Vous êtes sur la page 1sur 1

At-a-Glance

 
 
 
 
Cisco TrustSec Technology
 
 
Fast Security for Fast IT
  Business demand for cloud services, mobility, and the Internet of
 
  Things (IoT) has created exponential network growth and complexity. It
has introduced risk, too. Each new user, device, and data connection
represents a potential attack entry point. Your attack surface is
expanding.
To control the situation, you need dynamic security that moves at the
pace of your business. Network segmentation is essential to protecting
critical business assets, but traditionally requires extensive manual
maintenance. Embedded in your existing Cisco® network infrastructure,
Cisco TrustSec® security technology simplifies and accelerates network
access control with software-defined segmentation. Controls are defined
simply using endpoint roles, not IP address, so policy changes can be
made without redesigning the network.

Benefits The centralized policy management platform for TrustSec is the


Cisco Identity Services Engine. It gathers contextual data about
• Reduce operational expenses who and what is accessing your network. Administrators can use
by simplifying network
this information to create groups and to assign access rights based
segmentation and defining
on role, function, location, and so on. This intuitive process gives
security groups based on the right level of access to the right people at the right time and
business roles, not IP allows access to critical applications to be easily controlled.
addresses.
The increased visibility that Cisco TrustSec technology provides also helps
you better prioritize threats and accelerate remediation. Better inspection
• Limit the impact of a data
and analysis of suspicious activity can reduce the time needed to identify a
breach by quickly isolating
potential breach, reducing its impact and associated costs.
and containing threats using
 
technology already in your
How It Works
network.
Traditional network segmentation use VLANs and access control lists (ACLs)
• Centrally apply and enforce that are based on IP addresses, which require extensive manual
consistent policies across wired, maintenance. The Cisco TrustSec approach simplifies segmentation by
wireless, and remote-access dynamically organizing machines into logical groups, called security groups,
users and devices. and enabling security policies to be written using security group tags.
The interaction of systems is determined by the security-group-based
policies, eliminating the need for VLAN-based or address-based policy
“Effective network provisioning. Cisco TrustSec technology is available in virtual and physical
segmentation … reduces the switches. It provides consistent management of virtual and physical workloads
extent to which an across the campus and data center, allowing segmentation and
adversary can move across microsegmentation functions to be enabled anywhere on the network. Security
the network.” group-based policies also make firewall, VPN, and Web Security Apliances
much easier to manage.
– U.S. Department of Homeland
 
Security  

U.S. Computer Emergency Next Steps


Readiness Team For more information about Cisco TrustSec technology, contact your local
account representative or visit http://www.cisco.com/go/trustsec.
 
© 2015 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S.
and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/ go/trademarks. Third-party trademarks mentioned are the property of
their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) C45-
577269-02 12/15

Vous aimerez peut-être aussi