SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
EXECUTIVE SUMMARY
Company: The Polytechnic of Namibia
Industry: University
Location: Windhoek, Namibia
Students/Employees: 13,000 students,
1000–1500 faculty/staff
Challenge
• Prepare network for anticipated doubling of
student body size
• Strengthen network security against
increasing infections and attacks
• Simplify security implementations and
management for limited staff
Solution
• Cisco ASA 5585-X Series Next-Generation
Firewalls
• Cisco Identity Services Engine
• Cisco AnyConnect
Results
• Simplified integration of Cisco solutions with
planned roadmap
• Virtualized firewalls to ease and simplify
deployments
• Gained scalability to meet future needs
Challenge
Unlike traditional hacking targets such as financial institutions, universities are open
and inviting. Their faculty, staff, students, and visitors expect fast, easy access to
on-campus resources, as well as the ability to quickly connect their own devices
to the network. Faculty, in particular, has special needs, such as accessing other
universities’ systems. Unfortunately, that openness and accessibility often create
vulnerabilities in network security. These vulnerabilities could place university assets
– as well as those of students, faculty, staff, and guests themselves – at risk.
At The Polytechnic of Namibia, a 13,000-student university with 11 offices across
the country, Marco Maartens, network manager, says major network outages due to
virus infections and worms increased from one to several per year. More troubling,
however, was the trend he saw - prevalent in universities worldwide - toward
hackers using the university as a conduit to launch external attacks – the well-known
botnets.
“Universities in general are not known for securing themselves well, and we have
a lot of equipment available to serve very diverse needs. We’ve seen a rise in
instances where hackers invade our infrastructure, not to steal anything here, but to
use it to go after more valuable targets,” Maartens says.
The Polytechnic of Namibia has an IT staff of 60, with just five people, including
Maartens, focused on network security. In addition to addressing the growing threat
from outside hackers, Maartens’ team had to develop a roadmap to manage the
dramatic growth that the university predicts for the next several years.
The university will change its name in 2015 to Namibia University of Science &
Technology, and by 2017 expects to serve 20,000 students - almost twice as many
as are now enrolled. At least one more campus will be added, and the number
of faculty and staff will increase as well. For Maartens and his team, that means
thousands more users - and devices - to secure, while still maintaining the ease of
access that those users expect.
Growing University in Namibia
Moves to Next-Generation Security
1 © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Customer Case Study
Polytechnic of Namibia secures campuses and offices across
country with Cisco ASA 5585-X Series.
“Students are here to learn, and academics are here to give classes and to do
research. They’re not here to fiddle with patching machines and updating them
before they can connect,” says Maartens. “That’s why we need security measures
in place on the back end, so users don’t have to worry about it.”
Solution
The Polytechnic of Namibia began moving to end-to-end Cisco solutions about 10
years ago when the previous vendor stopped providing support. When Maartens
came on board about three years ago, he recognized the growing security threats
and the need for increased scalability. He began moving the university toward a
virtualized solution with two Cisco® ASA 5585-X Series Next-Generation Firewalls
supporting about 26 virtual firewalls.
The Cisco ASA 5585-X firewalls were the only such devices that Maartens could
find that had 10 GB/s throughput as well as a powerful and fully enabled intrusion
prevention system (IPS). The ASA appliances are partitioned into multiple virtual
devices, or security contexts. That effectively segments the network, so each faculty
member, as well as departments such as finance, has its own virtual firewall through
which all traffic passes.
The university is also in the midst of implementing Cisco Identity Services Engine
(ISE) to perform profiling and posture assessments before allowing access to the
network. “Right now, we fight fires one at a time, so for example, if someone adds
an infected machine to the network, we have to track where it is and disconnect it.
With ISE, it won’t get connected to begin with,” says Maartens, “in line with the goal
of providing seamless yet secure connectivity.”
ISE will be a key part of the university’s bring-your-own-device policy, which
provides unique levels of access for staff, students, and computer labs. His team
will be looking at how Cisco TrustSec® can provide role-based access for every
user and every device, from smartphones to printers and laptops, both wireless and
wired.
Results
Given his small staff, Maartens indicated that a key part of his decision to go with
Cisco solutions was the ease of implementation and support. “I only have nine staff
for network and telephony,” he says, “so I didn’t want to waste time trying to get
multiple vendors to integrate with each other. If I have a problem, I can just get on a
call with Cisco and get it resolved quickly.”
The need to save time also factored into Maartens’ decision to virtualize dozens
of firewalls from just two Cisco ASA 5585-X appliances. In fact, he says his entire
network design was based on that feature. “With the ASA, we don’t have to cable
up 20 boxes; we only have to cable up two. It’s obviously easier to manage that way,
and it takes a lot less time to test and monitor the cabling,” he says.
The ability to scale rapidly is also extremely important as the university continues to
grow. That point became clear recently when the university outsourced its printing
operations, which in the past would have been delayed six to eight weeks while a
new firewall appliance was procured and implemented. Instead, Maartens and his
team simply added another virtual firewall, which was ready in less than two days.
Customer Case Study
“We don’t have to change
our security policy to match
the Cisco hardware we
buy. The hardware does
what our security policies
demand, which is very
important to us.”
Marco Maartens
Network Manager
The Polytechnic of Namibia
2 © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Additionally, Maartens’ team can segment access to social media, such as
Facebook, according to user protocols, to further protect the network.
Implementing Cisco ISE will further strengthen the university’s network visibility
and control, with 802.1x port authentication capability for wired access, and
wireless access for mobile devices. In the future, Maartens says he will add
Cisco AnyConnect®, Cisco ASA Botnet Traffic Filter, and more advanced security
solutions, as well as rapidly expanding the number of wireless access points.
Maartens indicated that it makes his job easier to have one company with integrated
solutions that he can rely on. “We don’t have to change our security policy to
match the Cisco hardware we buy,” he says. “The hardware does what our security
policies demand, which is very important to us.”
For More Information
To find out more about the Cisco ASA-5585-X Next-Generation Firewall and other
Cisco Security products, go to:
http://www.cisco.com/go/asa
http://www.cisco.com/go/ise
http://www.cisco.com/go/anyconnect
http://www.cisco.com/go/ips
http://www.cisco.com/go/trustsec
PRODUCT LIST
Security
• Cisco ASA 5585-X Next-Generation Firewall
• Cisco Identity Services Engine
• Cisco AnyConnect
• Cisco Intrusion Prevention System (IPS)
• Cisco TrustSec
Data Center
• Cisco Nexus 5585UP
• Cisco UCS B-Series Blade Servers
Routers and Switches
• Cisco Nexus® 5585P
• Cisco ASR 1002 Routers
Wireless
• Cisco Flex® 7500 Series Wireless Controllers
• Cisco 3600, 3500, 1300 Series Access Points
Customer Case Study
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.	 C36-732194-00 07/14
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Americas Headquarters
Cisco Systems, Inc.
San Jose, CA
Asia Pacific Headquarters
Cisco Systems (USA) Pte. Ltd.
Singapore
Europe Headquarters
Cisco Systems International BV Amsterdam,
The Netherlands

Más contenido relacionado

La actualidad más candente

Iaona handbook for network security - draft rfc 0.4
Iaona   handbook for network security - draft rfc 0.4Iaona   handbook for network security - draft rfc 0.4
Iaona handbook for network security - draft rfc 0.4Ivan Carmona
 
Advice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT CybersecurityAdvice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT CybersecurityMighty Guides, Inc.
 
Cloud Encounters: Measuring the computing cloud
Cloud Encounters: Measuring the computing cloudCloud Encounters: Measuring the computing cloud
Cloud Encounters: Measuring the computing cloudPeter HJ van Eijk
 
Ohm2013 cloud security 101 slideshare
Ohm2013 cloud security 101 slideshareOhm2013 cloud security 101 slideshare
Ohm2013 cloud security 101 slidesharePeter HJ van Eijk
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...Yiannis Verginadis
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001PECB
 
Information flow control for secure cloud computing
Information flow control for secure cloud computingInformation flow control for secure cloud computing
Information flow control for secure cloud computingNexgen Technology
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC Advisory Group
 
Skyline Certificate of Completion
Skyline Certificate of CompletionSkyline Certificate of Completion
Skyline Certificate of CompletionChad Leggett
 
cloud-security
cloud-securitycloud-security
cloud-securityAsun Sada
 
Iaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloudIaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloudIaetsd Iaetsd
 
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...Tchelinux
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyNetworkCollaborators
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword EU Project
 
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote WorkforceClose the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforcejlieberman07
 
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1EnergySec
 
Reliable security in cloud computing environment 2-3-4-5-6
Reliable security in cloud computing environment 2-3-4-5-6Reliable security in cloud computing environment 2-3-4-5-6
Reliable security in cloud computing environment 2-3-4-5-6IAEME Publication
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceAustin Eppstein
 

La actualidad más candente (20)

Iaona handbook for network security - draft rfc 0.4
Iaona   handbook for network security - draft rfc 0.4Iaona   handbook for network security - draft rfc 0.4
Iaona handbook for network security - draft rfc 0.4
 
Advice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT CybersecurityAdvice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT Cybersecurity
 
Cloud Encounters: Measuring the computing cloud
Cloud Encounters: Measuring the computing cloudCloud Encounters: Measuring the computing cloud
Cloud Encounters: Measuring the computing cloud
 
Ohm2013 cloud security 101 slideshare
Ohm2013 cloud security 101 slideshareOhm2013 cloud security 101 slideshare
Ohm2013 cloud security 101 slideshare
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
Information flow control for secure cloud computing
Information flow control for secure cloud computingInformation flow control for secure cloud computing
Information flow control for secure cloud computing
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
 
Skyline Certificate of Completion
Skyline Certificate of CompletionSkyline Certificate of Completion
Skyline Certificate of Completion
 
cloud-security
cloud-securitycloud-security
cloud-security
 
Iaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloudIaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloud
 
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote WorkforceClose the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforce
 
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1
 
Reliable security in cloud computing environment 2-3-4-5-6
Reliable security in cloud computing environment 2-3-4-5-6Reliable security in cloud computing environment 2-3-4-5-6
Reliable security in cloud computing environment 2-3-4-5-6
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
 

Similar a The Polytechnic of Namibia

Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusCisco Security
 
UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsCisco Case Studies
 
Costruzioni Elettroniche Industriali Automatismi (CEIA) case study
Costruzioni Elettroniche Industriali Automatismi (CEIA) case studyCostruzioni Elettroniche Industriali Automatismi (CEIA) case study
Costruzioni Elettroniche Industriali Automatismi (CEIA) case studyCisco Case Studies
 
Australia's early adopters of network virtualization_Report
Australia's early adopters of network virtualization_ReportAustralia's early adopters of network virtualization_Report
Australia's early adopters of network virtualization_ReportBlake Douglas
 
Gobierno de Castilla la Mancha
Gobierno de Castilla la ManchaGobierno de Castilla la Mancha
Gobierno de Castilla la ManchaCisco Case Studies
 
Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataCisco Security
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksMighty Guides, Inc.
 
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
Tonight, March 5th – Class 7 (last class)   your test” on ICS.docxTonight, March 5th – Class 7 (last class)   your test” on ICS.docx
Tonight, March 5th – Class 7 (last class) your test” on ICS.docxturveycharlyn
 
Secure Data Center for Enterprise
Secure Data Center for EnterpriseSecure Data Center for Enterprise
Secure Data Center for EnterpriseCisco Russia
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 

Similar a The Polytechnic of Namibia (20)

Mondi Group
Mondi GroupMondi Group
Mondi Group
 
Marcegaglia Group
Marcegaglia GroupMarcegaglia Group
Marcegaglia Group
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
 
New Charter Housing Trust
New Charter Housing TrustNew Charter Housing Trust
New Charter Housing Trust
 
IntelAdapt
IntelAdaptIntelAdapt
IntelAdapt
 
UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated Solutions
 
Costruzioni Elettroniche Industriali Automatismi (CEIA) case study
Costruzioni Elettroniche Industriali Automatismi (CEIA) case studyCostruzioni Elettroniche Industriali Automatismi (CEIA) case study
Costruzioni Elettroniche Industriali Automatismi (CEIA) case study
 
Beachbody, LLC
Beachbody, LLCBeachbody, LLC
Beachbody, LLC
 
Datasheet
DatasheetDatasheet
Datasheet
 
University of Granada
University of Granada University of Granada
University of Granada
 
Ukrtransgaz
UkrtransgazUkrtransgaz
Ukrtransgaz
 
University of Granada
University of GranadaUniversity of Granada
University of Granada
 
Australia's early adopters of network virtualization_Report
Australia's early adopters of network virtualization_ReportAustralia's early adopters of network virtualization_Report
Australia's early adopters of network virtualization_Report
 
Gobierno de Castilla la Mancha
Gobierno de Castilla la ManchaGobierno de Castilla la Mancha
Gobierno de Castilla la Mancha
 
Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
 
Ministry of Foreign Affairs
Ministry of Foreign AffairsMinistry of Foreign Affairs
Ministry of Foreign Affairs
 
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
Tonight, March 5th – Class 7 (last class)   your test” on ICS.docxTonight, March 5th – Class 7 (last class)   your test” on ICS.docx
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
 
Secure Data Center for Enterprise
Secure Data Center for EnterpriseSecure Data Center for Enterprise
Secure Data Center for Enterprise
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 

Más de Cisco Case Studies (20)

Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_ENExpo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
 
Expo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_ITExpo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_IT
 
Seeberger
Seeberger Seeberger
Seeberger
 
Neotel
Neotel Neotel
Neotel
 
Il Gruppo Marcegaglia
Il Gruppo MarcegagliaIl Gruppo Marcegaglia
Il Gruppo Marcegaglia
 
SAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearwaySAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearway
 
AASTMT Case Study
AASTMT Case StudyAASTMT Case Study
AASTMT Case Study
 
Bauer
Bauer Bauer
Bauer
 
Universal Motors Agencies
Universal Motors AgenciesUniversal Motors Agencies
Universal Motors Agencies
 
Equitix
Equitix Equitix
Equitix
 
ScanPlus
ScanPlusScanPlus
ScanPlus
 
Odeabank Case Study
Odeabank Case StudyOdeabank Case Study
Odeabank Case Study
 
IBB Energie AG
IBB Energie AGIBB Energie AG
IBB Energie AG
 
Lufthansa Case Study
Lufthansa Case StudyLufthansa Case Study
Lufthansa Case Study
 
Schmitz Cargobull
Schmitz CargobullSchmitz Cargobull
Schmitz Cargobull
 
Mankiewicz Gebr & Co
Mankiewicz Gebr & Co Mankiewicz Gebr & Co
Mankiewicz Gebr & Co
 
Lomma Kommun
Lomma Kommun Lomma Kommun
Lomma Kommun
 
Skipton Building Society
Skipton Building SocietySkipton Building Society
Skipton Building Society
 
Anyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End UsersAnyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End Users
 
Rai Radio Televisione Italiana
Rai Radio Televisione ItalianaRai Radio Televisione Italiana
Rai Radio Televisione Italiana
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

The Polytechnic of Namibia

  • 1. EXECUTIVE SUMMARY Company: The Polytechnic of Namibia Industry: University Location: Windhoek, Namibia Students/Employees: 13,000 students, 1000–1500 faculty/staff Challenge • Prepare network for anticipated doubling of student body size • Strengthen network security against increasing infections and attacks • Simplify security implementations and management for limited staff Solution • Cisco ASA 5585-X Series Next-Generation Firewalls • Cisco Identity Services Engine • Cisco AnyConnect Results • Simplified integration of Cisco solutions with planned roadmap • Virtualized firewalls to ease and simplify deployments • Gained scalability to meet future needs Challenge Unlike traditional hacking targets such as financial institutions, universities are open and inviting. Their faculty, staff, students, and visitors expect fast, easy access to on-campus resources, as well as the ability to quickly connect their own devices to the network. Faculty, in particular, has special needs, such as accessing other universities’ systems. Unfortunately, that openness and accessibility often create vulnerabilities in network security. These vulnerabilities could place university assets – as well as those of students, faculty, staff, and guests themselves – at risk. At The Polytechnic of Namibia, a 13,000-student university with 11 offices across the country, Marco Maartens, network manager, says major network outages due to virus infections and worms increased from one to several per year. More troubling, however, was the trend he saw - prevalent in universities worldwide - toward hackers using the university as a conduit to launch external attacks – the well-known botnets. “Universities in general are not known for securing themselves well, and we have a lot of equipment available to serve very diverse needs. We’ve seen a rise in instances where hackers invade our infrastructure, not to steal anything here, but to use it to go after more valuable targets,” Maartens says. The Polytechnic of Namibia has an IT staff of 60, with just five people, including Maartens, focused on network security. In addition to addressing the growing threat from outside hackers, Maartens’ team had to develop a roadmap to manage the dramatic growth that the university predicts for the next several years. The university will change its name in 2015 to Namibia University of Science & Technology, and by 2017 expects to serve 20,000 students - almost twice as many as are now enrolled. At least one more campus will be added, and the number of faculty and staff will increase as well. For Maartens and his team, that means thousands more users - and devices - to secure, while still maintaining the ease of access that those users expect. Growing University in Namibia Moves to Next-Generation Security 1 © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Customer Case Study Polytechnic of Namibia secures campuses and offices across country with Cisco ASA 5585-X Series.
  • 2. “Students are here to learn, and academics are here to give classes and to do research. They’re not here to fiddle with patching machines and updating them before they can connect,” says Maartens. “That’s why we need security measures in place on the back end, so users don’t have to worry about it.” Solution The Polytechnic of Namibia began moving to end-to-end Cisco solutions about 10 years ago when the previous vendor stopped providing support. When Maartens came on board about three years ago, he recognized the growing security threats and the need for increased scalability. He began moving the university toward a virtualized solution with two Cisco® ASA 5585-X Series Next-Generation Firewalls supporting about 26 virtual firewalls. The Cisco ASA 5585-X firewalls were the only such devices that Maartens could find that had 10 GB/s throughput as well as a powerful and fully enabled intrusion prevention system (IPS). The ASA appliances are partitioned into multiple virtual devices, or security contexts. That effectively segments the network, so each faculty member, as well as departments such as finance, has its own virtual firewall through which all traffic passes. The university is also in the midst of implementing Cisco Identity Services Engine (ISE) to perform profiling and posture assessments before allowing access to the network. “Right now, we fight fires one at a time, so for example, if someone adds an infected machine to the network, we have to track where it is and disconnect it. With ISE, it won’t get connected to begin with,” says Maartens, “in line with the goal of providing seamless yet secure connectivity.” ISE will be a key part of the university’s bring-your-own-device policy, which provides unique levels of access for staff, students, and computer labs. His team will be looking at how Cisco TrustSec® can provide role-based access for every user and every device, from smartphones to printers and laptops, both wireless and wired. Results Given his small staff, Maartens indicated that a key part of his decision to go with Cisco solutions was the ease of implementation and support. “I only have nine staff for network and telephony,” he says, “so I didn’t want to waste time trying to get multiple vendors to integrate with each other. If I have a problem, I can just get on a call with Cisco and get it resolved quickly.” The need to save time also factored into Maartens’ decision to virtualize dozens of firewalls from just two Cisco ASA 5585-X appliances. In fact, he says his entire network design was based on that feature. “With the ASA, we don’t have to cable up 20 boxes; we only have to cable up two. It’s obviously easier to manage that way, and it takes a lot less time to test and monitor the cabling,” he says. The ability to scale rapidly is also extremely important as the university continues to grow. That point became clear recently when the university outsourced its printing operations, which in the past would have been delayed six to eight weeks while a new firewall appliance was procured and implemented. Instead, Maartens and his team simply added another virtual firewall, which was ready in less than two days. Customer Case Study “We don’t have to change our security policy to match the Cisco hardware we buy. The hardware does what our security policies demand, which is very important to us.” Marco Maartens Network Manager The Polytechnic of Namibia 2 © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
  • 3. Additionally, Maartens’ team can segment access to social media, such as Facebook, according to user protocols, to further protect the network. Implementing Cisco ISE will further strengthen the university’s network visibility and control, with 802.1x port authentication capability for wired access, and wireless access for mobile devices. In the future, Maartens says he will add Cisco AnyConnect®, Cisco ASA Botnet Traffic Filter, and more advanced security solutions, as well as rapidly expanding the number of wireless access points. Maartens indicated that it makes his job easier to have one company with integrated solutions that he can rely on. “We don’t have to change our security policy to match the Cisco hardware we buy,” he says. “The hardware does what our security policies demand, which is very important to us.” For More Information To find out more about the Cisco ASA-5585-X Next-Generation Firewall and other Cisco Security products, go to: http://www.cisco.com/go/asa http://www.cisco.com/go/ise http://www.cisco.com/go/anyconnect http://www.cisco.com/go/ips http://www.cisco.com/go/trustsec PRODUCT LIST Security • Cisco ASA 5585-X Next-Generation Firewall • Cisco Identity Services Engine • Cisco AnyConnect • Cisco Intrusion Prevention System (IPS) • Cisco TrustSec Data Center • Cisco Nexus 5585UP • Cisco UCS B-Series Blade Servers Routers and Switches • Cisco Nexus® 5585P • Cisco ASR 1002 Routers Wireless • Cisco Flex® 7500 Series Wireless Controllers • Cisco 3600, 3500, 1300 Series Access Points Customer Case Study © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. C36-732194-00 07/14 Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Americas Headquarters Cisco Systems, Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems (USA) Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands