IT security, a vital factor for long-term growth

Size: px
Start display at page:

Download "IT security, a vital factor for long-term growth"

Transcription

1 IT security, a vital factor for long-term growth The Marcegaglia Group confirms an IT security strategy based on Cisco solutions with the acquisition of centrally managed firewall tools and a Next-Generation Intrusion Prevention System. Thanks to Cisco, we ve reduced the hours allocated to maintenance and security management operations by 80%. Livio Bonatti, Information Technology & Network Infrastructure Manager, Marcegaglia Group Even companies and organizations operating in sectors where the computerization of production processes is an essential feature have only recently begun to experience the advantages of complete ICT security based on systems able to ensure that an operating environment is safe from external and internal threats and attacks. Executing a truly 360-degree security strategy makes it possible to protect all kinds of corporate resources - from the data and information stored in data centers to industrial systems and network-connected devices while reducing costs and the time spent on maintenance and management. The Marcegaglia Group chose Cisco as its sole reference brand to implement a complete and comprehensive security platform capable of meeting all its security needs, both now and in the future. The challenge Achieve next-generation IPS performance levels adequate for the dimensions of the new Data Center Set up a homogeneous and centrally controllable security environment for both wireless and wired networks Integrate technologies appropriate to a long-term strategy The Marcegaglia Group is a world leader in the steel processing sector which operates out of Italy on a global scale, with 43 plants spread over a total area of 6 million square meters. The Group comprises 7,000 employees, 60 commercial offices and 210 sales points for a turnover in 2013 of more than 4 billion euros from the steel industry and its other diversified business interests. Each day it produces 5,500 kilometers worth of stainless steel and carbon steel products for over 15,000 customers, for a total of more than 5 million tons of processed steel per year Cisco Systems, Inc. All rights reserved. 1

2 The group was founded in 1959 and is still fully owned and managed by the Marcegaglia family from its headquarters in Gazoldo degli Ippoliti (Mantua). After expanding the capacity of its Data Center by boosting connectivity to 10 gigabits, the Group realized it now needed to bring its IT security platform up to speed, starting with the Intrusion Prevention System, which could no longer keep pace with the performance of the new Data Center infrastructure. With the objective of integrating the best of natural technological evolution into an environment which already included Cisco ASA 5545 firewall appliances, the Marcegaglia Group chose the Cisco FirePOWER Appliance 8250 as the solution most in line with its security strategy for the future. Case Study Marcegaglia Group Employees: Sector: Heavy Industry Cisco s FirePOWER 8000 Series Appliances are the most effective platform for the Cisco NGIPS (Next-Generation Intrusion Prevention System) solution, which integrates visibility, automated management and intelligent security functions to provide reliable performance at competitive costs. The solution Integrate Cisco s FirePOWER 8250 NGIPS into the Cisco ASA 5545 firewall Integrate the Cisco FireSIGHT Management Center to centrally manage network security Use Cisco s Identity Services Engine (ISE) to administer network access and monitor device behavior Intrusion prevention is a critical factor After the Data Center infrastructure was upgraded, the Intrusion Prevention System (IPS) already in place at the Group s offices and plants proved unable to match the performance of the new appliances. The efficiency level dropped well below 70% of threats, jeopardizing Marcegaglia s IT systems and resources: almost a third of attacks could not be blocked, with all the consequent risks for operations and business Cisco Systems, Inc. All rights reserved. 2

3 To deal with the problem, the Group launched a test phase during which the five most commercially successful IPS solutions were compared. The proof of concept allowed us to implement the solutions in parallel on different network segments, to verify which one was best suited to our security requirements, said Livio Bonatti, Information Technology & Network Infrastructure Manager for the Marcegaglia Group. It was during this phase that the functionalities which convinced the Group to chose Cisco s FirePOWER 8250 Appliance emerged. Thanks to the next-generation FirePOWER intrusion prevention technology, the 8000 Series appliances can enable features such as real-time context recognition, complete visibility and intelligent security automation. And that s not all. The Cisco FirePOWER Appliance 8250 was identified as the solution which could be fully integrated into the pre-existing Cisco firewall environment, thereby validating it as a natural evolution of the investment just made in Cisco s ASA 5545 firewall. Confirming the choice of Cisco solutions enabled us to structure an IT security platform in line with the company s security strategy for the future, said Bonatti. Centralized management for distributed benefits Setting up a single environment based on Cisco technology to protect against threats and intrusions also enabled Marcegaglia to implement a comprehensive security solution that can be centrally managed. We adopted the Cisco FireSIGHT Management Center as a centralized management console, said Bonatti. This means we can now manage the whole pre-existing firewall configuration together with the newly-added Next-Generation IPS solution. Indeed, the Marcegaglia IT administrators can now centrally control all the network security services provided by the Cisco ASA firewalls and the FirePOWER 8250 appliance. The ease with which we can manage the entire security environment adds to the quality of the solution in terms of its effectiveness, which was verified as 100% in detecting threats of attack, said Bonatti. Not to mention the possibility of future developments of the platform, which will enable us to maximize the value of our investment. The advantages of centrally managing the security apparatus of an organization like the Marcegaglia Group are obvious. All of our plants have installed or will soon install a Cisco firewall, said Bonatti. Up until a few years ago, our network infrastructure devices were managed individually and we had no uniform system to protect against malware. With the centralization of IT security management via a single console for both the firewalls and the Next-Generation IPS modules, Marcegaglia has taken a major qualitative leap forwards Cisco Systems, Inc. All rights reserved. 3

4 Savings in time and resources Bonatti identifies the optimization of security management for all locations and plants as one of the main benefits of the new configuration. With just a few policies distributed across the entire IT environment we have complete control, whereas before we had to connect with each individual device in order to manage different policies, resulting in a substantial waste of time and resources. A greater level of security has corresponded to a concrete acceleration of maintenance operations. The hours devoted to policy management and, in general, to all security-related activities have been reduced by 80%. Results Increased overall security levels for the IT infrastructure 80% reduction of management time Protection of the technology investment thanks to security solutions adopted as part of a long-term strategy More security in the future The roadmap outlining Marcegaglia s present and future security strategy has seen further developments. After upgrading its infrastructure and IT security solutions, the Group also installed the Cisco Identity Services Engine (ISE), a platform based on context-aware identity management which gathers real-time information from the network, users and devices to enable security policy to be applied and network access to be better managed by companies deploying BYOD, who need to make resources and work tools available through the corporate network. Cisco ISE helps us manage wireless and wired access, and it acts as the reference for switches and access points as regards the policies to be implemented when a device connects to the corporate network, Bonatti explained. This architecture fully integrates with the Cisco FirePOWER Appliance Cisco ISE identifies roles and privileges across the network, but it s the FirePOWER Appliance which inspects the data traffic. If malware is detected, the Appliance communicates the risk of attack to the Cisco ISE. The infected device can then be investigated and kept away from the more vulnerable corporate resources Cisco Systems, Inc. All rights reserved. 4

5 Security is also decisive for business The project developed by the Marcegaglia Group is proof of the growing tendency of companies and organizations in every sector to consider IT security a vital factor in growth and business. The Group s management understood that the security project developed using Cisco solutions was crucially important, said Bonatti. Thanks to this approach, we were able to demonstrate the effectiveness of a 360-degree security vision as compared to non-unified actions targeting individual problems, while avoiding heavy investments in the initial stage. Cisco s IT security solutions are well suited to strategies that can enable the needs of a company like Marcegaglia to be met scalably and flexibly, needs that range from protecting network devices to safeguarding industrial equipment. The use of Cisco solutions allowed us to implement a comprehensive project with which we achieved all our objectives, of protecting the network and corporate resources. Cisco products and solutions Security Cisco FirePOWER Appliance 8250 Cisco ASA 5545 Cisco FireSIGHT Management Center Cisco Identity Services Engine For more information More information about the Cisco architectures and solutions referred to in this case study are available at For more information about the Marcegaglia Group, see Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA USA Tel.: Italian Headquarters Cisco Systems Italy Via Torri Bianche, Vimercate (MB) Toll Free: Fax: Rome Branch Office Cisco Systems Italy Via del Serafico, Roma Toll Free: Fax: There are more than 200 Cisco branch offices around the world. Their addresses, telephone and fax numbers are available on the Cisco website: Cisco Systems, Inc. All rights reserved. The Cisco logo is the registered trademark of Cisco Systems, Inc. in the United States and a number of other countries. All the other trademarks or registered marks referred to in this document or on the Cisco Website are the property of their respective companies.

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.

More information

Snort: The World s Most Widely Deployed IPS Technology

Snort: The World s Most Widely Deployed IPS Technology Technology Brief Snort: The World s Most Widely Deployed IPS Technology Overview Martin Roesch, the founder of Sourcefire and chief security architect at Cisco, created Snort in 1998. Snort is an open-source,

More information

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK

ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK INTRODUCTION Attivo Networks has partnered with Cisco Systems to provide advanced real-time inside-the-network

More information

Cisco Smart Business Communications Systems. Cisco Small Business Unified Communications 300 Series

Cisco Smart Business Communications Systems. Cisco Small Business Unified Communications 300 Series Cisco Smart Business Communications Systems Cisco Small Business Unified Communications 300 Series Easy, Affordable Unified Communications for Your Business. Small businesses face new challenges and competitive

More information

Total Threat Protection. Whitepaper

Total Threat Protection. Whitepaper Total Threat Protection Whitepaper Organizations Are Caught Between a Growing Threat Landscape and Resource Limitations Today s organizations continue to struggle with providing adequate protection in

More information

Symantec Client Security. Integrated protection for network and remote clients.

Symantec Client Security. Integrated protection for network and remote clients. Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions

More information

Cisco Next Generation Firewall and IPS. Dragan Novakovic Security Consulting Systems Engineer

Cisco Next Generation Firewall and IPS. Dragan Novakovic Security Consulting Systems Engineer Cisco Next Generation Firewall and IPS Dragan Novakovic Security Consulting Systems Engineer Cisco ASA with Firepower services Cisco TALOS - Collective Security Intelligence Enabled Clustering & High Availability

More information

Cisco Start. IT solutions designed to propel your business

Cisco Start. IT solutions designed to propel your business Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they

More information

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling

More information

Prevent and Detect Malware with Symantec Advanced Threat Protection: Network

Prevent and Detect Malware with Symantec Advanced Threat Protection: Network WHITE PAPER: SYMANTEC ADVANCED THREAT PROTECTION........................................ Prevent and Detect Malware with Symantec Advanced Threat Protection: Network Who should read this paper This white

More information

VMware vsphere 4 and Cisco Nexus 1000V Series: Accelerate Data Center Virtualization

VMware vsphere 4 and Cisco Nexus 1000V Series: Accelerate Data Center Virtualization VMware vsphere 4 and Cisco Nexus 1000V Series: Accelerate Data Center Virtualization Executive Summary VMware for the past decade has been the thought leader in driving virtualization of the data center

More information

Cisco Connected Factory Accelerator Bundles

Cisco Connected Factory Accelerator Bundles Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment

More information

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION

More information

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic

INSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic Virus Protection & Content Filtering TECHNOLOGY BRIEF Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server Enhanced virus protection for Web and SMTP traffic INSIDE The need

More information

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco Firepower NGFW. Anticipate, block, and respond to threats Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid

More information

CISCO SYSTEMS, INC. FORM 8-K. (Current report filing) Filed 07/30/01 for the Period Ending 07/27/01

CISCO SYSTEMS, INC. FORM 8-K. (Current report filing) Filed 07/30/01 for the Period Ending 07/27/01 CISCO SYSTEMS, INC. (Current report filing) Filed 07/30/01 for the Period Ending 07/27/01 Address 170 WEST TASMAN DR SAN JOSE, CA 95134-1706 Telephone 4085264000 CIK 0000858877 Symbol CSCO SIC Code 3576

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

Logistics Company Improves IT Uptime and Management

Logistics Company Improves IT Uptime and Management We look beyond IT CASE STUDY Logistics Company Improves IT Uptime and Management Logistics Company Improves IT Uptime and Management Customer Case Study FlexPod technology gives Suttons Group confidence

More information

Ixia ibypass: Avoid 5 Common Security Risks in One Easy Step

Ixia ibypass: Avoid 5 Common Security Risks in One Easy Step PRODUCT BRIEF Ixia ibypass: Avoid 5 Common Security Risks in One Easy Step With multi-million-dollar security breaches continuing to make headlines, businesses continue to invest in advanced security defenses

More information

Networking Drivers & Trends

Networking Drivers & Trends NSA Series Overview Agenda Networking Drivers & Trends New Risks & Challenges Current Solutions Introducing SonicWALL S NSA Series Product Specs Competition Launch Notes Networking Drivers & Trends Business

More information

Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries

Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries First united and open ecosystem to support enterprise-wide visibility and rapid response The cybersecurity industry needs a more efficient

More information

Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY

Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY CASE STUDY ADOBE 2 About Adobe Adobe Systems provides digital media and marketing solutions to customers around the world including

More information

Cisco Security Enterprise License Agreement

Cisco Security Enterprise License Agreement Cisco Security Enterprise License Agreement Deploy Software and Technology more easily The Cisco Security Enterprise Licensing Agreement (ELA) gives you a simpler way to manage your licenses. And it saves

More information

INFINIT Y TOTAL PROTECTION

INFINIT Y TOTAL PROTECTION CHECK POINT INFINIT Y TOTAL PROTECTION CHECK POINT INFINITY TOTAL PROTECTION Be s t T hre at P revention, A ll Inclusi ve INTRODUCTION Enterprises today need to battle Gen V (5th Generation) cyber-attacks,

More information

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution

Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all

More information

Cisco Virtual Experience Infrastructure for Government. Virtualize Your Desktop and Increase Agency Efficiency

Cisco Virtual Experience Infrastructure for Government. Virtualize Your Desktop and Increase Agency Efficiency Cisco Virtual Experience Infrastructure for Government Virtualize Your Desktop and Increase Agency Efficiency County Enhances Municipal Services Muskegon County offers a wide range of diverse programs

More information

Sony Adopts Cisco Solution for Global IPv6 Project

Sony Adopts Cisco Solution for Global IPv6 Project Customer Case Study Sony Adopts Cisco Solution for Global IPv6 Project Sony aims to accelerate global collaboration and business across business units to realize goal of "One Sony." EXECUTIVE SUMMARY Customer

More information

The threat landscape is constantly

The threat landscape is constantly A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions

More information

Cisco ASA 5500 Series IPS Edition for the Enterprise

Cisco ASA 5500 Series IPS Edition for the Enterprise Cisco ASA 5500 Series IPS Edition for the Enterprise Attacks on critical information assets and infrastructure can seriously degrade an organization s ability to do business. The most effective risk mitigation

More information

Expert Reference Series of White Papers. Cisco Completes the Security Picture with Sourcefire

Expert Reference Series of White Papers. Cisco Completes the Security Picture with Sourcefire Expert Reference Series of White Papers Cisco Completes the Security Picture with Sourcefire 1-800-COURSES www.globalknowledge.com Cisco Completes the Security Picture with Sourcefire Rich Hummel, CCNA,

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

Why Real Testing Requires Emulation, Not Just Simulation for Layer 4-7

Why Real Testing Requires Emulation, Not Just Simulation for Layer 4-7 White Paper Why Real Testing Requires Emulation, Not Just Simulation for Layer 4-7 Testing for the real world is about emulating the entire network, not just individual switches and routers. This includes

More information

TRUENAS SCALABLE HIGH- AVAILABILITY STORAGE FOR IT WORLDWIDE SERVICES

TRUENAS SCALABLE HIGH- AVAILABILITY STORAGE FOR IT WORLDWIDE SERVICES CASE STUDY TRUENAS SCALABLE HIGH- AVAILABILITY STORAGE FOR IT WORLDWIDE SERVICES Chantilly, VA Professional IT Services Summary Benefits Challenge: Low Storage Density / No Scalability Solution: TrueNAS

More information

MPI Vietnam Towards e-governance

MPI Vietnam Towards e-governance MPI Vietnam Towards e-governance A look inside the fully integrated, high-availability data center facility of MPI in Vietnam and its plan for e-governance The Ministry of Planning and Investment (MPI),

More information

ForeScout ControlFabric TM Architecture

ForeScout ControlFabric TM Architecture ForeScout ControlFabric TM Architecture IMPROVE MULTI-VENDOR SOLUTION EFFECTIVENESS, RESPONSE AND WORKFLOW AUTOMATION THROUGH COLLABORATION WITH INDUSTRY-LEADING TECHNOLOGY PARTNERS. The Challenge 50%

More information

Performance by Design. Product Catalogue

Performance by Design. Product Catalogue Performance by Design Product Catalogue The AX Series Advanced Traffic Manager Next-generation Server Load Balancer Shift Your Applications Into High Gear A10 Networks AX Series is the industry s best

More information

Petroleum Refiner Overhauls Security Infrastructure

Petroleum Refiner Overhauls Security Infrastructure Petroleum Refiner Overhauls Security Infrastructure Small team strengthens security posture and responds faster to threats HollyFrontier Customer Profile Fortune 500 independent petroleum refiner and distributor

More information

Leisure Business Center,Muntaza,Doha, Qatar Ph: Fax Your trusted security partner

Leisure Business Center,Muntaza,Doha, Qatar Ph: Fax Your trusted security partner Leisure Business Center,Muntaza,Doha, Qatar Ph: +974 44528099 Fax +97444528951 sales@ds-qatar.com www.ds-qatar.com Your trusted security partner About US DSS is conceived and formed by professionals with

More information

Passit4Sure (50Q) Cisco Advanced Security Architecture for System Engineers

Passit4Sure (50Q) Cisco Advanced Security Architecture for System Engineers Passit4Sure.500-265 (50Q) Number: 500-265 Passing Score: 800 Time Limit: 120 min File Version: 5.8 Cisco 500-265 Advanced Security Architecture for System Engineers Today is big day for me as I passed

More information

The Cisco BYOD Smart Solution

The Cisco BYOD Smart Solution 1 Security, Flexibility, and Performance for Any Workspace 2 Today, organizations have various devices on their networks. To manage the proliferation of personal devices, bring your own device (BYOD) policies

More information

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS

ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS P. Fidry, V. Rakotomanana, C. Ausanneau Pierre.fidry@alcatel-lucent.fr Alcatel-Lucent, Centre de Villarceaux, 91620, Nozay, France Abstract: As a consequence of

More information

How to Get Started with Cisco SBA

How to Get Started with Cisco SBA How to Get Started with Cisco SBA Cisco Smart Business Architecture (SBA) helps you design and quickly deploy a full-service business network. A Cisco SBA deployment is prescriptive, out-ofthe-box, scalable,

More information

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly

More information

Best Practices in Securing a Multicloud World

Best Practices in Securing a Multicloud World Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers

More information

User-to-Data-Center Access Control Using TrustSec Design Guide

User-to-Data-Center Access Control Using TrustSec Design Guide CISCO VALIDATED DESIGN User-to-Data-Center Access Control Using TrustSec Design Guide October 2015 REFERENCE NETWORK ARCHITECTURE Table of Contents About This Document... 1 Cisco TrustSec Overview... 2

More information

10 ways to securely optimize your network. Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control

10 ways to securely optimize your network. Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control 10 ways to securely optimize your network Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control Table of Contents Secure network optimization 3 #1. Application

More information

Application Intelligence and Integrated Security Using Cisco Catalyst 6500 Supervisor Engine 32 PISA

Application Intelligence and Integrated Security Using Cisco Catalyst 6500 Supervisor Engine 32 PISA Application Intelligence and Integrated Security Using Cisco Catalyst 6500 Supervisor Engine 32 PISA Overview The Cisco Catalyst 6500 Series Supervisor Engine 32 Programmable Intelligent Services Accelerator

More information

Symantec Network Access Control Starter Edition

Symantec Network Access Control Starter Edition Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access

More information

How to Get Started with Cisco SBA

How to Get Started with Cisco SBA How to Get Started with Cisco SBA Cisco Smart Business Architecture (SBA) helps you design and quickly deploy a full-service business network. A Cisco SBA deployment is prescriptive, out-ofthe-box, scalable,

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content

More information

Cisco Solution Support

Cisco Solution Support Service Definition Cisco Solution Support Security Solutions Service Definition October 2018 2015 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Public Information. Page 1 of

More information

The Benefits of Wireless Infrastructure Management in the Cloud

The Benefits of Wireless Infrastructure Management in the Cloud WHITE PAPER The Benefits of Wireless Infrastructure Management in the Cloud High Performance Wireless Networks The Benefits of Wireless Infrastructure Management in the Cloud How the cloud maximizes IT

More information

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement

Data Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely

More information

Subscriber Data Correlation

Subscriber Data Correlation Subscriber Data Correlation Application of Cisco Stealthwatch to Service Provider mobility environment Introduction With the prevalence of smart mobile devices and the increase of application usage, Service

More information

Networking for a dynamic infrastructure: getting it right.

Networking for a dynamic infrastructure: getting it right. IBM Global Technology Services Networking for a dynamic infrastructure: getting it right. A guide for realizing the full potential of virtualization June 2009 Executive summary June 2009 Networking for

More information

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Cisco Firepower NGFW. Anticipate, block, and respond to threats Cisco Firepower NGFW Anticipate, block, and respond to threats Digital Transformation on a Massive Scale 15B Devices Today Attack Surface 500B Devices In 2030 Threat Actors $19T Opportunity Next 10 Years

More information

Cisco Network Admission Control (NAC) Solution

Cisco Network Admission Control (NAC) Solution Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,

More information

WHITEPAPER The Firewall Market

WHITEPAPER The Firewall Market WHITEPAPER The Firewall Market Choosing The Right Product Author SecureData May 2012 CONTENTS Executive Summary...2 Part 2: Analysis of key findings... 3 Part 3: Summary...6 Appendix...6 Introduction Firewalls

More information

Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales

Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales The Industrialization of Hacking Sophisticated Attacks, Complex Landscape Hacking Becomes an Industry Phishing,

More information

Symantec Advanced Threat Protection: Endpoint

Symantec Advanced Threat Protection: Endpoint Symantec Advanced Threat Protection: Endpoint Data Sheet: Advanced Threat Protection The Problem Virtually all of today's advanced persistent threats leverage endpoint systems in order to infiltrate their

More information

Symantec NetBackup 7 for VMware

Symantec NetBackup 7 for VMware V-Ray visibility into virtual machine protection Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing

More information

External Supplier Control Obligations. Cyber Security

External Supplier Control Obligations. Cyber Security External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place

More information

Mobilizing Your Workforce for Success

Mobilizing Your Workforce for Success Mobilizing Your Workforce for Success Want to know what a mobile workforce (MW) looks like? Here s one example: 500 employees spread out over eight countries. They work where they want and when they want

More information

Next Generation Privilege Identity Management

Next Generation Privilege Identity Management White Paper Next Generation Privilege Identity Management Nowadays enterprise IT teams are focused on adopting and supporting newer devices, applications and platforms to address business needs and keep

More information

Design and Deployment of SourceFire NGIPS and NGFWL

Design and Deployment of SourceFire NGIPS and NGFWL Design and Deployment of SourceFire NGIPS and NGFWL BRKSEC - 2024 Marcel Skjald Consulting Systems Engineer Enterprise / Security Architect Abstract Overview of Session This technical session covers the

More information

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Cisco Cloud Security. How to Protect Business to Support Digital Transformation Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,

More information

5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS

5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS 5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS INTRODUCTION The modern data center is rapidly evolving. Virtualization is paving the way to the private cloud, enabling applications

More information

Freudenberg IT. Steelhead appliances. dramatically accelerated SAP performance for our clients. Solution: Wide-area Data Services

Freudenberg IT. Steelhead appliances. dramatically accelerated SAP performance for our clients. Solution: Wide-area Data Services CASE STUDY In Brief»» IT Managed Service Provider Challenges»» Created value-added services to better serve customer needs»» Accelerate application performance for a globally distributed client base»»

More information

Orange Business Services, Cisco, EMC and VMware to Pave the Way for Easy Cloud Computing Adoption

Orange Business Services, Cisco, EMC and VMware to Pave the Way for Easy Cloud Computing Adoption Orange Business Services, Cisco, EMC and VMware to Pave the Way for Easy Cloud Computing Adoption Companies form a global business alliance to address enterprise cloud computing needs PARIS, France, SAN

More information

Securing Your Microsoft Azure Virtual Networks

Securing Your Microsoft Azure Virtual Networks Securing Your Microsoft Azure Virtual Networks IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up

More information

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...

Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems... Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment

More information

SIEM: Five Requirements that Solve the Bigger Business Issues

SIEM: Five Requirements that Solve the Bigger Business Issues SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered

More information

Information Security and Cyber Security

Information Security and Cyber Security Information Security and Cyber Security Policy NEC recognizes that it is our duty to protect the information assets entrusted to us by our customers and business partners as well as our own information

More information

Protection - Before, During And After Attack

Protection - Before, During And After Attack Advanced Malware Protection for FirePOWER TM BENEFITS Continuous detection of malware - immediately and retrospectively Inline detection of sophisticated malware that evades traditional network protections

More information

Simplify PCI Compliance

Simplify PCI Compliance WHITE PAPER Simplify PCI Compliance An Affordable, Easy-to-Implement Approach Using Secure SD-WAN For most retailers, the technology burden of maintaining PCI compliance can be overwhelming. Hundreds of

More information

Networking for a smarter data center: Getting it right

Networking for a smarter data center: Getting it right IBM Global Technology Services October 2011 Networking for a smarter data center: Getting it right Planning the network needed for a dynamic infrastructure 2 Networking for a smarter data center: Getting

More information

Advance Info Service Public Company Limited

Advance Info Service Public Company Limited Advance Info Service Public Company Limited Leading Thailand s Mobile Services with Application Performance, Datacenter Availability, and Data Protection Gains from Symantec To manage fast growth, Thai

More information

Digitalization of energy systems leads to innovation, growth and jobs

Digitalization of energy systems leads to innovation, growth and jobs Digitalization of energy systems leads to innovation, growth and jobs Nikos Hatziargyriou Chairman of the Board and CEO, Hellenic Electricity Distribution Network Operator HEDNO The digital transformation

More information

The Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan

The Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan Perspective on Digital Transformation in Government with Her Excellency Dr. Rauda Al Saadi, Director General, Abu Dhabi Smart Solutions and Services Authority By Michael J. Keegan Today s digital economy

More information

Securing Your Amazon Web Services Virtual Networks

Securing Your Amazon Web Services Virtual Networks Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,

More information

Simplifying the Branch Network

Simplifying the Branch Network Simplifying the Branch Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Aruba, a Hewlett Packard Enterprise company Executive Summary A majority of IT organizations are experiencing

More information

Five Reasons Why You Should Choose Cisco MDS 9000 Family Directors Cisco and/or its affiliates. All rights reserved.

Five Reasons Why You Should Choose Cisco MDS 9000 Family Directors Cisco and/or its affiliates. All rights reserved. Five Reasons Why You Should Choose Cisco MDS 9000 Family Directors 2017 Cisco and/or its affiliates. All rights reserved. Contents Overview... 2 1. Integrated Analytics for Deep Visibility...3 2. Performance

More information

Symantec Protection Suite Add-On for Hosted Security

Symantec Protection Suite Add-On for Hosted  Security Symantec Protection Suite Add-On for Hosted Email Security Overview Malware and spam pose enormous risk to the health and viability of IT networks. Cyber criminal attacks are focused on stealing money

More information

Cisco APIC Enterprise Module Simplifies Network Operations

Cisco APIC Enterprise Module Simplifies Network Operations Cisco APIC Enterprise Module Simplifies Network Operations October 2015 Prepared by: Zeus Kerravala Cisco APIC Enterprise Module Simplifies Network Operations by Zeus Kerravala October 2015 º º º º º º

More information

Agile Security Solutions

Agile Security Solutions Agile Security Solutions Piotr Linke Security Engineer CISSP CISA CRISC CISM Open Source SNORT 2 Consider these guys All were smart. All had security. All were seriously compromised. 3 The Industrialization

More information

Future-ready security for small and mid-size enterprises

Future-ready security for small and mid-size enterprises First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,

More information

THE POWER OF A STRONG PARTNERSHIP.

THE POWER OF A STRONG PARTNERSHIP. THE POWER OF A STRONG PARTNERSHIP. Now you can harness a network of resources. Connections, knowledge, and expertise. All focused on your success. The Cisco Channel Partner Program. BE CONNECTED. Great

More information

Preparing your network for the next wave of innovation

Preparing your network for the next wave of innovation Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt

More information

Customer Access. Partner Initiated PICA - The Cisco PICA User Guide

Customer Access. Partner Initiated PICA - The Cisco PICA User Guide PICA - Partner Initiated Customer Access The Cisco PICA User Guide Table of Contents PICA User Guide TABLE OF CONTENTS...2 ABOUT THIS GUIDE...4 BENEFITS OF USING THE PICA TOOL...4 USING THE PICA TOOL...4

More information

Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security

Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security Healthcare provider manages threats with ease Atrius Health Customer Profile Large regional healthcare provider

More information

The Internet of Everything is changing Everything

The Internet of Everything is changing Everything The Internet of Everything is changing Everything Intelligent Threat Defense for the Enterprise Mobility Nikos Mourtzinos, CCIE #9763 Global Security Sales Organization Changing Business Models Any Device

More information

DATA CENTRE SOLUTIONS

DATA CENTRE SOLUTIONS DATA CENTRE SOLUTIONS NOW OPTIMIZATION IS WITHIN REACH. CONVERGED INFRASTRUCTURE VIRTUALIZATION STORAGE NETWORKING BACKUP & RECOVERY POWER & COOLING 2 INCREASE AGILITY, STARTING IN YOUR DATA CENTRE. Chances

More information

Water Provider Relocates, Modernizes Data Center

Water Provider Relocates, Modernizes Data Center : mission-critical services and Cisco engaged to lead data of 260 servers and 60 community of employees and partners. The most vital are those associated service. It was important for us to maintain the

More information

1110 Cool Things Your Firewall Should Do. Extend beyond blocking network threats to protect, manage and control application traffic

1110 Cool Things Your Firewall Should Do. Extend beyond blocking network threats to protect, manage and control application traffic 1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application

More information

Cisco Solution Support

Cisco Solution Support Service Definition Cisco Solution Support Cisco Security Solutions Service Definition November 2017 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page

More information

Cisco ASA 5500-X NGFW

Cisco ASA 5500-X NGFW Cisco ASA 5500-X NGFW Sieťová ochrana pre malé a stredné podniky pred modernými hrozbami Peter Mesjar CCIE 17428, Systémový Inžinier, Cisco What are we going to talk about Problem is THREATS How today

More information

HEALTH CARE AND CYBER SECURITY:

HEALTH CARE AND CYBER SECURITY: HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers

More information

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and

More information

Qatar s National ICT Plan

Qatar s National ICT Plan Overview Qatar s National ICT Plan Qatar has made significant progress toward creating an innovative and vibrant ICT sector that will secure a thriving, diversified economy and enrich the quality of life

More information

white paper SMS Authentication: 10 Things to Know Before You Buy

white paper SMS Authentication: 10 Things to Know Before You Buy white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling

More information