This chapter covers the following topics:
The weakest-link security problem
Introduction to Cisco ISE
Introduction to identity and context
The explosion of mobility, virtualization, social networking, and ubiquitous network access coupled with the consumerization of information technology brings new security challenges to organizations, including:
Insufficient security controls for non-corporate-owned ...