Cisco ISE for BYOD and Secure Unified Access

3 avg rating
( 1 ratings by Goodreads )
 
9781587143250: Cisco ISE for BYOD and Secure Unified Access
View all copies of this ISBN edition:
 
 

Plan and deploy identity-based secure access for BYOD and borderless networks

 

Using Cisco Secure Unified Access Architecture and Cisco Identity Services Engine, you can secure and regain control of borderless networks in a Bring Your Own Device (BYOD) world. This book covers the complete lifecycle of protecting a modern borderless network using these advanced solutions, from planning an architecture through deployment, management, and troubleshooting.

 

Cisco ISE for BYOD and Secure Unified Access begins by reviewing the business case for an identity solution. Next, you’ll walk through identifying users, devices, and security posture; gain a deep understanding of Cisco’s Secure Unified Access solution; and master powerful techniques for securing borderless networks, from device isolation to protocol-independent network segmentation.

 

You’ll find in-depth coverage of all relevant technologies and techniques, including 802.1X, profiling, device onboarding, guest lifecycle management, network admission control, RADIUS, and Security Group Access.

Drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors present detailed sample configurations to help you plan your own integrated identity solution. Whether you’re a technical professional or an IT manager, this guide will help you provide reliable secure access for BYOD, CYOD (Choose Your Own Device), or any IT model you choose.

 

  • Review the new security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT
  • Understand the building blocks of an Identity Services Engine (ISE) solution
  • Design an ISE-Enabled network, plan/distribute ISE functions, and prepare for rollout
  • Build context-aware security policies
  • Configure device profiling, endpoint posture assessments, and guest services
  • Implement secure guest lifecycle management, from WebAuth to sponsored guest access
  • Configure ISE, network access devices, and supplicants, step-by-step
  • Walk through a phased deployment that ensures zero downtime
  • Apply best practices to avoid the pitfalls of BYOD secure access
  • Simplify administration with self-service onboarding and registration
  • Deploy Security Group Access, Cisco’s tagging enforcement solution
  • Add Layer 2 encryption to secure traffic flows
  • Use Network Edge Access Topology to extend secure access beyond the wiring closet
  • Monitor, maintain, and troubleshoot ISE and your entire Secure Unified Access system

 

"synopsis" may belong to another edition of this title.

About the Author:

Aaron Woland , CCIE No. 20113, is a Senior Secure Access Engineer at Cisco Systems and works with Cisco’s largest customers all over the world. His primary job responsibilities include secure access and ISE deployments, solution enhancements, futures, and escalations. Aaron joined Cisco in 2005 and is currently a member of numerous security advisory boards. Prior to joining Cisco, he spent 12 years as a consultant and technical trainer. His areas of expertise include network and host security architecture and implementation, regulatory compliance, and routing and switching. Aaron is the author of many white papers and design guides, including the TrustSec 2.0 Design and Implementation Guide and the NAC Layer 3 OOB Using VRFs for Traffic Isolation design guide. He is also a distinguished speaker at Cisco Live for topics related to identity and is a security columnist for Network World , where he blogs on all things related to identity. Additional certifications include CCSP, CCNP, CCDP, Certified Ethical Hacker, MCSE, and many other industry certifications.

 

Jamey Heary , CCIE No. 7680, is a Distinguished Systems Engineer at Cisco Systems, where he works as a trusted security advisor to Cisco customers and business groups. He is also a featured security columnist for Network World , where he blogs on all things security. Jamey sits on the PCI Security Standards Council-Board of Advisors, where he provides strategic and technical guidance for future PCI standards. Jamey is the author of Cisco NAC Appliance: Enforcing Host Security with Clean Access . He also has a patent pending on a new DDoS mitigation technique. Jamey sits on numerous security advisory boards for Cisco Systems and is a founding member of the Colorado Healthcare InfoSec Users Group. His other certifications include CISSP, and he is a Certified HIPAA Security Professional. He has been working in the IT field for 19 years and in IT security for 15 years.

"About this title" may belong to another edition of this title.

Buy New View Book
List Price: US$ 69.99
US$ 87.68

Convert Currency

Shipping: FREE
From United Kingdom to U.S.A.

Destination, Rates & Speeds

Add to Basket

Top Search Results from the AbeBooks Marketplace

1.

Jamey Heary, Aaron Woland
Published by Pearson Education (US), United States (2013)
ISBN 10: 1587143259 ISBN 13: 9781587143250
New Paperback Quantity Available: 10
Seller:
Book Depository International
(London, United Kingdom)
Rating
[?]

Book Description Pearson Education (US), United States, 2013. Paperback. Condition: New. New.. Language: English . Brand New Book. Plan and deploy identity-based secure access for BYOD and borderless networks Using Cisco Secure Unified Access Architecture and Cisco Identity Services Engine, you can secure and regain control of borderless networks in a Bring Your Own Device (BYOD) world. This book covers the complete lifecycle of protecting a modern borderless network using these advanced solutions, from planning an architecture through deployment, management, and troubleshooting. Cisco ISE for BYOD and Secure Unified Access begins by reviewing the business case for an identity solution. Next, you ll walk through identifying users, devices, and security posture; gain a deep understanding of Cisco s Secure Unified Access solution; and master powerful techniques for securing borderless networks, from device isolation to protocol-independent network segmentation. You ll find in-depth coverage of all relevant technologies and techniques, including 802.1X, profiling, device onboarding, guest lifecycle management, network admission control, RADIUS, and Security Group Access. Drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors present detailed sample configurations to help you plan your own integrated identity solution. Whether you re a technical professional or an IT manager, this guide will help you provide reliable secure access for BYOD, CYOD (Choose Your Own Device), or any IT model you choose. Review the new security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT Understand the building blocks of an Identity Services Engine (ISE) solution Design an ISE-Enabled network, plan/distribute ISE functions, and prepare for rollout Build context-aware security policies Configure device profiling, endpoint posture assessments, and guest services Implement secure guest lifecycle management, from WebAuth to sponsored guest access Configure ISE, network access devices, and supplicants, step-by-step Walk through a phased deployment that ensures zero downtime Apply best practices to avoid the pitfalls of BYOD secure access Simplify administration with self-service onboarding and registration Deploy Security Group Access, Cisco s tagging enforcement solution Add Layer 2 encryption to secure traffic flows Use Network Edge Access Topology to extend secure access beyond the wiring closet Monitor, maintain, and troubleshoot ISE and your entire Secure Unified Access system. Seller Inventory # BZV9781587143250

More information about this seller | Contact this seller

Buy New
US$ 87.68
Convert Currency

Add to Basket

Shipping: FREE
From United Kingdom to U.S.A.
Destination, Rates & Speeds

2.

Heary, Jamey; Woland, Aaron
Published by Cisco Press
ISBN 10: 1587143259 ISBN 13: 9781587143250
New PAPERBACK Quantity Available: 3
Seller:
BarristerBooks
(Lawrence, KS, U.S.A.)
Rating
[?]

Book Description Cisco Press. PAPERBACK. Condition: New. 1587143259 BRAND NEW W/FAST SHIPPING! This item is: Cisco ISE for BYOD and Secure Unified Access, 1st Ed., 2013, by Heary, Jamey^Woland, Aaron; FORMAT: Paperback; ISBN: 9781587143250. Choose Expedited for fastest shipping! Our 98%+ rating proves our commitment! We cannot ship to PO Boxes/APO address. To avoid ordering the wrong item, please check your item's ISBN number!. Seller Inventory # P9781587143250

More information about this seller | Contact this seller

Buy New
US$ 87.69
Convert Currency

Add to Basket

Shipping: FREE
Within U.S.A.
Destination, Rates & Speeds

3.

Jamey Heary; Aaron Woland
Published by Cisco Press (2013)
ISBN 10: 1587143259 ISBN 13: 9781587143250
New Softcover First Edition Quantity Available: > 20
Seller:
Palexbooks
(Sanford, NC, U.S.A.)
Rating
[?]

Book Description Cisco Press, 2013. Condition: New. Brand new! Please provide a physical shipping address. Seller Inventory # 9781587143250

More information about this seller | Contact this seller

Buy New
US$ 87.75
Convert Currency

Add to Basket

Shipping: US$ 3.00
Within U.S.A.
Destination, Rates & Speeds

4.

Heary, Jamey, Woland, Aaron
Published by Cisco Press (2013)
ISBN 10: 1587143259 ISBN 13: 9781587143250
New Paperback Quantity Available: 2
Seller:
Murray Media
(North Miami Beach, FL, U.S.A.)
Rating
[?]

Book Description Cisco Press, 2013. Paperback. Condition: New. Never used!. Seller Inventory # P111587143259

More information about this seller | Contact this seller

Buy New
US$ 98.28
Convert Currency

Add to Basket

Shipping: US$ 1.99
Within U.S.A.
Destination, Rates & Speeds

5.

Jamey Heary; Aaron Woland
Published by Cisco Press (2013)
ISBN 10: 1587143259 ISBN 13: 9781587143250
New Softcover First Edition Quantity Available: 1
Seller:
Irish Booksellers
(Portland, ME, U.S.A.)
Rating
[?]

Book Description Cisco Press, 2013. Condition: New. book. Seller Inventory # M1587143259

More information about this seller | Contact this seller

Buy New
US$ 109.64
Convert Currency

Add to Basket

Shipping: FREE
Within U.S.A.
Destination, Rates & Speeds

6.

Heary, Jamey/ Woland, Aaron
Published by Cisco Systems (2013)
ISBN 10: 1587143259 ISBN 13: 9781587143250
New Paperback Quantity Available: 1
Seller:
Revaluation Books
(Exeter, United Kingdom)
Rating
[?]

Book Description Cisco Systems, 2013. Paperback. Condition: Brand New. 1st edition. 752 pages. 9.00x7.30x1.60 inches. In Stock. Seller Inventory # zk1587143259

More information about this seller | Contact this seller

Buy New
US$ 108.76
Convert Currency

Add to Basket

Shipping: US$ 8.52
From United Kingdom to U.S.A.
Destination, Rates & Speeds

7.

Jamey Heary, Aaron Woland
Published by Pearson Education (US), United States (2013)
ISBN 10: 1587143259 ISBN 13: 9781587143250
New Paperback Quantity Available: 10
Seller:
Book Depository hard to find
(London, United Kingdom)
Rating
[?]

Book Description Pearson Education (US), United States, 2013. Paperback. Condition: New. New.. Language: English . This book usually ship within 10-15 business days and we will endeavor to dispatch orders quicker than this where possible. Brand New Book. Plan and deploy identity-based secure access for BYOD and borderless networks Using Cisco Secure Unified Access Architecture and Cisco Identity Services Engine, you can secure and regain control of borderless networks in a Bring Your Own Device (BYOD) world. This book covers the complete lifecycle of protecting a modern borderless network using these advanced solutions, from planning an architecture through deployment, management, and troubleshooting. Cisco ISE for BYOD and Secure Unified Access begins by reviewing the business case for an identity solution. Next, you ll walk through identifying users, devices, and security posture; gain a deep understanding of Cisco s Secure Unified Access solution; and master powerful techniques for securing borderless networks, from device isolation to protocol-independent network segmentation. You ll find in-depth coverage of all relevant technologies and techniques, including 802.1X, profiling, device onboarding, guest lifecycle management, network admission control, RADIUS, and Security Group Access. Drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors present detailed sample configurations to help you plan your own integrated identity solution. Whether you re a technical professional or an IT manager, this guide will help you provide reliable secure access for BYOD, CYOD (Choose Your Own Device), or any IT model you choose. Review the new security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT Understand the building blocks of an Identity Services Engine (ISE) solution Design an ISE-Enabled network, plan/distribute ISE functions, and prepare for rollout Build context-aware security policies Configure device profiling, endpoint posture assessments, and guest services Implement secure guest lifecycle management, from WebAuth to sponsored guest access Configure ISE, network access devices, and supplicants, step-by-step Walk through a phased deployment that ensures zero downtime Apply best practices to avoid the pitfalls of BYOD secure access Simplify administration with self-service onboarding and registration Deploy Security Group Access, Cisco s tagging enforcement solution Add Layer 2 encryption to secure traffic flows Use Network Edge Access Topology to extend secure access beyond the wiring closet Monitor, maintain, and troubleshoot ISE and your entire Secure Unified Access system. Seller Inventory # BZV9781587143250

More information about this seller | Contact this seller

Buy New
US$ 121.89
Convert Currency

Add to Basket

Shipping: FREE
From United Kingdom to U.S.A.
Destination, Rates & Speeds