Cisco recently published their Annual Security Report (ASR) for 2015 and there was quite a bit of interesting information on what happened in 2014, but also trends for 2015. We saw the rise in the number of highly publicized attacks in 2014 and the fact that C-Level Executives are under a lot of pressure to improve the security of their networks and protect sensitive client data. While attackers have always targeted IT users, in 2015 the trend is shifting where the primary target is to take advantage of user behaviors to breach the network. This last point is important because once the user has been compromised or their credentials have been lifted, the attacker then has access to anything important that is connected. The Cisco 2015 ASR shows that only 43% of organizations leverage identity administration and provisioning to properly secure their networks and data. This means that over half of organizations don’t know who is accessing their networks, where they’re going or coming from, or what they’re using and if it is even authorized based on business policy. As we all know, once someone unauthorized gets inside it can be challenging to track down the incursion and negate the threat.
As the Cisco 2015 Annual Security Report shows, current security approaches aren’t sufficient. Attackers are shifting methods and becoming more sophisticated in their approaches, users are unwittingly complicit enablers, and defenders struggle to keep up with all of these things. It is time for defenders to take a different approach to security that not only outwits attackers but also makes security a competitive advantage that enables business growth.
By taking a threat-centric and operational approach to security, organizations can reduce complexity and fragmentation, while providing superior visibility, continuous control, and advanced threat protection across the extended network and the entire attack continuum.
Using Cisco technology, this approach is enabled by broad visibility for superior intelligence across the extended network, where all the solutions a customer deploys communicate with each other. Organizations using siloed solutions will have holes in their security. Siloed solutions do not provide full protection since they do not communicate with one another, thus leaving security gaps and the inability to create actionable intelligence.
Cisco can provide a holistic solution to this problem by reducing the attack surface and extending protection across the network – before, during and after attacks.
Whether you are among the 8,000 attendees participating at Cisco Live Milan in-person or among our many virtual attendees catching the live web broadcast, you’ll find lots to help you with your mobility-related projects.
Cisco Identity Services Engine (ISE) is commonly associated with use as a network access policy, BYOD and AAA platform. But to do its job in network policy, ISE collects a great breadth of telemetry about network users and devices. Whether a device is trying to access the network or is already connected, ISE knows specifics about:
- What the device type is (e.g., iPad Air 2 running iOS 8.1.2)
- How it is connected to the network (e.g., enterprise Wi-Fi)
- From where (e.g., access point in “California/SanDiego/Building 2/Floor 3/South”)
- Security and compliance posture of the device (e.g., Antimalware operating and up to date? PIN lock configured?)
- Who the user is on the device…or if it even has a user (e.g., printer)
- What policy and AD/LDAP group the user belongs to (e.g., “IT Admin” authorization group)
- Related session IP address and MAC address
While ISE primarily uses all this telemetry to establish network policies, it also shares it for use by other IT platforms. By doing so, ISE helps these platforms become more identity and device aware and thus more effective in a variety of ways. And this is where Splunk comes in.
Bring Your Own Device (BYOD) technology promises many benefits to organizations. For example, increased productivity results when users can access data with any device, anywhere, anytime. By both simplifying and automating security and policy management, IT management costs can also be reduced. There are equipment savings as well, since organizations can leverage the use of personal electronics that their employees already own.
There’s a lot to enabling BYOD. IT can’t afford to manage every single device that wants to join the network. There are also security issues, such as preventing stolen mobile devices from providing unrestricted access to sensitive data.
Cisco has worked with OneNeck IT Solutions to provide a comprehensive BYOD solution for businesses and other organizations. OneNeck IT Solutions is a Cisco Gold Partner. They have advanced specializations in mobility and security and are leading the industry in helping companies successfully embrace BYOD technology.
The OneNeck BYOD solution includes:
- Identity Services Engine: Unifies policy-based service enablement that ensures corporate and regulatory compliance of all devices on your network.
- Cisco AnyConnect Secure Mobility Client: Simplifies the VPN experience with enhanced remote access technology.
- Intelligent Network infrastructure: Security is embedded into wired, wireless, and VPN access points to provide greater visibility and enforcement.
- Mobile Device Management: Seamlessly integrates your BYOD strategy with solutions from leading market providers.
- Virtual Desktops: Provides secure access to desktops from any device.
OneNeck also offers many advanced features to assure the security of both devices and the network. You can read more about these features in this blog from OneNeck. To learn more about Cisco’s BYOD solutions, visit http://www.cisco.com/web/solutions/trends/byod_smart_solution/index.html.