Cisco TrustSec Uživatelský manuál Strana 3

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 10
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 2
© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 10
Introduction
The traditional desktop is no longer relevant. Customer networks must support all kinds of devices, such as
personal mobile devices, or legacy devices with no users connected to them. With so many devices connecting to
the enterprise network, customers need a solution that helps them to ensure that they’re meeting their security
policies when these devices use the network.
From a data center standpoint, applications are on the move. Customers used to think about securing their
applications using access control lists (ACLs); in a virtualized data center, however, applications move between
data centers via virtual machines (VMs). Customers need to think differently about how to secure their networks.
As their applications are moving through the data center, they need an infrastructure that is as dynamic as the
applications.
Solution Overview
Cisco TrustSec
®
is an intelligent access control solution. With minimal effort Cisco TrustSec mitigates security
risks by providing comprehensive visibility into who and what is connecting across the entire network
infrastructure, as well as exceptional control over what and where they can go.
Whether you need to support employees bringing personal devices to work or you want to secure access to your
data center resources, Cisco TrustSec provides a policy-based platform that offers integrated posture, profiling,
and guest services to make context-aware access control decisions. Cisco TrustSec builds on an existing identity-
aware infrastructure by enforcing these policies in a scalable manner; at the same time, it helps to ensure
complete data confidentiality by providing ubiquitous encryption between network devices. A unique, single-policy
platform that uses your existing infrastructure helps ensure highly effective management.
Although it is able to support any network, Cisco TrustSec offers a superior experience on a Cisco
®
infrastructure,
using infrastructure-embedded features such as device sensors for visibility, security group access for access
enforcement, and MAC Security (MACsec) encryption for data integrity.
Cisco TrustSec is a core component of the Cisco SecureX Architecture
for Cisco Borderless Networks. Its three
key functional areas are visibility, control, and management.
Comprehensive Visibility
The differentiated identity features, next-generation network-based device sensors, and active endpoint scanning
in Cisco TrustSec provide contextualized visibility of the “who, how, what, and when” for users and devices
accessing the network, whether through wired, wireless, or remote connections. Because Cisco TrustSec provides
comprehensive visibility into the broadest range of devices (whether smartphones, tablets, PCs, or even gaming
devices), it lays a strong foundation for a Bring Your Own Device (BYOD) solution. This visibility is set to grow
even further with planned integration with the leading mobile device management (MDM) solutions providing
unprecedented visibility and control over mobile devices based on company-defined policies. Available in the
second half of CY12.
Exceptional Control
A centralized policy and enforcement platform enables coordinated policy creation and consistent context-based
policy enforcement across the entire corporate infrastructure. Noncompliant devices can be quarantined,
remediated, or given restricted access with scalable and flexible next-generation enforcement mechanisms using
existing identity-aware infrastructure. Cisco TrustSec helps to ensure secure access for devices via automated
endpoint security configuration for the most common PC and mobile platforms.
Zobrazit stránku 2
1 2 3 4 5 6 7 8 9 10

Komentáře k této Příručce

Žádné komentáře