IT security, a vital factor for long-term growth
|
|
- Rodney Cole
- 5 years ago
- Views:
Transcription
1 IT security, a vital factor for long-term growth The Marcegaglia Group confirms an IT security strategy based on Cisco solutions with the acquisition of centrally managed firewall tools and a Next-Generation Intrusion Prevention System. Thanks to Cisco, we ve reduced the hours allocated to maintenance and security management operations by 80%. Livio Bonatti, Information Technology & Network Infrastructure Manager, Marcegaglia Group Even companies and organizations operating in sectors where the computerization of production processes is an essential feature have only recently begun to experience the advantages of complete ICT security based on systems able to ensure that an operating environment is safe from external and internal threats and attacks. Executing a truly 360-degree security strategy makes it possible to protect all kinds of corporate resources - from the data and information stored in data centers to industrial systems and network-connected devices while reducing costs and the time spent on maintenance and management. The Marcegaglia Group chose Cisco as its sole reference brand to implement a complete and comprehensive security platform capable of meeting all its security needs, both now and in the future. The challenge Achieve next-generation IPS performance levels adequate for the dimensions of the new Data Center Set up a homogeneous and centrally controllable security environment for both wireless and wired networks Integrate technologies appropriate to a long-term strategy The Marcegaglia Group is a world leader in the steel processing sector which operates out of Italy on a global scale, with 43 plants spread over a total area of 6 million square meters. The Group comprises 7,000 employees, 60 commercial offices and 210 sales points for a turnover in 2013 of more than 4 billion euros from the steel industry and its other diversified business interests. Each day it produces 5,500 kilometers worth of stainless steel and carbon steel products for over 15,000 customers, for a total of more than 5 million tons of processed steel per year Cisco Systems, Inc. All rights reserved. 1
2 The group was founded in 1959 and is still fully owned and managed by the Marcegaglia family from its headquarters in Gazoldo degli Ippoliti (Mantua). After expanding the capacity of its Data Center by boosting connectivity to 10 gigabits, the Group realized it now needed to bring its IT security platform up to speed, starting with the Intrusion Prevention System, which could no longer keep pace with the performance of the new Data Center infrastructure. With the objective of integrating the best of natural technological evolution into an environment which already included Cisco ASA 5545 firewall appliances, the Marcegaglia Group chose the Cisco FirePOWER Appliance 8250 as the solution most in line with its security strategy for the future. Case Study Marcegaglia Group Employees: Sector: Heavy Industry Cisco s FirePOWER 8000 Series Appliances are the most effective platform for the Cisco NGIPS (Next-Generation Intrusion Prevention System) solution, which integrates visibility, automated management and intelligent security functions to provide reliable performance at competitive costs. The solution Integrate Cisco s FirePOWER 8250 NGIPS into the Cisco ASA 5545 firewall Integrate the Cisco FireSIGHT Management Center to centrally manage network security Use Cisco s Identity Services Engine (ISE) to administer network access and monitor device behavior Intrusion prevention is a critical factor After the Data Center infrastructure was upgraded, the Intrusion Prevention System (IPS) already in place at the Group s offices and plants proved unable to match the performance of the new appliances. The efficiency level dropped well below 70% of threats, jeopardizing Marcegaglia s IT systems and resources: almost a third of attacks could not be blocked, with all the consequent risks for operations and business Cisco Systems, Inc. All rights reserved. 2
3 To deal with the problem, the Group launched a test phase during which the five most commercially successful IPS solutions were compared. The proof of concept allowed us to implement the solutions in parallel on different network segments, to verify which one was best suited to our security requirements, said Livio Bonatti, Information Technology & Network Infrastructure Manager for the Marcegaglia Group. It was during this phase that the functionalities which convinced the Group to chose Cisco s FirePOWER 8250 Appliance emerged. Thanks to the next-generation FirePOWER intrusion prevention technology, the 8000 Series appliances can enable features such as real-time context recognition, complete visibility and intelligent security automation. And that s not all. The Cisco FirePOWER Appliance 8250 was identified as the solution which could be fully integrated into the pre-existing Cisco firewall environment, thereby validating it as a natural evolution of the investment just made in Cisco s ASA 5545 firewall. Confirming the choice of Cisco solutions enabled us to structure an IT security platform in line with the company s security strategy for the future, said Bonatti. Centralized management for distributed benefits Setting up a single environment based on Cisco technology to protect against threats and intrusions also enabled Marcegaglia to implement a comprehensive security solution that can be centrally managed. We adopted the Cisco FireSIGHT Management Center as a centralized management console, said Bonatti. This means we can now manage the whole pre-existing firewall configuration together with the newly-added Next-Generation IPS solution. Indeed, the Marcegaglia IT administrators can now centrally control all the network security services provided by the Cisco ASA firewalls and the FirePOWER 8250 appliance. The ease with which we can manage the entire security environment adds to the quality of the solution in terms of its effectiveness, which was verified as 100% in detecting threats of attack, said Bonatti. Not to mention the possibility of future developments of the platform, which will enable us to maximize the value of our investment. The advantages of centrally managing the security apparatus of an organization like the Marcegaglia Group are obvious. All of our plants have installed or will soon install a Cisco firewall, said Bonatti. Up until a few years ago, our network infrastructure devices were managed individually and we had no uniform system to protect against malware. With the centralization of IT security management via a single console for both the firewalls and the Next-Generation IPS modules, Marcegaglia has taken a major qualitative leap forwards Cisco Systems, Inc. All rights reserved. 3
4 Savings in time and resources Bonatti identifies the optimization of security management for all locations and plants as one of the main benefits of the new configuration. With just a few policies distributed across the entire IT environment we have complete control, whereas before we had to connect with each individual device in order to manage different policies, resulting in a substantial waste of time and resources. A greater level of security has corresponded to a concrete acceleration of maintenance operations. The hours devoted to policy management and, in general, to all security-related activities have been reduced by 80%. Results Increased overall security levels for the IT infrastructure 80% reduction of management time Protection of the technology investment thanks to security solutions adopted as part of a long-term strategy More security in the future The roadmap outlining Marcegaglia s present and future security strategy has seen further developments. After upgrading its infrastructure and IT security solutions, the Group also installed the Cisco Identity Services Engine (ISE), a platform based on context-aware identity management which gathers real-time information from the network, users and devices to enable security policy to be applied and network access to be better managed by companies deploying BYOD, who need to make resources and work tools available through the corporate network. Cisco ISE helps us manage wireless and wired access, and it acts as the reference for switches and access points as regards the policies to be implemented when a device connects to the corporate network, Bonatti explained. This architecture fully integrates with the Cisco FirePOWER Appliance Cisco ISE identifies roles and privileges across the network, but it s the FirePOWER Appliance which inspects the data traffic. If malware is detected, the Appliance communicates the risk of attack to the Cisco ISE. The infected device can then be investigated and kept away from the more vulnerable corporate resources Cisco Systems, Inc. All rights reserved. 4
5 Security is also decisive for business The project developed by the Marcegaglia Group is proof of the growing tendency of companies and organizations in every sector to consider IT security a vital factor in growth and business. The Group s management understood that the security project developed using Cisco solutions was crucially important, said Bonatti. Thanks to this approach, we were able to demonstrate the effectiveness of a 360-degree security vision as compared to non-unified actions targeting individual problems, while avoiding heavy investments in the initial stage. Cisco s IT security solutions are well suited to strategies that can enable the needs of a company like Marcegaglia to be met scalably and flexibly, needs that range from protecting network devices to safeguarding industrial equipment. The use of Cisco solutions allowed us to implement a comprehensive project with which we achieved all our objectives, of protecting the network and corporate resources. Cisco products and solutions Security Cisco FirePOWER Appliance 8250 Cisco ASA 5545 Cisco FireSIGHT Management Center Cisco Identity Services Engine For more information More information about the Cisco architectures and solutions referred to in this case study are available at For more information about the Marcegaglia Group, see Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA USA Tel.: Italian Headquarters Cisco Systems Italy Via Torri Bianche, Vimercate (MB) Toll Free: Fax: Rome Branch Office Cisco Systems Italy Via del Serafico, Roma Toll Free: Fax: There are more than 200 Cisco branch offices around the world. Their addresses, telephone and fax numbers are available on the Cisco website: Cisco Systems, Inc. All rights reserved. The Cisco logo is the registered trademark of Cisco Systems, Inc. in the United States and a number of other countries. All the other trademarks or registered marks referred to in this document or on the Cisco Website are the property of their respective companies.
Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
More informationSnort: The World s Most Widely Deployed IPS Technology
Technology Brief Snort: The World s Most Widely Deployed IPS Technology Overview Martin Roesch, the founder of Sourcefire and chief security architect at Cisco, created Snort in 1998. Snort is an open-source,
More informationATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK
PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND PLATFORM INTEGRATION WITH CISCO SYSTEMS PROTECTS THE NETWORK INTRODUCTION Attivo Networks has partnered with Cisco Systems to provide advanced real-time inside-the-network
More informationCisco Smart Business Communications Systems. Cisco Small Business Unified Communications 300 Series
Cisco Smart Business Communications Systems Cisco Small Business Unified Communications 300 Series Easy, Affordable Unified Communications for Your Business. Small businesses face new challenges and competitive
More informationTotal Threat Protection. Whitepaper
Total Threat Protection Whitepaper Organizations Are Caught Between a Growing Threat Landscape and Resource Limitations Today s organizations continue to struggle with providing adequate protection in
More informationSymantec Client Security. Integrated protection for network and remote clients.
Symantec Client Security Integrated protection for network and remote clients. Complex Internet threats require comprehensive security. Today's complex threats require comprehensive security solutions
More informationCisco Next Generation Firewall and IPS. Dragan Novakovic Security Consulting Systems Engineer
Cisco Next Generation Firewall and IPS Dragan Novakovic Security Consulting Systems Engineer Cisco ASA with Firepower services Cisco TALOS - Collective Security Intelligence Enabled Clustering & High Availability
More informationCisco Start. IT solutions designed to propel your business
Cisco Start IT solutions designed to propel your business Small and medium-sized businesses (SMBs) typically have very limited resources to invest in new technologies. With every IT investment made, they
More informationData Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments
Trusted protection for endpoints and messaging environments Overview creates a protected endpoint and messaging environment that is secure against today s complex data loss, malware, and spam threats controlling
More informationPrevent and Detect Malware with Symantec Advanced Threat Protection: Network
WHITE PAPER: SYMANTEC ADVANCED THREAT PROTECTION........................................ Prevent and Detect Malware with Symantec Advanced Threat Protection: Network Who should read this paper This white
More informationVMware vsphere 4 and Cisco Nexus 1000V Series: Accelerate Data Center Virtualization
VMware vsphere 4 and Cisco Nexus 1000V Series: Accelerate Data Center Virtualization Executive Summary VMware for the past decade has been the thought leader in driving virtualization of the data center
More informationCisco Connected Factory Accelerator Bundles
Data Sheet Cisco Connected Factory Accelerator Bundles Many manufacturers are pursuing the immense business benefits available from digitizing and connecting their factories. Major gains in overall equipment
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationINSIDE. Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server. Enhanced virus protection for Web and SMTP traffic
Virus Protection & Content Filtering TECHNOLOGY BRIEF Symantec AntiVirus for Microsoft Internet Security and Acceleration (ISA) Server Enhanced virus protection for Web and SMTP traffic INSIDE The need
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats You have a mandate to build and secure a network that supports ongoing innovation Mobile access Social collaboration Public / private hybrid
More informationCISCO SYSTEMS, INC. FORM 8-K. (Current report filing) Filed 07/30/01 for the Period Ending 07/27/01
CISCO SYSTEMS, INC. (Current report filing) Filed 07/30/01 for the Period Ending 07/27/01 Address 170 WEST TASMAN DR SAN JOSE, CA 95134-1706 Telephone 4085264000 CIK 0000858877 Symbol CSCO SIC Code 3576
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationLogistics Company Improves IT Uptime and Management
We look beyond IT CASE STUDY Logistics Company Improves IT Uptime and Management Logistics Company Improves IT Uptime and Management Customer Case Study FlexPod technology gives Suttons Group confidence
More informationIxia ibypass: Avoid 5 Common Security Risks in One Easy Step
PRODUCT BRIEF Ixia ibypass: Avoid 5 Common Security Risks in One Easy Step With multi-million-dollar security breaches continuing to make headlines, businesses continue to invest in advanced security defenses
More informationNetworking Drivers & Trends
NSA Series Overview Agenda Networking Drivers & Trends New Risks & Challenges Current Solutions Introducing SonicWALL S NSA Series Product Specs Competition Launch Notes Networking Drivers & Trends Business
More informationIntegrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries
Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries First united and open ecosystem to support enterprise-wide visibility and rapid response The cybersecurity industry needs a more efficient
More informationCisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY
Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY CASE STUDY ADOBE 2 About Adobe Adobe Systems provides digital media and marketing solutions to customers around the world including
More informationCisco Security Enterprise License Agreement
Cisco Security Enterprise License Agreement Deploy Software and Technology more easily The Cisco Security Enterprise Licensing Agreement (ELA) gives you a simpler way to manage your licenses. And it saves
More informationINFINIT Y TOTAL PROTECTION
CHECK POINT INFINIT Y TOTAL PROTECTION CHECK POINT INFINITY TOTAL PROTECTION Be s t T hre at P revention, A ll Inclusi ve INTRODUCTION Enterprises today need to battle Gen V (5th Generation) cyber-attacks,
More informationOptimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution
DATASHEET Optimizing Pulse Secure Access Suite with Pulse Secure Virtual Application Delivery Controller solution Features & Benefits Best-in-class VPN and vadc solutions A single point of access for all
More informationCisco Virtual Experience Infrastructure for Government. Virtualize Your Desktop and Increase Agency Efficiency
Cisco Virtual Experience Infrastructure for Government Virtualize Your Desktop and Increase Agency Efficiency County Enhances Municipal Services Muskegon County offers a wide range of diverse programs
More informationSony Adopts Cisco Solution for Global IPv6 Project
Customer Case Study Sony Adopts Cisco Solution for Global IPv6 Project Sony aims to accelerate global collaboration and business across business units to realize goal of "One Sony." EXECUTIVE SUMMARY Customer
More informationThe threat landscape is constantly
A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions
More informationCisco ASA 5500 Series IPS Edition for the Enterprise
Cisco ASA 5500 Series IPS Edition for the Enterprise Attacks on critical information assets and infrastructure can seriously degrade an organization s ability to do business. The most effective risk mitigation
More informationExpert Reference Series of White Papers. Cisco Completes the Security Picture with Sourcefire
Expert Reference Series of White Papers Cisco Completes the Security Picture with Sourcefire 1-800-COURSES www.globalknowledge.com Cisco Completes the Security Picture with Sourcefire Rich Hummel, CCNA,
More informationSymantec Network Access Control Starter Edition
Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationWhy Real Testing Requires Emulation, Not Just Simulation for Layer 4-7
White Paper Why Real Testing Requires Emulation, Not Just Simulation for Layer 4-7 Testing for the real world is about emulating the entire network, not just individual switches and routers. This includes
More informationTRUENAS SCALABLE HIGH- AVAILABILITY STORAGE FOR IT WORLDWIDE SERVICES
CASE STUDY TRUENAS SCALABLE HIGH- AVAILABILITY STORAGE FOR IT WORLDWIDE SERVICES Chantilly, VA Professional IT Services Summary Benefits Challenge: Low Storage Density / No Scalability Solution: TrueNAS
More informationMPI Vietnam Towards e-governance
MPI Vietnam Towards e-governance A look inside the fully integrated, high-availability data center facility of MPI in Vietnam and its plan for e-governance The Ministry of Planning and Investment (MPI),
More informationForeScout ControlFabric TM Architecture
ForeScout ControlFabric TM Architecture IMPROVE MULTI-VENDOR SOLUTION EFFECTIVENESS, RESPONSE AND WORKFLOW AUTOMATION THROUGH COLLABORATION WITH INDUSTRY-LEADING TECHNOLOGY PARTNERS. The Challenge 50%
More informationPerformance by Design. Product Catalogue
Performance by Design Product Catalogue The AX Series Advanced Traffic Manager Next-generation Server Load Balancer Shift Your Applications Into High Gear A10 Networks AX Series is the industry s best
More informationPetroleum Refiner Overhauls Security Infrastructure
Petroleum Refiner Overhauls Security Infrastructure Small team strengthens security posture and responds faster to threats HollyFrontier Customer Profile Fortune 500 independent petroleum refiner and distributor
More informationLeisure Business Center,Muntaza,Doha, Qatar Ph: Fax Your trusted security partner
Leisure Business Center,Muntaza,Doha, Qatar Ph: +974 44528099 Fax +97444528951 sales@ds-qatar.com www.ds-qatar.com Your trusted security partner About US DSS is conceived and formed by professionals with
More informationPassit4Sure (50Q) Cisco Advanced Security Architecture for System Engineers
Passit4Sure.500-265 (50Q) Number: 500-265 Passing Score: 800 Time Limit: 120 min File Version: 5.8 Cisco 500-265 Advanced Security Architecture for System Engineers Today is big day for me as I passed
More informationThe Cisco BYOD Smart Solution
1 Security, Flexibility, and Performance for Any Workspace 2 Today, organizations have various devices on their networks. To manage the proliferation of personal devices, bring your own device (BYOD) policies
More informationON-LINE EXPERT SUPPORT THROUGH VPN ACCESS
ON-LINE EXPERT SUPPORT THROUGH VPN ACCESS P. Fidry, V. Rakotomanana, C. Ausanneau Pierre.fidry@alcatel-lucent.fr Alcatel-Lucent, Centre de Villarceaux, 91620, Nozay, France Abstract: As a consequence of
More informationHow to Get Started with Cisco SBA
How to Get Started with Cisco SBA Cisco Smart Business Architecture (SBA) helps you design and quickly deploy a full-service business network. A Cisco SBA deployment is prescriptive, out-ofthe-box, scalable,
More informationTHE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly
More informationBest Practices in Securing a Multicloud World
Best Practices in Securing a Multicloud World Actions to take now to protect data, applications, and workloads We live in a multicloud world. A world where a multitude of offerings from Cloud Service Providers
More informationUser-to-Data-Center Access Control Using TrustSec Design Guide
CISCO VALIDATED DESIGN User-to-Data-Center Access Control Using TrustSec Design Guide October 2015 REFERENCE NETWORK ARCHITECTURE Table of Contents About This Document... 1 Cisco TrustSec Overview... 2
More information10 ways to securely optimize your network. Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control
10 ways to securely optimize your network Integrate WAN acceleration with next-gen firewalls to enhance performance, security and control Table of Contents Secure network optimization 3 #1. Application
More informationApplication Intelligence and Integrated Security Using Cisco Catalyst 6500 Supervisor Engine 32 PISA
Application Intelligence and Integrated Security Using Cisco Catalyst 6500 Supervisor Engine 32 PISA Overview The Cisco Catalyst 6500 Series Supervisor Engine 32 Programmable Intelligent Services Accelerator
More informationSymantec Network Access Control Starter Edition
Symantec Network Access Control Starter Edition Simplified endpoint compliance Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access
More informationHow to Get Started with Cisco SBA
How to Get Started with Cisco SBA Cisco Smart Business Architecture (SBA) helps you design and quickly deploy a full-service business network. A Cisco SBA deployment is prescriptive, out-ofthe-box, scalable,
More informationNetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content
More informationCisco Solution Support
Service Definition Cisco Solution Support Security Solutions Service Definition October 2018 2015 Cisco and/or its affiliates. All rights reserv ed. This document is Cisco Public Information. Page 1 of
More informationThe Benefits of Wireless Infrastructure Management in the Cloud
WHITE PAPER The Benefits of Wireless Infrastructure Management in the Cloud High Performance Wireless Networks The Benefits of Wireless Infrastructure Management in the Cloud How the cloud maximizes IT
More informationData Sheet: Endpoint Security Symantec Network Access Control Starter Edition Simplified endpoint enforcement
Simplified endpoint enforcement Overview makes it easy to begin implementing a network access control solution. It offers a subset of Symantec Network Access Control functionality that can be completely
More informationSubscriber Data Correlation
Subscriber Data Correlation Application of Cisco Stealthwatch to Service Provider mobility environment Introduction With the prevalence of smart mobile devices and the increase of application usage, Service
More informationNetworking for a dynamic infrastructure: getting it right.
IBM Global Technology Services Networking for a dynamic infrastructure: getting it right. A guide for realizing the full potential of virtualization June 2009 Executive summary June 2009 Networking for
More informationCisco Firepower NGFW. Anticipate, block, and respond to threats
Cisco Firepower NGFW Anticipate, block, and respond to threats Digital Transformation on a Massive Scale 15B Devices Today Attack Surface 500B Devices In 2030 Threat Actors $19T Opportunity Next 10 Years
More informationCisco Network Admission Control (NAC) Solution
Data Sheet Cisco Network Admission Control (NAC) Solution New: Updated to include the Cisco Secure Network Server (SNS) Cisco Network Admission Control (NAC) solutions allow you to authenticate wired,
More informationWHITEPAPER The Firewall Market
WHITEPAPER The Firewall Market Choosing The Right Product Author SecureData May 2012 CONTENTS Executive Summary...2 Part 2: Analysis of key findings... 3 Part 3: Summary...6 Appendix...6 Introduction Firewalls
More informationIntelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales
Intelligent Cybersecurity for the Real World Scott Lovett Vice President, Global Security Sales The Industrialization of Hacking Sophisticated Attacks, Complex Landscape Hacking Becomes an Industry Phishing,
More informationSymantec Advanced Threat Protection: Endpoint
Symantec Advanced Threat Protection: Endpoint Data Sheet: Advanced Threat Protection The Problem Virtually all of today's advanced persistent threats leverage endpoint systems in order to infiltrate their
More informationSymantec NetBackup 7 for VMware
V-Ray visibility into virtual machine protection Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing
More informationExternal Supplier Control Obligations. Cyber Security
External Supplier Control Obligations Cyber Security Control Title Control Description Why this is important 1. Cyber Security Governance The Supplier must have cyber risk governance processes in place
More informationMobilizing Your Workforce for Success
Mobilizing Your Workforce for Success Want to know what a mobile workforce (MW) looks like? Here s one example: 500 employees spread out over eight countries. They work where they want and when they want
More informationNext Generation Privilege Identity Management
White Paper Next Generation Privilege Identity Management Nowadays enterprise IT teams are focused on adopting and supporting newer devices, applications and platforms to address business needs and keep
More informationDesign and Deployment of SourceFire NGIPS and NGFWL
Design and Deployment of SourceFire NGIPS and NGFWL BRKSEC - 2024 Marcel Skjald Consulting Systems Engineer Enterprise / Security Architect Abstract Overview of Session This technical session covers the
More informationCisco Cloud Security. How to Protect Business to Support Digital Transformation
Cisco Cloud Security How to Protect Business to Support Digital Transformation Dragan Novakovic Cybersecurity Consulting Systems Engineer January 2018. Security Enables Digitization Digital Disruption,
More information5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS
5 STEPS TO BUILDING ADVANCED SECURITY IN SOFTWARE- DEFINED DATA CENTERS INTRODUCTION The modern data center is rapidly evolving. Virtualization is paving the way to the private cloud, enabling applications
More informationFreudenberg IT. Steelhead appliances. dramatically accelerated SAP performance for our clients. Solution: Wide-area Data Services
CASE STUDY In Brief»» IT Managed Service Provider Challenges»» Created value-added services to better serve customer needs»» Accelerate application performance for a globally distributed client base»»
More informationOrange Business Services, Cisco, EMC and VMware to Pave the Way for Easy Cloud Computing Adoption
Orange Business Services, Cisco, EMC and VMware to Pave the Way for Easy Cloud Computing Adoption Companies form a global business alliance to address enterprise cloud computing needs PARIS, France, SAN
More informationSecuring Your Microsoft Azure Virtual Networks
Securing Your Microsoft Azure Virtual Networks IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up
More informationTable of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...
Table of Contents Table of Contents...2 Introduction...3 Mission of IT...3 Primary Service Delivery Objectives...3 Availability of Systems...3 Improve Processes...4 Innovation...4 IT Planning & Alignment
More informationSIEM: Five Requirements that Solve the Bigger Business Issues
SIEM: Five Requirements that Solve the Bigger Business Issues After more than a decade functioning in production environments, security information and event management (SIEM) solutions are now considered
More informationInformation Security and Cyber Security
Information Security and Cyber Security Policy NEC recognizes that it is our duty to protect the information assets entrusted to us by our customers and business partners as well as our own information
More informationProtection - Before, During And After Attack
Advanced Malware Protection for FirePOWER TM BENEFITS Continuous detection of malware - immediately and retrospectively Inline detection of sophisticated malware that evades traditional network protections
More informationSimplify PCI Compliance
WHITE PAPER Simplify PCI Compliance An Affordable, Easy-to-Implement Approach Using Secure SD-WAN For most retailers, the technology burden of maintaining PCI compliance can be overwhelming. Hundreds of
More informationNetworking for a smarter data center: Getting it right
IBM Global Technology Services October 2011 Networking for a smarter data center: Getting it right Planning the network needed for a dynamic infrastructure 2 Networking for a smarter data center: Getting
More informationAdvance Info Service Public Company Limited
Advance Info Service Public Company Limited Leading Thailand s Mobile Services with Application Performance, Datacenter Availability, and Data Protection Gains from Symantec To manage fast growth, Thai
More informationDigitalization of energy systems leads to innovation, growth and jobs
Digitalization of energy systems leads to innovation, growth and jobs Nikos Hatziargyriou Chairman of the Board and CEO, Hellenic Electricity Distribution Network Operator HEDNO The digital transformation
More informationThe Mission of the Abu Dhabi Smart Solutions and Services Authority. Leading ADSSSA. By Michael J. Keegan
Perspective on Digital Transformation in Government with Her Excellency Dr. Rauda Al Saadi, Director General, Abu Dhabi Smart Solutions and Services Authority By Michael J. Keegan Today s digital economy
More informationSecuring Your Amazon Web Services Virtual Networks
Securing Your Amazon Web Services s IPS security for public cloud deployments It s no surprise that public cloud infrastructure has experienced fast adoption. It is quick and easy to spin up a workload,
More informationSimplifying the Branch Network
Simplifying the Branch Network By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Aruba, a Hewlett Packard Enterprise company Executive Summary A majority of IT organizations are experiencing
More informationFive Reasons Why You Should Choose Cisco MDS 9000 Family Directors Cisco and/or its affiliates. All rights reserved.
Five Reasons Why You Should Choose Cisco MDS 9000 Family Directors 2017 Cisco and/or its affiliates. All rights reserved. Contents Overview... 2 1. Integrated Analytics for Deep Visibility...3 2. Performance
More informationSymantec Protection Suite Add-On for Hosted Security
Symantec Protection Suite Add-On for Hosted Email Security Overview Malware and spam pose enormous risk to the health and viability of IT networks. Cyber criminal attacks are focused on stealing money
More informationCisco APIC Enterprise Module Simplifies Network Operations
Cisco APIC Enterprise Module Simplifies Network Operations October 2015 Prepared by: Zeus Kerravala Cisco APIC Enterprise Module Simplifies Network Operations by Zeus Kerravala October 2015 º º º º º º
More informationAgile Security Solutions
Agile Security Solutions Piotr Linke Security Engineer CISSP CISA CRISC CISM Open Source SNORT 2 Consider these guys All were smart. All had security. All were seriously compromised. 3 The Industrialization
More informationFuture-ready security for small and mid-size enterprises
First line of defense for your network Quick Heal Terminator (UTM) (Unified Threat Management Solution) Data Sheet Future-ready security for small and mid-size enterprises Quick Heal Terminator is a high-performance,
More informationTHE POWER OF A STRONG PARTNERSHIP.
THE POWER OF A STRONG PARTNERSHIP. Now you can harness a network of resources. Connections, knowledge, and expertise. All focused on your success. The Cisco Channel Partner Program. BE CONNECTED. Great
More informationPreparing your network for the next wave of innovation
Preparing your network for the next wave of innovation The future is exciting. Ready? 2 Executive brief For modern businesses, every day brings fresh challenges and opportunities. You must be able to adapt
More informationCustomer Access. Partner Initiated PICA - The Cisco PICA User Guide
PICA - Partner Initiated Customer Access The Cisco PICA User Guide Table of Contents PICA User Guide TABLE OF CONTENTS...2 ABOUT THIS GUIDE...4 BENEFITS OF USING THE PICA TOOL...4 USING THE PICA TOOL...4
More informationReducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security
Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security Healthcare provider manages threats with ease Atrius Health Customer Profile Large regional healthcare provider
More informationThe Internet of Everything is changing Everything
The Internet of Everything is changing Everything Intelligent Threat Defense for the Enterprise Mobility Nikos Mourtzinos, CCIE #9763 Global Security Sales Organization Changing Business Models Any Device
More informationDATA CENTRE SOLUTIONS
DATA CENTRE SOLUTIONS NOW OPTIMIZATION IS WITHIN REACH. CONVERGED INFRASTRUCTURE VIRTUALIZATION STORAGE NETWORKING BACKUP & RECOVERY POWER & COOLING 2 INCREASE AGILITY, STARTING IN YOUR DATA CENTRE. Chances
More informationWater Provider Relocates, Modernizes Data Center
: mission-critical services and Cisco engaged to lead data of 260 servers and 60 community of employees and partners. The most vital are those associated service. It was important for us to maintain the
More information1110 Cool Things Your Firewall Should Do. Extend beyond blocking network threats to protect, manage and control application traffic
1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application
More informationCisco Solution Support
Service Definition Cisco Solution Support Cisco Security Solutions Service Definition November 2017 2017 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page
More informationCisco ASA 5500-X NGFW
Cisco ASA 5500-X NGFW Sieťová ochrana pre malé a stredné podniky pred modernými hrozbami Peter Mesjar CCIE 17428, Systémový Inžinier, Cisco What are we going to talk about Problem is THREATS How today
More informationHEALTH CARE AND CYBER SECURITY:
HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers
More informationPaper. Delivering Strong Security in a Hyperconverged Data Center Environment
Paper Delivering Strong Security in a Hyperconverged Data Center Environment Introduction A new trend is emerging in data center technology that could dramatically change the way enterprises manage and
More informationQatar s National ICT Plan
Overview Qatar s National ICT Plan Qatar has made significant progress toward creating an innovative and vibrant ICT sector that will secure a thriving, diversified economy and enrich the quality of life
More informationwhite paper SMS Authentication: 10 Things to Know Before You Buy
white paper SMS Authentication: 10 Things to Know Before You Buy SMS Authentication white paper Introduction Delivering instant remote access is no longer just about remote employees. It s about enabling
More information