Enrich your security apparatus with context. (1:51 min.)
Integrate your system with security information and event management (SIEM). (3:45 min)
Improve threat defense with shared context and dynamically controlled policy. (3:16 min)
Use one API for open, automated data sharing and control. (1:58 min)
The Cisco Identity Services Engine (ISE) improves your operations and network defense capabilities with user and device contextual data, access policies, and enforcement.
Cisco ISE is helping companies consolidate their security operations through open integration with partner technologies. ISE shares its wealth of contextual identity information and allows any partner technology to block network access. It’s immediate. Automatic. Effective.
Many security network technologies lack user identity or device type as part of their operations. Reacting when you do not know critical details impedes productivity and raises costs. Cisco ISE provides context at scale for actionable intelligence on a single pane of glass.
Stop threats immediately by directing ISE to quarantine a user or device for Rapid Threat Containment. Automate your responses so you are immediately protected from threats that are clearly identified.
Cisco Platform Exchange Grid (pxGrid) provides an open, highly secure system for technologies to exchange intelligence. They obtain contextual information from ISE and then direct ISE to contain threats.
ISE works with more than 50 partner technologies. It can be an enabler for multiple use cases, from cloud access security broker (CASBs) solutions to user behavior analytics (UBA). The list of partner technologies has grown exponentially along with the demand for simplicity and automation.
For a complete listing of Cisco ISE technology partners, go to www.cisco.com/go/csta.
Track, collect, and assess user data and activities. (PDF - 247 KB)
Assess posture compliance and apply network access control. (PDF - 268 KB)
Gain visibility into security events throughout your network. (PDF - 308 KB)
Adjust authentication policies based on risk levels and offer single sign-on. (PDF - 246 KB)
Get a complete view of your vulnerabilities in a single pane. (PDF - 284 KB)
Protect your business from risky cloud apps. (PDF - 501 KB)
Expedite troubleshooting and resolve issues fast. (PDF - 247 KB)
Detect and contain botnets quickly with precise policy management. (PDF - 516 KB)
Automatically contain malware to mitigate network risks.