Cisco Logo


Security

Secure access continues to be paramount for a connected world. People connect to the Internet for business and for personal use, from wired, wireless or mobile devices—locally and remotely. The Internet is a global system of interconnected networks. User devices, the Internet, and all computer networks are the target of a growing number of increasingly complex security threats. Let’s take a look at some recent trends from the Cisco Connected World Technology Report that speaks to the need for secure access:

Because of the Internet’s evolution and the role of the network as a platform in both providing rich services such as voice, video and collaboration tools, and in protecting people, businesses, and information, Cisco is uniquely positioned to lead the future of secure access. Cisco uses the network to gain visibility and to protect the organizational assets, critical services, and employees.

Two weeks ago at Cisco Live in London, there were many topics worth mentioning related to secure access, including the announcement of the next wave of Unified Access (UA)—The Intelligent Platform For the Connected World with emphasis on One Network with best-in-class wired and wireless networks unified. Core to securing this intelligent platform is the leader in Gartner’s Magic Quadrant for NAC , Cisco Identity Services Engine (ISE.). The UA announcement at Cisco Live also highlighted ISE 1.2 with features including MDM Integration (with Airwatch, Good, MobileIron, SAP/Afaria and  Zenprise/Citrix) to ensure all devices comply with security policies, an automatic  Device Feeder Service providing information on  the latest devices  so secure access is hassle-free for users and IT. This enables Cisco to offer the broadest device intelligence, doubling of Scale and Performance and allowing IT departments to handle the continuous influx of new devices. ISE 1.2 will be available during the second half of 2013.

ISE is the winning combination of network and device intelligence to ensure the most comprehensive and secure unified access. Speaking to customers in London and gaining visibility about what is on their networks was satisfying. Many customers want to see what is on the network and can do this easily with ISE in monitor mode. Some folks came across rogue devices and were surprised at the number of personal devices on their network. After knowing what’s on your network, the next step is gaining control. Gaining efficient control of these devices, while ensuring optimal connected experience makes ISE a clear winner!

Comments Are Closed

  1. Return to Countries/Regions
  2. Return to Home
  1. All Security
  2. All Security
  3. Return to Home