ise-ds
ise-ds
ise-ds
Cisco public
If a customer isn’t running Cisco ISE, then that network is not getting the full zero trust experience. Cracks can
form and bad actors can exploit those cracks, putting data and business in a compromising position.
Teams gain agility with zero trust provisioning and flexibility in automating their environment through the entire
life cycle of managing Cisco ISE. With Cisco ISE as the centerpiece for zero trust access to the workplace (self
managed infrastructure), organizations are lowering risk, protecting the integrity of their business, and
accelerating secure network access across the distributed network.
Cisco ISE, provides customers with the ability to see users and devices, control access across wired, wireless
VPN, and 5G connections to the corporate network.
Cisco ISE powers security resilience with the flexibility and choice required to host Cisco software as workloads
in multiple clouds beyond on premises support and maintain business continuity through uncertainty. This
allows customers to gain a more modernized approach to deploying NAC services from the cloud. When
moving from managing infrastructure in a box to leveraging Infrastructure-as-Code (IaC) across hybrid
deployments.
Customer Advantages
Cisco ISE offers a comprehensive solution to build, manage and integrate network access security to your
ecosystem of security applications. You gain many advantages when ISE is deployed, including:
● Highly secure business and context-based access based on your company policies. Cisco ISE works
with network devices to create an all-encompassing contextual identity with attributes such as user,
time, device, device posture, location, threat, vulnerability, and access type. This identity can be used to
enforce a highly secure access policy that matches the identity’s business role. IT administrators can
apply precise controls over who, what, when, where, and how endpoints are allowed on the network.
Cisco ISE uses multiple mechanisms to enforce policy, including Cisco Security Group software-defined
segmentation.
● Streamlined network visibility through a simple, flexible, and highly consumable interface. Cisco ISE
stores a detailed attribute history of all the endpoints that connect to the network as well as users
(including types such as guest, employee, and contractors) on the network, all the way down to endpoint
application details and firewall status. All of these insights go into all network endpoints and devices that
are connecting; providing visibility with context needed to assure device compliance.
● Threat Containment turns the network into the defender, and we are closing down access, removing the
endpoint form the network completely. However, Cisco ISE does not block or prevent a threat from
gaining access. And this level of protection can be automated with integration through pxGrid to give
passive security the intelligence and analytics solutions it needs to become an active arm of defense.
● Network Segmentation is important within balancing business objectives and maintaining protection to
limit organization risks. With Cisco ISE building security directly into the network, it dramatically reduces
the attack surface, the scope of compliance and limits the lateral movement of malware to contain
threats.
Automated device-compliance checks for device-posture and remediation options using Cisco Secure Client
(formerly Anyconnect agent), Temporal and Agentless options with custom scripts support. Cisco Secure Client
Temporal and Agentless are two different ways to gather posture from endpoints beyond a full agent. Agentless
option is supported from ISE 3.0 onwards lo Cisco Secure client also provide advanced VPN services for
desktop and laptop checks. ISE also integrates with market-leading Mobile Device Management/Enterprise
Mobility Management (MDM/EMM) vendors. MDM integration helps ensure that a mobile device is both secure
and policy compliant before it is given access to the network.
Central network device management using TACACS+. Cisco ISE allows you to manage network devices using
the TACACS+ security protocol to control and audit the configuration of network devices. ISE facilitates granular
control of who can access which network device and change the associated network settings.
Feature Benefit
Reboot Reduction Time ● The rebooting of ISE will now take a shorter time, in many cases, about five minutes.
● Typically a reboot of Cisco ISE is usually called for when upgrading software or adding new
services or reauthorizing new certifications and can take upwards of 20 minutes.
● Thanks to improvements made in reboot reduction time, customers will see a reboot
reduction savings of 40%.
Active Directory Site ● Customers have more control over Domain Controllers (DC) and in which priority the Policy
Awareness Service Node (PSN) is selected.
● There are situations when a domain controller is unavailable, and Cisco ISE will
automatically choose the next DC available. When the original domain controller comes
back online, the current protocol is for Cisco ISE to stick with the current DC and not return
to the original one selected.
● In these cases we are allowing the flexibility for our customers to override the Cisco ISE
selection algorithm. This provides peace of mind for customers who will be safe in the
knowledge that the domain controller that they chose originally is the one that will be
connected once the DC is restored.
Dynamic ● A time-saving feature that allows the administrator to set up a temporary policy where a
Reauthentication Times group of devices are placed in a particular bucket.
● This bucket is “dumped” or removed from the network at a particular time that is set by the
administrator. This allows the administrator to set up a designated time period prior for the
end devices to join the network and expel them concurrently once that designated period is
completed.
● This provides a sort of temporary segmentation that continues the Cisco ISE tradition of
least privilege where users are allowed to access only the information that they need and
no more.
pxGrid Direct ● There are two new enhancements that will strengthen the synergy between Cisco ISE and
enhancements pxGrid.
● Firstly, customers can immediately synchronize data from pxGrid Direct Connectors. Prior
to this release Cisco ISE can synchronize a full data base update once a week or less
(minimum once every 12 hours), with incremental updates every day (incremental updates
minimum once every hour). With immediate synchronization, there is no longer a need to
wait until once a week or the end of the day. Any and all updates can be made immediately
without waiting.
● Secondly, the server has been granted the ability to push updates immediately to Cisco
ISE. This new feature is called pxGrid Direct Push and will allow a continuous
synchronization of Cisco ISE without any lag. In other words, whenever a single record is
adjusted, the server will send the change immediately to Cisco ISE.
Protected Access ● A PAC is a credential generated by Cisco that can be sent to Cisco ISE that allows for
Credentials (PAC) less TrustSec devices to be authenticated. When the device needs to be identified later, the
communication PAC file can be sent again.
● Support of a PAC-less communication was developed and supported by Cisco ISE in
efforts to make the network run smoother.
● When a device that supports PAC-less communication connects to a network, newer
switches and network devices will now understand whether this device supports PAC. The
determination will then be sent to Cisco ISE.
● If PAC is not supported, Cisco ISE will recognize this and results in a PAC-less double
check. Older devices that still use PAC will still be covered and behave the way that it
always has.
Centralized Management ● Helps administrators centrally configure and manage profiler, posture, guest,
authentication, and authorization services in a single web-based GUI console.
● Simplifies administration by providing integrated management services from a single pane
of glass.
Rich contextual Identity ● Provides a rule-based, attribute-driven policy model for flexible and business-relevant
and business-policy access control policies.
● Includes attributes such as user and endpoint identity, posture validation, authentication
protocols, device identity, and other external attributes. These attributes can be created
dynamically and saved for later use.
● Integrates with multiple external identity repositories such as Microsoft Active Directory
(On-Prem or Azure AD), Lightweight Directory Access Protocol (LDAP), RADIUS, RSA One-
Time Password (OTP), certificate authorities for both authentication and authorization,
Open Database Connectivity (ODBC) and SAML providers.
Access Control ● Provides a range of access control options, including downloadable Access Control Lists
(dACLs), Virtual LAN (VLAN) assignments, URL redirections, named ACLs, and Security
Group ACLs (SGACLs) with Cisco Security Group technology.
Split Upgrades ● Upgrading to the newest version of Cisco ISE is now less complex as files are downloaded
before upgrades and prechecks are done.
● Split Upgrades shortens the upgrade process and becomes more predictable and runs
without network interruption
● Since the upgrade nodes are split into two distinct groups—allowing for the updates to be
split—customers will no longer have to worry about a lack of network functionality when
they see a Cisco ISE update request.
Cisco ISE Ciphers Control ● Provides the ability to edit a list of ciphers that can be disabled so that customers can be
compliant with the latest security standards.
● Customers that need to be compliant with the latest security standards now have an option
to select which ciphers should be ignored using the authentication.
New TPM Chip (for ● Found on the new SNS-3700 models and in some virtual environments, the TPM chip is a
supported hardware) dedicated chip where sensitive information can be stored.
● Thanks to chip improvements, data stored here can be more difficult to access thus
providing a more secure location for information storage.
AI/ML Profiling and ● Customers are able to quickly identify clusters of identical unknown endpoints via a cloud-
multifactor classification based ML engine
(MFC) ● Devices can be reviewed by proposed profiling policies via the ML engine and put into four
distinct buckets
● Grouping of unknown endpoints becomes much easier as a networking admin can create a
profile and rules for that particular group of unknown devices.
Wi-Fi Edge Analytics ● Cisco-only feature that allows network admins to mine data from Apple, Intel and Samsung
devices.
● This allows for an improvement in device profiling.
● This additional data allows the creation of a more precise profile which enables a safer
network.
Secure supplicant-less ● Provides the ability to swiftly roll out highly secure network access By deriving
network access with authentication and authorization from login information across application layers, allowing
Easy Connect user access without requiring an 802.1X supplicant to exist on the endpoint.
Cisco Security Group ● Cisco Security Group Policy software-defined segmentation provides simpler segmentation
Policy through the use of Security Group Tags (SGT). It is an open technology in IETF, available
within OpenDaylight, and supported on third-party and Cisco platforms.
● ISE is the Segmentation controller which simplifies the management of switch, router,
wireless, and firewall rules.
● Group information propagates SGTs across network devices in the data path (inline
tagging) or via Security group tag exchange protocol (SXP) IP-to-SGT binding information
where devices do not have the capability to tag packets with SGTs.
Guest lifecycle ● Provides a streamlined experience for implementing and customizing guest network
management access.
● Creates corporate-branded guest experiences with advertisements and promotions in
minutes. Support is built in for hotspot, sponsored, self-service, and numerous other
access workflows.
● Provides the administration with real-time visual flows that bring the effects of the guest
flow design to life.
● Tracks access across the network for security, compliance, and full guest auditing. Time
limits, account expirations, and SMS verification offer additional security controls.
● Streamlines access so guests can use their social media credentials to connect.
Streamlined device ● Automates supplicant provision and certificate enrollment for standard PC and mobile
onboarding computing platforms. Provides more secure access, reduces IT help desk tickets, and
delivers a better experience to users.
● Enables end users to add and manage their devices with self-service portals and supports
SAML 2.0 for web portals.
● Integrates with MDM/EMM vendors for mobile device compliancy and enrollment.
Built-in AAA services ● Uses standard RADIUS protocol for Authentication, Authorization, and Accounting (AAA).
● Supports a wide range of authentication protocols, including, but not limited to PAP, MS-
CHAP, Extensible Authentication Protocol (EAP)-MD5, Protected EAP (PEAP), EAP-Flexible
and TEAP.
● Authentication via Secure Tunneling (FAST), EAP-Transport Layer Security (TLS), and EAP-
Tunneled Transport Layer Security (TTLS). Note: Cisco ISE is the only RADIUS server to
support EAP chaining of machine and user credentials.
Device profiling ● Populated with predefined device templates for many types of endpoints, such as IP
phones, printers, IP cameras, smartphones, and tablets. with additional device templates
available for specialized devices such as medical, manufacturing, and building automation.
● Creates custom device templates to automatically detect, classify, and associate
administration- defined identities when endpoints connect to the network.
● Associates endpoint-specific authorization policies based on device type.
● Collects endpoint attribute data with passive network monitoring and telemetry.
Device-profile feed ● Delivers automatic updates of Cisco’s validated device profiles for various IP-enabled
service devices from multiple vendors. Simplifies the task of keeping an up-to-date library of the
newest IP-enabled devices.
● Gives partners and customers the ability to share customized profile information to be
vetted by Cisco and redistributed.
Endpoint posture service ● Performs posture assessments to endpoints connected to the network.
● Enforces the appropriate compliance policies for endpoints through a persistent client-
based agent, a temporal agent, or a query to an external MDM/EMM.
● Provides the ability to create powerful policies that include, but are not limited to, checks
for the latest OS patch, antivirus and antispyware packages with current definition file
variables (version, date, etc.), antimalware packages, registry settings (key, value, etc.),
patch management, disk encryption, mobile PINlock, rooted or jailbroken status, application
presence, and USB-attached media.
● Supports automatic remediation of PC clients as well as periodic reassessments alongside
leading enterprise patch-management systems to make sure the endpoint is not in violation
of company policies.
● Provides hardware inventory for full network visibility.
● Requires the AnyConnect 4.x agent for posture assessment on these OS platforms:
◦ Windows 10 and later
◦ Mac OS X 10.13 and later
◦ Linux (RedHat Enterprise Linux, SUSE Linux Enterprise Service and Ubuntu)
Extensive multiforest ● Provides comprehensive authentication and authorization against multiforest Microsoft
Active Directory support Active Directory domains.
● Groups multiple, disjointed domains into logical groups.
● Includes flexible identity rewriting rules to smooth the solution’s transition and integration.
● Supports Microsoft Active Directory 2003, 2008, 2008R2, 2012, 2012R2, 2016, and 2019.
Monitoring and ● Offers a built-in help web console for monitoring, reporting, and troubleshooting.
troubleshooting ● Provides robust historical and real-time reporting for all services. Logs all activity and offers
real- time dashboard metrics of all users and endpoints connecting to the network.
Certifications ● Meets the requirements of Federal Information Processing Standard (FIPS) 140-2,
Common Criteria, and Unified Capabilities Approved Product List.
● IPv6 ready.
Note: Certifications may not be available on all releases or they may be in varying states of
approval. Current certifications and releases can be found at Global Government
Certifications.
IPv6 Support ● IPv6 for RADIUS and TACACS+ based network devices.
● ISE can be managed via IPv6 management network. This includes: Connecting to ISE
management interface (Web or CLI), Connecting to Active Directory, Sending syslog
messages, Sending SNMP traps, REST API over IPv6, DNS resolution and NTP time
synchronization.
As an extension to the prior Cisco ISE 3.2 release, with the Cisco ISE 3.3 release pxGrid Direct Visibility has
improved visibility of attributes gathered from external databases such as ServiceNow. This allows network
administrators to easily view the content gathered by any endpoints across all of the different sources. This
provides a lot of information on the endpoints, users and devices, including which apps are running over the
network and the different attributes— such as the device owner and type and whether the device is operational.
Customers can then take this data and use it to more efficiently run their network, such as creating an ISE
authorization policy.
Cisco Rapid Threat Containment (RTC) simplifies and automates network mitigation and investigation actions in
response to security events. It integrates Cisco ISE and Cisco security technology partner solutions in a broad
variety of technology areas. With Threat-Centric Network Access Control (TC-NAC), it can change user access
based on CVSS vulnerability and STIX threat scores. With the Cisco pxGrid Adaptive Network Control (ANC), it
gives you the ability to reset the network access status of an endpoint to quarantine, unquarantine, bounce, or
shut down a port.
ISE Virtual appliances are supported on the following on-premise and cloud platforms:
For ISE physical appliance details please refer to the Cisco Secure Network Server datasheet.
Ordering information
The Cisco ISE ordering guide will help you understand the different models and licensing types to make the
best use of your ISE deployment. To place an order, visit the Cisco ordering homepage. To download the ISE
software, visit the Cisco Software Center.
Cisco Capital makes it easier to get the right technology to achieve your objectives, enable business
transformation, and help you stay competitive. We can help you reduce the total cost of ownership, conserve
capital, and accelerate growth. In more than 100 countries, our flexible payment solutions can help you
acquire hardware, software, services, and complementary third-party equipment in easy, predictable
payments. Learn more.
How to buy
To view buying options and speak with a Cisco sales representative, visit
https://www.cisco.com/c/en/us/buy.html.