SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
EXECUTIVE SUMMARY
Montana Economic Revitalization &
Development Institute (MERDI)
• Nonprofit/Technology
• Butte, Montana
• 30 employees
Business Challenge
• Provide advanced IT services to local
government, nonprofit and business
organizations to promote economic growth
• Help ensure security in multitenant
environment
• Simplify network and security operations
Network Solution
• Cisco ASA 5585-X Adaptive Security
Appliance with Next-Generation Firewall
Services
• Cisco Nexus Switches
• Cisco ASR Aggregation Services Router
Business Results
• Enables MERDI customers to capture
more business by increasing competitive
capabilities
• Provides holistic view of threat environment
for all customers
• Simplifies security management and
operations, and provides economic
sustainability for MERDI IT infrastructure
Challenge
The Montana Economic Revitalization and Development Institute (MERDI) has a
broad mission: to foster economic development and education in Montana through
investments in advanced technology.
“In today’s economy, business innovation and productivity are increasingly a function
of the degree to which information technology has been effectively institutionally
embedded within an organization,” says James Kambich, chief executive officer,
MERDI. “Accomplishing this within Montana’s local rural economies is no small task,
but MERDI is striving to create a holistic information technology ecostructure that
both enables and empowers organizations.”
“As companies move toward solutions like electronic health records, paperless
processes, and virtual infrastructure, these advances can create barriers for
Montana firms, which tend to be much smaller and have fewer IT resources,” says
Phillip J. Curtiss, PhD, chief technology officer for MERDI. “We make investments in
infrastructure to enable local businesses to compete more effectively and promote
economic growth.”
MERDI maintains an advanced data center, a fiber-optic metro network, and a
high-performance computing (HPC) cluster to make state-of-the-art technology
resources available to local organizations. These efforts have been an overwhelming
success. Since its founding in the 1970s, MERDI has supported businesses
producing thousands of local jobs. Today, MERDI’s data center houses 6 carriers,
serves 16 local businesses and the Butte School District, and offers the state’s only
HPC infrastructure.
MERDI’s mission, however, presents unique technology challenges. While MERDI is
classified as a small business by most standards, its multitenant data center needs
are more akin to those of a service provider. “We have many tenants, both inside
our building and connected through our fiber optic network, who all have different
demands,” says Curtiss.
Secure Data Center Solution
Spurs Economic Growth
1 © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Customer Case Study
Montana Economic Revitalization & Development Institute boosts
area business with multitenant Next-Generation Firewalls.
MERDI’s projects include bringing HPC resources to regional laboratories, providing
basic IT services for local government, launching a virtual desktop infrastructure
(VDI) initiative in the Butte School District, and many others. This diversity poses
significant security concerns.
Some data center services must meet regulatory requirements such as the Health
Insurance Portability and Accountability Act (HIPAA). Others must comply with the
stringent security demands of government and military projects. Still others must
protect intellectual property across a shared data center infrastructure. These
security solutions not only must be simple to manage by MERDI’s small staff, they
must be easily repeatable across multiple customers.
“As we look to meet customer requirements for hybrid fiber networks, virtualization,
VDI, and bring-your-own-device (BYOD) initiatives, we have to make informed
decisions about our technology purchases,” says Curtiss. “We need solutions that
not only will allow us to perform better at the things we’re doing now, but also will
give us capabilities for the future.”
Solution
MERDI has long relied on Cisco® for nearly all its IT needs, from the metro
fiber network to the data center infrastructure. By 2012, however, the data
center network was beginning to show its age. The organization overhauled the
infrastructure with a Cisco Nexus® switching backbone, Cisco edge routing, and
is even in the process of upgrading its HPC system to a Cisco Unified Computing
System™ (UCS®)-based cluster. To meet increasingly complex multitenant
requirements and lay a foundation for future services, MERDI turned to the Cisco
Secure Data Center solution, leveraging the ASA 5585-X Series Adaptive Security
Appliance with Next-Generation Firewall Services.
“We considered other vendors, but while their devices may be capable, they
were limited to an enterprise data center model, and we are not an enterprise
data center,” says Curtiss. “We are not serving one entity; we’re supporting many
different people and projects. That makes a huge difference in the kinds of network
services we need and the demands we place on our hardware. The Cisco ASA
5585-X platform was the most capable solution for meeting our multitenancy and
other project-related demands.”
Security Foundation for the Future
MERDI’s Cisco ASA 5585-X Series platforms provide granular visibility into and
control over client traffic flows, along with global threat correlation, intrusion
prevention system (IPS) services, and content security. The platforms also provide
industry-leading performance, capacity, virtual private network (VPN) connectivity,
and scalability. They allow MERDI to meet a diverse set of customer security needs
while reducing the hardware footprint and simplifying the infrastructure.
Curtiss also points out the ease of designing and deploying its new Secure Data
Center solution. “We used to have five large firewall appliances, standalone VPN
concentrators, and several smaller security appliances, all managed separately,”
says Curtiss. “All of that was replaced by a pair of Cisco ASA 5585-Xs.”
MERDI now can also provide more advanced security capabilities. Global threat
correlation, for example, provides security updates in as little as five minutes after
threats are reported, and allows MERDI to implement updates immediately for all
customers with a minimal staff.
Customer Case Study
2 © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
“The Cisco ASA 5585-X
platform was the most
capable solution for
meeting our multitenancy
and other project-related
demands.”
Phillip J. Curtiss, PhD
Chief Technology Officer
MERDI
While the organization is not yet using content security capabilities, they will play an
important role when MERDI implements its VDI project for the Butte School District,
and eventually extends state-of-the-art IT services to other Montana schools.
“As we look at the broad range of services that we can deliver with the Cisco
firewall solution, we will be able to offer school districts a comprehensive, end-to-
end computing solution from fiber networking to web security to content filtering,”
says Curtiss. “Whether it’s 1 or 2 school districts today, or 20 two years from now,
we can deploy the same portfolio of services over and over again.”
Advanced Multitenant Services
Among the most important advantages of the Cisco Next-Generation Firewalls is
native support for MERDI’s multitenant environment. The ability to serve diverse
customers and provide multiple levels of security with a single solution is already
achieving significant benefits.
“Right now we are supporting two oil and gas companies that are head-to-head
competitors,” says Curtiss. “It was no small feat to get them to collocate in our
building and operate on what is essentially a shared network. We are using the
Cisco security solutions to create multi-security zones for these customers, so we
can guarantee that their traffic never overlaps end to end. And we can do that for all
our customers, whether we need to assure HIPAA requirements or support military
projects.”
Results
The Cisco ASA 5585-X platforms and other Cisco data center upgrades already
are yielding benefits in the area that matters most: bringing business and jobs to
Montana. In just the first few months since deploying the new infrastructure, one of
the projects utilizing the MERDI data center for the United States Air Force was able
to secure two years of additional funding due, in part, to the expanded capabilities
of the data center. For another project, an information clearinghouse that works with
multiple federal agencies, the upgraded data center and security services allowed
them to compete for additional business.
“As a result of the upgrade, they can triple the amount of contracts they can take
on,” says Curtiss. “From an economic development perspective, this is a huge
benefit. Without the Cisco solutions, it wouldn’t be possible. We wouldn’t be able to
contemplate the kinds of services we can now securely deliver.”
The Cisco ASA 5585-X platforms are also making a big difference for MERDI
engineers. Instead of having to correlate logs from multiple platforms, MERDI now
has a consolidated view of the threat environment in the data center at all times.
“Having a single point of management and a global view with situational awareness
of the security situation across the data center has been huge for us,” says Curtiss.
“It’s made our lives a lot easier. We don’t necessarily have fewer security issues, but
we resolve them a lot quicker.”
The smarter, more consolidated security infrastructure also allows MERDI engineers
to deploy and replicate new services much more quickly. In the past, for example,
it could take more than an hour to make routine changes such as network address
translation (NAT) configurations, as engineers consulted multiple spreadsheets
to determine which appliance was serving which customer. Today, it takes a few
minutes.
Customer Case Study
3 © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Most important, the scalability MERDI now can offer, and the ability to securely
extend advanced data center services such as virtualization beyond the physical
walls of the data center, create opportunities to serve new kinds of customers and
contribute to new business models.
“As we look at the requirements we will need to meet in the next five years, the
ability to holistically understand security threats and assure multi-tenant security
models for our projects is essential,” says Curtiss. “If we did not have these
capabilities, we wouldn’t be able to support some of the work that our customers
and partners are able to secure now. That’s a big deal here in Montana. We are
seeing direct economic benefit as a result of these technology investments.”
For More Information
For more information about the Secure Data Center solution, Nexus switches, ASR
(Aggregation Services Router), and Unified Computer System (UCS), go to:
•	 http://www.cisco.com/go/securedatacenter
•	 http://www.cisco.com/go/asa
•	 http://www.cisco.com/go/ips
•	 http://www.cisco.com/go/switches
•	 http://www.cisco.com/go/routers
•	 http://www.cisco.com/go/ucs
PRODUCT LIST
Security
• Cisco ASA 5585-X Adaptive Security Appliances with Next-Generation Firewall
Services, IPS, and Global Threat Correlation
Routing and Switching
• Cisco Nexus 7000 Series
• Cisco Nexus 2000 Series
• Cisco ASR 1000 Series
Unified Computing
• Cisco UCS B200 Blade Servers
• Cisco UCS C220 Rack Servers
• Cisco UCS C240 Rack Servers
Customer Case Study
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.	 C36-730874-00  02/14
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Americas Headquarters
Cisco Systems, Inc.
San Jose, CA
Asia Pacific Headquarters
Cisco Systems (USA) Pte. Ltd.
Singapore
Europe Headquarters
Cisco Systems International BV Amsterdam,
The Netherlands

Más contenido relacionado

Destacado

Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataCisco Security
 
Interni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolaritàInterni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolaritàSaverio Massaro
 
E2 neannapa khajornmot presentation_29-11-09-2
E2 neannapa  khajornmot presentation_29-11-09-2E2 neannapa  khajornmot presentation_29-11-09-2
E2 neannapa khajornmot presentation_29-11-09-2Neannapa Khajornmot
 
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...FLUZO
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...FLUZO
 
Daftar usul zainab 1
Daftar usul zainab 1Daftar usul zainab 1
Daftar usul zainab 1Arya Ningrat
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...FLUZO
 
E metrics san fran 2014 aurelie pols final
E metrics san fran 2014 aurelie pols finalE metrics san fran 2014 aurelie pols final
E metrics san fran 2014 aurelie pols finalFLUZO
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyFLUZO
 

Destacado (12)

Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
 
Interni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolaritàInterni urbani: tra scarti e nuove circolarità
Interni urbani: tra scarti e nuove circolarità
 
Rizkan
RizkanRizkan
Rizkan
 
E2 neannapa khajornmot presentation_29-11-09-2
E2 neannapa  khajornmot presentation_29-11-09-2E2 neannapa  khajornmot presentation_29-11-09-2
E2 neannapa khajornmot presentation_29-11-09-2
 
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
 
Fathers day
Fathers dayFathers day
Fathers day
 
Plasma e2 24-01-53
Plasma e2 24-01-53Plasma e2 24-01-53
Plasma e2 24-01-53
 
Daftar usul zainab 1
Daftar usul zainab 1Daftar usul zainab 1
Daftar usul zainab 1
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
 
E metrics san fran 2014 aurelie pols final
E metrics san fran 2014 aurelie pols finalE metrics san fran 2014 aurelie pols final
E metrics san fran 2014 aurelie pols final
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
 

Más de Cisco Security

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityCisco Security
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco Security
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Cisco Security
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkCisco Security
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation FirewallCisco Security
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsCisco Security
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityCisco Security
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and PerformanceCisco Security
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicCisco Security
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security ChallengesCisco Security
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyCisco Security
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of InactivityCisco Security
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityCisco Security
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security StrategiesCisco Security
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardCisco Security
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Cisco Security
 

Más de Cisco Security (20)

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 

Último

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Último (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

Secure Data Center Solution Spurs Economic Growth

  • 1. EXECUTIVE SUMMARY Montana Economic Revitalization & Development Institute (MERDI) • Nonprofit/Technology • Butte, Montana • 30 employees Business Challenge • Provide advanced IT services to local government, nonprofit and business organizations to promote economic growth • Help ensure security in multitenant environment • Simplify network and security operations Network Solution • Cisco ASA 5585-X Adaptive Security Appliance with Next-Generation Firewall Services • Cisco Nexus Switches • Cisco ASR Aggregation Services Router Business Results • Enables MERDI customers to capture more business by increasing competitive capabilities • Provides holistic view of threat environment for all customers • Simplifies security management and operations, and provides economic sustainability for MERDI IT infrastructure Challenge The Montana Economic Revitalization and Development Institute (MERDI) has a broad mission: to foster economic development and education in Montana through investments in advanced technology. “In today’s economy, business innovation and productivity are increasingly a function of the degree to which information technology has been effectively institutionally embedded within an organization,” says James Kambich, chief executive officer, MERDI. “Accomplishing this within Montana’s local rural economies is no small task, but MERDI is striving to create a holistic information technology ecostructure that both enables and empowers organizations.” “As companies move toward solutions like electronic health records, paperless processes, and virtual infrastructure, these advances can create barriers for Montana firms, which tend to be much smaller and have fewer IT resources,” says Phillip J. Curtiss, PhD, chief technology officer for MERDI. “We make investments in infrastructure to enable local businesses to compete more effectively and promote economic growth.” MERDI maintains an advanced data center, a fiber-optic metro network, and a high-performance computing (HPC) cluster to make state-of-the-art technology resources available to local organizations. These efforts have been an overwhelming success. Since its founding in the 1970s, MERDI has supported businesses producing thousands of local jobs. Today, MERDI’s data center houses 6 carriers, serves 16 local businesses and the Butte School District, and offers the state’s only HPC infrastructure. MERDI’s mission, however, presents unique technology challenges. While MERDI is classified as a small business by most standards, its multitenant data center needs are more akin to those of a service provider. “We have many tenants, both inside our building and connected through our fiber optic network, who all have different demands,” says Curtiss. Secure Data Center Solution Spurs Economic Growth 1 © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Customer Case Study Montana Economic Revitalization & Development Institute boosts area business with multitenant Next-Generation Firewalls.
  • 2. MERDI’s projects include bringing HPC resources to regional laboratories, providing basic IT services for local government, launching a virtual desktop infrastructure (VDI) initiative in the Butte School District, and many others. This diversity poses significant security concerns. Some data center services must meet regulatory requirements such as the Health Insurance Portability and Accountability Act (HIPAA). Others must comply with the stringent security demands of government and military projects. Still others must protect intellectual property across a shared data center infrastructure. These security solutions not only must be simple to manage by MERDI’s small staff, they must be easily repeatable across multiple customers. “As we look to meet customer requirements for hybrid fiber networks, virtualization, VDI, and bring-your-own-device (BYOD) initiatives, we have to make informed decisions about our technology purchases,” says Curtiss. “We need solutions that not only will allow us to perform better at the things we’re doing now, but also will give us capabilities for the future.” Solution MERDI has long relied on Cisco® for nearly all its IT needs, from the metro fiber network to the data center infrastructure. By 2012, however, the data center network was beginning to show its age. The organization overhauled the infrastructure with a Cisco Nexus® switching backbone, Cisco edge routing, and is even in the process of upgrading its HPC system to a Cisco Unified Computing System™ (UCS®)-based cluster. To meet increasingly complex multitenant requirements and lay a foundation for future services, MERDI turned to the Cisco Secure Data Center solution, leveraging the ASA 5585-X Series Adaptive Security Appliance with Next-Generation Firewall Services. “We considered other vendors, but while their devices may be capable, they were limited to an enterprise data center model, and we are not an enterprise data center,” says Curtiss. “We are not serving one entity; we’re supporting many different people and projects. That makes a huge difference in the kinds of network services we need and the demands we place on our hardware. The Cisco ASA 5585-X platform was the most capable solution for meeting our multitenancy and other project-related demands.” Security Foundation for the Future MERDI’s Cisco ASA 5585-X Series platforms provide granular visibility into and control over client traffic flows, along with global threat correlation, intrusion prevention system (IPS) services, and content security. The platforms also provide industry-leading performance, capacity, virtual private network (VPN) connectivity, and scalability. They allow MERDI to meet a diverse set of customer security needs while reducing the hardware footprint and simplifying the infrastructure. Curtiss also points out the ease of designing and deploying its new Secure Data Center solution. “We used to have five large firewall appliances, standalone VPN concentrators, and several smaller security appliances, all managed separately,” says Curtiss. “All of that was replaced by a pair of Cisco ASA 5585-Xs.” MERDI now can also provide more advanced security capabilities. Global threat correlation, for example, provides security updates in as little as five minutes after threats are reported, and allows MERDI to implement updates immediately for all customers with a minimal staff. Customer Case Study 2 © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. “The Cisco ASA 5585-X platform was the most capable solution for meeting our multitenancy and other project-related demands.” Phillip J. Curtiss, PhD Chief Technology Officer MERDI
  • 3. While the organization is not yet using content security capabilities, they will play an important role when MERDI implements its VDI project for the Butte School District, and eventually extends state-of-the-art IT services to other Montana schools. “As we look at the broad range of services that we can deliver with the Cisco firewall solution, we will be able to offer school districts a comprehensive, end-to- end computing solution from fiber networking to web security to content filtering,” says Curtiss. “Whether it’s 1 or 2 school districts today, or 20 two years from now, we can deploy the same portfolio of services over and over again.” Advanced Multitenant Services Among the most important advantages of the Cisco Next-Generation Firewalls is native support for MERDI’s multitenant environment. The ability to serve diverse customers and provide multiple levels of security with a single solution is already achieving significant benefits. “Right now we are supporting two oil and gas companies that are head-to-head competitors,” says Curtiss. “It was no small feat to get them to collocate in our building and operate on what is essentially a shared network. We are using the Cisco security solutions to create multi-security zones for these customers, so we can guarantee that their traffic never overlaps end to end. And we can do that for all our customers, whether we need to assure HIPAA requirements or support military projects.” Results The Cisco ASA 5585-X platforms and other Cisco data center upgrades already are yielding benefits in the area that matters most: bringing business and jobs to Montana. In just the first few months since deploying the new infrastructure, one of the projects utilizing the MERDI data center for the United States Air Force was able to secure two years of additional funding due, in part, to the expanded capabilities of the data center. For another project, an information clearinghouse that works with multiple federal agencies, the upgraded data center and security services allowed them to compete for additional business. “As a result of the upgrade, they can triple the amount of contracts they can take on,” says Curtiss. “From an economic development perspective, this is a huge benefit. Without the Cisco solutions, it wouldn’t be possible. We wouldn’t be able to contemplate the kinds of services we can now securely deliver.” The Cisco ASA 5585-X platforms are also making a big difference for MERDI engineers. Instead of having to correlate logs from multiple platforms, MERDI now has a consolidated view of the threat environment in the data center at all times. “Having a single point of management and a global view with situational awareness of the security situation across the data center has been huge for us,” says Curtiss. “It’s made our lives a lot easier. We don’t necessarily have fewer security issues, but we resolve them a lot quicker.” The smarter, more consolidated security infrastructure also allows MERDI engineers to deploy and replicate new services much more quickly. In the past, for example, it could take more than an hour to make routine changes such as network address translation (NAT) configurations, as engineers consulted multiple spreadsheets to determine which appliance was serving which customer. Today, it takes a few minutes. Customer Case Study 3 © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
  • 4. Most important, the scalability MERDI now can offer, and the ability to securely extend advanced data center services such as virtualization beyond the physical walls of the data center, create opportunities to serve new kinds of customers and contribute to new business models. “As we look at the requirements we will need to meet in the next five years, the ability to holistically understand security threats and assure multi-tenant security models for our projects is essential,” says Curtiss. “If we did not have these capabilities, we wouldn’t be able to support some of the work that our customers and partners are able to secure now. That’s a big deal here in Montana. We are seeing direct economic benefit as a result of these technology investments.” For More Information For more information about the Secure Data Center solution, Nexus switches, ASR (Aggregation Services Router), and Unified Computer System (UCS), go to: • http://www.cisco.com/go/securedatacenter • http://www.cisco.com/go/asa • http://www.cisco.com/go/ips • http://www.cisco.com/go/switches • http://www.cisco.com/go/routers • http://www.cisco.com/go/ucs PRODUCT LIST Security • Cisco ASA 5585-X Adaptive Security Appliances with Next-Generation Firewall Services, IPS, and Global Threat Correlation Routing and Switching • Cisco Nexus 7000 Series • Cisco Nexus 2000 Series • Cisco ASR 1000 Series Unified Computing • Cisco UCS B200 Blade Servers • Cisco UCS C220 Rack Servers • Cisco UCS C240 Rack Servers Customer Case Study © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. C36-730874-00  02/14 Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Americas Headquarters Cisco Systems, Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems (USA) Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands