Cisco Cisco Identity Services Engine 2.1 入門ガイド
"The Cisco Identity Services
Engine prevented any
unauthorized access to the
network while providing highly
flexible operational access
management."
Mirko Berlier,
Cisco Engineer and Expo 2015
Architect
Engine prevented any
unauthorized access to the
network while providing highly
flexible operational access
management."
Mirko Berlier,
Cisco Engineer and Expo 2015
Architect
“The behavioral alarms built in
to Stealthwatch gave us a
whole new detection
capability that we never had
before.”
to Stealthwatch gave us a
whole new detection
capability that we never had
before.”
Mike Sheck
Incident Response Team
Cisco CSIRT
Incident Response Team
Cisco CSIRT
© 2016 Cisco and/or its affiliates. All rights reserved.
Use security as a growth enabler
Organizations are racing to reap the benefits of digitization, fueled by trends
such as mobility, IoT, cloud, and advanced analytics. The key to these
benefits is adapting networks to operate at digital speeds and keeping them
secure against threats. When companies are confident about their security,
they are able to innovate, adopt new technologies and develop new services.
Unfortunately, in a recent survey 39% of organizations have halted a mission-
critical initiative due to cybersecurity concerns.
such as mobility, IoT, cloud, and advanced analytics. The key to these
benefits is adapting networks to operate at digital speeds and keeping them
secure against threats. When companies are confident about their security,
they are able to innovate, adopt new technologies and develop new services.
Unfortunately, in a recent survey 39% of organizations have halted a mission-
critical initiative due to cybersecurity concerns.
Even when people know their system is compromised, they don’t always
know where it’s happening and how, making them susceptible to network
abuse and insider threats. Organizations need a solution that provides
extensive network visibility enhanced by rich user and device details to speed
up threat detection and response.
know where it’s happening and how, making them susceptible to network
abuse and insider threats. Organizations need a solution that provides
extensive network visibility enhanced by rich user and device details to speed
up threat detection and response.
Only the combination of Stealthwatch and Cisco’s Identity Services Engine
helps organizations get a 360° view, respond to threats faster, and secure a
growing digital business.
helps organizations get a 360° view, respond to threats faster, and secure a
growing digital business.
Get true visibility with
Stealthwatch and ISE
Stealthwatch and ISE
At-a-Glance
1
Get a 360° view
Gain unmatched visibility and control with integration between Stealthwatch
and ISE.
•
and ISE.
•
Continuously monitor, analyze, separate, categorize, and store host and
user information from your network with Stealthwatch.
•
Enable administrators to see details about each individual device – type,
operating system, compliance status, connection method, geographical
location and more with ISE.
location and more with ISE.
•
Discover anomalous traffic in your environment. Applying context-aware
security analysis to automatically detect anomalous behaviors,
Stealthwatch can identify a wide range of attacks, including malware, zero-
day attacks, distributed denial-of-service (DDoS) attempts, advanced
persistent threats (APTs), and insider threats.
Stealthwatch can identify a wide range of attacks, including malware, zero-
day attacks, distributed denial-of-service (DDoS) attempts, advanced
persistent threats (APTs), and insider threats.
•
Know exactly when individual user behavior becomes suspicious.
Stealthwatch enables admins to set their own behavior thresholds, once a
user crosses the threshold it triggers an alert.
user crosses the threshold it triggers an alert.
Get a
360° view
Secure a growing
digital business
Respond to
threats faster