Cisco ISE for BYOD and Secure Unified Access

Cisco TrustSec and ISE

Nonfiction, Computers, Networking & Communications
Cover of the book Cisco ISE for BYOD and Secure Unified Access by Jamey Heary, Aaron Woland, Pearson Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jamey Heary, Aaron Woland ISBN: 9780133103632
Publisher: Pearson Education Publication: June 7, 2013
Imprint: Cisco Press Language: English
Author: Jamey Heary, Aaron Woland
ISBN: 9780133103632
Publisher: Pearson Education
Publication: June 7, 2013
Imprint: Cisco Press
Language: English

Plan and deploy identity-based secure access for BYOD and borderless networks

 

Using Cisco Secure Unified Access Architecture and Cisco Identity Services Engine, you can secure and regain control of borderless networks in a Bring Your Own Device (BYOD) world. This book covers the complete lifecycle of protecting a modern borderless network using these advanced solutions, from planning an architecture through deployment, management, and troubleshooting.

 

Cisco ISE for BYOD and Secure Unified Access begins by reviewing the business case for an identity solution. Next, you’ll walk through identifying users, devices, and security posture; gain a deep understanding of Cisco’s Secure Unified Access solution; and master powerful techniques for securing borderless networks, from device isolation to protocol-independent network segmentation.

 

You’ll find in-depth coverage of all relevant technologies and techniques, including 802.1X, profiling, device onboarding, guest lifecycle management, network admission control, RADIUS, and Security Group Access.

Drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors present detailed sample configurations to help you plan your own integrated identity solution. Whether you’re a technical professional or an IT manager, this guide will help you provide reliable secure access for BYOD, CYOD (Choose Your Own Device), or any IT model you choose.

 

  • Review the new security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT
  • Understand the building blocks of an Identity Services Engine (ISE) solution
  • Design an ISE-Enabled network, plan/distribute ISE functions, and prepare for rollout
  • Build context-aware security policies
  • Configure device profiling, endpoint posture assessments, and guest services
  • Implement secure guest lifecycle management, from WebAuth to sponsored guest access
  • Configure ISE, network access devices, and supplicants, step-by-step
  • Walk through a phased deployment that ensures zero downtime
  • Apply best practices to avoid the pitfalls of BYOD secure access
  • Simplify administration with self-service onboarding and registration
  • Deploy Security Group Access, Cisco’s tagging enforcement solution
  • Add Layer 2 encryption to secure traffic flows
  • Use Network Edge Access Topology to extend secure access beyond the wiring closet
  • Monitor, maintain, and troubleshoot ISE and your entire Secure Unified Access system

 

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Plan and deploy identity-based secure access for BYOD and borderless networks

 

Using Cisco Secure Unified Access Architecture and Cisco Identity Services Engine, you can secure and regain control of borderless networks in a Bring Your Own Device (BYOD) world. This book covers the complete lifecycle of protecting a modern borderless network using these advanced solutions, from planning an architecture through deployment, management, and troubleshooting.

 

Cisco ISE for BYOD and Secure Unified Access begins by reviewing the business case for an identity solution. Next, you’ll walk through identifying users, devices, and security posture; gain a deep understanding of Cisco’s Secure Unified Access solution; and master powerful techniques for securing borderless networks, from device isolation to protocol-independent network segmentation.

 

You’ll find in-depth coverage of all relevant technologies and techniques, including 802.1X, profiling, device onboarding, guest lifecycle management, network admission control, RADIUS, and Security Group Access.

Drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors present detailed sample configurations to help you plan your own integrated identity solution. Whether you’re a technical professional or an IT manager, this guide will help you provide reliable secure access for BYOD, CYOD (Choose Your Own Device), or any IT model you choose.

 

 

More books from Pearson Education

Cover of the book My TV for Seniors by Jamey Heary, Aaron Woland
Cover of the book My iPhone for Seniors (Covers iOS 9 for iPhone 6s/6s Plus, 6/6 Plus, 5s/5C/5, and 4s) by Jamey Heary, Aaron Woland
Cover of the book MCTS 70-640 Cert Guide by Jamey Heary, Aaron Woland
Cover of the book Statistical Techniques for Forensic Accounting by Jamey Heary, Aaron Woland
Cover of the book SOA Using Java Web Services by Jamey Heary, Aaron Woland
Cover of the book Building Windows 8 Apps with C# and XAML by Jamey Heary, Aaron Woland
Cover of the book Using Google Advanced Search by Jamey Heary, Aaron Woland
Cover of the book The iOS 4 Developer's Cookbook by Jamey Heary, Aaron Woland
Cover of the book Taking Stock: Make money in microstock creating photos that sell by Jamey Heary, Aaron Woland
Cover of the book Start Here! Learn HTML5 by Jamey Heary, Aaron Woland
Cover of the book Reach Your Full Potential (Collection) by Jamey Heary, Aaron Woland
Cover of the book Brilliant Social Media by Jamey Heary, Aaron Woland
Cover of the book Introducing Windows 10 for IT Professionals, Preview Edition by Jamey Heary, Aaron Woland
Cover of the book Developing Flex 4 Components by Jamey Heary, Aaron Woland
Cover of the book Moving to Microsoft Windows Vista by Jamey Heary, Aaron Woland
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy