Ise Use Case Secure Wired Aag

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

At a glance

Cisco Public

Cisco Identity Services Engine


Secure Wired Access

We often think of wireless first, but don’t What does


overlook your wired network. Secure Wired
Almost everything is mobile these days, so it makes sense to secure your wireless
Access mean?
networks first. However, too much focus on wireless could blind you to the risks
Identity: Know the people
of uncontrolled access through your wired networks. If unauthorized people or
behind your user accounts
devices connect to your physical switch ports, the wired network could become – including visitors and
the main pathway to a data breach. Don’t let it happen. temporary workers.
Secure wired access means full knowledge and control over who’s and what’s Authentication: Make sure
allowed to connect, what they can do once they’re on, and for how long. It means that people are actually
continually monitoring active user and device sessions for anomalies and threats, who they claim to be.
and enforcing appropriate changes of authorization when necessary.
Authorization: Control
Providing the right level of access to the right people and devices sounds easy, the right level of wired
but it’s often difficult to do. The challenge is even greater when making access access based on who
policies consistent across wired, wireless, and VPN connections. the person or device is.
© 2019 Cisco and/or its affiliates. All rights reserved.
We have good news, though. We’ve made it fast and easy. Accounting: Track
who’s on your network,
© 2019 Cisco and/or its affiliates. All rights reserved.
what they’re doing,
and for how long.
At a glance
Cisco Public

With Cisco ISE, you can: Cisco ISE simplifies secure wired access control
Cisco Identity Services Engine (ISE) makes it easy to gain visibility and control over who and what’s
on your network consistently across wireless, wired, and VPN connections. Secure wired access is
Grant and control just one of several use cases that makes ISE a critical part of your cybersecurity program.
the right level of
ISE offers active authentication through IEEE 802.1X port-based access control, and passive
network access authentication by learning about identity through external integrations like Microsoft Active
Directory and others. Other methods include web authentication or simple MAC Authentication
Improve your security Bypass. Then ISE enforces authorization policy by linking the device’s session with a group-based
posture and quickly policy that’s enforced by the network itself.

contain breaches With Cisco ISE, you’ll benefit from simplified, secure wired access control needed to grant
appropriate access while protecting your organization from the risks of unauthorized people
and devices.
Gain complete endpoint
visibility with context
How Secure Wired Access Works
Streamline your Certificate As users and
access control policy SAML Authorities devices plug into
management IDPs
the network, ISE
confirms identities
APIs and device types

Licensing against its own


repository or
through APIs to
Secure Wired Access requires
External external sources.
the Base incense for each active Then it grants and
Switch Enterprise Cisco Identity Store
endpoint session. Check out the controls access
Ordering Guide to learn more. Network ISE
based on who and
what requested
network access.
Learn More
To learn more, please visit
https://www.cisco.com/go/ise or
contact your account representative.
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of
their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) 07/19

You might also like