Deploying Security Group Tags
This session explains how the combination of Security Group Tags extend context aware role based access control from the edge into the network. This session covers the protocols and functions that create a trusted network. We will see how this tagging ability can be deployed in the access layer, branch and the Data Centre in support of business requirements like regulatory compliance and BYOD. ISE drives the policy that defines how and when SGTs should be applied. The target audience for this Session are network and security architects and administrators that want to know more about the TrustSec solution.