SGT

May 25, 2022

NETWORKING

Enabling Scalable Group Policy with TrustSec Across Networks to Provide More Reliability and Determinism

3 min read

Cisco TrustSec relies on HTTPS, Representational State Transfer (REST) protocol API, and the JSON file and data interchange format for far more reliable and scalable policy updates and segmentation for more deterministic networks.

January 6, 2014

NETWORKING

Access Control with Cisco TrustSec: Moving from “IP Addresses” to “Roles and Attributes”

4 min read

Today’s enterprise is a highly dynamic, and hyper connected environment where IT plays a critical role in connecting the users, devices, resources and corporate IT systems. Today’s employees are also highly mobile in nature and do not necessarily have a single workspace assignment. The IT departments are constantly being challenged by the organization’s Line of […]

November 12, 2013

SECURITY

Security: Front and Center at Cisco Live Cancun 2013

4 min read

This year I was honored to be able to present and participate at Cisco Live Cancun, which took place last week. Many attendees from North, Central and South America and...

May 16, 2013

NETWORKING

MegaTrends: Cisco TrustSec from User Access to the Data Centre

3 min read

In my previous Blogs I have talked about Megatrends including BYOD, the Next-Generation Workspace, Video and the Internet of Things. One unfortunate reality all of these trends have in common is that they are going to put additional stress on your current Network and Security Infrastructure and Operational Process. TrustSec uniquely offers the welcome opportunity […]

February 19, 2013

NETWORKING

Demystifying the Catalyst: Cisco Context Aware Secure Access (Security Group Tags – SGT) Technology

In this blog, let us take a look at how Catalyst access switches enable and enforce context aware access to IT resources. Many types of devices, including laptops, smartphones, and tablets, are used by end users to connect to the network wired, wirelessly, and remotely through VPN. With bring your own device (BYOD) access, the […]