Cisco ISE for BYOD and Secure Unified Access

Cisco ISE for BYOD and Secure Unified Access
Author :
Publisher : Cisco Press
Total Pages : 752
Release :
ISBN-10 : 9780133103632
ISBN-13 : 0133103633
Rating : 4/5 (32 Downloads)

Synopsis Cisco ISE for BYOD and Secure Unified Access by : Jamey Heary

Plan and deploy identity-based secure access for BYOD and borderless networks Using Cisco Secure Unified Access Architecture and Cisco Identity Services Engine, you can secure and regain control of borderless networks in a Bring Your Own Device (BYOD) world. This book covers the complete lifecycle of protecting a modern borderless network using these advanced solutions, from planning an architecture through deployment, management, and troubleshooting. Cisco ISE for BYOD and Secure Unified Access begins by reviewing the business case for an identity solution. Next, you’ll walk through identifying users, devices, and security posture; gain a deep understanding of Cisco’s Secure Unified Access solution; and master powerful techniques for securing borderless networks, from device isolation to protocol-independent network segmentation. You’ll find in-depth coverage of all relevant technologies and techniques, including 802.1X, profiling, device onboarding, guest lifecycle management, network admission control, RADIUS, and Security Group Access. Drawing on their cutting-edge experience supporting Cisco enterprise customers, the authors present detailed sample configurations to help you plan your own integrated identity solution. Whether you’re a technical professional or an IT manager, this guide will help you provide reliable secure access for BYOD, CYOD (Choose Your Own Device), or any IT model you choose. Review the new security challenges associated with borderless networks, ubiquitous mobility, and consumerized IT Understand the building blocks of an Identity Services Engine (ISE) solution Design an ISE-Enabled network, plan/distribute ISE functions, and prepare for rollout Build context-aware security policies Configure device profiling, endpoint posture assessments, and guest services Implement secure guest lifecycle management, from WebAuth to sponsored guest access Configure ISE, network access devices, and supplicants, step-by-step Walk through a phased deployment that ensures zero downtime Apply best practices to avoid the pitfalls of BYOD secure access Simplify administration with self-service onboarding and registration Deploy Security Group Access, Cisco’s tagging enforcement solution Add Layer 2 encryption to secure traffic flows Use Network Edge Access Topology to extend secure access beyond the wiring closet Monitor, maintain, and troubleshoot ISE and your entire Secure Unified Access system

Practical Deployment of Cisco Identity Services Engine (ISE)

Practical Deployment of Cisco Identity Services Engine (ISE)
Author :
Publisher : Syngress
Total Pages : 300
Release :
ISBN-10 : 9780128045046
ISBN-13 : 0128045043
Rating : 4/5 (46 Downloads)

Synopsis Practical Deployment of Cisco Identity Services Engine (ISE) by : Andy Richter

With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.

CCNP Security SISAS 300-208 Official Cert Guide

CCNP Security SISAS 300-208 Official Cert Guide
Author :
Publisher : Pearson Education
Total Pages : 928
Release :
ISBN-10 : 9781587144264
ISBN-13 : 1587144263
Rating : 4/5 (64 Downloads)

Synopsis CCNP Security SISAS 300-208 Official Cert Guide by : Aaron T. Woland

CCNP Security SISAS 300-208 Official Cert Guide CCNP Security SISAS 300-208 Official Cert Guide from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Cisco security experts Aaron Woland and Kevin Redmon share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This complete study package includes A test-preparation routine proven to help you pass the exam "Do I Know This Already?" quizzes, which enable you to decide how much time you need to spend on each section The powerful Pearson IT Certification Practice Testsoftware, complete with hundreds of well-reviewed, exam-realistic questions, customization options, and detailed performance reports A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study time Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, video instruction, and hands-on labs, this official study guide helps you master the concepts and techniques that ensure your exam success. Aaron T. Woland, CCIE No. 20113, is a Principal Engineer and works with the largest Cisco customers all over the world. His primary job responsibilities include Secure Access and Identity deployments with ISE, solution enhancements, standards development, and futures. Aaron is the author of Cisco ISE for BYOD and Secure Unified Access (Cisco Press) and many published white papers and design guides. He is one of the first six members of the Hall of Fame for Distinguished Speakers at Cisco Live, and is a security columnist for Network World, where he blogs on all things related to Identity. Kevin Redmon is a Systems Test Engineer with the Cisco IoT Vertical Solutions Group, specializing in all things security. Previously with the Cisco Systems Development Unit, Kevin supported several iterations of the Cisco Validated Design Guide for BYOD and is the author of Cisco Bring Your Own Device (BYOD) Networking Live Lessons (Cisco Press). Since joining Cisco in October 2000, he has worked closely with several Cisco design organizations, and as Firewall/VPN Customer Support Engineer with the Cisco Technical Assistance Center (TAC). He holds several Cisco certifications and has an issued patent with the U.S. Patent and Trademark Office. The official study guide helps you master topics on the CCNP Security SISAS 300-208 exam, including the following: Identity management/secure access Threat defense Troubleshooting, monitoring and reporting tools Threat defense architectures Identity management architectures The CD contains 150 practice questions for the exam and a study planner tool. Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Test Pearson IT Certification Practice Test minimum system requirements: Windows Vista (SP2), Windows 7, or Windows 8.1; Microsoft .NET Framework 4.5 Client; Pentium-class 1GHz processor (or equivalent); 512MB RAM; 650MB disk space plus 50MB for each downloaded practice exam; access to the Internet to register and download exam databases

Network Security Technologies and Solutions (CCIE Professional Development Series)

Network Security Technologies and Solutions (CCIE Professional Development Series)
Author :
Publisher : Pearson Education
Total Pages : 700
Release :
ISBN-10 : 9780132796743
ISBN-13 : 0132796740
Rating : 4/5 (43 Downloads)

Synopsis Network Security Technologies and Solutions (CCIE Professional Development Series) by : Yusuf Bhaiji

CCIE Professional Development Network Security Technologies and Solutions A comprehensive, all-in-one reference for Cisco network security Yusuf Bhaiji, CCIE No. 9305 Network Security Technologies and Solutions is a comprehensive reference to the most cutting-edge security products and methodologies available to networking professionals today. This book helps you understand and implement current, state-of-the-art network security technologies to ensure secure communications throughout the network infrastructure. With an easy-to-follow approach, this book serves as a central repository of security knowledge to help you implement end-to-end security solutions and provides a single source of knowledge covering the entire range of the Cisco network security portfolio. The book is divided into five parts mapping to Cisco security technologies and solutions: perimeter security, identity security and access management, data privacy, security monitoring, and security management. Together, all these elements enable dynamic links between customer security policy, user or host identity, and network infrastructures. With this definitive reference, you can gain a greater understanding of the solutions available and learn how to build integrated, secure networks in today’s modern, heterogeneous networking environment. This book is an excellent resource for those seeking a comprehensive reference on mature and emerging security tactics and is also a great study guide for the CCIE Security exam. “Yusuf’s extensive experience as a mentor and advisor in the security technology field has honed his ability to translate highly technical information into a straight-forward, easy-to-understand format. If you’re looking for a truly comprehensive guide to network security, this is the one! ” –Steve Gordon, Vice President, Technical Services, Cisco Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and is currently the program manager for Cisco CCIE Security certification. He is also the CCIE Proctor in the Cisco Dubai Lab. Prior to this, he was technical lead for the Sydney TAC Security and VPN team at Cisco. Filter traffic with access lists and implement security features on switches Configure Cisco IOS router firewall features and deploy ASA and PIX Firewall appliances Understand attack vectors and apply Layer 2 and Layer 3 mitigation techniques Secure management access with AAA Secure access control using multifactor authentication technology Implement identity-based network access control Apply the latest wireless LAN security solutions Enforce security policy compliance with Cisco NAC Learn the basics of cryptography and implement IPsec VPNs, DMVPN, GET VPN, SSL VPN, and MPLS VPN technologies Monitor network activity and security incident response with network and host intrusion prevention, anomaly detection, and security monitoring and correlation Deploy security management solutions such as Cisco Security Manager, SDM, ADSM, PDM, and IDM Learn about regulatory compliance issues such as GLBA, HIPPA, and SOX This book is part of the Cisco CCIE Professional Development Series from Cisco Press, which offers expert-level instr

CCNP Security Identity Management Sise 300-715 Official Cert Guide

CCNP Security Identity Management Sise 300-715 Official Cert Guide
Author :
Publisher : Cisco Press
Total Pages : 750
Release :
ISBN-10 : 0136642942
ISBN-13 : 9780136642947
Rating : 4/5 (42 Downloads)

Synopsis CCNP Security Identity Management Sise 300-715 Official Cert Guide by : Aaron Woland

This is Cisco's official, comprehensive self-study resource for Cisco's SISE 300-715 exam (Implementing and Configuring Cisco Identity Services Engine), one of the most popular concentration exams required for the Cisco Certified Network Professional (CCNP) Security certification. It will thoroughly prepare network professionals to deploy and use Cisco ISE to simplify delivery of consistent, highly secure access control across wired, wireless, and VPN connections. Designed for all CCNP Security candidates, CCNP Security Identity Management SISE 300-715 Official Cert Guide covers every SISE #300-715 objective concisely and logically, with extensive teaching features designed to promote retention and understanding. You'll find: Pre-chapter quizzes to assess knowledge upfront and focus your study more efficiently Foundation topics sections that explain concepts and configurations, and link theory to practice Key topics sections calling attention to every figure, table, and list you must know Exam Preparation sections with additional chapter review features Final preparation chapter providing tools and a complete final study plan A customizable practice test library CCNP Security Identity Management SISE 300-715 Official Cert Guide offers comprehensive, up-to-date coverage of all SISE #300-715 Cisco Identity Services Engine topics related to: Architecture and deployment Policy enforcement Web Auth and guest services Profiler BYOD Endpoint compliance Network access device administration

Integrated Security Technologies and Solutions - Volume II

Integrated Security Technologies and Solutions - Volume II
Author :
Publisher : Cisco Press
Total Pages : 1017
Release :
ISBN-10 : 9780134807676
ISBN-13 : 0134807677
Rating : 4/5 (76 Downloads)

Synopsis Integrated Security Technologies and Solutions - Volume II by : Aaron Woland

The essential reference for security pros and CCIE Security candidates: identity, context sharing, encryption, secure connectivity and virtualization Integrated Security Technologies and Solutions – Volume II brings together more expert-level instruction in security design, deployment, integration, and support. It will help experienced security and network professionals manage complex solutions, succeed in their day-to-day jobs, and prepare for their CCIE Security written and lab exams. Volume II focuses on the Cisco Identity Services Engine, Context Sharing, TrustSec, Application Programming Interfaces (APIs), Secure Connectivity with VPNs, and the virtualization and automation sections of the CCIE v5 blueprint. Like Volume I, its strong focus on interproduct integration will help you combine formerly disparate systems into seamless, coherent, next-generation security solutions. Part of the Cisco CCIE Professional Development Series from Cisco Press, it is authored by a team of CCIEs who are world-class experts in their Cisco security disciplines, including co-creators of the CCIE Security v5 blueprint. Each chapter starts with relevant theory, presents configuration examples and applications, and concludes with practical troubleshooting. Review the essentials of Authentication, Authorization, and Accounting (AAA) Explore the RADIUS and TACACS+ AAA protocols, and administer devices with them Enforce basic network access control with the Cisco Identity Services Engine (ISE) Implement sophisticated ISE profiling, EzConnect, and Passive Identity features Extend network access with BYOD support, MDM integration, Posture Validation, and Guest Services Safely share context with ISE, and implement pxGrid and Rapid Threat Containment Integrate ISE with Cisco FMC, WSA, and other devices Leverage Cisco Security APIs to increase control and flexibility Review Virtual Private Network (VPN) concepts and types Understand and deploy Infrastructure VPNs and Remote Access VPNs Virtualize leading Cisco Security products Make the most of Virtual Security Gateway (VSG), Network Function Virtualization (NFV), and microsegmentation

Network Security Auditing

Network Security Auditing
Author :
Publisher : Cisco Press
Total Pages : 700
Release :
ISBN-10 : 9781587059421
ISBN-13 : 1587059428
Rating : 4/5 (21 Downloads)

Synopsis Network Security Auditing by : Chris Jackson

This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them. Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, including coverage of the latest regulations, compliance issues, and industry best practices. The author then demonstrates how to segment security architectures into domains and measure security effectiveness through a comprehensive systems approach. Network Security Auditing thoroughly covers the use of both commercial and open source tools to assist in auditing and validating security policy assumptions. The book also introduces leading IT governance frameworks such as COBIT, ITIL, and ISO 17799/27001, explaining their values, usages, and effective integrations with Cisco security products.

Practical Cisco Unified Communications Security

Practical Cisco Unified Communications Security
Author :
Publisher : Cisco Press
Total Pages : 780
Release :
ISBN-10 : 9780136654445
ISBN-13 : 0136654444
Rating : 4/5 (45 Downloads)

Synopsis Practical Cisco Unified Communications Security by : Brett Hall

Master the foundations of modern Cisco Unified Communications (UC) system security This guide helps you build foundational knowledge for securing modern Cisco Unified Communications environments that support voice, video, messaging, and meetings, and support different types of real-time collaboration capabilities based on mobile/remote access and mobile devices based on bring-your-own-device (BYOD) initiatives. Writing for administrators and managers, two Cisco collaboration experts bring together methods and insights to illuminate both the “why” and the “how” of effective collaboration security. Using the proven “Explain, Demonstrate, and Verify” methodology, they explain each threat, demonstrate remediation, and show how to confirm correct implementation. You'll walk through securing each attack surface in a logical progression, across each Cisco UC application domain. The authors address key updates to Cisco collaboration architecture, including Expressway, Cisco Meeting Server, encryption enhancements, and advanced business-to-business collaboration. You'll find quick-reference checklists in each chapter, and links to more detail wherever needed. Begin by protecting your workforce through basic physical security and life/safety techniques Understand how attackers seek to compromise your UC system's network environment—and your best countermeasures Maintain security across all UC deployment types n Protect core UC applications by locking down and hardening the core operating system Use encryption to protect media and signaling, and enforce secure authentication Secure Cisco Unified Communications Manager, Cisco Unity Connection, and Cisco Meeting Server Deploy Session Border Controllers to provide security controls for VoIP and video traffic Provide additional protection at the edge of the network Safeguard cloud-based and hybrid-cloud services Enable organizations to seamlessly and securely connect to cloud UC services Allow remote teleworker users to connect safely to local UC resources

Cisco Unified Contact Center Enterprise

Cisco Unified Contact Center Enterprise
Author :
Publisher : Pearson Education
Total Pages : 457
Release :
ISBN-10 : 9781587141386
ISBN-13 : 1587141388
Rating : 4/5 (86 Downloads)

Synopsis Cisco Unified Contact Center Enterprise by : Gary Ford

Cisco Unified Contact Center Enterprise (UCCE) The complete guide to managing UCCE environments: tips, tricks, best practices, and lessons learned Cisco Unified Contact Center Enterprise (UCCE) integrates multiple components and can serve a wide spectrum of business requirements. In this book, Gary Ford, an experienced Cisco UCCE consultant brings together all the guidance you need to optimally configure and manage UCCE in any environment. The author shares in-depth insights covering both the enterprise and hosted versions of UCCE. He presents an administrator’s view of how to perform key UCCE tasks and why they work as they do. He thoroughly addresses application configuration, agents, scripting, IVR, dial plans, UCM, error handling, reporting, metrics, and many other key topics. You’ll find proven, standardized configuration examples that help eliminate errors and reduce downtime, step-by-step walkthroughs of several actual configurations, and thorough coverage of monitoring and troubleshooting UCCE systems. Cisco Unified Contact Center Enterprise (UCCE) is an indispensable resource to help you deploy and operate UCCE systems reliably and efficiently. · Understand the Cisco Unified Contact Center product portfolio and platform architecture · Choose the right single-site, multi-site, or clustered deployment model for your environment · Take a lifecycle services approach to UCCE deployment and application configuration-–including preparation, planning, design, and implementation · Implement traditional, current-generation, and next-generation call routing · Master the latest best practices for call flow scripting · Understand UCCE’s nodes and distributed processes and build a clean system startup sequence · Design, implement, and deliver unified CM/IP IVR solutions · Set up and efficiently manage UCCE databases · Make the most of UCCE’s reporting tools · Create advanced applications with Data-Driven Routing · Effectively maintain any UCCE deployment, including older versions · Use a best-practice methodology for troubleshooting, and master valuable, little-known Cisco diagnostic tools This IP communications book is part of the Cisco Press® Networking Technology Series. IP communications titles from Cisco Press help networking professionals understand voice and IP telephony technologies, plan and design converged networks, and implement network solutions for increased productivity.

Email Security with Cisco IronPort

Email Security with Cisco IronPort
Author :
Publisher : Cisco Press
Total Pages : 760
Release :
ISBN-10 : 9780132730716
ISBN-13 : 0132730715
Rating : 4/5 (16 Downloads)

Synopsis Email Security with Cisco IronPort by : Chris Porter

Email Security with Cisco IronPort thoroughly illuminates the security and performance challenges associated with today’s messaging environments and shows you how to systematically anticipate and respond to them using Cisco’s IronPort Email Security Appliance (ESA). Going far beyond any IronPort user guide, leading Cisco expert Chris Porter shows you how to use IronPort to construct a robust, secure, high-performance email architecture that can resist future attacks. Email Security with Cisco IronPortpresents specific, proven architecture recommendations for deploying IronPort ESAs in diverse environments to optimize reliability and automatically handle failure. The author offers specific recipes for solving a wide range of messaging security problems, and he demonstrates how to use both basic and advanced features-–including several hidden and undocumented commands. The author addresses issues ranging from directory integration to performance monitoring and optimization, and he offers powerful insights into often-ignored email security issues, such as preventing “bounce blowback.” Throughout, he illustrates his solutions with detailed examples demonstrating how to control ESA configuration through each available interface. Chris Porter,Technical Solutions Architect at Cisco, focuses on the technical aspects of Cisco IronPort customer engagements. He has more than 12 years of experience in applications, computing, and security in finance, government, Fortune® 1000, entertainment, and higher education markets. ·Understand how the Cisco IronPort ESA addresses the key challenges of email security ·Select the best network deployment model for your environment, and walk through successful installation and configuration ·Configure and optimize Cisco IronPort ESA’s powerful security, message, and content filtering ·Understand the email pipeline so you can take full advantage of it–and troubleshoot problems if they occur ·Efficiently control Cisco IronPort ESA through its Web User Interface (WUI) and command-line interface (CLI) ·Implement reporting, monitoring, logging, and file management ·Integrate Cisco IronPort ESA and your mail policies with LDAP directories such as Microsoft Active Directory ·Automate and simplify email security administration ·Deploy multiple Cisco IronPort ESAs and advanced network configurations ·Prepare for emerging shifts in enterprise email usage and new security challenges This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.