• Latest
  • All
  • How To
Cisco Seeks to Standardize TrustSec, Submitted to IETF draft as RFC 3514

Cisco Seeks to Standardize TrustSec, Submitted to IETF draft as RFC 3514

January 30, 2014
Cyber attacks on insurance companies

Kenyan Insurance Companies Ordered to Report Cyber Attacks Within 24 Hours

July 12, 2025
Linkless phishing scams

Linkless Scams Are the New Phishing, Experts Warn

July 12, 2025
Android 16

Android 16 Will Clean Up Your Notifications with Smart AI Grouping

July 12, 2025
Android Canary release channel

Early Access Android Builds Arrive with Google’s Canary Channel

July 12, 2025
DHgate Tablet Cases deals
Japan Internet Speed

Japan Records World’s Fastest Internet Speed at 1.02 Petabits Per Second

July 12, 2025
Bitchat

Jack Dorsey Launches Bitchat, a Bluetooth-Only Messaging App

July 10, 2025
YouTube AI slop is getting demonetized

YouTube Declares War on Low-Effort AI Videos via Demonetization

July 10, 2025
Why Can'y You Register a Safaricom SIM Card After 7 PM

Why You Cannot Register a Safaricom SIM Card After 7 PM

July 10, 2025
Former Safaricom Chief Enterprise Business Officer, Cynthia Karuri-Kropac

Frankline Okata Takes Over as Cynthia Karuri-Kropac Exits Safaricom PLC

July 10, 2025
AI

OpenAI and Perplexity Launch Browsers to Rival Google Chrome

July 10, 2025
Vivo-Y29-4G

Vivo Y29 Launches in Kenya at KES 23,999

July 10, 2025
galaxy z fold7-galaxy z flip7-samsung

Samsung Unveils Galaxy Z Fold7 and Z Flip7 with Bigger Screens

July 10, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Cisco Seeks to Standardize TrustSec, Submitted to IETF draft as RFC 3514

Carlos Ageng'o by Carlos Ageng'o
January 30, 2014
in News
Reading Time: 2 mins read
262
0

reviewreviewreview
Cisco’s TrustSec is designed as a policy management framework that gets rid of complexity associated with network security. The technology provides a simple matrix through which network security policies can be defined using plain language – doesn’t require vlans, acls, firewall rules. TrustSec has now been submitted to the IETF site as RFC 3514. The request for comments would push TrustSec (now Source-group tag eXchange Protocol – SXP) as a standard among network vendors.

SXP promises switch to switch wirespeed encryption services and security group tagging (SGT) of ethernet frames. Traffic is therefore forwarded based on the SGT assigned to a user or network device. As described in the post “Cisco TrustSec Makes Your Network Identity Aware” by James Heary on Network World:

…what it [TrustSec] really does is allow you to implement the most robust identity aware network with services on the planet. This technology, if Cisco executes on it properly, could forever change the way we design secure networks. Today’s business networks are so open and have so many ingress/egress perimeters that it is very risky to trust your internal packets anymore. The industry data on this topic backs that up with statistics that show right around 40% of breaches occur from inside the network. So what do we do now that we cannot trust our internal communication flows? Well for starters we need pervasive identity awareness in the network. If we can trace a communication flow or even a packet back to an identity then we can make a better security decision on what to allow that flow to do on the network. Once we have identity awareness of every internal packet then we need to be able to apply identity aware security policies to those packets. And that ladies and gentlemen is exactly what Cisco’s TrustSec solution does.

Cisco Identity Services Engine, Cisco Catalyst, Nexus Switches, Cisco Integrated Services Routers, Cisco ASA firewalls are the currently supported platforms for TrustSec/SXP.

Tags: Cisco
SendShare149Tweet93
Carlos Ageng'o

Carlos Ageng'o

Bringing you news on information systems, business intelligence and IT innovations. Contact me on @aKhadiemik and c [dot] agengo [at] techweez [dot] com

Related Posts

Telecom Technicians in Kenya: CA Introduces Modernized Licensing Guidelines

New Licensing Rules Proposed for Kenya’s Telecom Engineers and IT Experts

December 24, 2024
Clayton Naidoo, General Manager for Sub-Saharan Africa - Cisco

ICT Authority Picks Cisco as Partner in Digital Master Plan Implementation

April 4, 2023
Near 8000 Students and Civil Servants Benefit From Ajira Digital and Cisco Partnership

Near 8000 Students and Civil Servants Benefit From Ajira Digital and Cisco Partnership

February 25, 2021
Sally Kimeu

Networking Corporation Cisco Appoints New Regional Manager for East Africa

October 22, 2019
Cisco

Cisco Launches a KES 60M Incubation Hub in Nairobi

April 8, 2019
Cisco

Cisco 2018 Annual Cybersecurity Report: Defenses to Leverage AI and Machine Learning Tools

July 17, 2018

Latest

Cyber attacks on insurance companies

Kenyan Insurance Companies Ordered to Report Cyber Attacks Within 24 Hours

July 12, 2025
Linkless phishing scams

Linkless Scams Are the New Phishing, Experts Warn

July 12, 2025
Android 16

Android 16 Will Clean Up Your Notifications with Smart AI Grouping

July 12, 2025
Android Canary release channel

Early Access Android Builds Arrive with Google’s Canary Channel

July 12, 2025
Japan Internet Speed

Japan Records World’s Fastest Internet Speed at 1.02 Petabits Per Second

July 12, 2025
Bitchat

Jack Dorsey Launches Bitchat, a Bluetooth-Only Messaging App

July 10, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Kenyan Insurance Companies Ordered to Report Cyber Attacks Within 24 Hours

July 12, 2025

Linkless Scams Are the New Phishing, Experts Warn

July 12, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Abductions and Arrests! Kenyan Government’s Fear and Hate of X Users Makes No Sense

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

More News

YouTube Declares War on Low-Effort AI Videos via Demonetization

Why You Cannot Register a Safaricom SIM Card After 7 PM

Frankline Okata Takes Over as Cynthia Karuri-Kropac Exits Safaricom PLC

OpenAI and Perplexity Launch Browsers to Rival Google Chrome

Vivo Y29 Launches in Kenya at KES 23,999

Samsung Unveils Galaxy Z Fold7 and Z Flip7 with Bigger Screens

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.