Cisco Cisco Identity Services Engine 1.0.4 Guía De Introducción
At-a-Glance
Manage Devices More Easily and Respond to
Threats Faster
As more employees demand access to enterprise resources through
a variety of devices, you start to lose sight of what, exactly, is on your
network. Providing access to employees on their devices and across a
growing number of applications is critical to productivity. But how do you
deliver this level of access without compromising security?
You need deep visibility into what’s on the network. Only then can you
You need deep visibility into what’s on the network. Only then can you
dynamically and intelligently assign policies to quickly stop threats.
With the Cisco Identity Services Engine and Cisco Meraki Systems
With the Cisco Identity Services Engine and Cisco Meraki Systems
Manager working together, you gain the control and visibility needed to
identify and respond to threats, all within a single policy management
platform.
Cisco ISE
Cisco Meraki
Systems Manager
Simple and Flexible
Extend Policy Management to Mobile Devices
With Cisco ISE and Meraki Systems Manager, you can:
• Apply policies to mobile devices based on granular user and device data
• Stop potential threats by dynamically updating access policies, even if
• Apply policies to mobile devices based on granular user and device data
• Stop potential threats by dynamically updating access policies, even if
a device is already connected
• Support Enterprise Mobility Management (EMM) use cases such as
device registration, remote actions, remediation, and data security
• Simplify policy management and strengthen security with a single
source of control
Next Steps
To learn more, check out the
. For additional information, visit
Cisco Identity Services
Engine and Cisco Meraki
Systems Manager
Benefits
• Greater visibility into who and
what are on your network,
including device compliance
and enrollment status
• Simplified management
with ISE as the single source
of control for access across
on-premises and cloud-
managed networks
• Fast responses to threats
with dynamic policy updates
should a mobile device become
compromised
© 2016 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of
Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/
go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
C45-737829-00 09/16