Chapter 1 Regain Control of Your IT Security
This chapter covers the following topics:
The weakest-link security problem
Introduction to Cisco ISE
Introduction to identity and context
The explosion of mobility, virtualization, social networking, and ubiquitous network access coupled with the consumerization of information technology brings new security challenges to organizations, including:
Insufficient security controls for non-corporate-owned ...
Get Cisco ISE for BYOD and Secure Unified Access, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.