Skip to main content
TrustRadius
Cisco TrustSec

Cisco TrustSec

Overview

Learn from top reviewers

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Return to navigation

Pricing

View all pricing
N/A
Unavailable

Sorry, this product's description is unavailable

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

1 person also want pricing

Alternatives Pricing

What is Kaspersky Endpoint Security Cloud?

Kaspersky Endpoint Security Cloud provides a solution for organizations' IT security needs, blocking ransomware, file-less malware, zero-day attacks and other emerging threats. Kaspersky’s cloud-based approach helps users to work securely on any device, and collaborate safely online, at work or at…

What is OpsCompass?

OpsCompass is an enterprise-ready cloud security management software that drives multi-cloud operational control, visibility, and security to Microsoft Azure, AWS, and Google Cloud Platform. Its UI is designed to provide clear data visualization for resource management, remediation, and…

Return to navigation

Product Demos

Reducing Malware Propagation with TrustSec on SDA

YouTube
Return to navigation

Product Details

What is Cisco TrustSec?

Cisco TrustSec Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews From Top Reviewers

(1-1 of 1)

Cisco TrustSec for Data center use

Rating: 9 out of 10
November 29, 2016
Vetted Review
Verified User
Cisco TrustSec
1 year of experience
We use Cisco TrustSec in our data center. It is embedded in Cisco switching, routing, firewall, and wireless devices. Supporting platforms include Cisco Identity Services Engine, Cisco Catalyst and Cisco Nexus switches. It simplifies the provisioning and management of highly secure access to network services and applications. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks.
  • Reduce operational expenses by simplifying network segmentation and defining security groups based on business roles, not IP addresses.
  • Limit the impact of a data breach by quickly isolating and containing threats using technology already in your network.
Cons
  • Help and solutions if needed, support
  • Control access to critical enterprise resources by business role, device type, and location, so policy changes can be made without redesigning the network.
  • Easily manage access control and segmentation while maintaining compliance.
  • Create and manage policies in an easy-to-use matrix.
  • Reduce the need for costly network re-architecture by automating firewall rules and access control list (ACL) administration.
  • Reduction in IT operational costs
Return to navigation