<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BYOD and Security in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/byod-and-security/m-p/4101670#M561149</link>
    <description>&lt;P&gt;here is the good guide for BYOD :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-byod-prescriptive-deployment-guide/ta-p/3641867" target="_blank"&gt;https://community.cisco.com/t5/security-documents/cisco-ise-byod-prescriptive-deployment-guide/ta-p/3641867&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 11 Jun 2020 16:32:24 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2020-06-11T16:32:24Z</dc:date>
    <item>
      <title>BYOD and Security</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-and-security/m-p/4101565#M561141</link>
      <description>&lt;P&gt;HI All,&lt;/P&gt;&lt;P&gt;I am giving a Demo session on BYOD, But still I am bit confused that how BYOD covering the end point compliance/security. As we cannot implement posture on personal device with BYOD. And how we can ensure that personal device connecting to corporate Network is secure and will not effect the corporate network. Any explanation on this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Garry&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jun 2020 14:07:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-and-security/m-p/4101565#M561141</guid>
      <dc:creator>gurbinder.kabbay</dc:creator>
      <dc:date>2020-06-11T14:07:26Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD and Security</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-and-security/m-p/4101670#M561149</link>
      <description>&lt;P&gt;here is the good guide for BYOD :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/cisco-ise-byod-prescriptive-deployment-guide/ta-p/3641867" target="_blank"&gt;https://community.cisco.com/t5/security-documents/cisco-ise-byod-prescriptive-deployment-guide/ta-p/3641867&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jun 2020 16:32:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-and-security/m-p/4101670#M561149</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-06-11T16:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD and Security</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-and-security/m-p/4102534#M561176</link>
      <description>&lt;P&gt;BYOD with ISE is all about device registration and potentially provisioning an 802.1X certificate to avoid credential stuffing attacks. For compliance you will need to do MDM/EMM posture/compliance with &lt;STRONG&gt;&lt;A href="http://cs.co/ise-guides#Meraki" target="_self"&gt;Meraki SM&lt;/A&gt;&lt;/STRONG&gt; or a &lt;STRONG&gt;&lt;A href="http://cisco.com/go/csta" target="_self"&gt;third party MDM vendor&lt;/A&gt;&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;Also see &lt;A href="http://cs.co/ise-webinars" target="_blank"&gt;http://cs.co/ise-webinars&lt;/A&gt; &amp;gt; Recorded Webinars &amp;amp; Training Videos &amp;gt; BYOD (Bring Your Own Device) to help explain some of this.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 23:23:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-and-security/m-p/4102534#M561176</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2020-06-12T23:23:18Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD and Security</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-and-security/m-p/4103371#M561231</link>
      <description>&lt;P&gt;Hi Thomas,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can we implement &lt;STRONG&gt;ISE Posture&lt;/STRONG&gt; with &lt;STRONG&gt;ISE BYOD ?&amp;nbsp;&lt;/STRONG&gt;If Yes, then please share any documentation or Use case. Moreover, EMM is only for mobile or for personal laptops/ desktop machines as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Gurbinder&lt;/P&gt;</description>
      <pubDate>Mon, 15 Jun 2020 14:15:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-and-security/m-p/4103371#M561231</guid>
      <dc:creator>gurbinder.kabbay</dc:creator>
      <dc:date>2020-06-15T14:15:36Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD and Security</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-and-security/m-p/4103808#M561247</link>
      <description>&lt;P&gt;Yes, you can use Posture in conjunction with BYOD. After BYOD enrollment, you would use a redirect-based Posture flow to deploy the AnyConnect Posture/Compliance modules or use the Web Agent. See &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/identity-services-engine-22/210523-ISE-posture-style-comparison-for-pre-and.html#anc9" target="_blank" rel="noopener"&gt;ISE Posture Style Comparison for Pre and Post 2.2&lt;/A&gt;&amp;nbsp; for more information and Posture flow diagrams. Keep in mind that both Posture and MDM require ISE Apex licensing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is also a section on "Posture and Compliance in Cisco ISE" in the Webinars link that &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/26555"&gt;@thomas&lt;/a&gt; provided earlier.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2020 03:01:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-and-security/m-p/4103808#M561247</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2020-06-16T03:01:40Z</dc:date>
    </item>
    <item>
      <title>Re: BYOD and Security</title>
      <link>https://community.cisco.com/t5/network-access-control/byod-and-security/m-p/4104093#M561256</link>
      <description>&lt;P&gt;Read my response immediately above.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2020 12:55:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/byod-and-security/m-p/4104093#M561256</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2020-06-16T12:55:21Z</dc:date>
    </item>
  </channel>
</rss>

