Cisco Cisco Identity Services Engine 2.1 Guía De Introducción

Descargar
Página de 2
At-A-Glance
At-a-Glance
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of 
Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/
go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner 
does not imply a partnership relationship between Cisco and any other company. (1110R) 
C45-735770-02  06/16
What’s Inside
Cisco Rapid Threat Containment includes:
Context and control: The 
 provides 
contextual identity data (user, device type, and posture). It contains 
threats by using the network as an enforcer with VLANs or Cisco 
TrustSec® security groups.
Integration: 
 provides an open, 
highly secure system for security technologies to exchange intelligence, 
obtain contextual information from ISE, and direct ISE to contain threats. 
Cisco pxGrid is consistent with Internet Engineering Task Force (IETF) 
standards.
Intelligence: 
 who are integrated with 
pxGrid’s Rapid Threat Containment capability can share their data and 
use ISE to control network access to threatening devices.
Cisco security technologies: With the 
 behavior analysis, you can share security 
intelligence and the ability to request threat containments through ISE.
Threat-Centric NAC technologies: You can use the standard 
expressions of the Structured Threat Information Expression (STIX) 
for threats and the Common Vulnerability Scoring System (CVSS) for 
vulnerabilities to help ensure consistent categorization and responses. 
Today Qualys is integrated with pxGrid for vulnerabilities and Cisco AMP 
for threats.
Next Steps 
The Rapid Threat Containment solution is tested, documented, and 
supported by Cisco customer service.
For a complete listing of Cisco security technology partners who 
support ISE pxGrid and Rapid Threat Containment go to: 
For design and deployment guides go to: 
.
For more details about Cisco’s extensive and marketing-leading security 
technologies, go to: 
.
•  Protect critical data faster: 
You can change users’ access 
privileges before or after 
they get on the network, 
based on their threat score. 
So if a device starts to act 
suspiciously you can have its 
access to critical resources 
such as finance or patient 
records automatically denied 
while allowing access to 
noncritical resources. This 
flexibility allows you to protect 
critical data while limiting 
the impact to your users’ 
productivity.