Cisco Cisco Identity Services Engine 1.0.4 Guía De Introducción
At-A-Glance
At-a-Glance
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of
Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/
go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
C45-735770-02 06/16
What’s Inside
Cisco Rapid Threat Containment includes:
Context and control: The
provides
contextual identity data (user, device type, and posture). It contains
threats by using the network as an enforcer with VLANs or Cisco
TrustSec® security groups.
threats by using the network as an enforcer with VLANs or Cisco
TrustSec® security groups.
provides an open,
highly secure system for security technologies to exchange intelligence,
obtain contextual information from ISE, and direct ISE to contain threats.
Cisco pxGrid is consistent with Internet Engineering Task Force (IETF)
standards.
obtain contextual information from ISE, and direct ISE to contain threats.
Cisco pxGrid is consistent with Internet Engineering Task Force (IETF)
standards.
who are integrated with
pxGrid’s Rapid Threat Containment capability can share their data and
use ISE to control network access to threatening devices.
use ISE to control network access to threatening devices.
Cisco security technologies: With the
behavior analysis, you can share security
intelligence and the ability to request threat containments through ISE.
Threat-Centric NAC technologies: You can use the standard
expressions of the Structured Threat Information Expression (STIX)
for threats and the Common Vulnerability Scoring System (CVSS) for
vulnerabilities to help ensure consistent categorization and responses.
Today Qualys is integrated with pxGrid for vulnerabilities and Cisco AMP
for threats.
expressions of the Structured Threat Information Expression (STIX)
for threats and the Common Vulnerability Scoring System (CVSS) for
vulnerabilities to help ensure consistent categorization and responses.
Today Qualys is integrated with pxGrid for vulnerabilities and Cisco AMP
for threats.
Next Steps
The Rapid Threat Containment solution is tested, documented, and
supported by Cisco customer service.
supported by Cisco customer service.
For a complete listing of Cisco security technology partners who
support ISE pxGrid and Rapid Threat Containment go to:
support ISE pxGrid and Rapid Threat Containment go to:
For design and deployment guides go to:
.
For more details about Cisco’s extensive and marketing-leading security
technologies, go to:
technologies, go to:
.
• Protect critical data faster:
You can change users’ access
privileges before or after
they get on the network,
based on their threat score.
So if a device starts to act
suspiciously you can have its
access to critical resources
such as finance or patient
records automatically denied
while allowing access to
noncritical resources. This
flexibility allows you to protect
critical data while limiting
the impact to your users’
productivity.