SlideShare a Scribd company logo
1 of 28
June 2016
See It All, Secure It Now
Identity Services Engine
(ISE)
How Many Devices Will Connect to Your
Network by 2030?
devices will be connected
worldwide
500B
of people currently use
personal devices at work,
regardless of BYOD policies
and lack of security
67%
It’s Harder Than Ever to See Who Is on Your
Network and What They Are Doing
?
And you can’t protect what you don’t see
?
of surveyed organizations are
not “fully aware” of the devices
accessing their network
90%
of companies say their mobile
devices were targeted by
malware in the last 12 months
75%
?
If Only You Had the Right Tools to…
See who and
what is on
your network
Grant access on a
“need to know” basis
Share information to
bolster security
Detect and respond
to threats
With Cisco Identity Services Engine You Can
Stop and contain threats
See and share rich user
and device details
Control all access
throughout the network
from one place
Introducing Cisco Identity Services Engine (ISE)
Network Resources
Access Policy
Traditional
Cisco
TrustSec®
BYOD Access
Threat Containment
Guest Access
Role-Based
Access
Identity Profiling
and Posture
A centralized security solution that automates context-aware access to network resources and shares
contextual data
Network
Door
Physical or VM
ISE pxGrid
Controller
Who
Compliant

What
When
Where
How
Context
Threat (New!)
Vulnerability (New!)
Context Enhances Protection Across the
Attack Continuum
• Gain visibility into who and
what is on your network
• Grant access on a
“need to know” basis
• Provide threat context to network
behavioral analysis
• Contain through network
elements and security ecosystem
• Get better forensics and prepare
for the next attack by sharing
information with ecosystem
partners
BEFORE
ISE
How What
Who
Where
When
DURING AFTER
With ISE You Can
Stop and contain threats
See and share rich user
and device details
Control all access
throughout the network
from one place
Control It All from a Single Location
Network, Data, and Applications
Remote User
Contractor
Guest
Wireless VPN
Wired
Branch
Headquarters
Secure access from any
location, regardless of
connection type
Apply access and usage
policies across the entire
network
Monitor access, activity,
and compliance of
noncorporate assets
Administrator
Enterprise
Mobility
Partner
Enable Faster and Easier Device Onboarding
without Any IT Support
Internal
Employee
Intranet
www
Confidential
HR Records
?
Device Profiling
Employee
Simplified device management
from self-service portal
Automated authentication and
access to business assets
Rapid device identification with
out-of-the-box profiles
IT Staff
SimplifyAccess Management While MaintainingSecurity
Easy Connect
Capabilities
• Active-session monitoring across
both AD and Network log-ins
• Session maintenance from Wired
MAB clients to NADs
• Directory notification publication
via pxGrid
• Address legacy and unsupported
NADs with TrustSec
• Assignment of VLANs, dACLs,
SGTs and more for users
authorized via Easy Connect
Most secure
with integrated 802.1X, supplicants
and certificates
Basic
with whitelisting
Access
Security
Better and flexible
with ISE Easy Connect
Benefits
What’s New for ISE 2.1?
Easy Connect is a quick, flexible user
authentication method that applies
when endpoints don’t support 802.1x.
Easy Connect monitors user login via
Active Directory and maps the user’s
identity to give access.
Increased visibility
into active network sessions
authenticated against AD
Immediate value
with no need to touch each
endpoint or require users to
authenticate again
Flexible deployment
that doesn’t require a supplicant
or PKI, allowing ISE to issue
COA for added security
Complexity
Access Security
Complexity
Access
Security Complexity
EasyConnect, a Secure Alternative to Whitelisting
Easy Connect merges RADIUS identity with AD
Login identity to deliver differentiated access
Identity
mapping
Active Directory
(AD) Login
Publish
to pxGrid
SXP
speaker
Publish
to pxGrid
MnT
Network
Access Device
w/o 802.1x
Improve Guest Experiences without
Compromising Security
Guest
Guest
Guest
Sponsor
Internet
Internet
Internet and
Network
Immediate,
uncredentialed Internet
access with Hotspot
Simple self-registration
Role-based access with
employee sponsorship
OS patches?
AV installed?
Registered?
Custom
criteria?
? Vulnerable?

Rest Assured That Cisco ISE Is Keeping Track
Enterprise Mobility
Management
(EMM) Integrations
Identifies Device Checks Posture
Verifies Policy
Compliance
Quarantines Non-
Compliant Devices


X

X X
Threat? X
MaaS360
AirWatch
SAP
MobileIron
Citrix
Microsoft
Good
Give the Right People on the Right Devices the Right
Access to the Right Resources with Cisco TrustSec
Internet
Confidential
Patient Records
Internal
Employee
Intranet
Who: Guest
What: iPad
Where: Office
Who: Receptionist
What: iPad
Where: Office
Who: Doctor
What: Laptop
Where: Office
Enforce business role policies
for all network services
and decisions
Define security groups and
access policies based on
business roles
Implement granular control on
traffic, users, and assets
access-list 102 permit tcp 37.85.170.24 0.0.0.127 lt 3146 77.26.232.98 0.0.0.127 gt 1462
access-list 102 permit tcp 155.237.22.232 0.0.0.127 gt 1843 239.16.35.19 0.0.1.255 lt 4384
access-list 102 permit icmp 136.237.66.158 255.255.255.255 eq 946 119.186.148.222 0.255.255.255 eq 878
access-list 102 permit ip 129.100.41.114 255.255.255.255 gt 3972 47.135.28.103 0.0.0.255 eq 467
with Cisco TrustSec
Traditional Security Policy
Cisco TrustSec® Security Policy
Security Control Automation
Simplified Access Management
Improved Security Efficacy
Network Fabric
Switch Router DC FW DC Switch
Wireless
Flexible and Scalable Policy Enforcement
Software-Defined
Segmentation
With ISE You Can
Stop and contain threats
See and share rich user
and device details
Control all access
throughout the network
from one place
Make Fully Informed Decisions with Rich
Contextual Awareness
Context
Who
What
Where
When
How
IP address 192.168.1.51
Unknown
Unknown
Unknown
Unknown
Bob
Tablet, iOS, v. 9.1x
Building 200, first floor
11:00 a.m. EST on April 10
Wireless
The right user, on the right device, from the
right place is granted the right access
Any user, any device, anywhere gets on
the network
Result
Poor Context Awareness Extensive Context Awareness
Streamlined Visibility: Uncover Endpoints
and Potential Threats
192.168.24.3 192.168.24.13
192.168.24.5
192.168.24.11
192.168.24.12
No Access
X
Local
Network
X

Local
Network
File Server
Access
 
Employee
Portal
Internet
Access
 
Enterprise
Network
X
Surveillance
Analytics

IP Camera
Where: Room 12
When: 9/12/15
How: Automatic
Mobile Phone
Where: Lobby
When: 3:21 p.m.
How: Hotspot
Pen Drive
Where: Room 223
When: 12:31 p.m.
How: Unknown
IoT Security Camera
Where: Loading 223
When: 9/2/25
How: Automatic
Corporate Managed Tablet
Where: Commons
When: 9/8/15
How: VPN
Data Center
Access
With ISE You Can
Stop and contain threats
See and share rich user
and device details
Control all access
throughout the network
from one place
Enable Unified Threat Response by Sharing
Contextual Data
Cisco Platform Exchange Grid (pxGrid)
When
Where
Who
How
What
Cisco and Partner
Ecosystem
ISE
Cisco Network
pxGrid
Controller
Context
3
2
1
4
5
Cisco® ISE collects
contextual data from network
1
Context is shared via
pxGrid technology
2
Partners use context to
improve visibility to
detect threats
3
Partners can direct ISE to
rapidly contain threats
4
ISE uses partner data to
update context and
refine access policy
5
ISE Is the Cornerstone of Your
Cisco Security Solutions
NetFlow
NGIPS
StealthWatch®
AMP
AMP Threat Grid
FirePOWER Console
CWS
WSA
ESA
FirePOWER™ Services
DURING AFTER
BEFORE
ISE
How What
Who
Where
When
And Easily Integrates with Partner Solutions
ISE pxGrid
controller
How What
Who
Where
When
SIEM EMM/MDM Firewall
Vulnerability
Assessment
Threat
Defense
IoT IAM/SSO PCAP
Web
Security
CASB
Performance
Management
Cisco
Meraki
Lancope Splunk Emulex
Ping
Identity Bayshore Tenable
Network Security
Infoblox CheckPoint
See How Endpoints Act on the Network
with Better Visibility
Rapid Threat Containment
Data
StealthWatch
By Lancope
Network Sensor
• Cisco® ISE
• Cisco networking portfolio
• Cisco IOS® NetFlow
Network Sensor
• Cisco Stealthwatch
• Cisco Firepower Management Center
- Cisco NGFW
- Cisco NGIPS
- Cisco AMP
And Make Visibility Actionable Through
Segmentation and Automation
Network as an Enforcer
ADMIN
ZONE
ENTERPRISE
ZONE
POINT-OF-SALE
ZONE
VENDOR
ZONE
• Cisco® ISE
• Cisco networking portfolio
• Cisco IOS® NetFlow
• Cisco Stealthwatch®
• Cisco TrustSec® software-defined
segmentation
EMPLOYEE
ZONE
DEV
ZONE
Cisco ISE Delivers
1. Simplified access delivery
across wired, wireless, and
VPN connections
2. Visibility into who and what is on
your network that shared across
security and network solutions
3. Reduced risk and threat
containment by dynamically
controlling network access
ISE allows you to see it all
and secure it now
“Cisco ISE unifies and automates access control to proactively enforce role-based access to
enterprise networks and resources.”
— SC Company 2016
Don’t Just Take It from Us
Recognized as a LEADER, four years in a row
— Gartner Magic Quadrant for NAC: 2014, 2013, 2012, 2011
A CHAMPION in Info-Tech Vendor Landscape for NAC
— Info-Tech Research Group, 2014
Recipient of the 2016 Frost & Sullivan Global NAC Market Leadership Award
“In this generation NAC platform, Cisco wanted to make an easier, more intuitive platform
while adding features and functionality. Cisco has gone a long way toward achieving
these objectives.”
— Frost & Sullivan, 2016
Let’s Get Started
Visit www.cisco.com/go/ise
Contact your authorized Cisco partner
ISE_2.1_BDM_v3a.pptx

More Related Content

Similar to ISE_2.1_BDM_v3a.pptx

Similar to ISE_2.1_BDM_v3a.pptx (20)

Eximbank security presentation
Eximbank security presentationEximbank security presentation
Eximbank security presentation
 
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutionsCisco Connect 2018 Malaysia - Secure data center and mobility solutions
Cisco Connect 2018 Malaysia - Secure data center and mobility solutions
 
TechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISETechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISE
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
Meraki powered services bell
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
 
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
Secure & Automate AWS Deployments with Next-Generation Security from Palo Alt...
 
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
Cisco Connect 2018 Thailand - Security automation and programmability mr. kho...
 
Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics Cisco Connect 2018 Thailand - Telco service provider network analytics
Cisco Connect 2018 Thailand - Telco service provider network analytics
 
Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...Micro segmentation and zero trust for security and compliance - Guardicore an...
Micro segmentation and zero trust for security and compliance - Guardicore an...
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
 
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
DEVNET-1123	CSTA - Cisco Security Technical Alliances, New Program for Ecosys...DEVNET-1123	CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
DEVNET-1123 CSTA - Cisco Security Technical Alliances, New Program for Ecosys...
 
How to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network SecurityHow to Overcome Network Access Control Limitations for Better Network Security
How to Overcome Network Access Control Limitations for Better Network Security
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution brief
 
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Cisco Connect 2018 Thailand - Software defined access a transformational appr...Cisco Connect 2018 Thailand - Software defined access a transformational appr...
Cisco Connect 2018 Thailand - Software defined access a transformational appr...
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

ISE_2.1_BDM_v3a.pptx

  • 1. June 2016 See It All, Secure It Now Identity Services Engine (ISE)
  • 2. How Many Devices Will Connect to Your Network by 2030? devices will be connected worldwide 500B of people currently use personal devices at work, regardless of BYOD policies and lack of security 67%
  • 3. It’s Harder Than Ever to See Who Is on Your Network and What They Are Doing ? And you can’t protect what you don’t see ? of surveyed organizations are not “fully aware” of the devices accessing their network 90% of companies say their mobile devices were targeted by malware in the last 12 months 75% ?
  • 4. If Only You Had the Right Tools to… See who and what is on your network Grant access on a “need to know” basis Share information to bolster security Detect and respond to threats
  • 5. With Cisco Identity Services Engine You Can Stop and contain threats See and share rich user and device details Control all access throughout the network from one place
  • 6. Introducing Cisco Identity Services Engine (ISE) Network Resources Access Policy Traditional Cisco TrustSec® BYOD Access Threat Containment Guest Access Role-Based Access Identity Profiling and Posture A centralized security solution that automates context-aware access to network resources and shares contextual data Network Door Physical or VM ISE pxGrid Controller Who Compliant  What When Where How Context Threat (New!) Vulnerability (New!)
  • 7. Context Enhances Protection Across the Attack Continuum • Gain visibility into who and what is on your network • Grant access on a “need to know” basis • Provide threat context to network behavioral analysis • Contain through network elements and security ecosystem • Get better forensics and prepare for the next attack by sharing information with ecosystem partners BEFORE ISE How What Who Where When DURING AFTER
  • 8. With ISE You Can Stop and contain threats See and share rich user and device details Control all access throughout the network from one place
  • 9. Control It All from a Single Location Network, Data, and Applications Remote User Contractor Guest Wireless VPN Wired Branch Headquarters Secure access from any location, regardless of connection type Apply access and usage policies across the entire network Monitor access, activity, and compliance of noncorporate assets Administrator Enterprise Mobility Partner
  • 10. Enable Faster and Easier Device Onboarding without Any IT Support Internal Employee Intranet www Confidential HR Records ? Device Profiling Employee Simplified device management from self-service portal Automated authentication and access to business assets Rapid device identification with out-of-the-box profiles IT Staff
  • 11. SimplifyAccess Management While MaintainingSecurity Easy Connect Capabilities • Active-session monitoring across both AD and Network log-ins • Session maintenance from Wired MAB clients to NADs • Directory notification publication via pxGrid • Address legacy and unsupported NADs with TrustSec • Assignment of VLANs, dACLs, SGTs and more for users authorized via Easy Connect Most secure with integrated 802.1X, supplicants and certificates Basic with whitelisting Access Security Better and flexible with ISE Easy Connect Benefits What’s New for ISE 2.1? Easy Connect is a quick, flexible user authentication method that applies when endpoints don’t support 802.1x. Easy Connect monitors user login via Active Directory and maps the user’s identity to give access. Increased visibility into active network sessions authenticated against AD Immediate value with no need to touch each endpoint or require users to authenticate again Flexible deployment that doesn’t require a supplicant or PKI, allowing ISE to issue COA for added security Complexity Access Security Complexity Access Security Complexity EasyConnect, a Secure Alternative to Whitelisting Easy Connect merges RADIUS identity with AD Login identity to deliver differentiated access Identity mapping Active Directory (AD) Login Publish to pxGrid SXP speaker Publish to pxGrid MnT Network Access Device w/o 802.1x
  • 12. Improve Guest Experiences without Compromising Security Guest Guest Guest Sponsor Internet Internet Internet and Network Immediate, uncredentialed Internet access with Hotspot Simple self-registration Role-based access with employee sponsorship
  • 13. OS patches? AV installed? Registered? Custom criteria? ? Vulnerable?  Rest Assured That Cisco ISE Is Keeping Track Enterprise Mobility Management (EMM) Integrations Identifies Device Checks Posture Verifies Policy Compliance Quarantines Non- Compliant Devices   X  X X Threat? X MaaS360 AirWatch SAP MobileIron Citrix Microsoft Good
  • 14. Give the Right People on the Right Devices the Right Access to the Right Resources with Cisco TrustSec Internet Confidential Patient Records Internal Employee Intranet Who: Guest What: iPad Where: Office Who: Receptionist What: iPad Where: Office Who: Doctor What: Laptop Where: Office Enforce business role policies for all network services and decisions Define security groups and access policies based on business roles Implement granular control on traffic, users, and assets
  • 15. access-list 102 permit tcp 37.85.170.24 0.0.0.127 lt 3146 77.26.232.98 0.0.0.127 gt 1462 access-list 102 permit tcp 155.237.22.232 0.0.0.127 gt 1843 239.16.35.19 0.0.1.255 lt 4384 access-list 102 permit icmp 136.237.66.158 255.255.255.255 eq 946 119.186.148.222 0.255.255.255 eq 878 access-list 102 permit ip 129.100.41.114 255.255.255.255 gt 3972 47.135.28.103 0.0.0.255 eq 467 with Cisco TrustSec Traditional Security Policy Cisco TrustSec® Security Policy Security Control Automation Simplified Access Management Improved Security Efficacy Network Fabric Switch Router DC FW DC Switch Wireless Flexible and Scalable Policy Enforcement Software-Defined Segmentation
  • 16. With ISE You Can Stop and contain threats See and share rich user and device details Control all access throughout the network from one place
  • 17. Make Fully Informed Decisions with Rich Contextual Awareness Context Who What Where When How IP address 192.168.1.51 Unknown Unknown Unknown Unknown Bob Tablet, iOS, v. 9.1x Building 200, first floor 11:00 a.m. EST on April 10 Wireless The right user, on the right device, from the right place is granted the right access Any user, any device, anywhere gets on the network Result Poor Context Awareness Extensive Context Awareness
  • 18. Streamlined Visibility: Uncover Endpoints and Potential Threats 192.168.24.3 192.168.24.13 192.168.24.5 192.168.24.11 192.168.24.12 No Access X Local Network X  Local Network File Server Access   Employee Portal Internet Access   Enterprise Network X Surveillance Analytics  IP Camera Where: Room 12 When: 9/12/15 How: Automatic Mobile Phone Where: Lobby When: 3:21 p.m. How: Hotspot Pen Drive Where: Room 223 When: 12:31 p.m. How: Unknown IoT Security Camera Where: Loading 223 When: 9/2/25 How: Automatic Corporate Managed Tablet Where: Commons When: 9/8/15 How: VPN Data Center Access
  • 19. With ISE You Can Stop and contain threats See and share rich user and device details Control all access throughout the network from one place
  • 20. Enable Unified Threat Response by Sharing Contextual Data Cisco Platform Exchange Grid (pxGrid) When Where Who How What Cisco and Partner Ecosystem ISE Cisco Network pxGrid Controller Context 3 2 1 4 5 Cisco® ISE collects contextual data from network 1 Context is shared via pxGrid technology 2 Partners use context to improve visibility to detect threats 3 Partners can direct ISE to rapidly contain threats 4 ISE uses partner data to update context and refine access policy 5
  • 21. ISE Is the Cornerstone of Your Cisco Security Solutions NetFlow NGIPS StealthWatch® AMP AMP Threat Grid FirePOWER Console CWS WSA ESA FirePOWER™ Services DURING AFTER BEFORE ISE How What Who Where When
  • 22. And Easily Integrates with Partner Solutions ISE pxGrid controller How What Who Where When SIEM EMM/MDM Firewall Vulnerability Assessment Threat Defense IoT IAM/SSO PCAP Web Security CASB Performance Management Cisco Meraki Lancope Splunk Emulex Ping Identity Bayshore Tenable Network Security Infoblox CheckPoint
  • 23. See How Endpoints Act on the Network with Better Visibility Rapid Threat Containment Data StealthWatch By Lancope Network Sensor • Cisco® ISE • Cisco networking portfolio • Cisco IOS® NetFlow Network Sensor • Cisco Stealthwatch • Cisco Firepower Management Center - Cisco NGFW - Cisco NGIPS - Cisco AMP
  • 24. And Make Visibility Actionable Through Segmentation and Automation Network as an Enforcer ADMIN ZONE ENTERPRISE ZONE POINT-OF-SALE ZONE VENDOR ZONE • Cisco® ISE • Cisco networking portfolio • Cisco IOS® NetFlow • Cisco Stealthwatch® • Cisco TrustSec® software-defined segmentation EMPLOYEE ZONE DEV ZONE
  • 25. Cisco ISE Delivers 1. Simplified access delivery across wired, wireless, and VPN connections 2. Visibility into who and what is on your network that shared across security and network solutions 3. Reduced risk and threat containment by dynamically controlling network access ISE allows you to see it all and secure it now
  • 26. “Cisco ISE unifies and automates access control to proactively enforce role-based access to enterprise networks and resources.” — SC Company 2016 Don’t Just Take It from Us Recognized as a LEADER, four years in a row — Gartner Magic Quadrant for NAC: 2014, 2013, 2012, 2011 A CHAMPION in Info-Tech Vendor Landscape for NAC — Info-Tech Research Group, 2014 Recipient of the 2016 Frost & Sullivan Global NAC Market Leadership Award “In this generation NAC platform, Cisco wanted to make an easier, more intuitive platform while adding features and functionality. Cisco has gone a long way toward achieving these objectives.” — Frost & Sullivan, 2016
  • 27. Let’s Get Started Visit www.cisco.com/go/ise Contact your authorized Cisco partner

Editor's Notes

  1. SCRIPT: My name is <> and I’m a <> at Cisco. This presentation will go over the business case for ISE 2.0. Why it matters, what it can accomplish.
  2. The enterprise network today extends around the globe—to wherever employees are and to wherever their data flows. These employees require access to enterprise resources in more ways than ever before – whether they’re inside or outside of the office and regardless of what device they’re using. This shift towards greater flexibility for employees is forcing enterprises to face a rapidly changing environment that features a more dynamic threat landscape, a lot of fragmentation, and greatly increased complexity. Think about it: mobility , cloud services, and the Internet of Everything (IoE) are fundamentally changing the way we live and work, and, as a result, enterprises are challenged to support a massive proliferation of new network-enabled devices. Tack on all the cloud services being used – both approved and non-approved – across the modern enterprise and the forecast of 500 BILLION devices connecting to networks by 2030 (which I think is conservative), and you can see how important and how challenging it is to secure access in this constantly evolving enterprise network. http://www.cisco.com/c/r/en/us/internet-of-everything-ioe/internet-of-things-iot/index.html Many of these devices are non-corporate assets—67% of people bring their own devices to work, often times ignoring BYOD policies and being completely unaware of the security risk they might pose. http://voicevault.com/three-frightening-mobile-security-statistics-will-make-believer-voice-biometrics/ T: But what does this mean for your network? <click>
  3. As more and more employees bring their personal devices onto the corporate network , organizations start to lose sight of exactly what and who is on their network. A recent report noted that 90% of surveyed organizations were not “fully aware” of the devices accessing their network. These “blind spots” in your network quickly translate to security threats. Basically, if you can’t even see what is accessing your network, its going to be an even bigger challenge to secure it across all devices and all users for proactive protection against threats. And it’s not really a matter of “if” your company data will be face a security threat such as a data breach or malware attack, it’s a matter of “when”: According to the Ponemon Institute in the 2015 State of the Endpoint Report: User-Centric Risk, 75% of companies say their mobile devices were targeted by malware in the last 12 months. Data theft and targeted phishing campaigns are on the rise and are becoming increasingly sophisticated. Malware attacks are more sophisticated than the basic phishing attacks of 20 years ago. For example, the Stuxnet virus physically destroyed hundreds to thousands of uranium enrichment centrifuges. Recent breaches at high profile retailers resulted in tens of millions of credit card accounts being compromised and stolen. Devastating, to say the least. Again, the problem enterprises are facing in an increasingly mobile environment is that <click> you can’t protect what you don’t see. In fact, 66% of organizations simply, outright fail to detect a breach for months or even years. (Verizon Data Breach Report - http://www.secretservice.gov/Verizon_Data_Breach_2013.pdf). Scarier still is that today’s advanced, persistent threats can sit quietly in an enterprise infrastructure, moving laterally, to find the right unprotected asset that allows it to elevate rights and gain access to the most important company data. <click>
  4. This is the scenario that is keeping business decision makers (like yourself) awake at night. The stakes are high, and the challenge is complex. But it doesn’t have to be . With the right solution, you could solve for mobile network security. The “right solution” would be one that gives you: Visibility of who and what is on your network The tools to grant access on a “need to know” basis, so that even people that get on the network can only access the information they are entitled to The ability to share information and data with other components of your security solution And the ability to better detect and respond to behavior that doesn’t belong anywhere on your network T: But is it really possible to get all of these things from a single solution? <click>
  5. Yes, with Cisco Identity Services Engine. With this solution you can: Control all access throughout the network, from one place See and share rich user and device details Stop and contain threats Let’s look at ISE in more detail.
  6. What is Cisco ISE? ISE is a centralized security solution that automates context-aware access to network resources and shares contextual data. Here’s how it works… In reality, you have many different types of users trying to get onto a network. In this case, not a an employee, but also not a guest. The contractor needs access, perhaps only temporarily, to certain network resources in order to do her job effectively and efficiently. ISE collects contextual data from the network (like DHCP, NetFlow, etc.), the type of device, and the user identity (e.g., from Active Directory) and pulls that information in. It also collects context from integrated partners when evaluating posture or compliance. Now, with a contextual identity established, ISE is able to bring together these disparate pieces of data to a single location and make a more fully-informed decision regarding access. ISE now incorporates vulnerability assessment and threat incident intelligence to drive network policy. This also allows ISE to change network privileges dynamically in the event that an endpoint’s threat score changes. Here, the contractor may get access to certain file servers and the employee intranet, but obviously not admin servers, etc. Other examples include: You’re a visitor…you get guest access. You’re a corporate employee on an iPad…you get employee access that varies depending whether your device is a corporate or non-corporate managed asset. And different employees can get access to different parts on the network based on their specific business roles and data requirements. An HR employee will get access to employee personal records, while a finance executive will have access to financial data, but not necessarily HR records. And of course, if you’re using a device that is compromised with malware or just not compliant…you get zero access to the network. By eliminating these unknowns and ensuring device compliance, we’re able to provide the RIGHT level of access to the RIGHT user at the RIGHT time while reducing the overall attack surface by preventing compromised entities from gaining access in the first place. These role-based access policies enabled through segmentations, accomplished either traditionally, or with Cisco’s TrustSec, which allow you to dynamically segment your network without the complexity of VLANs and ACLs. You can also share all the rich contextual information you gather with your other Cisco solutions and your partner ecosystem through pxGrid technology. And the best part – you can deploy ISE with a single physical appliance or run it on a virtual machine. T: With deeper visibility and context, we get more accurate identification, which ensures that users and devices are onboarded seamlessly with greater, more granular security, and your network is protected from threats. <click>
  7. And of course, ISE is full integrated with other Cisco products to enhance protection before, during, and after an attack. It works before an attack to manage and define networks access, as described above. It provides better visibility into an attack with its context sharing capabilities across platforms. It also provides better security during an attack through network segmentation, which prevents the lateral movements of threats across the network. And finally, it promotes enhanced security after the attack by using the security event data to help fine tune secure access policies that better manage who and what can access the network and network resources. T: Now, let’s dive into the details… <click>
  8. First, how ISE lets you control network access from one place.
  9. Centralized policy management can control network access and usage policies from a single location. Customers have the flexibility to manage policies for a variety of use cases including secure access, guest management, TrustSec, and enterprise mobility. ISE provides secure access management capabilities over all users, regardless of connection type. Wired, wireless and remote users can connect directly, or through VPNs, and receive the same unified access and control found when connected to the corporate Ethernet. Centralized policy management controls access and usage policies across the entire network from a single location that can be managed either onsite or off. Customers can control individual branches or the entire business. ISE also delivers guest and enterprise mobility management capabilities so customers can regulate access to internet, network, and company files. Customers can set up automatic rules or offer employee sponsorships to ensure that guests and contractors get the access they need while still maintaining overall company security. T: ISE not only implements policies across the network from a single location, but uses superior visibility to provide device onboarding management. <Click>
  10. It used to be easy to secure corporate assets. They were managed and maintained by IT, and only the devices that were provisioned were allowed on the network. Today, the trend is to work on your personal smart device. Whether for financial reasons (i.e., cheaper for enterprises) or for productivity reasons (i.e., people want to use their own iPads), enterprise mobility on non-corporate assets is here to stay. However, this creates a scenario where all these new devices are attempting to access the network. How do we control their access? How can we tell that they’re compliant with corporate policy? How do we know they’re secure and uncompromised? Luckily, with Cisco ISE, there is full functionality out of the box that allows for full command over every aspect of managing and securing an enterprise mobility project. ISE delivers fully customizable user experiences with themes and gives end users control to add and manage their devices. ISE also simplifies the task of managing certificates for non-corporate devices. In order to reduce the complexity and expense, ISE offers a native Certificate Authority, designed to work in concert as a self-contained solution or with existing Enterprise Public Key Infrastructure (PKI) to simplify these deployments: by managing endpoints and the certificates. When an endpoint is deleted ISE deletes the certificate. T: This visibility also enables guests to quickly profile and onboard devices as well. <click>
  11. With ISE 2.1 we are introducing a feature called Easy Connect, which offers a quick, easy, and flexible method for user authentication that applies when endpoints don’t support 802.1x. We understand that 802.1x can be hard to deploy, and requires touching each endpoint. And we understand that users often complain about additional app authentications. We listened to the need for an option that doesn’t require 802.1x roll out and that doesn’t require touching each endpoint. Easy Connect addresses all of those concerns. Unlike competitors who use a MAC address to give devices network access, Easy Connect permits access to the network with user information behind it. Easy Connect finds devices based on the user, and gives differentiated access with no 802.1x involved. The moment a user authenticates with Easy Connect, ISE maps the user’s identity and pushes a tag to the endpoint to enable policy enforcement, even if the network isn’t configured with TrustSec. ISE can be an SXP speaker that directly points back from the endpoint, enabling tags to be passed along for enforcement so that TrustSec can work with a broad set of devices (e.g. third-party devices like a non-supported access switch). ISE also publishes information using pxGrid.
  12. The same great visibility available on employee devices is available with guests as well. Customers can see the who, what, when, and where of the connection to maintain security. With support for a variety of browsers on both computers and mobile devices, ISE can identify the type of device that guests are using and send them an easy-to-use onboarding screen compatible with their machine. In many instances, guests only have the ability to use the internet, rather than the company’s network. ISE provides guests with the right type of access immediately with internet access through a hotspot, or a brief, self-registration portal, which may allow registered users more access. With ISE, employees can also sponsor guests so they can access the information they need, whether it be guests needing to access online services or contractors needing information to perform jobs. These sponsorships can be customized by administrators or by individual employees. Because of the variety of devices supported and the ease of onboarding, guests can often get up and going without the need for specialized assistance, reducing the burden on IT staff. T: Of course, whether it is secure access, guest access, or enterprise mobility access, all devices must be compliant… <click>
  13. ISE first identifies and checks the posture of devices automatically whenever they access the network. This ensures that all devices meet security requirements at all times. In addition, customers can create their own custom criteria that devices must have in order to gain network access. This enables business to maintain compliance with their own business policies, industry regulations and government compliance. ISE can also implement quarantines on devices that do not meet regulations, whether preset or custom. Users can limit the access of such devices or even deny access completely. Oftentimes, these devices are denied network access but can still access the internet or IT services in order to remediate their deficiencies and maintain compliance. In addition, ISE offers integrations with enterprise mobility management (EMM) platforms – including Cisco’s own Meraki Systems Manager Enterprise – to offer complete enterprise mobility control to administrators. T: The robust identity and access control features of ISE are available on a variety of different licenses. <Click>
  14. The problem is this: As enterprises become more complex and more distributed, consistent network policy potentially becomes more complicated. Multiple SSIDs, different network segmentation, different sets of rules depending on how a user accesses the network. Cisco TrustSec, controlled by ISE, delivers Simplified Access Management across the entire business. It works by categorizing and tagging devices and then using those tags to push policies and regulate access. While developers need access to developer databases and storage, the HR department needs access to employee documents and legal information. Neither group has any need to access the other’s information. Executives and management however, may need access to all categories. TrustSec tags can be set on the basis of device type, user role and a variety of other criteria. This simplified access management brings accelerated security options. By categorizing users, customers can simplify firEasyConnectll administration, avoiding the common rule explosions that happen when new servers are onboarded. Creating rules based on tags results in fewer rules that are more easily maintained. Easier maintenance reduces the burden on IT staff and enables them to focus on other, more pressing issues instead. In addition to accelerated security, the simplification also results in consistent policies. Users can control devices from a central location, regardless of device type or connection method. Individual tags can be customized and policies enforced separately to maintain the access your employees need without increased IT strain. T: Next, let’s talk about how TrustSec enables you to easily segment your network… <click>
  15. TrustSec is a core technology for segmentation that ISE controls. TrustSec uses abstract security policy by grouping source and destination objects based on context and/or role. Think of Access Control List with ”Deny TCP Employee to HR Server eq HTTPS”. The employee could be anyone who’s classified as employee by using context / attributes. Same for HR servers. You are going to create a policy in matrix that looks like a spreadsheet. This addresses the segmentation complexity issue by having context behind the endpoint. When a customer has 200 new employees joining tomorrow worldwide, maybe admin can registers those employee in an Employee Active Directory Group. TrustSec takes care rest of the security policy enforcement. TrustSec also distributes and provisions this abstracted policy to the network automatically, so customer network/security admins do not need to configure policy on every single segmentation point. Of course, you can use ISE to update all the policy centrally. This addresses the second segmentation complexity issue by simplifying maintenance operation. Enforcement policy is only invoked when appropriate. If your switch has HR servers and finance servers, the switch automatically downloads and invokes policy for those servers only. When finance servers are decommissioned, policy is automatically removed from the switch. This helps customers to keep up-to-date security policy on their network devices all the time without creating any security holes. The same concept applies when a new service needs to be provisioned. Once servers are classified in the right group, you just have to connect those servers to the network, and TrustSec automates the rest of the security policy enforcement. T: And this is the perfect way to help introduce ISE’s second main benefit: Visibility… <click>
  16. Before ISE, the problem was a lack of context awareness. Even if a network administrator was about to get the different aspects of context information (the who, what, and where, for example), they were available from different places and could not be found in a single location to provide a complete picture of the type of network access request. There was no way to make an immediate, fully-informed access decision. ISE provides intelligent profiling features and posture checking that are brought together to create a single point of decision. ISE has a more comprehensive set of probes to GET that contextual awareness needed to profile correctly. Profiling is benefits your network because it provides better mobility policies, easier onboarding for users, less time spent by admins because of better access policy management. This increases the productivity of both users and admins alike. And most importantly, it get the right user, on the right device, from the right place, the right network access. T: And the best part, your ability to see more come right out of the box… <click>
  17. To make sure that enterprises stay up-to-date with all the new commercial and specialized devices that are brought to market every week, Cisco ISE offers a profile feed service that updates the profiling database with the latest and greatest profiles. This ensures that no matter the type of device, ISE can identify it and you can wrap a granular policy around it to control its network access. ISE has a larger array of profiles right out of the box – more than double the competition. This means you can identify devices much more quickly, leading to easier and fast device onboarding policies. And ISE allows administrators to create their own custom profiles to fit whatever types of devices they imagine they might need. This superior, market-leading profiling technology and feed service reduces unknown devices, on average, by 74%. (This number was calculated based on the ISE Device Profile Feed Service and a sample of our participating deployments, who went down, on average, from 35% unknown devices to 9% - garnering a 74% reduction in unknown devices. (35-9)/35 = 74%). Enhanced out-of-box visibility to users and devices on the network through a simple, flexible and highly consumable interface. ISE also now stores a history of all endpoints that have been on the network and all the associated visibility. And the visibility setup wizard allows you to quickly stand up a proof of value before lunch and, by the time you’re back from lunch, you’ll have visibility into all the endpoints currently on the customer’s network. T: Now, that covers visibility and control. What about stopping and containing threats? <click>
  18. Cisco Platform Exchange Grid (pxGrid) enables multivendor, cross-platform network system collaboration among parts of the IT infrastructure such as security monitoring and detection systems, network policy platforms, asset and configuration management, identity and access management platforms, and virtually any other IT operations platform. When business or operational needs arise, ecosystem partners can use pxGrid to share contextual information with Cisco platforms that use pxGrid as well as any ecosystem partner system that uses pxGrid. Cisco pxGrid provides a unified framework that enables ecosystem partners to integrate to pxGrid once, then share context bidirectionally with many platforms without the need to adopt platform-specific APIs. Partners can also direct ISE to take remediation or other network action along the same channels of communication. Then, ISE can use the partner data to update context and refine access policies, resulting in tighter, more comprehensive security. pxGrid is fully secured and customizable, enabling partners to share only what they want to share and consume only context relevant to their platform. This level of customizability ensures scalability when integrating with one or multiple systems. Furthermore, pxGrid enables ecosystem partner platforms to execute network actions with the Cisco network infrastructure. T: pxGrid really turns ISE into an enabler of your overall security system… <click>
  19. ISE is an enabler of many other Cisco security solutions by providing them with better visibility, context, and control. With ISE, you can optimize downstream security services. It really serves as the cornerstone for a context and policy architecture, leveraging pxGrid technology to make security solutions context-aware. With the ability to connect these disparate solutions, ISE can help accelerate the security capabilities and reduce the overall time-to-attribution and time-to-remediation for advanced network threats – including containing malicious threats through dynamic segmentation with Cisco TrustSec-enabled hardware. T: … <click>
  20. One of the major problems that enterprises face is that they have multiple security vendors and all of these disparate solutions work independently of each other. Cisco ISE and Cisco pxGrid are designed to confront that challenge head-on. When partner platforms integrate with Cisco ISE, there are three powerful benefits to enterprises: ISE makes partners context-aware  Contextual awareness offers deeper insight into the context surrounding a security event. Many partner platforms provide IP or MAC addresses as key identifiers. How much easier would it be to triage security events if you knew that an event was tied to a person, device, and location? Partner data improves ISE network access policy  With more data from more places, it’s possible to fine-tune ISE access policy even more granularly to ensure that the right level of access is being provided at any given moment. Partner platforms can take action with ISE  Quickest way to minimize time-to-attribution and time-to-remediation? Link a partner platform with ISE. The partner platform gains the context to more accurately identify the threat as well as the capability to send a “signal” to ISE to take action to quarantine or kick off a delinquent actor on the network. T: And the ISE story doesn’t stop here <click>
  21. ISE is a very important part of Cisco’s Network as a Sensor, which also includes Cisco StealthWatch. StealthWatch enables context aware visibility, threat detection, incident response diagnostics, and user monitoring It gives deeper visibility into the network and also accelerates the response of what to do with Netflow data, it analyzes the Netflow data and provides analytics on top of it. StealthWatch can look at user behavior – copying files, moving places in the network and determine whether these behaviors are suspicious. It allows you to provide analytics and gain insight from Netflow, you can gain visibility into user behavior, detect anomalies, collect and analyze network audit trails, and leverage Cisco Identity Services Engine, or Cisco ISE, to take action based on this visibility. T: And on the other side of the same coin…. <click>
  22. Cisco Network as an Enforcer works hand in hand with Network as a Sensor. Network as an Enforcer uses all the same elements in the Cisco Network as a Sensor solution but then augments that solution with Cisco TrustSec. Once you have used the Network as a Sensor solution to gain that deeper visibility and insight into traffic flows, user policy violations and malware, you can then leverage the Network as an Enforcer to take action. Network as an Enforcer allows you to contain the scope of an attack in progress, quarantine threats, and implement policy controls to secure your network resources. It allows you to not only quarantine threats but also reduce your time to remediation. T: So are you seeing everything that ISE can do for you and your network? <click>
  23. Cisco ISE is the vital component for close to 7000 different customers to support THEIR Unified Access, manage THEIR BYOD deployments, and achieve THEIR overall security and compliance objectives of minimizing the overall attack surface, securing access, containing threats, and reducing overall risk. By now, you can see for yourself how Cisco ISE provides deeper visibility, centralized control, and superior protection. T: But it is not just about what WE say… <click>
  24. Cisco ISE is generally on the short list of vendors to be considered for NAC deployments…and for good reason. We’re perennially recognized for tech innovation and leadership by all of the major industry analysts following the market. <click>
  25. In order to learn more about our offerings, please go to www.cisco.com/go/ise, or contact your authorized Cisco partner. We look forward to continuing the conversation!