SlideShare a Scribd company logo
1 of 45
Cisco Confidential 1C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved.
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
End-User Behaviors IT Trends
• Over 15 billion devices by
2015, with average worker
with 3 devices
• New workspace:
anywhere, anytime
• 71% of Gen Y workforce
do not obey policies
• 60% will download
sensitive data on a
personal device
• Must control the multiple
devices and guests
• Security: Top concern for
BYOD
• Mobile malware has
doubled (from 2010 to
2011)
• IT consumed with network
fragmentation
Reduce
Security Risk
Improve End-User
Productivity
Increase Operation
Efficiency
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Comprehensive Secure Access
More Productive
Workers and End Users
Lower Operating Costs
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Retail Healthcare Education
Financial Manufacturing Government
BYOD Guest Access Secure Access
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Who What Where When How
Virtual machine client, IP device, guest, employee, and remote user
Cisco® ISE
Wired Wireless VPN
Business-Relevant
Policies
Replaces AAA and RADIUS, NAC, guest management, and device identity servers
Security Policy Attributes
Identity
Context
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
BYOD
Users get safely on the
Internet fast and easy
Guest Access
It is easy to provide
guests limited-time and
limited- resource access
Secure Access on
Wired and Wireless
Network and VPN
Control with one policy across
wired, wireless, and remote
infrastructure
Cisco TrustSec®
Network Policy
Rules written in business
terms control access
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Get users on the net in minutes,
not hours
Simple self-service portal for any user
to get quickly on the net without help
or hassle
Reduce burden on IT and
help desk staff
Reliable automation reduces
user problems to near zero so…
Immediate secure access
Rigorous identity and
access policy enforcement
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Near-zero IT and help desk burden
• Employee hosted
• Full guest lifecycle
Accommodate and control
• Limited to Internet
• Time sensitive
Streamlined system
• Integrated into the all-in-one enterprise
policy control—Cisco® ISE console
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Automated onboarding and device security
Policy-governed unified access
Enforcement embedded in the intelligent
network
Dependable anywhere access
Increase IT Productivity
Wired RemoteWireless
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Distributed Enforcement Throughout Network
Switch Router DC Firewall DC Switch
Distributed Enforcement Throughout Network
Network
Context Classification
Security Group TagTag
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Main Features and Benefits
Comprehensive
Secure Access
Operation
Efficiency
More
Productivity
Device Profiling and Posture
Contextual Identity (Intelligent Identity)
Policy Management
Network Enforcement and Control Point
Device Profiling and Posture
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Comprehensive Secure Access
Initial Posture Validation
MS Patches
Av and AS Installation
Application and Process
Running State
MDM Integration
Corporate and Personal Device Posture Check and MDM Remediation
New
Feature
MDM Policy Check
Device registration status
Device compliance status
Disk encryption status
Pin lock status
Jailbreak status
Manufacturer
Model
IMEI
Serial number
OS version
Phone number
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Comprehensive Secure Access
Cisco Device Sensor
Device Sensor
(Network Based)
Active
Endpoint
Scanning
Device Feed*
Cisco ISE
Active scanning:
Enhanced accuracy
Integrated profiling:
Visibility in scale
Device feed —
identity in scale
Cisco® ISE augments passive network
insight with active endpoint data
Network infrastructure provides local
sensing function
Manufacturers and ecosystem provide
constant updates to new devices
* Scheduled for Spring 2013
New
Feature
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Comprehensive Secure Access
Identity (IEEE 802.1X)-Enabled Network
CONTEXT
IDENTITY
Vicky Sanchez
Frank LeeSecurity Camera Gateway
Francois Didier
Personal iPad
Employee, Marketing
Wireline
3 p.m.
Guest
Wireless
9 a.m.
Agentless Asset
Chicago Branch
Consultant
HQ - Strategy
Remote Access
6 p.m.
Employee Owned
Wireless HQ
Who What Where When How
Guest access
Profiling
Posture
IEEE 802.1X
MAB
WebAuth Cisco Switches, Routers, and Wireless Access Points
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Centralized management
Across wired and wireless
network and VPN
Simplified troubleshooting
Operation Efficiency
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Policy-Based
Access Control
Scalable Enforcement
VLANs
Access Control Lists
*
Device Sensing
Identity and
Context-Aware
Network
Remote VPN
User
Wireless
User
Wired User Devices Virtual Desktop
Data Center Intranet Internet Security Zones
Increased Operation Efficiency
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Lower Operating Costs
NY VPN UK CA
DC-MTV (SRV1)
DC-MTV (SAP1)
DC-RTP (SCM2)
DC-RTP (ESXix)
Security Group
Filtering
Cisco
Distinction
Employee Firewall Rules = 10 Production Server Rules = 50
• Customer managed > 500,000 firewall rules with 24 people
• Cisco TrustSec® and Cisco® ASA reduced that to 6 people
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
More Productivity
Trusted
Wi-Fi
Onboarding
 Authenticate user
 Fingerprint device
 Apply corporate configuration
 Enterprise applications
 Automatic policies
Secure and customizable
captive portal
Self-registration for any device
Remediate actions
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
“Instrumental in giving
us visibility to enforce access
policy, perform remediation,
and improve compliance level”
“Now students and faculty can
collaborate with ease, working
anywhere, anytime on campus”
Positioned as leader in Gartner NAC
Magic Quadrant
December 2012
“Cisco TrustSec and Cisco ISE are
consistent with our view of identity-
centric end-to-end security that is both
needed and lacking in the enterprise
today.”
Forrester 2011
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Source: Gartner NAC Magic Quadrant 2012
Gartner: "Magic Quadrant for Network Access Control," by Lawrence Orans and John Pescatore, December 8, 2011
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
• Required enhanced global
security for security-conscious
company; customer service
offering.
• Used Cisco® ISE to manage
multiple systems and devices,
segmenting infrastructure
• Profiling services for business
units, individuals, contractors,
and complete guest lifecycle
wired or wireless.
• Always-on secure remote
access with Cisco AnyConnect®
Challenge Solution
”Cisco ISE provides a best-in-class access control solution
for Diebold, enabling unmatched granularity and insight
about our users,”
—David Kennedy, Vice President, Former CSO, Diebold
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
Winning combination of network
and device intelligence to help
ensure the most comprehensive
secure unified access
Most extensive and efficient
enforcement to achieve
exceptional operation efficiency
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
An Architectural Approach For…
Professional and Technical Services, Compliance, and Cisco® Validated Designs
Context-Based Policy and Management
Cloud-Based Intelligence
Cloud
Securing the Transition to
Virtualization and Cloud
Collaboration
10110100
Securing Applications,
Content, and Traffic
BYOD
Secure Access for the
Distributed Workforce
SwitchesAppliances WirelessVirtual RoutersPrivate Cloud
Email Firewall WebVPNPolicy IPS
Network-Enforced Policy
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Cisco Prime™
Cisco® ISE
Third-Party
MDM Appliance
MDM Manager
Cisco
WLAN
Controller
Cisco ASA
Firewall and IPS
Cisco CSM
and ASDM
Cisco Web
Security
Wired
Network
Devices
Cisco
Catalyst®
Switches
Cisco AnyConnect®
Cisco AnyConnect Cisco AnyConnect
Office Wired Access Office Wireless Access Remote Access
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Who What Where When How
Identity and Device Context
Cisco ISE
Virtual machine client, IP device, guest, employee, and
remote user
Wired Wireless VPN
Business-Relevant
Policies
Policy Management
Increases Operational
Efficiency
Onboarding &
Remediation
Increases Productivity and
Improves User Experience
Device Profiling &
Posture
Provides Comprehensive
Secure Access
Intelligent Identity
Ensures Consistent Policies
Network Enforcement
Decreases Operational Costs
• Consistent source of
identity
• Endpoint device-type
awareness
• Posture, access level,
network location context
• Enable ecosystem partner
platform to share context
for use in ISE network
policy
• Enable ecosystem partner
to take network actions
via ISE
Benefits
• Allows deeper network
and security insight
• Allows more detailed
control over BYOD and
sensitive users and
groups
• Helps clarify which
network and security
events are important
and helps make them
actionable
• Unifies policy silos
Cisco® ISE
Context Sharing
IT Infrastructure
Network
Management
Network
Control
Cisco Network
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Security Information and Event Management (SIEM) and Threat Defense
Mobile Device Management
Prioritize Events, User/Device-Aware Analytics, Expedite Resolution
• ISE provides user and device context to SIEM and Threat Defense partners
• Partners utilize context to identify users, devices, posture, location and
network privilege level associated with SIEM/TD security events
• Partners may take network action on users/devices via ISE
Ensure Device Enrollment and Security Compliance
• ISE serves as policy gateway for mobile device network access
• MDM provides ISE mobile device security compliance context
• ISE assigns network access privilege based on compliance context
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Comprehensive Secure Access
More Productive
Workers and End Users
Lower Operating Costs
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Location-based
personalized
promotions
Better patient care
with tablet-based
medical data
Variety of learning
options for online and
onsite student
experience
Retail EducationHealthcare
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Thank you.
Cisco Confidential 32C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved.
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Efficiency Time Money= or
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
NCS
Prime
ISE
Cisco
WLAN
Controller
Wired
Network
Devices
Cisco
Catalyst
Switches
3rd Party
MDM
Appliance
MDM
Manager
IronPort WSA
Dependable anywhere
access
Enforcement embedded in
the network
Automated onboarding
and device security
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Internet
Services 1Campus Cloud
Data Center
Policy
Services 2
POLICYPOLICYPOLICYPolicy
SGT
Inter
net
Open
Net
Serv
Net
Data
Center
Restr
ict
DC
Exec, IT
Laptop
Wired
Net
Permit Permit Permit Permit Permit
All,
iPad
Internal
Permit Permit Permit Deny Deny
Exec,
iPad
VPN
Permit Permit Permit Permit Deny
Guest
Any
Permit Deny Deny Deny Deny
John
IT Administrator
Restricted
Data
Center
John updates Cisco® ISE for
BYOD and guest access
policies, which are pushed to
the network.
IT
Confidential. Product is planned, features are not committed.
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Internet
Services 1Campus Cloud
Data Center
Services 2
Wired
Restricted
Data
Center
John
IT Administrator
Brice logs onto wired
network on IT-issued laptop.
Cisco® ISE authenticates,
identifies context, and applies
wired execution policy.
Wired
Confidential. Product is planned, features are not committed.
Brice
CFO
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Internet
Services 1Campus Cloud
Confidential. Product is planned, features are not committed.
Data Center
Device
Identity
AAADID
Wireless
Restricted
Data
Center
John
IT Administrator
• Brice connects his new iPad to
the WLAN and logs on.
• While Cisco® ISE performs
AAA check of his ID, Cisco ISE
Profiler identifies his device.
Onboarding
Wired
Brice
CFO
Services 2
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Internet
Services 1Campus Cloud
Data Center
Wired
Wireless
?
R DIR
REG
John
IT Administrator
• Cisco® ISE authenticates Brice,
but does not recognize the iPad.
• Cisco ISE redirects Brice to the
onboarding portal to register
his iPad.
Onboarding
Services 2
Restricted
Data
Center
Confidential. Product is planned, features are not committed.
Brice
CFO
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Internet
Services 1Campus Cloud
Data Center
Services 2
Wired
Wireless
Policy
Policy
Restricted
Data
Center
John
IT Administrator
• Cisco® ISE forms a contextual
identity: Brice + iPad + location.
• Cisco ISE assigns a policy
based on the context and
grants it role-based access.
Onboarding
Confidential. Product is planned, features are not committed.
Contextual
Identity
Brice
CFO
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Internet
Services 1Campus Cloud
Data Center
Services 2
Wired
VPN
Wireless
Restricted
Data
Center
John
IT Administrator
• Brice uses the same iPad from
a hotel room. Cisco® ISE
recognizes the context change
and applies execution VPN
policy..
VPN
Confidential. Product is planned, features are not committed.
Brice
CFO
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Internet
Services 1Campus Cloud
Data Center
Services 2
Wired
VPN
Wireless
John
IT Administrator
Restricted
Data
Center
• Sarah receives password through text
message. She selects GuestWiFi, and
Cisco ISE directs her to the guest portal
to register and obtain Internet access.
• Brice enters Cisco® ISE guest
hotspot portal and sponsors
Sarah for 1-day access.
Sponsor
Guest
Brice
CFO
Sarah
Vendor
Confidential. Product is planned, features are not committed.
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Internet
Services 1Campus Cloud
Data Center
Wired
Wireless
BYOD
Guest
Policy Management
Restricted
Data
Center
John
IT Administrator
Brice
CFO
Sarah
Vendor
VPN
Confidential. Product is planned, features are not committed.
Services 2
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Comprehensive Wired, Wireless,
and VPNSecureAccess
More Productive Workers Lower Operating Costs
Rigorous Identity Enforcement
Extensive Policy Enforcement
Security Compliance
Automated Onboarding
Automated Device Security
Dependable-Anywhere
Access
Operation Efficiency
Use Cisco® Infrastructure
Next-Generation Policy
Networking
Control
devices
everywhere
Control
Precisely
Who & what
Is allowed
Maintain &
validate
compliance
Secure every
device
Get quick
access with
little IT
intervention
Provide
consistent
service
Get the most
from
investments
Save time
End VLAN,
ALC & FW
Rule pain
ISE
That’s it.
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Limited AdvancedEnhancedBasic
Environment requires tight
controls
Company-only device
• Manufacturing
environment
• Trading floor
• Classified government
networks
• Traditional enterprise
Focus on basic services
and easy access for almost
anybody
Broader device types but
Internet only
• Education environments
• Public institutions
• Simple guests
Enable differentiated
services and onboarding
with security both onsite
and offsite
Multiple device types plus
access methods
• Healthcare
• Early BYOD adopters
• Contractor enablement
Company-native
applications, new services,
and full control
Multiple device types,
company issued
• Innovative enterprises
• Retail on demand
• Mobile sales services
(video, collaboration, etc.)
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Wireless Upgrade License (ATP)
Extend Policy for Wired and VPN Endpoints
Platforms
Small: Cisco® ISE 3315 and 3415* | Medium-Sized: Cisco ISE 3355
Large: Cisco ISE 3395 and 3495* | Virtual Appliance * New
Wireless License
Policy for Wireless Endpoints: 5-Year Term Licensing
• Authentication and authorization
• Guest provisioning
• Link-encryption policies
• Device profiling
• Host posture
• Security group access
Base License (ATP)
Policy for Wired, Wireless, and VPN Endpoints
Advanced License (ATP)
Policy for Wired, Wireless, and VPN Endpoints
Perpetual Licensing 3- or 5-Year Term Licensing
+
C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Internet
AP Third-
Party
Controller
Layer 3
Switch
Policy ServicesCisco ISE Inline
Posture Node
Layer 3
Switch
Wireless
User
VPN
User
VPN
Wireless Wired
Wired
eth1 eth0
eth1 eth0
VPN Infra
Trusted
Network
Cisco ISE Inline
Posture Node
Entry Point for Third Party Wireless Infra
• RADIUS authorization for
Cisco ASA
• Authorization and posture
for Inline posture node
Policy Services
• IEEE 802.1X
authorization for WLC
• Authorization and posture
for Inline posture node
Cisco®
ASA

More Related Content

What's hot

Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
Red Hat Certified engineer course
  Red Hat Certified engineer course   Red Hat Certified engineer course
Red Hat Certified engineer course Ali Abdo
 
Best Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationBest Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationAlienVault
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon LibraryFortinet
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopCisco Canada
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxNajahIdrissiMoulayRa
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio updateAtanas Gergiminov
 
Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabricANSItunCERT
 
Introduction Network Monitoring and Management Solution
Introduction Network Monitoring and Management SolutionIntroduction Network Monitoring and Management Solution
Introduction Network Monitoring and Management SolutionTien Nguyen Duc
 
Fortinet UTM - les Fonctionnalités avancéese
Fortinet UTM - les Fonctionnalités avancéeseFortinet UTM - les Fonctionnalités avancéese
Fortinet UTM - les Fonctionnalités avancéeseAlphorm
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!Netskope
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA FirepowerAnwesh Dixit
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 

What's hot (20)

Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Red Hat Certified engineer course
  Red Hat Certified engineer course   Red Hat Certified engineer course
Red Hat Certified engineer course
 
Best Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM InstallationBest Practices for Configuring Your OSSIM Installation
Best Practices for Configuring Your OSSIM Installation
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 
Fortinet Icon Library
Fortinet Icon LibraryFortinet Icon Library
Fortinet Icon Library
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking Workshop
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptx
 
Wazuh Security Platform
Wazuh Security PlatformWazuh Security Platform
Wazuh Security Platform
 
NetScaler ADC - Customer Overview
NetScaler ADC - Customer OverviewNetScaler ADC - Customer Overview
NetScaler ADC - Customer Overview
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Zabbix Monitoring Platform
Zabbix Monitoring Platform Zabbix Monitoring Platform
Zabbix Monitoring Platform
 
Cisco Security portfolio update
Cisco Security portfolio updateCisco Security portfolio update
Cisco Security portfolio update
 
Fortinet security fabric
Fortinet security fabricFortinet security fabric
Fortinet security fabric
 
Introduction Network Monitoring and Management Solution
Introduction Network Monitoring and Management SolutionIntroduction Network Monitoring and Management Solution
Introduction Network Monitoring and Management Solution
 
Fortinet UTM - les Fonctionnalités avancéese
Fortinet UTM - les Fonctionnalités avancéeseFortinet UTM - les Fonctionnalités avancéese
Fortinet UTM - les Fonctionnalités avancéese
 
Cloud security
Cloud security Cloud security
Cloud security
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 

Similar to Ise 1 2-bdm-v4

Cisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed NetworkingCisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed NetworkingCisco Russia
 
Cisco Powered Presentation - For Customers
Cisco Powered Presentation - For CustomersCisco Powered Presentation - For Customers
Cisco Powered Presentation - For CustomersCisco Powered
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSMAU
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center LandscapeCisco Canada
 
Cisco ucs overview ibm team 2014 v.2 - handout
Cisco ucs overview   ibm team 2014 v.2 - handoutCisco ucs overview   ibm team 2014 v.2 - handout
Cisco ucs overview ibm team 2014 v.2 - handoutSarmad Ibrahim
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki OverviewSSISG
 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with merakiCisco Canada
 
È l'ora del Cloud Managed IT
È l'ora del Cloud Managed ITÈ l'ora del Cloud Managed IT
È l'ora del Cloud Managed ITMatteo Masi
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the EnterpriseCisco Canada
 
Cisco cloupia bdm presentation
Cisco cloupia bdm presentationCisco cloupia bdm presentation
Cisco cloupia bdm presentationxKinAnx
 
Cisco Connect Toronto 2017 - Cisco meraki let simple work for you
Cisco Connect Toronto 2017 - Cisco meraki   let simple work for youCisco Connect Toronto 2017 - Cisco meraki   let simple work for you
Cisco Connect Toronto 2017 - Cisco meraki let simple work for youCisco Canada
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Cisco UCS for OpenStack Cloud
Cisco UCS for OpenStack CloudCisco UCS for OpenStack Cloud
Cisco UCS for OpenStack CloudLora O'Haver
 
Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015ldangelo0772
 
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksGeorge Wainblat
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionCisco Mobility
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01Sergiy Pitel
 

Similar to Ise 1 2-bdm-v4 (20)

Cisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed NetworkingCisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed Networking
 
Cisco Powered Presentation - For Customers
Cisco Powered Presentation - For CustomersCisco Powered Presentation - For Customers
Cisco Powered Presentation - For Customers
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 
PSOIOT-1151.pdf
PSOIOT-1151.pdfPSOIOT-1151.pdf
PSOIOT-1151.pdf
 
The Changing Data Center Landscape
The Changing Data Center LandscapeThe Changing Data Center Landscape
The Changing Data Center Landscape
 
Cisco ucs overview ibm team 2014 v.2 - handout
Cisco ucs overview   ibm team 2014 v.2 - handoutCisco ucs overview   ibm team 2014 v.2 - handout
Cisco ucs overview ibm team 2014 v.2 - handout
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with meraki
 
È l'ora del Cloud Managed IT
È l'ora del Cloud Managed ITÈ l'ora del Cloud Managed IT
È l'ora del Cloud Managed IT
 
BYOD Transforming the Enterprise
BYOD Transforming the EnterpriseBYOD Transforming the Enterprise
BYOD Transforming the Enterprise
 
Cisco cloupia bdm presentation
Cisco cloupia bdm presentationCisco cloupia bdm presentation
Cisco cloupia bdm presentation
 
Cisco Connect Toronto 2017 - Cisco meraki let simple work for you
Cisco Connect Toronto 2017 - Cisco meraki   let simple work for youCisco Connect Toronto 2017 - Cisco meraki   let simple work for you
Cisco Connect Toronto 2017 - Cisco meraki let simple work for you
 
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco MerakiCisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco UCS for OpenStack Cloud
Cisco UCS for OpenStack CloudCisco UCS for OpenStack Cloud
Cisco UCS for OpenStack Cloud
 
Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015Cisco at v mworld 2015 cisco powered_vmworld 2015
Cisco at v mworld 2015 cisco powered_vmworld 2015
 
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 

Recently uploaded

Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...Call Girls in Nagpur High Profile
 
VIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service Bhiwandi
VIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service BhiwandiVIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service Bhiwandi
VIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service BhiwandiSuhani Kapoor
 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptxVanshNarang19
 
WAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsWAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsCharles Obaleagbon
 
(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...
(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...
(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...ranjana rawat
 
Cheap Rate ➥8448380779 ▻Call Girls In Huda City Centre Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Huda City Centre GurgaonCheap Rate ➥8448380779 ▻Call Girls In Huda City Centre Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Huda City Centre GurgaonDelhi Call girls
 
VIP Russian Call Girls in Saharanpur Deepika 8250192130 Independent Escort Se...
VIP Russian Call Girls in Saharanpur Deepika 8250192130 Independent Escort Se...VIP Russian Call Girls in Saharanpur Deepika 8250192130 Independent Escort Se...
VIP Russian Call Girls in Saharanpur Deepika 8250192130 Independent Escort Se...Suhani Kapoor
 
The history of music videos a level presentation
The history of music videos a level presentationThe history of music videos a level presentation
The history of music videos a level presentationamedia6
 
Kindergarten Assessment Questions Via LessonUp
Kindergarten Assessment Questions Via LessonUpKindergarten Assessment Questions Via LessonUp
Kindergarten Assessment Questions Via LessonUpmainac1
 
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130Suhani Kapoor
 
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call GirlsCBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girlsmodelanjalisharma4
 
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Gariahat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Roomdivyansh0kumar0
 
Presentation.pptx about blender what is blender
Presentation.pptx about blender what is blenderPresentation.pptx about blender what is blender
Presentation.pptx about blender what is blenderUbaidurrehman997675
 
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...Pooja Nehwal
 
Captivating Charm: Exploring Marseille's Hillside Villas with Our 3D Architec...
Captivating Charm: Exploring Marseille's Hillside Villas with Our 3D Architec...Captivating Charm: Exploring Marseille's Hillside Villas with Our 3D Architec...
Captivating Charm: Exploring Marseille's Hillside Villas with Our 3D Architec...Yantram Animation Studio Corporation
 
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵anilsa9823
 

Recently uploaded (20)

young call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Service
young call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Service
young call girls in Vivek Vihar🔝 9953056974 🔝 Delhi escort Service
 
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...Booking open Available Pune Call Girls Nanded City  6297143586 Call Hot India...
Booking open Available Pune Call Girls Nanded City 6297143586 Call Hot India...
 
VIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service Bhiwandi
VIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service BhiwandiVIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service Bhiwandi
VIP Call Girls Bhiwandi Ananya 8250192130 Independent Escort Service Bhiwandi
 
escort service sasti (*~Call Girls in Prasad Nagar Metro❤️9953056974
escort service sasti (*~Call Girls in Prasad Nagar Metro❤️9953056974escort service sasti (*~Call Girls in Prasad Nagar Metro❤️9953056974
escort service sasti (*~Call Girls in Prasad Nagar Metro❤️9953056974
 
Fashion trends before and after covid.pptx
Fashion trends before and after covid.pptxFashion trends before and after covid.pptx
Fashion trends before and after covid.pptx
 
WAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past QuestionsWAEC Carpentry and Joinery Past Questions
WAEC Carpentry and Joinery Past Questions
 
(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...
(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...
(AISHA) Ambegaon Khurd Call Girls Just Call 7001035870 [ Cash on Delivery ] P...
 
Cheap Rate ➥8448380779 ▻Call Girls In Huda City Centre Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Huda City Centre GurgaonCheap Rate ➥8448380779 ▻Call Girls In Huda City Centre Gurgaon
Cheap Rate ➥8448380779 ▻Call Girls In Huda City Centre Gurgaon
 
VIP Russian Call Girls in Saharanpur Deepika 8250192130 Independent Escort Se...
VIP Russian Call Girls in Saharanpur Deepika 8250192130 Independent Escort Se...VIP Russian Call Girls in Saharanpur Deepika 8250192130 Independent Escort Se...
VIP Russian Call Girls in Saharanpur Deepika 8250192130 Independent Escort Se...
 
The history of music videos a level presentation
The history of music videos a level presentationThe history of music videos a level presentation
The history of music videos a level presentation
 
Kindergarten Assessment Questions Via LessonUp
Kindergarten Assessment Questions Via LessonUpKindergarten Assessment Questions Via LessonUp
Kindergarten Assessment Questions Via LessonUp
 
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
VIP Call Girls Service Bhagyanagar Hyderabad Call +91-8250192130
 
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
VIP Call Girls Service Kukatpally Hyderabad Call +91-8250192130
 
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call GirlsCBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
CBD Belapur Individual Call Girls In 08976425520 Panvel Only Genuine Call Girls
 
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Gariahat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Gariahat 👉 8250192130 Available With Room
 
Presentation.pptx about blender what is blender
Presentation.pptx about blender what is blenderPresentation.pptx about blender what is blender
Presentation.pptx about blender what is blender
 
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...Kurla Call Girls Pooja Nehwal📞 9892124323 ✅  Vashi Call Service Available Nea...
Kurla Call Girls Pooja Nehwal📞 9892124323 ✅ Vashi Call Service Available Nea...
 
Captivating Charm: Exploring Marseille's Hillside Villas with Our 3D Architec...
Captivating Charm: Exploring Marseille's Hillside Villas with Our 3D Architec...Captivating Charm: Exploring Marseille's Hillside Villas with Our 3D Architec...
Captivating Charm: Exploring Marseille's Hillside Villas with Our 3D Architec...
 
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service  🧵
CALL ON ➥8923113531 🔝Call Girls Kalyanpur Lucknow best Female service 🧵
 
young call girls in Pandav nagar 🔝 9953056974 🔝 Delhi escort Service
young call girls in Pandav nagar 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Pandav nagar 🔝 9953056974 🔝 Delhi escort Service
young call girls in Pandav nagar 🔝 9953056974 🔝 Delhi escort Service
 

Ise 1 2-bdm-v4

  • 1. Cisco Confidential 1C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved.
  • 2. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 End-User Behaviors IT Trends • Over 15 billion devices by 2015, with average worker with 3 devices • New workspace: anywhere, anytime • 71% of Gen Y workforce do not obey policies • 60% will download sensitive data on a personal device • Must control the multiple devices and guests • Security: Top concern for BYOD • Mobile malware has doubled (from 2010 to 2011) • IT consumed with network fragmentation Reduce Security Risk Improve End-User Productivity Increase Operation Efficiency
  • 3. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Comprehensive Secure Access More Productive Workers and End Users Lower Operating Costs
  • 4. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Retail Healthcare Education Financial Manufacturing Government BYOD Guest Access Secure Access
  • 5. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Who What Where When How Virtual machine client, IP device, guest, employee, and remote user Cisco® ISE Wired Wireless VPN Business-Relevant Policies Replaces AAA and RADIUS, NAC, guest management, and device identity servers Security Policy Attributes Identity Context
  • 6. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 BYOD Users get safely on the Internet fast and easy Guest Access It is easy to provide guests limited-time and limited- resource access Secure Access on Wired and Wireless Network and VPN Control with one policy across wired, wireless, and remote infrastructure Cisco TrustSec® Network Policy Rules written in business terms control access
  • 7. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Get users on the net in minutes, not hours Simple self-service portal for any user to get quickly on the net without help or hassle Reduce burden on IT and help desk staff Reliable automation reduces user problems to near zero so… Immediate secure access Rigorous identity and access policy enforcement
  • 8. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 Near-zero IT and help desk burden • Employee hosted • Full guest lifecycle Accommodate and control • Limited to Internet • Time sensitive Streamlined system • Integrated into the all-in-one enterprise policy control—Cisco® ISE console
  • 9. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Automated onboarding and device security Policy-governed unified access Enforcement embedded in the intelligent network Dependable anywhere access Increase IT Productivity Wired RemoteWireless
  • 10. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Distributed Enforcement Throughout Network Switch Router DC Firewall DC Switch Distributed Enforcement Throughout Network Network Context Classification Security Group TagTag
  • 11. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Main Features and Benefits Comprehensive Secure Access Operation Efficiency More Productivity Device Profiling and Posture Contextual Identity (Intelligent Identity) Policy Management Network Enforcement and Control Point Device Profiling and Posture
  • 12. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Comprehensive Secure Access Initial Posture Validation MS Patches Av and AS Installation Application and Process Running State MDM Integration Corporate and Personal Device Posture Check and MDM Remediation New Feature MDM Policy Check Device registration status Device compliance status Disk encryption status Pin lock status Jailbreak status Manufacturer Model IMEI Serial number OS version Phone number
  • 13. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 Comprehensive Secure Access Cisco Device Sensor Device Sensor (Network Based) Active Endpoint Scanning Device Feed* Cisco ISE Active scanning: Enhanced accuracy Integrated profiling: Visibility in scale Device feed — identity in scale Cisco® ISE augments passive network insight with active endpoint data Network infrastructure provides local sensing function Manufacturers and ecosystem provide constant updates to new devices * Scheduled for Spring 2013 New Feature
  • 14. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Comprehensive Secure Access Identity (IEEE 802.1X)-Enabled Network CONTEXT IDENTITY Vicky Sanchez Frank LeeSecurity Camera Gateway Francois Didier Personal iPad Employee, Marketing Wireline 3 p.m. Guest Wireless 9 a.m. Agentless Asset Chicago Branch Consultant HQ - Strategy Remote Access 6 p.m. Employee Owned Wireless HQ Who What Where When How Guest access Profiling Posture IEEE 802.1X MAB WebAuth Cisco Switches, Routers, and Wireless Access Points
  • 15. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 Centralized management Across wired and wireless network and VPN Simplified troubleshooting Operation Efficiency
  • 16. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Policy-Based Access Control Scalable Enforcement VLANs Access Control Lists * Device Sensing Identity and Context-Aware Network Remote VPN User Wireless User Wired User Devices Virtual Desktop Data Center Intranet Internet Security Zones Increased Operation Efficiency
  • 17. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Lower Operating Costs NY VPN UK CA DC-MTV (SRV1) DC-MTV (SAP1) DC-RTP (SCM2) DC-RTP (ESXix) Security Group Filtering Cisco Distinction Employee Firewall Rules = 10 Production Server Rules = 50 • Customer managed > 500,000 firewall rules with 24 people • Cisco TrustSec® and Cisco® ASA reduced that to 6 people
  • 18. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 More Productivity Trusted Wi-Fi Onboarding  Authenticate user  Fingerprint device  Apply corporate configuration  Enterprise applications  Automatic policies Secure and customizable captive portal Self-registration for any device Remediate actions
  • 19. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 “Instrumental in giving us visibility to enforce access policy, perform remediation, and improve compliance level” “Now students and faculty can collaborate with ease, working anywhere, anytime on campus” Positioned as leader in Gartner NAC Magic Quadrant December 2012 “Cisco TrustSec and Cisco ISE are consistent with our view of identity- centric end-to-end security that is both needed and lacking in the enterprise today.” Forrester 2011
  • 20. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 Source: Gartner NAC Magic Quadrant 2012 Gartner: "Magic Quadrant for Network Access Control," by Lawrence Orans and John Pescatore, December 8, 2011
  • 21. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 • Required enhanced global security for security-conscious company; customer service offering. • Used Cisco® ISE to manage multiple systems and devices, segmenting infrastructure • Profiling services for business units, individuals, contractors, and complete guest lifecycle wired or wireless. • Always-on secure remote access with Cisco AnyConnect® Challenge Solution ”Cisco ISE provides a best-in-class access control solution for Diebold, enabling unmatched granularity and insight about our users,” —David Kennedy, Vice President, Former CSO, Diebold
  • 22. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23 Winning combination of network and device intelligence to help ensure the most comprehensive secure unified access Most extensive and efficient enforcement to achieve exceptional operation efficiency
  • 23. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 An Architectural Approach For… Professional and Technical Services, Compliance, and Cisco® Validated Designs Context-Based Policy and Management Cloud-Based Intelligence Cloud Securing the Transition to Virtualization and Cloud Collaboration 10110100 Securing Applications, Content, and Traffic BYOD Secure Access for the Distributed Workforce SwitchesAppliances WirelessVirtual RoutersPrivate Cloud Email Firewall WebVPNPolicy IPS Network-Enforced Policy
  • 24. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 Cisco Prime™ Cisco® ISE Third-Party MDM Appliance MDM Manager Cisco WLAN Controller Cisco ASA Firewall and IPS Cisco CSM and ASDM Cisco Web Security Wired Network Devices Cisco Catalyst® Switches Cisco AnyConnect® Cisco AnyConnect Cisco AnyConnect Office Wired Access Office Wireless Access Remote Access
  • 25. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 Who What Where When How Identity and Device Context Cisco ISE Virtual machine client, IP device, guest, employee, and remote user Wired Wireless VPN Business-Relevant Policies Policy Management Increases Operational Efficiency Onboarding & Remediation Increases Productivity and Improves User Experience Device Profiling & Posture Provides Comprehensive Secure Access Intelligent Identity Ensures Consistent Policies Network Enforcement Decreases Operational Costs • Consistent source of identity • Endpoint device-type awareness • Posture, access level, network location context • Enable ecosystem partner platform to share context for use in ISE network policy • Enable ecosystem partner to take network actions via ISE Benefits • Allows deeper network and security insight • Allows more detailed control over BYOD and sensitive users and groups • Helps clarify which network and security events are important and helps make them actionable • Unifies policy silos Cisco® ISE Context Sharing IT Infrastructure Network Management Network Control Cisco Network
  • 26. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 Security Information and Event Management (SIEM) and Threat Defense Mobile Device Management Prioritize Events, User/Device-Aware Analytics, Expedite Resolution • ISE provides user and device context to SIEM and Threat Defense partners • Partners utilize context to identify users, devices, posture, location and network privilege level associated with SIEM/TD security events • Partners may take network action on users/devices via ISE Ensure Device Enrollment and Security Compliance • ISE serves as policy gateway for mobile device network access • MDM provides ISE mobile device security compliance context • ISE assigns network access privilege based on compliance context
  • 27. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 Comprehensive Secure Access More Productive Workers and End Users Lower Operating Costs
  • 28. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29 Location-based personalized promotions Better patient care with tablet-based medical data Variety of learning options for online and onsite student experience Retail EducationHealthcare
  • 29. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
  • 31. Cisco Confidential 32C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved.
  • 32. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33 Efficiency Time Money= or
  • 33. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 NCS Prime ISE Cisco WLAN Controller Wired Network Devices Cisco Catalyst Switches 3rd Party MDM Appliance MDM Manager IronPort WSA Dependable anywhere access Enforcement embedded in the network Automated onboarding and device security
  • 34. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 Internet Services 1Campus Cloud Data Center Policy Services 2 POLICYPOLICYPOLICYPolicy SGT Inter net Open Net Serv Net Data Center Restr ict DC Exec, IT Laptop Wired Net Permit Permit Permit Permit Permit All, iPad Internal Permit Permit Permit Deny Deny Exec, iPad VPN Permit Permit Permit Permit Deny Guest Any Permit Deny Deny Deny Deny John IT Administrator Restricted Data Center John updates Cisco® ISE for BYOD and guest access policies, which are pushed to the network. IT Confidential. Product is planned, features are not committed.
  • 35. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 Internet Services 1Campus Cloud Data Center Services 2 Wired Restricted Data Center John IT Administrator Brice logs onto wired network on IT-issued laptop. Cisco® ISE authenticates, identifies context, and applies wired execution policy. Wired Confidential. Product is planned, features are not committed. Brice CFO
  • 36. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37 Internet Services 1Campus Cloud Confidential. Product is planned, features are not committed. Data Center Device Identity AAADID Wireless Restricted Data Center John IT Administrator • Brice connects his new iPad to the WLAN and logs on. • While Cisco® ISE performs AAA check of his ID, Cisco ISE Profiler identifies his device. Onboarding Wired Brice CFO Services 2
  • 37. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 Internet Services 1Campus Cloud Data Center Wired Wireless ? R DIR REG John IT Administrator • Cisco® ISE authenticates Brice, but does not recognize the iPad. • Cisco ISE redirects Brice to the onboarding portal to register his iPad. Onboarding Services 2 Restricted Data Center Confidential. Product is planned, features are not committed. Brice CFO
  • 38. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 Internet Services 1Campus Cloud Data Center Services 2 Wired Wireless Policy Policy Restricted Data Center John IT Administrator • Cisco® ISE forms a contextual identity: Brice + iPad + location. • Cisco ISE assigns a policy based on the context and grants it role-based access. Onboarding Confidential. Product is planned, features are not committed. Contextual Identity Brice CFO
  • 39. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40 Internet Services 1Campus Cloud Data Center Services 2 Wired VPN Wireless Restricted Data Center John IT Administrator • Brice uses the same iPad from a hotel room. Cisco® ISE recognizes the context change and applies execution VPN policy.. VPN Confidential. Product is planned, features are not committed. Brice CFO
  • 40. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 Internet Services 1Campus Cloud Data Center Services 2 Wired VPN Wireless John IT Administrator Restricted Data Center • Sarah receives password through text message. She selects GuestWiFi, and Cisco ISE directs her to the guest portal to register and obtain Internet access. • Brice enters Cisco® ISE guest hotspot portal and sponsors Sarah for 1-day access. Sponsor Guest Brice CFO Sarah Vendor Confidential. Product is planned, features are not committed.
  • 41. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 Internet Services 1Campus Cloud Data Center Wired Wireless BYOD Guest Policy Management Restricted Data Center John IT Administrator Brice CFO Sarah Vendor VPN Confidential. Product is planned, features are not committed. Services 2
  • 42. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43 Comprehensive Wired, Wireless, and VPNSecureAccess More Productive Workers Lower Operating Costs Rigorous Identity Enforcement Extensive Policy Enforcement Security Compliance Automated Onboarding Automated Device Security Dependable-Anywhere Access Operation Efficiency Use Cisco® Infrastructure Next-Generation Policy Networking Control devices everywhere Control Precisely Who & what Is allowed Maintain & validate compliance Secure every device Get quick access with little IT intervention Provide consistent service Get the most from investments Save time End VLAN, ALC & FW Rule pain ISE That’s it.
  • 43. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44 Limited AdvancedEnhancedBasic Environment requires tight controls Company-only device • Manufacturing environment • Trading floor • Classified government networks • Traditional enterprise Focus on basic services and easy access for almost anybody Broader device types but Internet only • Education environments • Public institutions • Simple guests Enable differentiated services and onboarding with security both onsite and offsite Multiple device types plus access methods • Healthcare • Early BYOD adopters • Contractor enablement Company-native applications, new services, and full control Multiple device types, company issued • Innovative enterprises • Retail on demand • Mobile sales services (video, collaboration, etc.)
  • 44. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45 Wireless Upgrade License (ATP) Extend Policy for Wired and VPN Endpoints Platforms Small: Cisco® ISE 3315 and 3415* | Medium-Sized: Cisco ISE 3355 Large: Cisco ISE 3395 and 3495* | Virtual Appliance * New Wireless License Policy for Wireless Endpoints: 5-Year Term Licensing • Authentication and authorization • Guest provisioning • Link-encryption policies • Device profiling • Host posture • Security group access Base License (ATP) Policy for Wired, Wireless, and VPN Endpoints Advanced License (ATP) Policy for Wired, Wireless, and VPN Endpoints Perpetual Licensing 3- or 5-Year Term Licensing +
  • 45. C97-726694-00 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46 Internet AP Third- Party Controller Layer 3 Switch Policy ServicesCisco ISE Inline Posture Node Layer 3 Switch Wireless User VPN User VPN Wireless Wired Wired eth1 eth0 eth1 eth0 VPN Infra Trusted Network Cisco ISE Inline Posture Node Entry Point for Third Party Wireless Infra • RADIUS authorization for Cisco ASA • Authorization and posture for Inline posture node Policy Services • IEEE 802.1X authorization for WLC • Authorization and posture for Inline posture node Cisco® ASA