Техническая Спецификация для Cisco Cisco Identity Services Engine Software
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 1 of 5
Data Sheet
Cisco Identity Services Engine
The Cisco
®
Identity Services Engine (ISE) allows you to see and control users and
devices connecting to the corporate network. It does all this from a central location.
Product Overview
A different approach is required to both manage and secure the evolving mobile enterprise. With superior user and
device visibility, Cisco ISE simplifies the mobility experience for enterprises. It also shares vital contextual data with
integrated technology partner solutions. With the integration, consolidation, and automation that Cisco ISE
provides, you can identify, contain, and remediate threats faster.
The Customer Advantages
Cisco ISE offers a holistic approach to network access security. You gain many advantages when it is deployed,
including:
Secure business and context-based access per on your company policies. ISE can match users and endpoints
and other attributes such as time, location, and access type or method, creating an all-encompassing contextual
identity. This identity is used to enforce a secure-
access policy that matches the identity’s business role. IT
administrators can apply precise controls over who and what are allowed on the network. They use multiple
solution’ for software-defined segmentation.
Streamlined network visibility through a simple, flexible, and highly consumable interface. ISE now stores a
history of all endpoints that have been on the network with the associated visibility. The Streamlined Visibility
Wizard can quickly stand up a proof of value to demonstrate visibility into all the endpoints on a given network.
Extensive policy enforcement to define access rules easily and with great flexibility that meets your ever-
changing business needs. All this can be done from a centralized location that distributes enforcement across the
entire network and security infrastructure. IT administrators can centrally define a policy that differentiates guest
users and devices from registered users and devices. Regardless of the access location, users and endpoints are
allowed access based on their context.
Streamlined guest experiences that provide multiple levels of access to your networks. Guests can use a coffee-
shop hotspot, self-service registered access, or sponsored access to get to specific resources. Dynamic visual
tools offer real-time previews of the portal screens and the steps that a user experiences. You can see how
changes affect the settings in sponsored guest accounts, self-registrations, and SMS and email confirmations of
Self-service device onboarding to implement the
enterprise’s bring-your-own-device (BYOD) or guest policies.
Users can manage devices according to the business policies defined by IT administrators. The IT staff can get the
automated device provisioning, profiling, and posturing it needs to comply with security policies. At the same time,
employees can get their devices onto the network without requiring IT assistance.