Blogs
CTO of Netformx
More about Jacob Ukelson, D.Sc.
New CISA Edge Device Mandate Creates Urgent Discovery Action for Cisco Partners Supporting Government — and a Warning for Every Enterprise Network
A new federal cybersecurity mandate has put unsupported edge devices directly in the risk spotlight — and created an immediate action window for partners serving government agencies.
Per the Cybersecurity and Infrastructure Security Agency (CISA) notice on February 5, 2026, federal civilian agencies are now required to rapidly identify and remove end-of-support (EOS) edge devices because they are actively targeted by advanced threat actors. Agencies must inventory affected devices within months, replace them within a year, and implement continuous discovery going forward.
For Cisco partners supporting government customers, this is not just policy — it is a near-term execution requirement. For partners worldwide, it is also an early signal of where global cybersecurity expectations are heading not just for government but for enterprises as well. Similar lifecycle and edge-security requirements are likely to emerge across other national and regional frameworks.
What the New Requirement Means in Practice
CISA’s directive focuses on edge and boundary devices that no longer receive vendor security updates — including firewalls, routers, switches, wireless access points, load balancers, and other internet-facing infrastructure.
The required model is straightforward and urgent:
- Near term: In the next 3 months identify and submit EOS and soon-to-be-EOS edge devices
- Within 12 months: Decommission and replace unsupported devices
- Ongoing: Establish continuous discovery and lifecycle tracking process
Unsupported devices are now formally recognized as disproportionate risk because newly discovered vulnerabilities remain permanently unpatched. These systems are frequently used by attackers as initial entry and pivot points into broader networks.
Partners supporting federal environments should expect immediate demand for:
assessment, inventory validation, lifecycle reporting, and refresh planning.
Why This Is a Global Partner Message — Not Just a U.S. One
Although this directive applies to U.S. federal agencies, the risk model is universal and borderless:
- Attackers target exposed edge devices in every region
- Global supply chains interconnect public and private networks
- International regulators and cyber authorities are tightening controls
- Cyber insurers increasingly examine lifecycle hygiene
- EOS exposure is easy to exploit — and preventable everywhere
CISA leadership has encouraged non-federal organizations to adopt the same practices — and global enterprises should treat this as an early benchmark of coming expectations.
This is not just a U.S. compliance story — it is a global lifecycle security signal.
You cannot secure what you have not discovered — and you cannot protect what is no longer supported.
The Visibility Gap Is the Real Barrier
Most organizations cannot quickly produce an accurate, defensible inventory of edge devices across all sites and vendors. Vendor-only tools provide partial views. Manual inventories are slow and outdated almost immediately.
Customers struggle to answer:
- What edge devices actually exist across the environment?
- Which are already EOS or nearing EOS?
- Which are externally exposed?
- Which carry known vulnerabilities?
- Which sit outside primary management platforms?
Without automated discovery and enrichment, replacement planning becomes guesswork — and deadlines become dangerous.
Assessment-Led Engagement Is the Fastest Path Forward
Assessment should now be the first motion — not the follow-up motion.
Netformx AssetXpert network assessments use discovery – they leverage existing network protocols to automatically find devices on the network. This discovery capability is key to enable partners to rapidly discover and baseline Cisco and multivendor environments and identify:
- Edge and infrastructure devices
- EOS and lifecycle milestones
- End-of-life and last-day-of-support dates
- CVE and security advisory exposure
- Configuration and topology risk
- Replacement and refresh priorities
Assessments produce customer-ready reports and prioritized action plans — exactly what agencies and enterprises need to move quickly and confidently.
Strong Alignment with Cisco 360 Lifecycle and AI-Ready Modernization
This mandate also reinforces the direction of Cisco’s 360 partner model — better lifecycle management, proactive refresh, improved security posture, and modernization toward AI-ready infrastructure.
Assessment-driven refresh planning supports:
- Lifecycle execution and customer success motions
- Security and Zero Trust improvements
- Technology refresh acceleration
- AI-ready network upgrades
- Outcome-based partner value
Security compliance, lifecycle management, and AI readiness are no longer separate conversations — they are one modernization strategy.
Act Now: Lead with Discovery and Lifecycle Intelligence
Federal agencies are already on the clock. Enterprise customers worldwide will follow. The partners who lead now with multivendor discovery and lifecycle assessments will shape the refresh conversation instead of reacting to it.
Start with discovery. Build the EOS and lifecycle roadmap. Drive secure modernization.
👉 Read the detailed Solution Paper on AI-Ready and Secure Networks
👉 Learn how Netformx AssetXpert accelerates EOS identification and refresh planning
👉 Contact sales@netformx.com to launch an assessment motion now or request a demo.
Time is limited. Assessment-led action is the advantage.

What is the CISA Mandate on edge devices about?
A new federal cybersecurity mandate has put unsupported edge devices directly in the risk spotlight for partners serving government agencies. Agencies must identify End-of-Support (EoS) devices within months, replace them within a year, and implement continuous discovery going forward. Learn more.


