Network technologies and trends

Jan 29 2017   7:10AM GMT

Cisco launches ISE 2.2 with a promise of more visibility and control

Yasir Irfan Yasir Irfan Profile: Yasir Irfan

Internet of Things

Since the introduction of Internet in early 90’s to general public, no one ever imagined that Internet will grow so fast, and vast majority of organizations and consumers will be interconnected using the internet. It has expanded exponentially and still its is growing at its greatest speed. The invent of Internet of things (IoT) has changed the game, as huge numbers of new devices and users are interconnected either using an internet or an enterprise network . These changing  trends  have created a need not only for the visibility of the connected devices but also how control them, secure them and segment them.

According a latest blog update from Cisco suggests that its cost overs $4M on average yearly for companies to follow best-practices, such as segmentation, and mandating stringent rules and regulations in traditional way.

According to Cisco the launching of version 2.2 of the Cisco Identity Services Engine, or ISE gives their customers the visibility and control they need to defend their network from an ever-increasing number of attack vectors, contain advanced persistent threats, and secure access across today’s distributed networks.

Some of the highlights of ISE 2.2 are

Control All Access throughout the Network

  • Introducing greater control for endpoints. Coupled with much richer endpoint and application visibility, Cisco ISE can now enforce very granular user behavior and device compliance. Major improvements to architecture and functionality provide even greater access control including additional AnyConnect distribution options, more robust deployment resiliency, and the ability to support more posture functionality with non-Cisco network access devices.
  • The new, built-in ISE Setup tool makes it easier and faster than ever to get started with enterprise-grade network access security. This includes out-of-the-box wireless setup for secure access, guest services, and BYOD in as little as 10 minutes with Cisco Wireless LAN Controllers!
  • Customers of any size can now take advantage of efficient and scalable role-based segmentation through a TrustSec-enabled border router such as the Cisco ASR 1000.
  • ISE Device Administration is better than ever with the addition of features Cisco ACS customers enjoy. And migrating from ACS to ISE has been streamlined with new migration tools and resources. With the recent announcement of the ACS End-of-Sale (EoS) as well as the ACS-to-ISE Migration Program, there’s never been a better time to deploy device administration with Cisco ISE.
  • Separate administrative domains for differentiated control based on flexible criteria such as place in network, geographical location, or role and responsibilities, using multiple TrustSec matrixes.

Stop and Contain Threats 

  • Don’t just block bad devices from entering your network, get deep visibility at the application-level so you can set policy based on what the user is doing.
  • Quickly raise the drawbridges and effectively wall off your crown jewels from threats with simplified and agile threat responsiveness. Develop a next-level segmentation strategy with ISE DEFCON. Set multiple policy scenarios pre-defined within multiple TrustSec matrixes for software-defined segmentation that can be dynamically deployed immediately based on an organization’s threat climate.
  • Stop malicious devices before they connect to your network by consuming more Indications of Compromise (IoCs) from your vulnerability assessment and threat incident intelligence solutions such as TenableCisco Cognitive Threat Analytics (CTA) and Rapid7. We call this new layer of posture assessment Threat-Centric NAC.

This will certainly further enhance the end point security not only from visibility perspective but also controlling them by applying security polices and protecting them growing attacks.

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: