See How Organizations Use Cisco ISE to Centralize Policy and Secure Access
Activate the IT Transformation with Unified Access: Part 4 - Centralized Policy, Control, and Enforcement
Activate the IT Transformation with Unified Access: Part 4 - Centralized Policy, Control, and Enforcement