SlideShare une entreprise Scribd logo
1  sur  15
CISCO IDENTITY SERVICES ENGINE (ISE)
OVERVIEW OF CISCO ISE
Cisco Identity Services Engine (ISE) is a next-generation identity
and access control policy platform that enables enterprises to
enforce compliance, enhance infrastructure security, and
streamline their service operations.
The unique architecture of Cisco ISE allows enterprises to gather
real-time contextual information from networks, users, and devices.
The administrator can then use that information to make proactive
governance decisions by tying identity to various network elements
including access switches, wireless LAN controllers (WLCs), virtual
private network (VPN) gateways, and data center switches.
CISCO ISE FUNCTIONS
Combines authentication, authorization, accounting
(AAA), posture, and profiler into one appliance
Provides for comprehensive guest access management for the Cisco
ISE administrator, sanctioned sponsor administrators, or both
Enforces endpoint compliance by providing comprehensive client
provisioning measures and assessing device posture for all
endpoints that access the network, including 802.1X environments
Provides support for discovery, profiling, policy-based placement, and
monitoring of endpoint devices on the network
Enables consistent policy in centralized and distributed deployments
that allows services to be delivered where they are needed
Employs advanced enforcement capabilities including security group
access (SGA) through the use of security group tags (SGTs) and
security group access control lists (SGACLs)
Supports scalability to support a number of deployment scenarios
from small office to large enterprise environments
CONTEXT-AWARE IDENTITY MANAGEMENT

Cisco ISE determines whether users are accessing the network on an
authorized, policy-compliant device.
Cisco ISE establishes user identity, location, and access
history, which can be used for compliance and reporting.
Cisco ISE assigns services based on the assigned user
role, group, and associated policy (job role, location, device
type, and so on).
Cisco ISE grants authenticated users with access to specific
segments of the network, or specific applications and services, or
both, based on authentication results.
BENEFITS & FEATURES
Provides comprehensive secure wired, wireless, and VPN access
which includes rigorous identity enforcement, extensive policy
enforcement, and security compliance.
Helps increase worker productivity through automated on
boarding, automated device security, and dependable anywhere
access.
Reduces operations costs by enhanced operational
efficiency, leveraging the embedded sensing and enforcement in
the existing network and the centralized policy control and visibility
to decreasing tedious efforts to secure access.
Guest lifecycle management : Enables full guest lifecycle
management, whereby guest users can access the network for a
limited time, either through administrator sponsorship or by selfsigning via a guest portal.
Rigorous identity enforcement : ISE offers the industry's first device
profiler* to identify each device; match it to its user or function and
other attributes, including time, location, and network; and create a
AAA protocols : Utilizes standard RADIUS protocol for
authentication, authorization, and accounting (AAA).
Authentication protocols : Supports a wide range of authentication
protocols, including PAP, MS-CHAP, Extensible Authentication
Protocol (EAP)-MD5, Protected EAP (PEAP), EAP-Flexible
Authentication via Secure Tunneling (FAST), and EAP-Transport
Layer Security (TLS).
Policy model : Offers a rules-based, attribute-driven policy model for
creating flexible and business-relevant access control policies. .

Access control : Provides a wide range of access control
mechanisms, including downloadable access control lists
(dACLs), VLAN assignments, URL redirect, and Security
Group Access (SGA) tagging using the advanced
capabilities of Cisco's TrustSec-enabled network devices.
Profiling : Ships with predefined device templates for a wide
range of endpoints, such as IP phones, printers, IP
cameras, smartphones, and tablets. Administrators can
also create their own device templates. These templates
can be used to automatically detect, classify, and associate
administrative-defined identities when endpoints connect
Posture :Verifies endpoint posture assessment for PCs and mobile
devices connecting to the network. Works via either a persistent
client-based agent or a temporal web agent to validate that an
endpoint is conforming to a company's posture policies. Provides
the ability to create powerful policies that include but are not
limited to checks for the latest OS patches, antivirus and
antispyware software packages with current definition file variables
(version, date, etc.), registries (key, value, etc.), and applications.
Mobile device management integration : MDM integration* enables ISE
to connect with Cisco MDM technology partner solutions to ensure
that the mobile devices that are trying to connect to the network
have previously registered with the MDM platform, are compliant
with the enterprise policy, and can help users remediate their
devices.
Endpoint protection service : Allows administrators to quickly take
corrective action (Quarantine, Un-Quarantine, or Shutdown) on riskcompromised endpoints within the network. This helps to reduce
risk and increase security in the network.
Centralized management : Enables administrators to centrally
configure and manage profiler, posture, guest, authentication, and
Monitoring and troubleshooting : Includes a built-in web console for
monitoring, reporting, and troubleshooting to assist helpdesk and
network operators in quickly identifying and resolving issues.
Offers comprehensive historical and real-time reporting for all
services, logging of all activities, and real-time dashboard metrics
of all users and endpoints connecting to the network.
Platform options : Available as a physical or virtual appliance. There
are five physical platforms as well as a VMware ESX- or ESXi-based
appliance.
Extensive policy enforcement : Based on the user's or device's
contextual identity, ISE sends secure access rules to the network
point of access so IT is assured of consistent policy enforcement
whether the user or device is trying to access the network from a
wired, wireless, or VPN connection.
Security compliance : A single dashboard simplifies policy creation,
visibility, and reporting across all company networks so it's easy to
validate compliance for audits, regulatory requirements, and
mandated federal 802.1X guidelines.
Dependable anywhere access : ISE provisions policy on the network
access device in real time, so mobile or remote users can get
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)

Contenu connexe

Tendances

Presentation f5 – beyond load balancer
Presentation   f5 – beyond load balancerPresentation   f5 – beyond load balancer
Presentation f5 – beyond load balancer
xKinAnx
 

Tendances (20)

From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE
 
Cisco Meraki Portfolio Guide
Cisco Meraki Portfolio GuideCisco Meraki Portfolio Guide
Cisco Meraki Portfolio Guide
 
SDWAN.pdf
SDWAN.pdfSDWAN.pdf
SDWAN.pdf
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Aruba Networks - Overview ClearPass
Aruba Networks - Overview ClearPassAruba Networks - Overview ClearPass
Aruba Networks - Overview ClearPass
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internet
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
 
CCNP Security-Firewall
CCNP Security-FirewallCCNP Security-Firewall
CCNP Security-Firewall
 
Cisco ASA Firewalls
Cisco ASA FirewallsCisco ASA Firewalls
Cisco ASA Firewalls
 
ClearPass Policy Model - An Introduction
ClearPass Policy Model - An IntroductionClearPass Policy Model - An Introduction
ClearPass Policy Model - An Introduction
 
Access Management with Aruba ClearPass
Access Management with Aruba ClearPassAccess Management with Aruba ClearPass
Access Management with Aruba ClearPass
 
Presentation f5 – beyond load balancer
Presentation   f5 – beyond load balancerPresentation   f5 – beyond load balancer
Presentation f5 – beyond load balancer
 
Cisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network Intuitive
 
Secure sd wan
Secure sd wanSecure sd wan
Secure sd wan
 
Voice over IP (VoIP) Deployment with Aruba Mobility Access Switch
Voice over IP (VoIP) Deployment with Aruba Mobility Access SwitchVoice over IP (VoIP) Deployment with Aruba Mobility Access Switch
Voice over IP (VoIP) Deployment with Aruba Mobility Access Switch
 
Cisco DNA
Cisco DNACisco DNA
Cisco DNA
 
Data Center Security
Data Center SecurityData Center Security
Data Center Security
 
EMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant APEMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant AP
 

En vedette

Presentaci%f3n%20 resultados%20site%20survey%20wireless
Presentaci%f3n%20 resultados%20site%20survey%20wirelessPresentaci%f3n%20 resultados%20site%20survey%20wireless
Presentaci%f3n%20 resultados%20site%20survey%20wireless
camilo14789
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered service
Gen-i
 
Simos formation-mettre-en-oeuvre-la-securite-pour-la-mobilite-avec-les-produi...
Simos formation-mettre-en-oeuvre-la-securite-pour-la-mobilite-avec-les-produi...Simos formation-mettre-en-oeuvre-la-securite-pour-la-mobilite-avec-les-produi...
Simos formation-mettre-en-oeuvre-la-securite-pour-la-mobilite-avec-les-produi...
CERTyou Formation
 
Sise formation-mettre-en-oeuvre-et-configurer-la-solution-cisco-identity-serv...
Sise formation-mettre-en-oeuvre-et-configurer-la-solution-cisco-identity-serv...Sise formation-mettre-en-oeuvre-et-configurer-la-solution-cisco-identity-serv...
Sise formation-mettre-en-oeuvre-et-configurer-la-solution-cisco-identity-serv...
CERTyou Formation
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
Chris Genazzio
 

En vedette (20)

TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
 
PIW ISE best practices
PIW ISE best practicesPIW ISE best practices
PIW ISE best practices
 
Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISE
 
Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0 Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0
 
ISE-802.1X-MAB
ISE-802.1X-MABISE-802.1X-MAB
ISE-802.1X-MAB
 
Aruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep DiveAruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep Dive
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
 
Текториал по тематике информационной безопасности
Текториал по тематике информационной безопасности Текториал по тематике информационной безопасности
Текториал по тематике информационной безопасности
 
On the methodology of isew, gpi... (neumayer, 2000)
On the methodology of isew, gpi... (neumayer, 2000)On the methodology of isew, gpi... (neumayer, 2000)
On the methodology of isew, gpi... (neumayer, 2000)
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
Presentaci%f3n%20 resultados%20site%20survey%20wireless
Presentaci%f3n%20 resultados%20site%20survey%20wirelessPresentaci%f3n%20 resultados%20site%20survey%20wireless
Presentaci%f3n%20 resultados%20site%20survey%20wireless
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered service
 
Simos formation-mettre-en-oeuvre-la-securite-pour-la-mobilite-avec-les-produi...
Simos formation-mettre-en-oeuvre-la-securite-pour-la-mobilite-avec-les-produi...Simos formation-mettre-en-oeuvre-la-securite-pour-la-mobilite-avec-les-produi...
Simos formation-mettre-en-oeuvre-la-securite-pour-la-mobilite-avec-les-produi...
 
Sise formation-mettre-en-oeuvre-et-configurer-la-solution-cisco-identity-serv...
Sise formation-mettre-en-oeuvre-et-configurer-la-solution-cisco-identity-serv...Sise formation-mettre-en-oeuvre-et-configurer-la-solution-cisco-identity-serv...
Sise formation-mettre-en-oeuvre-et-configurer-la-solution-cisco-identity-serv...
 
Cisco identity services engine (ise) ordering steps & guide
Cisco identity services engine (ise) ordering steps & guideCisco identity services engine (ise) ordering steps & guide
Cisco identity services engine (ise) ordering steps & guide
 
Punahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyPunahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case study
 
Cisco ONE - The BIG Deal
Cisco ONE - The BIG Deal Cisco ONE - The BIG Deal
Cisco ONE - The BIG Deal
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
[IoT World Forum Webinar] Review of CMX Cisco technology
[IoT World Forum Webinar] Review of CMX Cisco technology[IoT World Forum Webinar] Review of CMX Cisco technology
[IoT World Forum Webinar] Review of CMX Cisco technology
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 

Similaire à Cisco Identity Services Engine (ISE)

AOS - Wireless Solutions
AOS - Wireless SolutionsAOS - Wireless Solutions
AOS - Wireless Solutions
NGINX at F5
 
case-study-cisco-ise-project copy
case-study-cisco-ise-project copycase-study-cisco-ise-project copy
case-study-cisco-ise-project copy
Lee Millington
 
Willard_Grayson_201505
Willard_Grayson_201505Willard_Grayson_201505
Willard_Grayson_201505
Will Grayson
 

Similaire à Cisco Identity Services Engine (ISE) (20)

Cisco ISE,Eve ng online lab Services.pdf
Cisco ISE,Eve ng online lab Services.pdfCisco ISE,Eve ng online lab Services.pdf
Cisco ISE,Eve ng online lab Services.pdf
 
fortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeurfortigate-600f-series pdf manual routeur
fortigate-600f-series pdf manual routeur
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
 
Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009Mobile Worxs Net Motion Gq3 2009
Mobile Worxs Net Motion Gq3 2009
 
AOS - Wireless Solutions
AOS - Wireless SolutionsAOS - Wireless Solutions
AOS - Wireless Solutions
 
Comparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdfComparison Review Forticlient x Kaspersky.pdf
Comparison Review Forticlient x Kaspersky.pdf
 
ISE_2.1_BDM_v3a.pptx
ISE_2.1_BDM_v3a.pptxISE_2.1_BDM_v3a.pptx
ISE_2.1_BDM_v3a.pptx
 
Light sec for service providers brochure
Light sec for service providers brochureLight sec for service providers brochure
Light sec for service providers brochure
 
Forti os ngfw
Forti os ngfwForti os ngfw
Forti os ngfw
 
Ixia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution BriefIxia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution Brief
 
case-study-cisco-ise-project copy
case-study-cisco-ise-project copycase-study-cisco-ise-project copy
case-study-cisco-ise-project copy
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
 
Manoj Kumar_CA
Manoj Kumar_CAManoj Kumar_CA
Manoj Kumar_CA
 
Willard_Grayson_201505
Willard_Grayson_201505Willard_Grayson_201505
Willard_Grayson_201505
 
LTS Secure Identity Management
LTS Secure Identity ManagementLTS Secure Identity Management
LTS Secure Identity Management
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
Sangfor SSL VPN Datasheet
Sangfor SSL VPN DatasheetSangfor SSL VPN Datasheet
Sangfor SSL VPN Datasheet
 
Secure Desktop Computing In the Cloud
Secure Desktop Computing In the CloudSecure Desktop Computing In the Cloud
Secure Desktop Computing In the Cloud
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
SECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYSSECURE ACCESS GATEWAYS
SECURE ACCESS GATEWAYS
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Cisco Identity Services Engine (ISE)

  • 1. CISCO IDENTITY SERVICES ENGINE (ISE)
  • 2. OVERVIEW OF CISCO ISE Cisco Identity Services Engine (ISE) is a next-generation identity and access control policy platform that enables enterprises to enforce compliance, enhance infrastructure security, and streamline their service operations. The unique architecture of Cisco ISE allows enterprises to gather real-time contextual information from networks, users, and devices. The administrator can then use that information to make proactive governance decisions by tying identity to various network elements including access switches, wireless LAN controllers (WLCs), virtual private network (VPN) gateways, and data center switches.
  • 3. CISCO ISE FUNCTIONS Combines authentication, authorization, accounting (AAA), posture, and profiler into one appliance Provides for comprehensive guest access management for the Cisco ISE administrator, sanctioned sponsor administrators, or both Enforces endpoint compliance by providing comprehensive client provisioning measures and assessing device posture for all endpoints that access the network, including 802.1X environments Provides support for discovery, profiling, policy-based placement, and monitoring of endpoint devices on the network Enables consistent policy in centralized and distributed deployments that allows services to be delivered where they are needed Employs advanced enforcement capabilities including security group access (SGA) through the use of security group tags (SGTs) and security group access control lists (SGACLs) Supports scalability to support a number of deployment scenarios from small office to large enterprise environments
  • 4. CONTEXT-AWARE IDENTITY MANAGEMENT Cisco ISE determines whether users are accessing the network on an authorized, policy-compliant device. Cisco ISE establishes user identity, location, and access history, which can be used for compliance and reporting. Cisco ISE assigns services based on the assigned user role, group, and associated policy (job role, location, device type, and so on). Cisco ISE grants authenticated users with access to specific segments of the network, or specific applications and services, or both, based on authentication results.
  • 5. BENEFITS & FEATURES Provides comprehensive secure wired, wireless, and VPN access which includes rigorous identity enforcement, extensive policy enforcement, and security compliance. Helps increase worker productivity through automated on boarding, automated device security, and dependable anywhere access. Reduces operations costs by enhanced operational efficiency, leveraging the embedded sensing and enforcement in the existing network and the centralized policy control and visibility to decreasing tedious efforts to secure access. Guest lifecycle management : Enables full guest lifecycle management, whereby guest users can access the network for a limited time, either through administrator sponsorship or by selfsigning via a guest portal. Rigorous identity enforcement : ISE offers the industry's first device profiler* to identify each device; match it to its user or function and other attributes, including time, location, and network; and create a
  • 6. AAA protocols : Utilizes standard RADIUS protocol for authentication, authorization, and accounting (AAA). Authentication protocols : Supports a wide range of authentication protocols, including PAP, MS-CHAP, Extensible Authentication Protocol (EAP)-MD5, Protected EAP (PEAP), EAP-Flexible Authentication via Secure Tunneling (FAST), and EAP-Transport Layer Security (TLS). Policy model : Offers a rules-based, attribute-driven policy model for creating flexible and business-relevant access control policies. . Access control : Provides a wide range of access control mechanisms, including downloadable access control lists (dACLs), VLAN assignments, URL redirect, and Security Group Access (SGA) tagging using the advanced capabilities of Cisco's TrustSec-enabled network devices. Profiling : Ships with predefined device templates for a wide range of endpoints, such as IP phones, printers, IP cameras, smartphones, and tablets. Administrators can also create their own device templates. These templates can be used to automatically detect, classify, and associate administrative-defined identities when endpoints connect
  • 7. Posture :Verifies endpoint posture assessment for PCs and mobile devices connecting to the network. Works via either a persistent client-based agent or a temporal web agent to validate that an endpoint is conforming to a company's posture policies. Provides the ability to create powerful policies that include but are not limited to checks for the latest OS patches, antivirus and antispyware software packages with current definition file variables (version, date, etc.), registries (key, value, etc.), and applications. Mobile device management integration : MDM integration* enables ISE to connect with Cisco MDM technology partner solutions to ensure that the mobile devices that are trying to connect to the network have previously registered with the MDM platform, are compliant with the enterprise policy, and can help users remediate their devices. Endpoint protection service : Allows administrators to quickly take corrective action (Quarantine, Un-Quarantine, or Shutdown) on riskcompromised endpoints within the network. This helps to reduce risk and increase security in the network. Centralized management : Enables administrators to centrally configure and manage profiler, posture, guest, authentication, and
  • 8. Monitoring and troubleshooting : Includes a built-in web console for monitoring, reporting, and troubleshooting to assist helpdesk and network operators in quickly identifying and resolving issues. Offers comprehensive historical and real-time reporting for all services, logging of all activities, and real-time dashboard metrics of all users and endpoints connecting to the network. Platform options : Available as a physical or virtual appliance. There are five physical platforms as well as a VMware ESX- or ESXi-based appliance. Extensive policy enforcement : Based on the user's or device's contextual identity, ISE sends secure access rules to the network point of access so IT is assured of consistent policy enforcement whether the user or device is trying to access the network from a wired, wireless, or VPN connection. Security compliance : A single dashboard simplifies policy creation, visibility, and reporting across all company networks so it's easy to validate compliance for audits, regulatory requirements, and mandated federal 802.1X guidelines. Dependable anywhere access : ISE provisions policy on the network access device in real time, so mobile or remote users can get