Asimily, a company specializing in cyber asset management for connected devices, has announced a significant enhancement to its platform's microsegmentation capabilities. The key development is the new native support for Security Group Access Control Lists (SGACL) within Cisco Identity Services Engine (ISE). This deepens the existing integration between the two products, enabling security teams to automatically translate the detailed device intelligence gathered by Asimily into enforceable, granular access policies in Cisco ISE. This move aims to help organizations, particularly in sectors like healthcare and manufacturing, to move from passive device visibility to active risk reduction by containing threats and preventing lateral movement across their diverse and growing fleets of IoT, OT, and IoMT devices.
The integration between Asimily and Cisco ISE creates a powerful, automated workflow for network segmentation:
This closed-loop process ensures that security policies are not only based on deep device context but are also dynamically updated as the device's risk profile changes.
This enhanced integration provides several key benefits for organizations struggling with connected device security:
This solution is particularly valuable for industries with a high proliferation of connected devices, including:
The Asimily and Cisco ISE integration is a prime example of implementing dynamic network segmentation (microsegmentation) to contain threats.
By automatically generating and enforcing SGACLs, the solution enforces least-privilege access for IoT/OT devices at the network level.
Mapped D3FEND Techniques:
The Asimily-Cisco ISE integration provides a powerful mechanism for achieving Network Isolation for IoT and OT devices. The tactical approach is to use Asimily to first baseline the normal behavior of all connected devices. For a set of infusion pumps in a hospital, Asimily will identify that they only communicate with a specific application server. This intelligence is then used to create a policy in ISE that places all infusion pumps into a specific Security Group. An SGACL is then applied to this group, explicitly allowing communication only to the application server and denying all other traffic. This effectively isolates the infusion pumps from the rest of the network, including other medical devices and the corporate IT network, preventing a compromise from spreading.
Asimily's platform is fundamentally built on Resource Access Pattern Analysis. It continuously monitors the network behavior of each connected device to build a deep understanding of its normal communication patterns. Security teams should leverage this capability not just for initial policy creation, but for ongoing threat detection. Set up alerts in Asimily for when a device deviates from its established baseline. For example, if an HVAC controller that normally only communicates with a building management system suddenly attempts to connect to an external IP address, this is a strong indicator of compromise. This behavioral analysis provides a dynamic layer of defense that can detect attacks even against zero-day vulnerabilities.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats