ISE
Robot Soccer? Staying Connected at Bowdoin College
As our team has prepared for Educause 2013 this week, we have been talking a lot about technology in higher education and how it’s impacting colleges, universities, students and staff. Of course, robot soccer was not the first thing that came to mind, but it’s a great example of how different techno…
A Financial Service Organization Speaks Out on Secure Access
Are your finances secure with your financial institution? Vystar Credit Union in Florida, USA speaks out on one of their recent efforts to ensure highly secure access at their institution. With the pressures of compliance and the need to protect their institution’s network and assets, Vystar deploys…
More Effective Threat Visibility Using Identity and Device-Type Context
Following my previous blog post about identity and device aware IT platforms making IT operations easier and more effective, I wanted to delve a little deeper into a specific element of the IT infrastructure: Security Event & Information Management (SIEM) and Threat Defense (TD) systems.…
Register to Learn About Cisco’s Policy Enforcement Solution
In his blog last week, Daryl Coon announced how there’s going to be a webinar this Thursday talking about Cisco’s leading One Policy solution driver, the Identity Services Engine (ISE) and its newest enhancements—now available with its 1.2 release. During this free event, you will learn…
Cisco’s Policy Enforcement Solution Delivers
Whether you need to support BYOD work practices, or provide more secure access to your data center resources, the Cisco Identity Services Engine (ISE) can help. With this all-in-one enterprise policy control platform, you can reliably enforce compliance, enhance infrastructure security, and simplify…
How Secure is Your Secure Access?
In June, I attended the Gartner Security Summit in Washington, D.C. where I was asked by quite a few security executives, “My network folks just bought ISE, but what is ISE and what type of security does it provide?” Fast forward to July, and I wish I had this SANS review on ISE to offer a month ea…
Securing Access to the Network and Beyond
Often when I think about what mobile means, I picture sales people out in the field, inspectors on bridges, repair men high atop utility poles. But in reality, we are all mobile a lot closer to home. I’m mobile when I check email from my backyard. I’m even mobile when I’m in the office, accessing th…
Seven Things to Complete Before Deploying Cisco Identity Services Engine
Connected devices are spreading like kudzu on the Carolina roadside. Cisco Identity Services Engine (ISE) is a great way to manage the devices on your network and with implementing some best practices, I can say you will save time. Below are 7 ideas that will help: 1. Find an Executive Sponsor. Secu…
Have You Registered for Centralize Policy, Control and Enforcement May 15th?
Activate the IT Transformation with Unified Access: Part 4 – Centralized Policy, Control, and Enforcement Wednesday, May 15, 2013 10am-11am PDT | Register Now Don’t miss the next in line of our five-part Unified Access Webinar Series on May 15th to hear how organizations in…