Cisco Trustsec

Páginas: 6 (1389 palabras) Publicado: 8 de mayo de 2012
Cisco TrustSec
Address Customer Challenges

At-A-Glance

A Foundational Component to Secure Borderless Networks

Benefits
Enables secure collaboration: Cisco TrustSec dynamically assigns access and services for users and devices to support a dynamic workforce. The consistency, efficiency, and role-aware networking capabilities delivered by TrustSec enable a secure collaborative businessenvironment and a seamless user experience. Strengthen security: Cisco TrustSec secures access to the network and resources, whether wired, wireless, or VPN, ensuring that endpoint devices are authorized and healthy. TrustSec enforces security policies across the entire network. Furthermore, TrustSec protects network data confidentiality and integrity with switch port level encryption. Addresscompliance: Cisco TrustSec helps address compliance requirements by knowing who’s coming to the network, what they are doing on the network, and what type of resources they are allowed to access. Customers can use the information and capabilities for controls, auditing, and reporting as part of their effort to meet compliance requirements.

Physical boundaries are disappearing. Customers need tosupport a mobile workforce, manage outsourcing, and respond to IT consumerization. In addition, the threat environment demands more effective protection for business infrastructure and valuable information assets. Finally, regulatory and industry mandates impose strict requirements for many organizations. As a foundational component to secure Borderless Networks, the Cisco® TrustSec solution helpscustomers enable secure collaboration, strengthen security, and address compliance requirements.

Key Functions
Cisco TrustSec comprehensively secures networks and access to business-critical resources by establishing visibility and controls that apply to all users and discovering and monitoring IP-enabled devices. It does this through policy-based access control, identity-aware networking, anddata confidentiality and integrity protection in the network. Policy-based access control: Cisco TrustSec provides network access controls based on a consistent policy for users (such as employees, contractors, or guests), end point devices (laptops, IP phones, printers) and networking devices (switches, routers, and so on). Cisco TrustSec has the ability to control how a user or a device can begranted access, what security policies endpoint devices must meet, such as posture compliance, and what network resources a user is authorized to use in the network. Identity-aware networking: Cisco TrustSec uses end user and device identity information as well as additional factors (such as time, location and user’s role in the organization) to provide precise security policy controls. TrustSecalso delivers further rolebased networking services including support for Cisco Medianet and quality of service for business-critical applications associated with users in specific roles. Data integrity and confidentiality: Cisco TrustSec secures data paths in the switching environment with IEEE 802.1AE standard encryption. Data confidentiality and integrity is instantiated between devices at theswitch port level on a hop by hop basis. Cisco switching infrastructure maintains controls so that critical security applications such as firewalls, intrusion prevention, and content inspection can retain visibility into data streams.

Product Portfolio
Cisco TrustSec includes three product component groups: infrastructure, policy, and endpoint. Infrastructure components: Cisco Catalyst® Series2900/3560/3700/4500/6500 switches and Cisco Nexus™ 7000 switches interact with network users for authentication and authorization. Access to the network is dictated by policy, user identity, and other attributes. Flexible authentication methods include 802.1X, web authentication, and MAC authentication bypass, all controlled in a single configuration for each switch port. Furthermore, Cisco...
Leer documento completo

Regístrate para leer el documento completo.

Estos documentos también te pueden resultar útiles

  • Cisco
  • Cisco
  • Cisco
  • CISCO
  • cisco
  • cisco
  • cisco
  • Cisco

Conviértase en miembro formal de Buenas Tareas

INSCRÍBETE - ES GRATIS