login access to the App Portal. Remediation efforts are underway. Updates will be provided as restoration progresses.
-
identified Mar 09, 2026, 04:57 AM UTC
We are continuing to work on the issue affecting the App Portal. Our team remains actively engaged in mitigation efforts and is closely monitoring the situation. We will provide further updates as additional information becomes available.
-
resolved Mar 09, 2026, 05:31 AM UTC
The issue affecting the App Portal globally has been resolved as of 05:15 UTC. All services are now operating normally. We apologize for any inconvenience caused and thank you for your patience. We’re Here to Help If you have any questions or need assistance, please contact our support team. Thank you for your understanding and support as we work to enhance your Cisco Secure Access experience.
Read the full incident report →
- Detected by Pingoru
- Mar 07, 2026, 09:06 PM UTC
- Resolved
- Mar 07, 2026, 09:06 PM UTC
- Duration
- —
Affected: Data Loss Prevention
Timeline · 1 update
-
resolved Mar 07, 2026, 09:06 PM UTC
We have successfully resolved the service disruption caused by an issue suspected with an external infrastructure provider. All services are now fully operational.
Read the full incident report →
- Detected by Pingoru
- Mar 06, 2026, 10:55 AM UTC
- Resolved
- Mar 07, 2026, 02:02 AM UTC
- Duration
- 15h 6m
Affected: APICisco Secure ClientData Loss PreventionDNSExperience InsightsNetwork Tunnel GroupsPolicy EnforcementRemote Access VPNRemote Browser IsolationReporting and LoggingReserved IPResource ConnectorWeb SecurityZero Trust Access
Timeline · 5 updates
-
investigating Mar 06, 2026, 10:55 AM UTC
During our routine maintenance window on the Kubernetes cluster, we encountered an issue impacting the Miami region. Traffic continues to flow, but some customers may experience degraded performance. As a precaution, some customers may be moved to other data centers to ensure service stability. Our teams are working to restore normal operations and will provide updates as more information becomes available. Thank you for your understanding and cooperation. We’re Here to Help If you have any questions or need assistance, please contact our support team. Thank you for your continued support as we work to enhance your Cisco Secure Access experience.
-
investigating Mar 06, 2026, 12:03 PM UTC
We are continuing to investigate this issue.
-
investigating Mar 06, 2026, 12:37 PM UTC
We are taking the Miami data center Out Of Rotation to address ongoing performance concerns. All customer traffic will be automatically redirected to the nearest data center to maintain service continuity. No disruption to customer traffic is expected during this transition. We will continue to monitor the situation and provide updates as needed.
-
identified Mar 06, 2026, 02:44 PM UTC
We are continuing with taking the Miami data center Out Of Rotation
-
resolved Mar 07, 2026, 02:02 AM UTC
The issue of performance degradation at the Miami Data Center has been resolved. All services are now operating normally without any interruptions
Read the full incident report →