Following my previous blog post about identity and device aware IT platforms making IT operations easier and more effective, I wanted to delve a little deeper into a specific element of the IT infrastructure: Security Event & Information Management (SIEM) and Threat Defense (TD) systems.
In his blog last week, Daryl Coon announced how there’s going to be a webinar this Thursday talking about Cisco’s leading One Policy solution driver, the Identity Services Engine (ISE) and its newest enhancements—now available with its 1.2 release.
During this free event, you will learn about the new features that provide increased scalability, reliability, and ease-of-use for guest access and BYOD on-boarding. You will hear from customers who have already deployed the 1.2 release. And we will discuss how the enhancements provide significantly greater capabilities than solutions available from competing vendors.Whether you need to support BYOD work practices, or provide more secure access to your data center resources, the Cisco Identity Services Engine (ISE) can help. With this all-in-one enterprise policy control platform, you can reliably enforce compliance, enhance infrastructure security, and simplify service operations.
Already sold? Join us for the free webinar, Thursday Sept 5 at 10am PST to learn more.
Whether you need to support BYOD work practices, or provide more secure access to your data center resources, the Cisco Identity Services Engine (ISE) can help. With this all-in-one enterprise policy control platform, you can reliably enforce compliance, enhance infrastructure security, and simplify service operations.
Cisco’s leading One Policy Solution—the Identity Services Engine (ISE)—now delivers even greater capabilities.
Join us next Thursday September 5 to learn about the solution’s newest enhancements—now available with its 1.2 release. The Identity Services Engine provides a comprehensive solution to manage and maintain network access and policies—ensuring consistent enforcement across wired, wireless, and VPN networks. Register today! Read More »
In June, I attended the Gartner Security Summit in Washington, D.C. where I was asked by quite a few security executives, “My network folks just bought ISE, but what is ISE and what type of security does it provide?” Fast forward to July, and I wish I had this SANS review on ISE to offer a month earlier. (SANS, as many security professionals know, is a highly regarded organization on IT security and cyber security.) Read More »
Often when I think about what mobile means, I picture sales people out in the field, inspectors on bridges, repair men high atop utility poles. But in reality, we are all mobile a lot closer to home. I’m mobile when I check email from my backyard. I’m even mobile when I’m in the office, accessing the network from my device from a meeting room or even from my desk. Mobile truly means working from anywhere.
As employees have become increasingly mobile, their needs have changed both while they are in the office and when they are remote. And network access control has had to mature to meet user needs. SAP has been a long time partner of Cisco when it comes to managing mobile devices and networks.
Cisco easily solves the problem of determining who is allowed onto a corporate network and, once there, what they can access. Getting the correct network rights and having the ability to change attributes over time is an important area for any network administrator to control. It is a natural extension to add Mobile Device Management (MDM) to the mix for full control over mobile deployments. That’s why SAP Afaria and Cisco ISE make a fantastic pair.
Companies who have both Afaria and Cisco Identity Services Engine (ISE) can configure ISE to only allow network access to devices that are managed by Afaria and are compliant. ISE can then route non-compliant devices to the Afaria Self Service Portal where users can enroll their device and get access to the corporate network. For an administrator, the combination of Afaria and Cisco ISE provides a single view into the compliance status of network identity across all regions with detailed visibility into all kinds of devices management information. The ability to add contextual awareness to your access control is interesting to ponder. For example, perhaps an employee is OK to access the company network when in the United States, but not when traveling abroad. You can have the added contact to allow or disallow access with very specific requirements. Administrators love the ability to gain immediate insight into non-compliant devices trying to connect to the network – and shut them down!
SAP’s expertise in mobile device management is only one aspect of a comprehensive system. The company’s expertise in real time data management and analytics also come in to play. Imagine the capabilities you would have with real time analysis of compliance across all of your global networks and devices. You’d have the ability to capture high volume of data from all sources and translate that into valuable reporting and dashboard capabilities via a great user experience. For example, you could gain insight into overall device adoption rates, network usage, BYOD compliance, track devices attempting to connect without the proper enrollment, etc. One example that is particularly interesting is tracking data roaming – being able to know at any point in time what devices are roaming without a data plan.