SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 4
Customer Case Study
EXECUTIVE SUMMARY
CITY OF EL PASO, TEXAS
● Municipal Government
● El Paso, Texas, USA
● 6,000 employees; 800,000 citizens
BUSINESS CHALLENGE
● Compliance with HIPAA, PCI, Criminal Justice
Information Services (CJIS)
● Maintain uptime for employees and citizens
● Re-centralize IT functions for greater
efficiency
SECURITY SOLUTION
● Cisco ASA 5585-X Series Next-Generation
Firewalls
● Cisco Prime Security Manager
● Cisco Email Security Appliance (ESA)
BUSINESS RESULTS
● Firewall footprint reduced by 60 percent
● Ability to monitor public Wi-Fi and employee
connectivity for improved service
● Most maintenance to be performed without
firewall outages or IT overtime, saving 10
percent in employee time
City of Tomorrow Builds in Next-Generation
Security
City of El Paso relies on Cisco ASA 5585-X Series to secure network to best deliver
municipality’s  services.
Business Challenge
The City of El Paso is located in west Texas, serving a rapidly
growing citizenry of 800,000. It is adjacent to a large U.S. military
base. Just over the border, Juarez, Mexico, is home to more than
two million people, many of whom come to El Paso to work, go to
school,  and  dine.  In  less  than  two  years,  the  City  of  El  Paso’s  
government has digitally reinvented itself to better serve its citizens
and employees.
“Previously,  we  had  many  IT  staff  working  inside  different  agencies  
within the City organization, with varying levels of expertise and
security,”  says  Miguel  Gamino,  former Chief Information Officer and
Chief Innovation Officer, Dept. of Information Technology Services,
City  of  El  Paso,  who  has  spearheaded  the  city’s  digital  
transformation. Gamino recently became Deputy Chief Information
Officer and Chief Operating Officer, Dept. of Technology, City and
County of San Francisco.
While centralizing IT purchasing, planning, and support, the IT
Department also set its sights on improving services for both
employees and citizens.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 4
Until 2011, the City of El Paso experienced a range of IT challenges. Telephony services were suffering: as many
as 100 calls a day were being dropped by the local tax office. The city also had many regulatory compliance
requirements,  due  to  its  need  to  connect  to  the  FBI’s  Criminal  Justice  Information  Services Network (CJIS), with
oversight by the National Security Administration (NSA); area hospitals, necessitating Health Information Portability
and Accountability Act (HIPAA) compliance; and the recreation center and other departments that planned to
accept credit cards for payment, therefore, needing Payment Card Industry (PCI) compliance. A big shift was
needed to create a well-designed, compliant, and secure infrastructure.
Solution
In 2011, a new IT team for the City of El Paso looked at what other municipalities were doing and drew on their
experience to design a new infrastructure. The team began with a pilot of Cisco
®
IP telephony on two floors of City
Hall. When the pilot ended, the plan had been to expand to other floors. Instead, the team looked at the entire IT
infrastructure citywide, and came up with a plan to rebuild the network, top to bottom. This plan became the
foundational  platform  of  the  “City  of  El  Paso  Network  Infrastructure  Update”  initiative,  in  collaboration  with  the  
Mayor’s  and  City  Manager’s  offices.
As a longtime Cisco routing and switching customer, the City of El Paso moved forward with bringing in a range of
Cisco security products at the center of its business transformation. The city imperative was to improve access to
and delivery of important services, supported by updated, streamlined, and secure network access. This project
included  a  companion  initiative,  “Digital  El  Paso,”  to  broaden  the  city’s  public  Wi-Fi access in the direction to
become ubiquitous.
“Currently,  Wi-Fi is available in the downtown area, public libraries, fire stations, police department regional
command centers, some parks and recreational centers, Judson F. Williams Convention Center, El Paso
International Airport, community centers, Sun Metro public transit  terminals,  city  buildings,  and  other  locations,”  
says Michael Valencia, Network and Voice Infrastructure Manager, Dept. of Information Technology Services, City
of  El  Paso.  “Soon  we  will  have  Wi-Fi onboard buses in the public transit system for anyone to use en-route.”
In addition, the IT team is considering credit card payment options for city services, as well as integrating services
from healthcare providers and city health offices, all of which are to be secured by Cisco security solutions.
For example,  the  plan  is  for  families  using  the  city’s  recreational  pool  facilities  to  be  able  to  pay  their  entry  fees  with  
a swipe of a credit or debit card via a secure card reader. Traffic tickets and other services are expected be able to
paid in a similar manner.
Additionally,  local  hospitals  will  be  able  to  track  and  feed  data  securely  back  to  the  city’s  health  department  
regarding the ailments for which people are treated. Similarly, the local drug stores will be able to provide buying
information to the city, to see what medical purchases are being made, as part of a means to assess the health of
its citizens, without compromising patient privacy. This information is expected be utilized to help determine
government health benefits and to assess trends that can be assimilated into local, state, and federal program
decision-making.
The city worked with Cisco and its partner, Sigma Solutions, to implement the new infrastructure. The team
replaced the legacy phone system with a universal contract with Cisco, upgrading to a 2 GB public Internet service
capacity, with reciprocal redundancy with El Paso County, providing operational and cost efficiencies.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 4
“We  wanted  to  deal  with  just  one  platform  for  LAN,  WAN,  Voice  and  Wireless,”  says  Valencia.  “Our  team  has  a  lot
of experience with Cisco and has obtained several Cisco certifications. We know the platform and strength of its
other  network  and  security  products,  and  Cisco  support  has  been  a  godsend.”
The city adopted a policy for standardization on Cisco and defined its first security policy. A chief security officer
position also is being added.
“We  made  a  conscious  decision  to  standardize  our  digital  infrastructure  on  Cisco,”  says  Gamino.  “It  is  part  of  our  
big picture value to El Paso, bringing together the most comprehensive, integrated, and collaborative solutions,
starting with the network and security, and extending to Voice over Internet Protocol (VoIP) and collaboration
technologies,  such  as  the  WebEx  Social  platform.”
The City of El Paso installed Cisco ASA Next-Generation Firewalls to protect its expanded external connection.
The  new  network’s  strong  levels  of  security  will  help  meet  compliance  standards  needed  for  its  connections  to  
hospitals and to the Texas Department of Public Safety, as well as for processing credit card payments for city
services in the future.
“The  ASA  Next-Generation  Firewalls  have  been  solid,”  says  Valencia.  “They  provide  an  active  standby  solution  that  
immediately recognizes and reacts to when one has stopped. Because they combine multiple functions in one
firewall, we were able to replace five firewalls with two, which means less maintenance and support needed from
us.”
The City of El Paso also uses Cisco ASA Next-Generation Firewalls internally for the Department of Public Safety.
Cisco AnyConnect
®
Secure Mobility VPN is used for an extra measure of security in wireless access by employee
devices,  primarily  in  the  city’s  legal  and  purchasing  departments,  and  the  executive  offices.  To  monitor  its  new  
state-of-the-art public Wi-Fi, the team uses Cisco Prime
™
Network Manager to assess network traffic, which
averages 10,500 people daily.
Cisco TelePresence
®
is expected to be used to enable citizens and other stakeholders in remote locations to
participate in city council meetings. Cisco WebEx
®
Social will be leveraged to facilitate collaboration between city
departments, as well as to the public they serve. Cisco Identity Services Engine (ISE) is being explored to secure
the network device endpoints.
“At  the  end  of  the  day,  we  got  the  best  of  all  worlds:  a  Cisco unified platform, great service, and the security to
deliver  a  higher  level  of  services,”  says  Valencia.
“If we were going to take this project on, we were going to apply all the
best practices. There is no doubt that Cisco is the foundation for this
massive undertaking.”
— Miguel Gamino, Former Chief Information Officer and Chief Innovation Officer, Dept. of Information Technology Services,
City of El Paso
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 4
PRODUCT LIST
Security
● Cisco ASA 5585-X Next-Generation
Firewall
● Cisco AnyConnect Secure Mobility Client
● Cisco Email Security Appliance (ESA)
● Cisco Prime Security Manager
● Cisco Secure Access Control System
Routers and Switches
● Cisco Catalyst
®
3750 Switches
● Cisco Catalyst 2960 Series Switches
● Cisco Catalyst 4500 Series Switches
● Cisco 1000 Series Aggregation Services
Routers (ASR)
● Cisco 2900 Series Integrated Services
Routers (ISR)
● Cisco 3900 Series Integrated Services
Routers (ISR)
Data Center
● Cisco Unified Computing System
™
(UCS
®
)
Collaboration
● Cisco WebEx Social
● Cisco TelePresence
● Cisco Jabber
®
Cisco Voice and Unified Communications
● Cisco IP Telephony
● Cisco Call Center
● Cisco Emergency Responder
Business Results
In just 18 months, the City of El Paso has realized a vast
transformation in its ability to serve its citizens and visitors, securing
their network to provide a broader array of services, streamline
operations, and significantly reduce expenditures.
As the initiatives continue to unfold, the city already has put into play
new, secure, and speedier access to city services. It soon will enable
citizens to securely pay for routine public services via credit card and
plans to have secure Wi-Fi access from anywhere in the city, no matter
their device of choice: smartphones, tablets, or laptops.
At  the  core  of  the  city’s  security  footprint  is the Cisco ASA 5585-X
Next-Generation Firewall to protect its two data centers. The Cisco
ASA 5550 protects the city police department as well as the
Department of Public Services in its communications with federal
agencies. Additionally, the ASA 5505 is used to secure the parks and
recreation, fire, and senior services departments through a full virtual
private network (VPN) tunnel.
The  city’s  health  department  will  be  able  to  communicate  with  the  
area’s  health  providers  and  hospitals,  securely  sharing  information to
expedite medical procedures and track the health of the community, as
it is tied to federal funding.
Additionally, the city has saved 10 to 12 percent of US$56-million in related IT projects, while centralizing
administration and improving service delivery, network availability, and security. It also has realized a savings of
$4-million in consolidating IT contracts, and it is projecting $1.3-million annual savings with consolidated phone
services.
For More Information
To learn more about Cisco ASA 5585-X Series Next-Generation Firewalls, please visit:
http://www.cisco.com/go/asa.
Printed in USA C36-730152-00 11/13

Más contenido relacionado

La actualidad más candente

Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Mychal McCabe
 
ATTOBahn NETWORK(part1)The Internet of Things
ATTOBahn NETWORK(part1)The Internet of ThingsATTOBahn NETWORK(part1)The Internet of Things
ATTOBahn NETWORK(part1)The Internet of ThingsDarryl Gray
 
Modern computer network technology
Modern computer network technologyModern computer network technology
Modern computer network technologyMH Shihab
 
Attobahn_Reduced_Angel_070915
Attobahn_Reduced_Angel_070915Attobahn_Reduced_Angel_070915
Attobahn_Reduced_Angel_070915Darryl Gray
 
Monetizing the Internet of Everything: Media Session fact sheet at Cisco Part...
Monetizing the Internet of Everything: Media Session fact sheet at Cisco Part...Monetizing the Internet of Everything: Media Session fact sheet at Cisco Part...
Monetizing the Internet of Everything: Media Session fact sheet at Cisco Part...Marc Musgrove
 
Four key points for smart city public wifi security -- C&T RF Antennas Inc
Four key points for smart city public wifi security -- C&T RF Antennas IncFour key points for smart city public wifi security -- C&T RF Antennas Inc
Four key points for smart city public wifi security -- C&T RF Antennas IncAntenna Manufacturer Coco
 
Ten Technology Trends that Will Shape the Next-Generation Internet
Ten Technology Trends that Will Shape the Next-Generation InternetTen Technology Trends that Will Shape the Next-Generation Internet
Ten Technology Trends that Will Shape the Next-Generation InternetCisco Services
 
Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...IPPAI
 
Smart & Secure City Solutions by Rupinder Singh
Smart & Secure City Solutions by Rupinder SinghSmart & Secure City Solutions by Rupinder Singh
Smart & Secure City Solutions by Rupinder SinghIPPAI
 
An Internet of Things blueprint for a smarter world
An Internet of Things blueprint for a smarter worldAn Internet of Things blueprint for a smarter world
An Internet of Things blueprint for a smarter worldMarc Jadoul
 
CommunicAsia2015 Summit Programme (Updated)
CommunicAsia2015 Summit Programme (Updated)CommunicAsia2015 Summit Programme (Updated)
CommunicAsia2015 Summit Programme (Updated)Dr. Mazlan Abbas
 
IoT : Research, Development, Challenges
IoT: Research, Development, ChallengesIoT: Research, Development, Challenges
IoT : Research, Development, Challengesbaddi youssef
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
The Future of the Internet in India
The Future of the Internet in IndiaThe Future of the Internet in India
The Future of the Internet in IndiaKiran Mandrawadkar
 
How blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingHow blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingAhmed Banafa
 
REDtone IoT and Unified Inbox partner to integrate IoT devices with Social Media
REDtone IoT and Unified Inbox partner to integrate IoT devices with Social MediaREDtone IoT and Unified Inbox partner to integrate IoT devices with Social Media
REDtone IoT and Unified Inbox partner to integrate IoT devices with Social MediaDr. Mazlan Abbas
 
Internet Of things
Internet Of thingsInternet Of things
Internet Of thingsDeva Johnson
 
Ivan Seidenberg Keynote Speech at SUPERCOMM
Ivan Seidenberg Keynote Speech at SUPERCOMMIvan Seidenberg Keynote Speech at SUPERCOMM
Ivan Seidenberg Keynote Speech at SUPERCOMMnextgenweb1
 

La actualidad más candente (20)

Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)Intelligence in the Internet of Things (IoT)
Intelligence in the Internet of Things (IoT)
 
ATTOBahn NETWORK(part1)The Internet of Things
ATTOBahn NETWORK(part1)The Internet of ThingsATTOBahn NETWORK(part1)The Internet of Things
ATTOBahn NETWORK(part1)The Internet of Things
 
Modern computer network technology
Modern computer network technologyModern computer network technology
Modern computer network technology
 
Attobahn_Reduced_Angel_070915
Attobahn_Reduced_Angel_070915Attobahn_Reduced_Angel_070915
Attobahn_Reduced_Angel_070915
 
ICC icXchange Community Wireless Mobility
ICC icXchange Community Wireless MobilityICC icXchange Community Wireless Mobility
ICC icXchange Community Wireless Mobility
 
Monetizing the Internet of Everything: Media Session fact sheet at Cisco Part...
Monetizing the Internet of Everything: Media Session fact sheet at Cisco Part...Monetizing the Internet of Everything: Media Session fact sheet at Cisco Part...
Monetizing the Internet of Everything: Media Session fact sheet at Cisco Part...
 
Four key points for smart city public wifi security -- C&T RF Antennas Inc
Four key points for smart city public wifi security -- C&T RF Antennas IncFour key points for smart city public wifi security -- C&T RF Antennas Inc
Four key points for smart city public wifi security -- C&T RF Antennas Inc
 
Ten Technology Trends that Will Shape the Next-Generation Internet
Ten Technology Trends that Will Shape the Next-Generation InternetTen Technology Trends that Will Shape the Next-Generation Internet
Ten Technology Trends that Will Shape the Next-Generation Internet
 
Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...Business Development, Industry Solutions, Internet of Everything Cisco India ...
Business Development, Industry Solutions, Internet of Everything Cisco India ...
 
Smart & Secure City Solutions by Rupinder Singh
Smart & Secure City Solutions by Rupinder SinghSmart & Secure City Solutions by Rupinder Singh
Smart & Secure City Solutions by Rupinder Singh
 
An Internet of Things blueprint for a smarter world
An Internet of Things blueprint for a smarter worldAn Internet of Things blueprint for a smarter world
An Internet of Things blueprint for a smarter world
 
CommunicAsia2015 Summit Programme (Updated)
CommunicAsia2015 Summit Programme (Updated)CommunicAsia2015 Summit Programme (Updated)
CommunicAsia2015 Summit Programme (Updated)
 
IoT : Research, Development, Challenges
IoT: Research, Development, ChallengesIoT: Research, Development, Challenges
IoT : Research, Development, Challenges
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
The Future of the Internet in India
The Future of the Internet in IndiaThe Future of the Internet in India
The Future of the Internet in India
 
How blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfundingHow blockchain is revolutionizing crowdfunding
How blockchain is revolutionizing crowdfunding
 
REDtone IoT and Unified Inbox partner to integrate IoT devices with Social Media
REDtone IoT and Unified Inbox partner to integrate IoT devices with Social MediaREDtone IoT and Unified Inbox partner to integrate IoT devices with Social Media
REDtone IoT and Unified Inbox partner to integrate IoT devices with Social Media
 
Internet Of things
Internet Of thingsInternet Of things
Internet Of things
 
Ivan Seidenberg Keynote Speech at SUPERCOMM
Ivan Seidenberg Keynote Speech at SUPERCOMMIvan Seidenberg Keynote Speech at SUPERCOMM
Ivan Seidenberg Keynote Speech at SUPERCOMM
 
MESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - UpdatedMESA- Cyber & Smart Cities - Updated
MESA- Cyber & Smart Cities - Updated
 

Similar a City of Tomorrow Builds in Next-Generation Security

Gobierno de Castilla la Mancha
Gobierno de Castilla la ManchaGobierno de Castilla la Mancha
Gobierno de Castilla la ManchaCisco Case Studies
 
Public Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case StudiesPublic Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case StudiesConnected Futures
 
Ups Global Operations
Ups Global OperationsUps Global Operations
Ups Global OperationsKarina Thomas
 
Coastal Californian Community Deploys Avaya Network to Enable Mission-Critica...
Coastal Californian Community Deploys Avaya Network to Enable Mission-Critica...Coastal Californian Community Deploys Avaya Network to Enable Mission-Critica...
Coastal Californian Community Deploys Avaya Network to Enable Mission-Critica...Avaya Inc.
 
Ultra-high bandwidth via Colt Technology
Ultra-high bandwidth via Colt TechnologyUltra-high bandwidth via Colt Technology
Ultra-high bandwidth via Colt TechnologyLemar Amany
 
cisco_edge_whitepaper.pdf
cisco_edge_whitepaper.pdfcisco_edge_whitepaper.pdf
cisco_edge_whitepaper.pdfRaymondKoh23
 
The Global Interconnection Index - Measuring Growth of the Digital Economy
The Global Interconnection Index - Measuring Growth of the Digital EconomyThe Global Interconnection Index - Measuring Growth of the Digital Economy
The Global Interconnection Index - Measuring Growth of the Digital EconomyEquinix
 
Ericsson: Latam Insights - We Enable Change-Makers
Ericsson: Latam Insights - We Enable Change-MakersEricsson: Latam Insights - We Enable Change-Makers
Ericsson: Latam Insights - We Enable Change-MakersEricsson Latin America
 
Goodenough 110424192114-phpapp02
Goodenough 110424192114-phpapp02Goodenough 110424192114-phpapp02
Goodenough 110424192114-phpapp02Gerson Orlando Jr
 
Planning for a Digital Future
Planning for a Digital FuturePlanning for a Digital Future
Planning for a Digital FutureNETSCOUT
 
A Comprehensive Suite Of Managed Security Services
A Comprehensive Suite Of Managed Security ServicesA Comprehensive Suite Of Managed Security Services
A Comprehensive Suite Of Managed Security ServicesJessica Tanner
 
Internet & Telephone - CIO Review
Internet & Telephone  - CIO ReviewInternet & Telephone  - CIO Review
Internet & Telephone - CIO ReviewAureus Humboldt
 
Is3 Satcom Capabilities Brief
Is3 Satcom Capabilities BriefIs3 Satcom Capabilities Brief
Is3 Satcom Capabilities Briefmageeb
 
VMware SEAK Customer Success Showcase 2017
VMware SEAK Customer Success Showcase 2017VMware SEAK Customer Success Showcase 2017
VMware SEAK Customer Success Showcase 2017Mark Koh
 

Similar a City of Tomorrow Builds in Next-Generation Security (20)

Gobierno de Castilla la Mancha
Gobierno de Castilla la ManchaGobierno de Castilla la Mancha
Gobierno de Castilla la Mancha
 
Public Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case StudiesPublic Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case Studies
 
V5I6-0559
V5I6-0559V5I6-0559
V5I6-0559
 
Ups Global Operations
Ups Global OperationsUps Global Operations
Ups Global Operations
 
Coastal Californian Community Deploys Avaya Network to Enable Mission-Critica...
Coastal Californian Community Deploys Avaya Network to Enable Mission-Critica...Coastal Californian Community Deploys Avaya Network to Enable Mission-Critica...
Coastal Californian Community Deploys Avaya Network to Enable Mission-Critica...
 
Lomma Kommun
Lomma Kommun Lomma Kommun
Lomma Kommun
 
Ultra-high bandwidth via Colt Technology
Ultra-high bandwidth via Colt TechnologyUltra-high bandwidth via Colt Technology
Ultra-high bandwidth via Colt Technology
 
cisco_edge_whitepaper.pdf
cisco_edge_whitepaper.pdfcisco_edge_whitepaper.pdf
cisco_edge_whitepaper.pdf
 
The Global Interconnection Index - Measuring Growth of the Digital Economy
The Global Interconnection Index - Measuring Growth of the Digital EconomyThe Global Interconnection Index - Measuring Growth of the Digital Economy
The Global Interconnection Index - Measuring Growth of the Digital Economy
 
Ericsson: Latam Insights - We Enable Change-Makers
Ericsson: Latam Insights - We Enable Change-MakersEricsson: Latam Insights - We Enable Change-Makers
Ericsson: Latam Insights - We Enable Change-Makers
 
Goodenough 110424192114-phpapp02
Goodenough 110424192114-phpapp02Goodenough 110424192114-phpapp02
Goodenough 110424192114-phpapp02
 
Securing io t_with_aws
Securing io t_with_awsSecuring io t_with_aws
Securing io t_with_aws
 
New Charter Housing Trust
New Charter Housing TrustNew Charter Housing Trust
New Charter Housing Trust
 
Planning for a Digital Future
Planning for a Digital FuturePlanning for a Digital Future
Planning for a Digital Future
 
ICC icXchange Community Wireless Mobility
ICC icXchange Community Wireless MobilityICC icXchange Community Wireless Mobility
ICC icXchange Community Wireless Mobility
 
A Comprehensive Suite Of Managed Security Services
A Comprehensive Suite Of Managed Security ServicesA Comprehensive Suite Of Managed Security Services
A Comprehensive Suite Of Managed Security Services
 
National Airport of Romania
National Airport of Romania National Airport of Romania
National Airport of Romania
 
Internet & Telephone - CIO Review
Internet & Telephone  - CIO ReviewInternet & Telephone  - CIO Review
Internet & Telephone - CIO Review
 
Is3 Satcom Capabilities Brief
Is3 Satcom Capabilities BriefIs3 Satcom Capabilities Brief
Is3 Satcom Capabilities Brief
 
VMware SEAK Customer Success Showcase 2017
VMware SEAK Customer Success Showcase 2017VMware SEAK Customer Success Showcase 2017
VMware SEAK Customer Success Showcase 2017
 

Más de Cisco Security

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityCisco Security
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco Security
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Cisco Security
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkCisco Security
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation FirewallCisco Security
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsCisco Security
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityCisco Security
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and PerformanceCisco Security
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicCisco Security
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security ChallengesCisco Security
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyCisco Security
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of InactivityCisco Security
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityCisco Security
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security StrategiesCisco Security
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardCisco Security
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Cisco Security
 

Más de Cisco Security (20)

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 

Último

UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxUdaiappa Ramachandran
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 

Último (20)

UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Building AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptxBuilding AI-Driven Apps Using Semantic Kernel.pptx
Building AI-Driven Apps Using Semantic Kernel.pptx
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 

City of Tomorrow Builds in Next-Generation Security

  • 1. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 4 Customer Case Study EXECUTIVE SUMMARY CITY OF EL PASO, TEXAS ● Municipal Government ● El Paso, Texas, USA ● 6,000 employees; 800,000 citizens BUSINESS CHALLENGE ● Compliance with HIPAA, PCI, Criminal Justice Information Services (CJIS) ● Maintain uptime for employees and citizens ● Re-centralize IT functions for greater efficiency SECURITY SOLUTION ● Cisco ASA 5585-X Series Next-Generation Firewalls ● Cisco Prime Security Manager ● Cisco Email Security Appliance (ESA) BUSINESS RESULTS ● Firewall footprint reduced by 60 percent ● Ability to monitor public Wi-Fi and employee connectivity for improved service ● Most maintenance to be performed without firewall outages or IT overtime, saving 10 percent in employee time City of Tomorrow Builds in Next-Generation Security City of El Paso relies on Cisco ASA 5585-X Series to secure network to best deliver municipality’s  services. Business Challenge The City of El Paso is located in west Texas, serving a rapidly growing citizenry of 800,000. It is adjacent to a large U.S. military base. Just over the border, Juarez, Mexico, is home to more than two million people, many of whom come to El Paso to work, go to school,  and  dine.  In  less  than  two  years,  the  City  of  El  Paso’s   government has digitally reinvented itself to better serve its citizens and employees. “Previously,  we  had  many  IT  staff  working  inside  different  agencies   within the City organization, with varying levels of expertise and security,”  says  Miguel  Gamino,  former Chief Information Officer and Chief Innovation Officer, Dept. of Information Technology Services, City  of  El  Paso,  who  has  spearheaded  the  city’s  digital   transformation. Gamino recently became Deputy Chief Information Officer and Chief Operating Officer, Dept. of Technology, City and County of San Francisco. While centralizing IT purchasing, planning, and support, the IT Department also set its sights on improving services for both employees and citizens.
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 4 Until 2011, the City of El Paso experienced a range of IT challenges. Telephony services were suffering: as many as 100 calls a day were being dropped by the local tax office. The city also had many regulatory compliance requirements,  due  to  its  need  to  connect  to  the  FBI’s  Criminal  Justice  Information  Services Network (CJIS), with oversight by the National Security Administration (NSA); area hospitals, necessitating Health Information Portability and Accountability Act (HIPAA) compliance; and the recreation center and other departments that planned to accept credit cards for payment, therefore, needing Payment Card Industry (PCI) compliance. A big shift was needed to create a well-designed, compliant, and secure infrastructure. Solution In 2011, a new IT team for the City of El Paso looked at what other municipalities were doing and drew on their experience to design a new infrastructure. The team began with a pilot of Cisco ® IP telephony on two floors of City Hall. When the pilot ended, the plan had been to expand to other floors. Instead, the team looked at the entire IT infrastructure citywide, and came up with a plan to rebuild the network, top to bottom. This plan became the foundational  platform  of  the  “City  of  El  Paso  Network  Infrastructure  Update”  initiative,  in  collaboration  with  the   Mayor’s  and  City  Manager’s  offices. As a longtime Cisco routing and switching customer, the City of El Paso moved forward with bringing in a range of Cisco security products at the center of its business transformation. The city imperative was to improve access to and delivery of important services, supported by updated, streamlined, and secure network access. This project included  a  companion  initiative,  “Digital  El  Paso,”  to  broaden  the  city’s  public  Wi-Fi access in the direction to become ubiquitous. “Currently,  Wi-Fi is available in the downtown area, public libraries, fire stations, police department regional command centers, some parks and recreational centers, Judson F. Williams Convention Center, El Paso International Airport, community centers, Sun Metro public transit  terminals,  city  buildings,  and  other  locations,”   says Michael Valencia, Network and Voice Infrastructure Manager, Dept. of Information Technology Services, City of  El  Paso.  “Soon  we  will  have  Wi-Fi onboard buses in the public transit system for anyone to use en-route.” In addition, the IT team is considering credit card payment options for city services, as well as integrating services from healthcare providers and city health offices, all of which are to be secured by Cisco security solutions. For example,  the  plan  is  for  families  using  the  city’s  recreational  pool  facilities  to  be  able  to  pay  their  entry  fees  with   a swipe of a credit or debit card via a secure card reader. Traffic tickets and other services are expected be able to paid in a similar manner. Additionally,  local  hospitals  will  be  able  to  track  and  feed  data  securely  back  to  the  city’s  health  department   regarding the ailments for which people are treated. Similarly, the local drug stores will be able to provide buying information to the city, to see what medical purchases are being made, as part of a means to assess the health of its citizens, without compromising patient privacy. This information is expected be utilized to help determine government health benefits and to assess trends that can be assimilated into local, state, and federal program decision-making. The city worked with Cisco and its partner, Sigma Solutions, to implement the new infrastructure. The team replaced the legacy phone system with a universal contract with Cisco, upgrading to a 2 GB public Internet service capacity, with reciprocal redundancy with El Paso County, providing operational and cost efficiencies.
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 4 “We  wanted  to  deal  with  just  one  platform  for  LAN,  WAN,  Voice  and  Wireless,”  says  Valencia.  “Our  team  has  a  lot of experience with Cisco and has obtained several Cisco certifications. We know the platform and strength of its other  network  and  security  products,  and  Cisco  support  has  been  a  godsend.” The city adopted a policy for standardization on Cisco and defined its first security policy. A chief security officer position also is being added. “We  made  a  conscious  decision  to  standardize  our  digital  infrastructure  on  Cisco,”  says  Gamino.  “It  is  part  of  our   big picture value to El Paso, bringing together the most comprehensive, integrated, and collaborative solutions, starting with the network and security, and extending to Voice over Internet Protocol (VoIP) and collaboration technologies,  such  as  the  WebEx  Social  platform.” The City of El Paso installed Cisco ASA Next-Generation Firewalls to protect its expanded external connection. The  new  network’s  strong  levels  of  security  will  help  meet  compliance  standards  needed  for  its  connections  to   hospitals and to the Texas Department of Public Safety, as well as for processing credit card payments for city services in the future. “The  ASA  Next-Generation  Firewalls  have  been  solid,”  says  Valencia.  “They  provide  an  active  standby  solution  that   immediately recognizes and reacts to when one has stopped. Because they combine multiple functions in one firewall, we were able to replace five firewalls with two, which means less maintenance and support needed from us.” The City of El Paso also uses Cisco ASA Next-Generation Firewalls internally for the Department of Public Safety. Cisco AnyConnect ® Secure Mobility VPN is used for an extra measure of security in wireless access by employee devices,  primarily  in  the  city’s  legal  and  purchasing  departments,  and  the  executive  offices.  To  monitor  its  new   state-of-the-art public Wi-Fi, the team uses Cisco Prime ™ Network Manager to assess network traffic, which averages 10,500 people daily. Cisco TelePresence ® is expected to be used to enable citizens and other stakeholders in remote locations to participate in city council meetings. Cisco WebEx ® Social will be leveraged to facilitate collaboration between city departments, as well as to the public they serve. Cisco Identity Services Engine (ISE) is being explored to secure the network device endpoints. “At  the  end  of  the  day,  we  got  the  best  of  all  worlds:  a  Cisco unified platform, great service, and the security to deliver  a  higher  level  of  services,”  says  Valencia. “If we were going to take this project on, we were going to apply all the best practices. There is no doubt that Cisco is the foundation for this massive undertaking.” — Miguel Gamino, Former Chief Information Officer and Chief Innovation Officer, Dept. of Information Technology Services, City of El Paso
  • 4. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 4 PRODUCT LIST Security ● Cisco ASA 5585-X Next-Generation Firewall ● Cisco AnyConnect Secure Mobility Client ● Cisco Email Security Appliance (ESA) ● Cisco Prime Security Manager ● Cisco Secure Access Control System Routers and Switches ● Cisco Catalyst ® 3750 Switches ● Cisco Catalyst 2960 Series Switches ● Cisco Catalyst 4500 Series Switches ● Cisco 1000 Series Aggregation Services Routers (ASR) ● Cisco 2900 Series Integrated Services Routers (ISR) ● Cisco 3900 Series Integrated Services Routers (ISR) Data Center ● Cisco Unified Computing System ™ (UCS ® ) Collaboration ● Cisco WebEx Social ● Cisco TelePresence ● Cisco Jabber ® Cisco Voice and Unified Communications ● Cisco IP Telephony ● Cisco Call Center ● Cisco Emergency Responder Business Results In just 18 months, the City of El Paso has realized a vast transformation in its ability to serve its citizens and visitors, securing their network to provide a broader array of services, streamline operations, and significantly reduce expenditures. As the initiatives continue to unfold, the city already has put into play new, secure, and speedier access to city services. It soon will enable citizens to securely pay for routine public services via credit card and plans to have secure Wi-Fi access from anywhere in the city, no matter their device of choice: smartphones, tablets, or laptops. At  the  core  of  the  city’s  security  footprint  is the Cisco ASA 5585-X Next-Generation Firewall to protect its two data centers. The Cisco ASA 5550 protects the city police department as well as the Department of Public Services in its communications with federal agencies. Additionally, the ASA 5505 is used to secure the parks and recreation, fire, and senior services departments through a full virtual private network (VPN) tunnel. The  city’s  health  department  will  be  able  to  communicate  with  the   area’s  health  providers  and  hospitals,  securely  sharing  information to expedite medical procedures and track the health of the community, as it is tied to federal funding. Additionally, the city has saved 10 to 12 percent of US$56-million in related IT projects, while centralizing administration and improving service delivery, network availability, and security. It also has realized a savings of $4-million in consolidating IT contracts, and it is projecting $1.3-million annual savings with consolidated phone services. For More Information To learn more about Cisco ASA 5585-X Series Next-Generation Firewalls, please visit: http://www.cisco.com/go/asa. Printed in USA C36-730152-00 11/13