Skip to main content
Cisco TrustSec

Cisco TrustSec


Recent Reviews
Read all reviews


Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Return to navigation


View all pricing

Sorry, this product's description is unavailable

Entry-level set up fee?

  • No setup fee


  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

1 person also want pricing

Alternatives Pricing

What is AlienVault USM?

AlienVault® Unified Security Management® (USM) delivers threat detection, incident response, and compliance management in one unified platform. It is designed to combine all the essential security capabilities needed for effective security monitoring across cloud and on-premises environments,…

What is Kaspersky Endpoint Security Cloud?

Kaspersky Endpoint Security Cloud provides a solution for organizations' IT security needs, blocking ransomware, file-less malware, zero-day attacks and other emerging threats. Kaspersky’s cloud-based approach helps users to work securely on any device, and collaborate safely online, at work or at…

Return to navigation

Product Demos

Reducing Malware Propagation with TrustSec on SDA

Return to navigation

Product Details

What is Cisco TrustSec?

Cisco TrustSec Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation


View all alternatives
Return to navigation

Reviews and Ratings



(1-1 of 1)
Companies can't remove reviews or game the system. Here's why
Score 9 out of 10
Vetted Review
Verified User
We use Cisco TrustSec in our data center. It is embedded in Cisco switching, routing, firewall, and wireless devices. Supporting platforms include Cisco Identity Services Engine, Cisco Catalyst and Cisco Nexus switches. It simplifies the provisioning and management of highly secure access to network services and applications. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks.
  • Reduce operational expenses by simplifying network segmentation and defining security groups based on business roles, not IP addresses.
  • Limit the impact of a data breach by quickly isolating and containing threats using technology already in your network.
  • Help and solutions if needed, support
  • Control access to critical enterprise resources by business role, device type, and location, so policy changes can be made without redesigning the network.
  • Easily manage access control and segmentation while maintaining compliance.
  • Create and manage policies in an easy-to-use matrix.
  • Reduce the need for costly network re-architecture by automating firewall rules and access control list (ACL) administration.
  • Reduction in IT operational costs
Return to navigation