Cisco ISE Velti ISE Implementation to secure the organization April 23, 2013 1 Anthony Hassiotis
Cisco ISE
Velti ISE Implementation
to secure the organization
April 23, 2013
1
Anthony Hassiotis
2
Agenda Velti Overview
Key Challenges
ISE Solution
Benefits
Q & A
Agenda
3
East
Asia
Europe
Africa
Latin
America
Russia & CIS
Central America
North America
2013
Our Users Have New Expectations
The Evolving Workplace Landscape
DEVICE
PROLIFERATION
15 Billion Devices
by 2015 that Will Be Connecting to the
Internet
On Average Every Person Has
3–4 Devices On Them
that Connects to the Network
55% of Staff Are Bringing
Their Own Devices to Work
5
Wireless access-Key Challenges
• Managing wireless Security
• Centralized authentication
• Mobile Workforce - Easy access across offices
• Time to expand to new installations
• Visibility on the devices/users connect on the network
• Troubleshooting
• Admin - IT time spent to set up Users/Guests
• Proliferation of Mobile Devices
• Authenticate and authorize all legitimate devices and users
• Safeguard confidential data
Challenges
6
Identity and Context Centric Security Cisco ISE Architecture
WHEN WHAT
WHERE
HOW WHO
Identity
Security Policy
Attributes
Cisco Identity Services Engine
Business-Relevant
Policies
User and Devices
Dynamic Policy & Enforcement
APPLICATION CONTROLS MONITORING AND
REPORTING
SECURITY POLICY
ENFORCEMENT
Cisco SecureX Architecture
7
From PoC to full install
Deployment
Office ISE WLC AP
Athens 1 1 1
London 1
8
Core Network
Deployment Office ISE WLC AP
Athens 1 1 21
London 1 1 10
SF 1 1 10
Atlanta 1 1 5
NY 1 1 4
Chennai 1 1 4
9
From PoC to full install
Deployment
Office ISE WLC AP
Athens 1 1 21 + 2 Flex
London 10 + 2 Flex
SF 1 1 10 + 1 Flex
Palo Alto 1 2
Atlanta 1 1 5
NY 1 1 4
Dubai 1 Flex
Santa Monica 1 Flex
Moscow 1 Flex
Mumbai 1 2
Chennai 1 1 2 + 1 Flex
New Delhi 1 Flex
Newton Abbot 1 Flex
Manchester 1 Flex
Patra 1 Flex
Dusseldorf 1 Flex
Amsterdam 1 Flex
10
Solution-ISE/WLC
Centralized authentication
Quick to deploy-Speed to Market
No rip and replace infra - No overlay appliances
Resilient installation
One administration/monitoring dashboard
Benefits
12
Benefits SOX - security mandates
Productivity
No rip and replace infra - No overlay appliances
Fewer Cases
Transparent to users
Speed to Market
Cost effective
Generation Y talents – Remove barriers to innovation
Benefits
14
Guest access
Guest Policy
What policy for web authenticated users?
Internet only
Internet +
specific
ressources
Guest Group ½ day or a day
Business Hours
Contractor
Group
Up to one month
Any day (inc. WE)
Guest
Contractor
Email Encryption
Cisco Jabber™ Cisco WebEx ®
Cisco ISE Cisco Prime™ NCS Router Wireless Wired
Enterprise Applications
Cisco AnyConnect™ Cisco ASA Cisco ® ScanSafe Cisco WSA
Devices Layer
Desktop and Notebook Computers
Tablets
Smartphones
Games and Printers
Thin and Virtual Clients
Enable a Full Mobile and Collaboration Experience
Provide integrated policy management with mobile device management, deliver granular
endpoint controls, provide layered security, and enforce network security policies for
BYOD deployments
Business Policy: Provide Granular Access to Full Company Workspace,
Both On and Off Site
Cisco ISE
19
Thank you
Q&A