Cisco Cisco Identity Services Engine 1.2 Prospecto
Solution Overview
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public.
Page 1 of 4
BENEFITS
● Apply granular control of network
access with location-based
authorization for individual users
authorization for individual users
● Enhance policy enforcement with
automated location checks and
reauthorizations
reauthorizations
● Simplify management by
configuring authorization with
ISE tools
ISE tools
Gain Location-Based Services with Cisco ISE and
Cisco MSE
Cisco MSE
Now you can give network access to users only when they’re in a specific location.
Protect confidential data by denying access when an individual leaves a board room,
lab, or other designated area.
Protect confidential data by denying access when an individual leaves a board room,
lab, or other designated area.
The days of employees tethered to desks are long gone. They move across the
enterprise, room to room, floor to floor, building to building. At the same time,
they use their laptops and other wireless devices to get stay connected and get
their jobs done. Organizations need a single source of dynamic access control
that adapts automatically and simply for this mobile workforce.
The Cisco
®
. Administrators can grant access to users
based on their specific physical location. This ability adds another level of
context by which access is authorized.
As We Move Around, Our Network Access Should Change Accordingly
Currently, the definiti
on of “location” on the network is static. It is based on the network access devicethat a user
came through to access the network. Even within a specific building, “location” hasn’t been based on the
geographic whereabouts of a user who may be moving around that building. You may want to control network
access more precisely, however. For example, you might want to grant doctors in a hospital access to patient
records or to certain applications during an emergency. But when those doctors work in the medical lab, you might
want to limit their access to those same records or applications.