Cisco Cisco Identity Services Engine 1.2 Guía De Introducción
© 2016 Cisco and/or its affiliates. All rights reserved.
At-a-Glance
2
Respond with Rapid Threat Containment
No matter how advanced the security, some threats will still get in. The
solution isn’t to build larger walls, it’s about speeding up the way you respond.
solution isn’t to build larger walls, it’s about speeding up the way you respond.
A leading healthcare
company uses ISE and
Stealthwatch to gain
visibility and get ahead of
cyber attacks.
company uses ISE and
Stealthwatch to gain
visibility and get ahead of
cyber attacks.
Challenge:
•
Secure 500 sites and 250,000
devices across the network
•
Gain visibility and control over
network threats
•
Meet HIPAA compliance
requirements
Solution:
•
Network as a Sensor and
Network as an Enforcer with
Cisco ISE and Stealthwatch
Cisco ISE and Stealthwatch
•
Enforce network segmentation
and user access control
policies
policies
Results:
•
Deployed across all sites
6 months ahead of schedule
•
Cut threat response time from
days to minutes
•
Ensured safety of information
& compliance to HIPAA
standards
standards
•
Once Stealthwatch detects anomalous traffic, it issues an alert, giving the
admin the option to quarantine the user. pxGrid enables Stealthwatch to
hand off the quarantine command directly to ISE.
hand off the quarantine command directly to ISE.
•
Admins can make a decision based on analysis, revoking users access
and quarantining through ISE them with a single click. Admins don’t need
to modify or change the overall system policies in place because ISE
reassigns the access policy of the quarantined individual.
to modify or change the overall system policies in place because ISE
reassigns the access policy of the quarantined individual.
•
Find the root cause of a breach with post-incident audit trails. Stealthwatch
stores records of all network activity for months or years.
For more on responding to threat faster go to:
www.cisco.com/go/rtc
Secure your growing digital business
To move forward with new initiatives or technologies confidently, businesses
must know they can scale without creating new security issues.
must know they can scale without creating new security issues.
•
Stop thinking about security as an obstacle and provide a foundation for
network segmentation for secure access & visibility.
•
Enable admins to carefully control access to sensitive assets, know
precisely when someone tries to access information, and extend that
visibility to any new area of the network, environment or cloud.
visibility to any new area of the network, environment or cloud.
•
Add users, devices and business without compromising network visibility.
Reduce the administrative burden of setting up new devices with
constantly updating device profile feeds from ISE.
constantly updating device profile feeds from ISE.
•
Scale the environment without creating blind spots. A deployment of
Stealthwatch can process data from 50,000 flow sources at 6 million flows
per second (fps) all while stitching and de-duplicating flows.
per second (fps) all while stitching and de-duplicating flows.
•
Reduce the administrative burden associated with silo’d management
sources. Network-wide flow is centrally displayed in the Stealthwatch
Management Console. Easily integrate 3rd party technologies and services
through a REST API.
Management Console. Easily integrate 3rd party technologies and services
through a REST API.
Next Steps
.
To learn more visit
www.cisco.com/go/Stealthwatch
,
www.cisco.com/go/ise