ISE

June 11, 2014

NETWORKING

Cisco Meraki, Now with ISE!

We’ve been hearing from some of our customers that they are interested in using Cisco Meraki in their branches alongside their Cisco infrastructure in their main offices, but were worried about having to deal with too many segregated policy management systems. Good news: Interoperability between Cisco Meraki and ISE is here. Administrators can now define […]

May 6, 2014

NETWORKING

Get Your Mobile Workspace Solution now – from Cisco and Citrix

Having an enterprise-wide mobility strategy provides a competitive advantage as a recent IT survey from Cisco concluded.  Working with many customers over the last couple of years we have come to recognize that mobility is a multi-stage journey that every organization is taking at its own pace. While some of you might think of this journey […]

April 23, 2014

INSIDE CISCO IT

Cisco IT’s Identity Services Engine Deployment: Cluster and Server Sizing

When sizing clusters for devices in our Identity Services Engine (ISE) deployment, Cisco IT uses a “3+1” formula: For every person we assume three devices (laptop, smartphone, and a tablet) plus one device in the background (security camera, printer, network access device, etc.). In a company the size of Cisco, with roughly 80,000 employees, the […]

March 5, 2014

INSIDE CISCO IT

Cisco IT’s Identity Services Engine Deployment: First Capabilities to Roll Out

Cisco IT is deploying Identity Services Engine (ISE) globally. ISE is a security policy management and control platform that automates and simplifies access control and security compliance for wired, wireless, and VPN connectivity. We’re running ISE 1.2 Patch 3 globally and evaluating Patch 5 for its guest networking enhancements. Over the next few months, I’d […]

March 5, 2014

SECURITY

Batman, TrustSec, and PCI

One of my passions is around PCI compliance. I know that sounds oxymoronic. How can someone actually be passionate about something as dry as compliance? Well, for the sake of argument, I prefer delusional rationalization. I think of myself as Batman! I don’t have his intelligence, money, car, or cape (well, I do have the […]

February 5, 2014

SECURITY

Can You Guess Your ROI on Your Secure Access?

Cisco commissioned Forrester Consulting to examine the business value and potential return on investment (ROI) enterprises may realize by implementing Cisco Identity Services Engine (ISE)—a leading secure access solution. This is available in the recently published Forrester TEI (Total Economic Impact) Research. Four customers were interviewed for this study and covered use cases for policy-governed, unified access across the following use case scenarios: guest services; BYOD; full access across wired, wireless, and VPN; and policy networking. The calculation was based on a composite organization of 10,000 employees that reflected the four interviewed customers from higher education, utilities, and financial services markets.

January 23, 2014

SECURITY

Security Realities of IoT (Internet of Things)

Are you a security professional or IT professional just resolving the security issues with BYOD (bring-your-own-device)? Watch out, BYOD was a precursor or warm up exercise to the tsunami just hitting your shores now. The SANS Institute just completed a survey on the security viewpoints on IoT, predominantly with security and IT professionals. 78% of […]

January 9, 2014

SECURITY

2014: More Secure Access, Please

Are you back from holiday break all refreshed and ready to embrace 2014 with confidence? Many organizations will see new devices on their networks given the recent massive holiday gift giving. In particular, educational organizations will be morst likely to be impacted. It seems there was no new hot toy (must-have gift) noted this year […]

October 23, 2013

NETWORKING

Honesty is the Best BYOD Policy

Does BYOD really mean that my device will become the company’s device? Do I control my private data or does my employer? How can I make sure I maintain a...