Chapter 1 Regain Control of Your IT Security

This chapter covers the following topics:

Image The weakest-link security problem

Image Introduction to Cisco ISE

Image Introduction to identity and context

The explosion of mobility, virtualization, social networking, and ubiquitous network access coupled with the consumerization of information technology brings new security challenges to organizations, including:

Insufficient security controls for non-corporate-owned ...

Get Cisco ISE for BYOD and Secure Unified Access, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.