Properties (61)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:Company
|
gptkbp:appliesTo |
Enterprise networks
|
gptkbp:developedBy |
gptkb:Cisco_Systems
|
gptkbp:enables |
Dynamic access control
Guest access management Micro-segmentation Policy-based access control |
gptkbp:enhances |
Data center security
|
gptkbp:facilitates |
gptkb:Zero_Trust_Security_Model
|
https://www.w3.org/2000/01/rdf-schema#label |
Cisco TrustSec
|
gptkbp:improves |
Visibility and control of network traffic
|
gptkbp:integratesWith |
gptkb:Cisco_Identity_Services_Engine_(ISE)
|
gptkbp:isBasedOn |
IEEE_802.1AE_standard
|
gptkbp:isCompatibleWith |
gptkb:Cisco_Firepower
gptkb:Cisco_Umbrella gptkb:Cisco_routers gptkb:Cisco_switches Cisco AnyConnect Third-party security solutions |
gptkbp:isDesignedFor |
Large enterprises
Reduce attack surface |
gptkbp:isIntegratedWith |
gptkb:Cisco_DNA_Center
gptkb:Cisco_Secure_Firewall |
gptkbp:isLocatedIn |
Access switches
Core switches Distribution switches Wireless_LAN_controllers |
gptkbp:isPartOf |
gptkb:Cisco's_Secure_Network_Architecture
gptkb:Cisco_SecureX_platform Cisco's_Zero_Trust_strategy Cisco's_cloud_security_solutions Cisco_ACI_(Application_Centric_Infrastructure) Cisco_Security_portfolio |
gptkbp:isUsedFor |
Data encryption
Compliance management Incident response Access control policies Network monitoring Data loss prevention User identity verification Application security Network access control Network segmentation strategies Threat containment |
gptkbp:isUsedIn |
Cloud environments
Campus networks Remote access solutions Data center environments |
gptkbp:offers |
Scalability for large networks
|
gptkbp:provides |
Network segmentation
Role-based access control Automated policy enforcement Centralized policy management End-to-end security policies |
gptkbp:supports |
gptkb:Software-Defined_Networking_(SDN)
IoT security Endpoint compliance checks Network visibility tools Multi-domain security policies |
gptkbp:uses |
Security_Group_Tags_(SGTs)
|
gptkbp:utilizes |
MACsec_encryption
|