Skip to main content
TrustRadius
Cisco TrustSec

Cisco TrustSec

Overview

Learn from top reviewers

Awards

Products that are considered exceptional by their customers based on a variety of criteria win TrustRadius awards. Learn more about the types of TrustRadius awards to make the best purchase decision. More about TrustRadius Awards

Return to navigation

Pricing

View all pricing
N/A
Unavailable

Sorry, this product's description is unavailable

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

1 person also want pricing

Alternatives Pricing

What is Kaspersky Endpoint Security Cloud?

Kaspersky Endpoint Security Cloud provides a solution for organizations' IT security needs, blocking ransomware, file-less malware, zero-day attacks and other emerging threats. Kaspersky’s cloud-based approach helps users to work securely on any device, and collaborate safely online, at work or at…

What is Aqua Cloud Native Security Platform?

The Aqua Platform is an integrated Cloud Native Application Protection Platform (CNAPP), that prioritizes risk and automates prevention while also focussing on detection and response across the lifecycle. It aims to stop current and prevent future cloud native attacks.

Return to navigation

Product Demos

Reducing Malware Propagation with TrustSec on SDA

YouTube
Return to navigation

Product Details

What is Cisco TrustSec?

Cisco TrustSec Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews From Top Reviewers

(1-1 of 1)

Cisco TrustSec for Data center use

Rating: 9 out of 10
November 29, 2016
Vetted Review
Verified User
Cisco TrustSec
1 year of experience
We use Cisco TrustSec in our data center. It is embedded in Cisco switching, routing, firewall, and wireless devices. Supporting platforms include Cisco Identity Services Engine, Cisco Catalyst and Cisco Nexus switches. It simplifies the provisioning and management of highly secure access to network services and applications. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks.
  • Reduce operational expenses by simplifying network segmentation and defining security groups based on business roles, not IP addresses.
  • Limit the impact of a data breach by quickly isolating and containing threats using technology already in your network.
Cons
  • Help and solutions if needed, support
  • Control access to critical enterprise resources by business role, device type, and location, so policy changes can be made without redesigning the network.
  • Easily manage access control and segmentation while maintaining compliance.
  • Create and manage policies in an easy-to-use matrix.
  • Reduce the need for costly network re-architecture by automating firewall rules and access control list (ACL) administration.
  • Reduction in IT operational costs
Return to navigation