Cisco Cisco Identity Services Engine 1.2 Libro blanco
White Paper:
Cisco Systems and the Migration from NAC to EVAS
10
© 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
maximize its value, Cisco is working with several partners to provide enterprise organizations with
additional functionality such as:
additional functionality such as:
1. Faster remediation of threats via work with SIEM vendors.
2. Extension of access policy and posture compliance to mobile devices with MDM vendors.
3. Enhanced single sign-on (SSO) on mobile device for secure access to sensitive data.
4. Internet of Things (IoT) security for the industrial sector and operations technology (OT).
5. Simplified network troubleshooting and forensics.
6. Endpoint vulnerability remediation.
2. Extension of access policy and posture compliance to mobile devices with MDM vendors.
3. Enhanced single sign-on (SSO) on mobile device for secure access to sensitive data.
4. Internet of Things (IoT) security for the industrial sector and operations technology (OT).
5. Simplified network troubleshooting and forensics.
6. Endpoint vulnerability remediation.
When all products are deployed in concert, the Cisco EVAS architecture can be used in the before, during, and after
attack use cases, helping enterprise organizations lower risk, accelerate incident detection/response, and
streamline security operations.
attack use cases, helping enterprise organizations lower risk, accelerate incident detection/response, and
streamline security operations.
The Bigger Truth
To this day, security professionals equate NAC with its original concepts and form factor from over ten years ago.
This perception is misguided and ignores the fact that NAC technology maturity has led to a new category—EVAS.
EVAS extends security protection, profiles endpoints for continuous monitoring, provides for granular access
controls, and aligns cybersecurity with business processes.
This perception is misguided and ignores the fact that NAC technology maturity has led to a new category—EVAS.
EVAS extends security protection, profiles endpoints for continuous monitoring, provides for granular access
controls, and aligns cybersecurity with business processes.
Aside from network access alone, EVAS can also help organizations prevent, detect, and respond to attacks in a
timely manner. In fact, EVAS can be used to help organizations reduce the endpoint and network attack surface,
define the scale and scope of an attack, remediate problem resolution processes, and further harden the network
after an attack has occurred. EVAS also integrates with other security technologies to share data and automate
remediation activities.
timely manner. In fact, EVAS can be used to help organizations reduce the endpoint and network attack surface,
define the scale and scope of an attack, remediate problem resolution processes, and further harden the network
after an attack has occurred. EVAS also integrates with other security technologies to share data and automate
remediation activities.
As organizations embrace cloud computing and mobile applications, EVAS is becoming increasingly important
because it can balance business enablement, end-user productivity, and strong security. As CISOs recognize this and
seek the best EVAS solutions, they would be well served by contacting Cisco and discussing how its enterprise-class
EVAS architecture can help them discover and control rogue devices, reduce the attack surface for threats, and
improve downstream security operations while enhancing productivity for authorized users by enabling and
securing access to critical business resources.
because it can balance business enablement, end-user productivity, and strong security. As CISOs recognize this and
seek the best EVAS solutions, they would be well served by contacting Cisco and discussing how its enterprise-class
EVAS architecture can help them discover and control rogue devices, reduce the attack surface for threats, and
improve downstream security operations while enhancing productivity for authorized users by enabling and
securing access to critical business resources.