We are talking precisely of the Identity Service Engine better known as ISE , that is, an instrument Cisco designed to create and apply security policies for all the various end devices, such as: laptops, fixed PCs, smartphones and any network device.
ISE It is a solution that therefore works on our network (wired or wireless), separating accesses on the basis of to the identity of those who connect.
But Ise is not limited only to controlling who connects to our network and their possible permissions, it gives us the possibility to intervene on:
- Who can access our network,
- What you can access,
- How can I access it,
- When and how can I access it.
Ise therefore becomes very useful not only for controlling access and logically grouping the different types of users that populate our work environment, but it also gives us a tool for visibility of the 'state' of the network. With Ise we are able to get a lot of interesting details about everything that is in contact in our network.
It protects network access and at the same time it can provide real-time visibility of network users and devices for all business and non-business activities.
It supports all those business initiatives such as the use of their devices in a work environment (BRing ANDOur OWn Ddevice) through the extensive qualifications that Ise grants. Another very interesting example could be the possibility of creating a network access portal for Guest users through ISE, in this way we would have self-registration by users while maintaining the required level of security.
One of the most important issues after security, this often underestimated aspect is instead present in ISE, we can precisely create policies that serve to standardize the work environment from a security point of view and not. For example, we can decide that if a device does not have Antivirus it cannot access the network. This, in addition to increasing security, allows us, as mentioned before having a common work environment, these aspects can also be applied to versions and types of operating systems.
Interested? Click here to find out more about the steps suggested by IT GLOBAL CONSULTING
Watch the informational video on Global IT Services! : Click Here!
Do you want to be contacted? Click here to access the contact page
Our team of experts is ready to listen to your needs and to offer you solutions tailored to your business.
Fill out the contact form. We will get back to you as soon as possible to discuss how we can support you in the transformation of your IT infrastructure.