Cisco ISE for BYOD and Secure Unified Access
<P style="MARGIN: 0px">Plan and deploy identity-based secure access for BYOD and borderless networks</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Using Cisco Secure Unified Access Architecture and Cisco Identity Services Engine, you can secure and regain control of borderless networks in a Bring Your Own Device (BYOD) world. This book covers the complete lifecycle of protecting a modern borderless network using these advanced solutions, from planning an architecture through deployment, management, and troubleshooting.</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">Cisco ISE for BYOD and Secure Unified Access begins by reviewing the business case for an identity solution. Next, you’ll walk through identifying users, devices, and security posture; gain a deep understanding of Cisco’s Secure Unified Access solution; and master powerful techniques for securing borderless networks, from device isolation to protocol-independent network segmentation.</P> <P style="MARGIN: 0px"> </P> <P style="MARGIN: 0px">You’ll find in-depth coverage of all relevant technologies and techniques, including 802.1X, profiling, device onboarding, guest lifecycle management, network admission control, RADIUS, and Security Group Access.</P> <P style="MARGIN: 0px">Drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors present detailed sample configurations to help you plan your own integrated identity solution. Whether you’re a technical professional or an IT manager, this guide will help you provide reliable secure access for BYOD, CYOD (Choose Your Own Device), or any IT model you choose.</P> <P style="MARGIN: 0px"> </P> <UL> <LI> <DIV style="MARGIN: 0px">Review the new security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT</DIV> </LI> <LI> <DIV style="MARGIN: 0px">Understand the building blocks of an Identity Services Engine (ISE) solution</DIV> </LI> <LI> <DIV style="MARGIN: 0px">Design an ISE-Enabled network, plan/distribute ISE functions, and prepare for rollout</DIV> </LI> <LI> <DIV style="MARGIN: 0px">Build context-aware security policies</DIV> </LI> <LI> <DIV style="MARGIN: 0px">Configure device profiling, endpoint posture assessments, and guest services</DIV> </LI> <LI> <DIV style="MARGIN: 0px">Implement secure guest lifecycle management, from WebAuth to sponsored guest access</DIV> </LI> <LI> <DIV style="MARGIN: 0px">Configure ISE, network access devices, and supplicants, step-by-step</DIV> </LI> <LI> <DIV style="MARGIN: 0px">Walk through a phased deployment that ensures zero downtime</DIV> </LI> <LI> <DIV style="MARGIN: 0px">Apply best practices to avoid the pitfalls of BYOD secure access</DIV> </LI> <LI> <DIV style="MARGIN: 0px">Simplify administration with self-service onboarding and registration</DIV> </LI> <LI> <DIV style="MARGIN: 0px">Deploy Security Group Access, Cisco’s tagging enforcement solution</DIV> </LI> <LI> <DIV style="MARGIN: 0px">Add Layer 2 encryption to secure traffic flows</DIV> </LI> <LI> <DIV style="MARGIN: 0px">Use Network Edge Access Topology to extend secure access beyond the wiring closet</DIV> </LI> <LI> <DIV style="MARGIN: 0px">Monitor, maintain, and troubleshoot ISE and your entire Secure Unified Access system</DIV> </LI> </UL> <P style="MARGIN: 0px"> </P>