
© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 10
Professional Services
Cisco and our partners deliver intelligent, personalized, professional services to help organizations with the
planning, design, and implementation of the Cisco TrustSec solution to meet their unique requirements. These
services include security policy review, design strategy development, controlled deployment, full deployment,
training, and knowledge transfer. Services from Cisco and our certified partners can help organizations more
quickly and cost-effectively deploy a fully integrated Cisco TrustSec solution.
Capabilities
Cisco TrustSec uses your networking infrastructure to scalably deliver the following technical capabilities:
●
Identity-enabled networking: Cisco TrustSec delivers flexible authentication (FlexAuth) methods,
including IEEE 802.1X, WebAuth, and MAB, using the network to ascertain the identity of users and
devices on your network.
●
Context awareness: The next-generation, distributed, granular scanning and endpoint inspection
elements in Cisco TrustSec provide contextualized visibility into the “who, how, what, and when” for the
identities of users and devices accessing the network.
●
Highest precision device profiling for any endpoint: Automatically identifies and classifies devices by
collecting endpoint data through the built-in ISE probes or network-based device sensors on the Cisco
Catalyst switching and wireless infrastructure, and further refines the classification with directed policy-
based active endpoint scanning technology.
●
Guest user access and lifecycle management: Sponsored guests receive restricted access to specific
resources (Internet, printers, and so on) through a customized web portal. Internal network access is
blocked, and activity is tracked and reported.
●
Centralized policy and enforcement: A centralized policy platform enables coordinated policy creation
and consistent, context-based policy enforcement across the entire corporate infrastructure, spanning the
head office, branch office, and remote users (wired, wireless, and VPN). Noncompliant devices can be
quarantined, remediated, or given restricted access.
●
Topology-independent access control: Broader SGA technology provides a scalable and flexible way to
assign roles via network “tags” to authorize users and devices, and to enable any network to enforce
policies based on these tags. This offers a unique, scalable architecture for network enforcement without
network redesign using VLANs or having to manage a multitude of ACLs.
●
Data integrity and confidentiality: Hop-by-hop standards-based MACsec encryption provides data
confidentiality with visibility in the flows for security-based access policy enforcement.
●
Monitoring, management, and troubleshooting: Centralized, policy-based corporate governance and
compliance includes centralized monitoring and tracking of users and devices to maintain policy
compliance. Provides sophisticated troubleshooting, detailed auditing, and historical and real-time
reporting.
●
Integration with Cisco Prime
™
Network Control System: Provides a unified view of all network functions
to streamline your network management efforts.
Comentarios a estos manuales