- Detected by Pingoru
- Mar 06, 2026, 05:30 AM UTC
- Resolved
- Mar 06, 2026, 05:46 AM UTC
- Duration
- 15m
Affected: DNSDNSDNSDNSDNSDNSDNSDNSDNSDNS
Timeline · 2 updates
-
investigating Mar 06, 2026, 05:30 AM UTC
We are investigating a potential issue with SWG FQDN service affecting customers connecting to the India, Asia, Europe Region across Multiple data center. Customer will not be able to access as SWG FQDN as the Service is not be able resolve the IP Cisco is currently working to confirm the impact, identify the root cause, and implement a resolution. We are committed to restoring full service as quickly as possible. Updates and additional details will be provided as new information becomes available. We appreciate your patience and understanding during this time
-
resolved Mar 06, 2026, 05:46 AM UTC
The issue affecting SWG FQDN has been resolved as of 05:36 UTC Mar 06, 2026 UTC. All services are now operating normally. We apologize for any inconvenience caused and thank you for your patience. We’re Here to Help If you have any questions or need assistance, please contact our support team. Thank you for your understanding and support as we work to enhance your Cisco Secure Access experience.
Read the full incident report →
- Detected by Pingoru
- Mar 05, 2026, 08:00 AM UTC
- Resolved
- Mar 05, 2026, 08:00 AM UTC
- Duration
- —
Affected: Data Loss PreventionWeb Security
Timeline · 1 update
-
resolved Mar 05, 2026, 08:00 AM UTC
We have identified an issue impacting DLP services in the India South region between 6:50 UTC and 07:43 UTC which has been identified and resolved
Read the full incident report →
- Detected by Pingoru
- Mar 04, 2026, 11:11 AM UTC
- Resolved
- Mar 04, 2026, 11:50 AM UTC
- Duration
- 38m
Affected: Data Loss PreventionWeb Security
Timeline · 2 updates
-
investigating Mar 04, 2026, 11:11 AM UTC
We are currently investigating an issue involving fail-open for DLP affecting services in the London region. Our teams are working to identify the cause and will provide updates as more information becomes available. Thank you for your patience and understanding. We’re Here to Help If you have any questions or need assistance, please contact our support team. Thank you for your support as we work to enhance your Cisco Secure Access experience.
-
resolved Mar 04, 2026, 11:50 AM UTC
The issue involving fail-open for DLP affecting services in the London region has been resolved. All services are now operating normally. We appreciate your patience and understanding while we worked to address this matter.
Read the full incident report →
- Detected by Pingoru
- Mar 02, 2026, 01:02 PM UTC
- Resolved
- Mar 02, 2026, 08:30 PM UTC
- Duration
- 7h 27m
Affected: Remote Access VPN (LA)
Timeline · 9 updates
-
investigating Mar 02, 2026, 01:02 PM UTC
We are currently addressing connectivity issues with services in the Riyadh and Jeddah data centers, affecting resources such as RAVPN and FWAAS. Our engineering teams are actively investigating to identify the cause and restore full functionality. Updates will be provided as more information becomes available. Thank you for your patience and understanding. We’re Here to Help If you have any questions or need assistance, please contact our support team. Thank you for your understanding and support as we work to enhance your Cisco Secure Access experience.
-
investigating Mar 02, 2026, 04:22 PM UTC
We are continuing to investigate this issue.
-
investigating Mar 02, 2026, 05:59 PM UTC
We are continuing to investigate connectivity issues affecting services in the Riyadh and Jeddah data centers, including Remote Access VPN (RAVPN) and Firewall as a Service (FWaaS). This impact is related to upstream regional infrastructure dependencies in the Middle East (UAE) region. Our engineering teams are actively working to mitigate the impact and restore full service functionality.
-
investigating Mar 02, 2026, 06:48 PM UTC
The firewall synchronization issue has been mitigated by transitioning traffic to an alternate regional endpoint. FireWall as a Service functionality has been restored, and is operating normally. We will continue to monitor the system to ensure sustained stability.
-
investigating Mar 02, 2026, 06:58 PM UTC
We are continuing to investigate this issue with Remote Access VPN (RAVPN)
-
investigating Mar 02, 2026, 08:00 PM UTC
The remediation work for Riyadh for the RAVPN team has been successful. Team is now working on Jeddah DC
-
identified Mar 02, 2026, 08:02 PM UTC
The remediation work for Riyadh for the RAVPN team has been successful. Team is now working on Jeddah DC
-
identified Mar 02, 2026, 08:06 PM UTC
Remote Access VPN (RAVPN) services in the Jeddah data center have been fully restored and are operating normally. We are continuing to work on restoring RAVPN functionality in the Riyadh data center and will provide further updates as progress is made.
-
resolved Mar 02, 2026, 08:30 PM UTC
Connectivity issues affecting Remote Access VPN (RAVPN) and Firewall as a Service (FWaaS) in the Riyadh and Jeddah data centers have been fully resolved. All services are operating normally at this time. Our teams will continue to monitor the environment to ensure sustained stability. We’re Here to Help If you have any questions or need assistance, please contact our support team.
Read the full incident report →
- Detected by Pingoru
- Mar 01, 2026, 04:09 PM UTC
- Resolved
- Mar 02, 2026, 02:29 AM UTC
- Duration
- 10h 19m
Affected: Reserved IP
Timeline · 4 updates
-
identified Mar 01, 2026, 04:09 PM UTC
We have identified an issue affecting a limited subset of customers using Reserved IP configurations in the Dubai region. The impact is isolated to specific infrastructure components, and our team is actively working on mitigation efforts. We are also coordinating with our cloud partner as part of the recovery process. We will continue to provide updates as progress is made toward full restoration.
-
identified Mar 01, 2026, 07:08 PM UTC
We continue to make progress on the issue affecting a limited subset of customers using Reserved IP configurations in the Dubai (mec1-1-0) region. Mitigation actions are actively underway, and we are closely coordinating with our cloud partner to restore full service. No broader service impact has been observed. We will provide further updates as additional progress is made.
-
identified Mar 02, 2026, 12:04 AM UTC
We are observing continued progress in restoring functionality for limited subset of customers impacted by Reserved IP configurations in the Dubai (mec1-1-0) region. Improvements have been seen in infrastructure operations, and mitigation efforts remain actively in progress.
-
resolved Mar 02, 2026, 02:29 AM UTC
The issue affecting a limited subset of customers using Reserved IP configurations in the Middle East (UAE) region has been fully resolved.Service functionality has been fully restored, and the environment is stable. We will continue to monitor the region to ensure sustained performance and reliability. We apologize for any inconvenience caused and thank you for your patience. We’re Here to Help If you have any questions or need assistance, please contact our support team.
Read the full incident report →
- Detected by Pingoru
- Mar 01, 2026, 01:12 PM UTC
- Resolved
- Mar 01, 2026, 03:57 PM UTC
- Duration
- 2h 45m
Affected: Cisco Secure ClientExperience InsightsNetwork Tunnel GroupsPolicy EnforcementRemote Access VPNRemote Browser IsolationReserved IPResource ConnectorZero Trust Access
Timeline · 5 updates
-
investigating Mar 01, 2026, 01:12 PM UTC
We are currently investigating a service availability issue affecting Secure Access in the Dubai. Some users may experience timeouts and difficulties accessing resources. Our engineering team is actively working to confirm the impact, identify the root cause, and implement a resolution. We are committed to restoring full service as quickly as possible. Updates and additional details will be provided as new information becomes available. We apologize for any inconvenience caused and thank you for your patience. We’re Here to Help If you have any questions or need assistance, please contact our support team. Thank you for your understanding and support as we work to enhance your Cisco Secure Access experience.
-
investigating Mar 01, 2026, 01:14 PM UTC
We are continuing to investigate this issue.
-
identified Mar 01, 2026, 01:55 PM UTC
We have identified the root cause of the issue affecting customer connectivity and service stability in Dubai. Remediation efforts are underway. Updates will be provided as restoration progresses.
-
identified Mar 01, 2026, 03:27 PM UTC
We are continuing to work on the issue, which has been identified as related to a cloud infrastructure disruption impacting services in the Dubai region. Our team remains actively engaged in mitigation efforts and is closely monitoring the situation. We will provide further updates as additional information becomes available.
-
resolved Mar 01, 2026, 03:57 PM UTC
The migration of services from mec1-1-0 to mec1-1-1 has been successfully completed. This action has restored service stability, and the issue is now resolved. We’re Here to Help If you have any questions or need assistance, please contact our support team. Thank you for your understanding and support as we work to enhance your Cisco Secure Access experience.
Read the full incident report →
- Detected by Pingoru
- Feb 27, 2026, 06:16 PM UTC
- Resolved
- Mar 12, 2026, 03:13 PM UTC
- Duration
- 12d 20h
Affected: Dashboard
Timeline · 4 updates
-
investigating Feb 27, 2026, 06:16 PM UTC
We are currently investigating an issue impacting one feature within the Investigate dashboard, specifically the DNS query volume. This affects the visibility of query volume data in the UI. All other Umbrella services, including DNS resolution, traffic handling, and policy enforcement, remain fully operational. Our team is actively working to restore normal data processing for the affected dashboard feature and will provide updates as they become available.
-
identified Feb 27, 2026, 06:18 PM UTC
We have identified the issue impacting the Investigate dashboard. DNS resolution, traffic handling, and policy enforcement remain fully operational. The team is preparing remediation steps and will continue monitoring the system.
-
identified Mar 02, 2026, 07:48 PM UTC
Our engineering teams are continuing to make progress on resolving the display issue within the Investigate dashboard. While remediation is in progress, we anticipate it may take a few more days to fully resolve. We will provide further updates as they become available.
-
resolved Mar 12, 2026, 03:13 PM UTC
We are pleased to confirm that the display issue impacting the Investigate dashboard has been fully resolved. All dashboard functions are now operating as expected. Thank you for your patience and understanding while we worked to restore full service.
Read the full incident report →
- Detected by Pingoru
- Feb 26, 2026, 07:28 AM UTC
- Resolved
- Feb 26, 2026, 07:28 AM UTC
- Duration
- —
Affected: Data Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss Prevention (LA)Data Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionData Loss PreventionRemote Access VPNPolicy EnforcementRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPN (LA)Remote Access VPNRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPNRemote Access VPN
Timeline · 1 update
-
resolved Feb 26, 2026, 07:28 AM UTC
We recently experienced an issue that affected Policy Updates, DLP Reporting, RAVPN, and Firewall-as-a-Service. The issue started at 05:12 UTC and was fully resolved by 05:51 UTC. During this period, DLP Policy updates would not have been propagated, and DLP Event reporting also would have failed. Customers may also have been unable to establish new RAVPN connections, Firewall policies were affected and configuration updates were not processed. All services are now operating normally. We sincerely apologize for any inconvenience this may have caused and thank you for your patience. We’re Here to Help If you have any questions or need assistance, please contact our support team. Thank you for your understanding and support as we work to enhance your Cisco Secure Access experience.
Read the full incident report →
- Detected by Pingoru
- Feb 25, 2026, 03:20 PM UTC
- Resolved
- Feb 25, 2026, 05:57 PM UTC
- Duration
- 2h 37m
Affected: Zero Trust AccessZero Trust Access
Timeline · 6 updates
-
investigating Feb 25, 2026, 12:59 PM UTC
We are currently investigating an issue affecting Secure Access services in the Singapore (ap-southeast-1) and Stockholm ( eu-north-1_1_0) data centers. Some customers may be unable to access newly created private resources at this time. Our engineering teams are actively working to identify the cause and restore full functionality as quickly as possible. We will provide updates as more information becomes available. We apologize for any inconvenience caused and thank you for your patience. We’re Here to Help If you have any questions or need assistance, please contact our support team. Thank you for your understanding and support as we work to enhance your Cisco Secure Access experience.
-
investigating Feb 25, 2026, 02:41 PM UTC
We are still investigating the issue affecting Secure Access services in the Singapore (ap-southeast-1) and Stockholm (eu-north-1_1_0) data centers. Updates will be provided as more information becomes available. Thank you for your patience and understanding.
-
investigating Feb 25, 2026, 03:20 PM UTC
A backend mitigation has been implemented and we are working to confirm its effectiveness. Investigation into the root cause remains ongoing.
-
investigating Feb 25, 2026, 03:58 PM UTC
As part of our ongoing investigation, we have redirected traffic away from a subset of our infrastructure to test for service restoration. We are observing system behavior over the next several minutes to validate the effectiveness of this change. We appreciate your patience as we work toward a resolution.
-
monitoring Feb 25, 2026, 05:07 PM UTC
Service has been stabilized following successful mitigation efforts and are being monitored.
-
resolved Feb 25, 2026, 05:57 PM UTC
Issue is resolved
Read the full incident report →
- Detected by Pingoru
- Feb 25, 2026, 08:57 AM UTC
- Resolved
- Feb 25, 2026, 09:13 AM UTC
- Duration
- 16m
Affected: Resource ConnectorResource ConnectorResource ConnectorZero Trust AccessZero Trust AccessZero Trust Access
Timeline · 2 updates
-
investigating Feb 25, 2026, 08:57 AM UTC
We are currently investigating a service availability issue affecting Secure Access in the Osaka, Tokyo, and Sydney regions. Some users may experience difficulties accessing resources through the application portal or private connections. Our teams are actively working to identify the cause and restore full service as quickly as possible. We will share updates as more information becomes available. We apologize for any inconvenience caused and thank you for your patience. We’re Here to Help If you have any questions or need assistance, please contact our support team. Thank you for your understanding and support as we work to enhance your Cisco Secure Access experience.
-
resolved Feb 25, 2026, 09:13 AM UTC
The service availability issue affecting Secure Access in the Osaka, Tokyo, and Sydney regions has been resolved as of 08:55 UTC. Access to resources through the application portal and private connections is now functioning as expected.
Read the full incident report →
- Detected by Pingoru
- Feb 25, 2026, 03:42 AM UTC
- Resolved
- Feb 25, 2026, 04:17 AM UTC
- Duration
- 34m
Affected: Reserved IPReserved IPReserved IP
Timeline · 2 updates
-
investigating Feb 25, 2026, 03:42 AM UTC
We are investigating a potential issue with the Reserved IP service affecting customers connecting to the sa-east110, us-west210, and us-west211 data centers. Multiple reserved IPs are currently not reachable in these regions. As a result, network traffic may not pass through the affected reserved IPs, which could cause network connectivity issues for impacted customers. Our engineering team is actively working to confirm the impact, identify the root cause, and implement a resolution. We are committed to restoring full service as quickly as possible. Updates and additional details will be provided as new information becomes available. We appreciate your patience and understanding during this time.
-
resolved Feb 25, 2026, 04:17 AM UTC
The issue affecting Reserved IP service in sa-east110 (Brazil), us-west210 (US - California), and us-west211 (US - Pacific Northwest) has been resolved. The Reserved IP service is now operating normally. We apologize for any inconvenience caused and thank you for your patience. We’re Here to Help If you have any questions or need assistance, please contact our support team. Thank you for your understanding and support as we work to enhance your Cisco Secure Access experience.
Read the full incident report →
- Detected by Pingoru
- Feb 21, 2026, 03:00 AM UTC
- Resolved
- Feb 21, 2026, 05:34 AM UTC
- Duration
- 2h 33m
Affected: Policy EnforcementPolicy EnforcementPolicy Enforcement
Timeline · 4 updates
-
investigating Feb 21, 2026, 03:00 AM UTC
We are currently encountering delays in the propagation of firewall policy changes in the Mumbai, Middle East, and Saudi Arabia regions. Our engineering team is actively working to confirm the impact, identify the root cause, and implement a resolution. We are committed to restoring full service as quickly as possible. Updates and additional details will be provided as new information becomes available. We appreciate your patience and understanding during this time
-
investigating Feb 21, 2026, 04:23 AM UTC
Our engineering team is actively investigating the issue. We will provide another update as soon as any new information becomes available.
-
monitoring Feb 21, 2026, 05:24 AM UTC
We are no longer seeing delays in firewall policy changes in the Mumbai, Middle East, and Saudi Arabia regions, and we continue to monitor the situation closely.
-
resolved Feb 21, 2026, 05:34 AM UTC
The issue has been resolved. We apologize for any inconvenience caused and thank you for your patience.
Read the full incident report →
- Detected by Pingoru
- Feb 11, 2026, 10:02 PM UTC
- Resolved
- Feb 11, 2026, 11:23 PM UTC
- Duration
- 1h 21m
Affected: Zero Trust Access
Timeline · 4 updates
-
investigating Feb 11, 2026, 10:02 PM UTC
We are investigating an issue affecting Cisco Secure Access, where some customers may be experiencing issues with loading ZTNA posture profiles. Our engineering team is actively working to confirm the impact, identify the root cause, and implement a resolution. We are committed to restoring full service as quickly as possible. Updates and additional details will be provided as new information becomes available. We appreciate your patience and understanding during this time
-
investigating Feb 11, 2026, 10:26 PM UTC
We are still actively investigating the issue where some customers are experiencing ZTNA posture profiles not loading for multiple users. In addition, we have identified that VPN posture profiles are also impacted.
-
identified Feb 11, 2026, 11:04 PM UTC
We have identified the root cause of the issue. Our engineering teams are actively working to implement a resolution and restore full functionality as quickly as possible
-
resolved Feb 11, 2026, 11:23 PM UTC
The issue affecting ZTNA profiles and VPN posture profiles has been resolved.Thank you for your patience and understanding while we worked to restore full service.
Read the full incident report →
- Detected by Pingoru
- Feb 11, 2026, 09:12 PM UTC
- Resolved
- Feb 11, 2026, 10:35 PM UTC
- Duration
- 1h 23m
Affected: Dashboard
Timeline · 4 updates
-
investigating Feb 11, 2026, 09:12 PM UTC
We are investigating an issue affecting the Cisco Secure Access Dashboard, where some customers are unable to open the Digital Experience element, including Experience Insights and ZTNA posture, within the dashboard. Our engineering team is actively working to confirm the impact, identify the root cause, and implement a resolution. We are committed to restoring full service as quickly as possible. Updates and additional details will be provided as new information becomes available. We appreciate your patience and understanding during this time
-
investigating Feb 11, 2026, 09:46 PM UTC
We are still actively investigating the issue affecting access to the Digital Experience elements within the Cisco Secure Access Dashboard.We appreciate your patience and will provide updates as soon as new information becomes available.
-
identified Feb 11, 2026, 10:16 PM UTC
We have identified the root cause of the issue. Our engineering teams are actively working to implement a resolution and restore full functionality as quickly as possible.
-
resolved Feb 11, 2026, 10:35 PM UTC
We are pleased to inform you that the issue affecting access to the Digital Experience has been resolved. If you have any questions or need assistance, please contact our support team.
Read the full incident report →
- Detected by Pingoru
- Feb 06, 2026, 05:37 AM UTC
- Resolved
- Feb 06, 2026, 08:40 AM UTC
- Duration
- 3h 2m
Affected: APICisco Secure ClientData Loss PreventionDNSExperience InsightsNetwork Tunnel GroupsPolicy EnforcementRemote Access VPNRemote Browser IsolationReporting and LoggingReserved IPResource ConnectorWeb SecurityZero Trust Access
Timeline · 5 updates
-
investigating Feb 06, 2026, 05:37 AM UTC
We are currently experiencing loss of network connectivity at our Miami data center. As a result, all services hosted in this Data center are currently unavailable. Our engineering team is currently moving services out of rotation to backup datacenter and restore the services. We’re Here to Help If you have any questions or need assistance, please contact our support team.
-
identified Feb 06, 2026, 06:07 AM UTC
We have identified the issue and are working to restore services.
-
identified Feb 06, 2026, 06:58 AM UTC
Network connectivity has been restored for the Miami data center. We are in the process of bringing all services back into rotation. Our engineering team is closely monitoring progress.
-
monitoring Feb 06, 2026, 07:46 AM UTC
All services at the Miami data center have been brought back into rotation and are currently operational. Our engineering team is actively monitoring the environment to ensure continued stability.
-
resolved Feb 06, 2026, 08:40 AM UTC
The network connectivity issue at the Miami data center has been resolved as of 08:37 UTC. All services are now operating normally. We apologize for any inconvenience caused and thank you for your patience. We’re Here to Help If you have any questions or need assistance, please contact our support team. Thank you for your understanding and support as we work to enhance your Cisco Secure Access experience.
Read the full incident report →