SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Realizing Mobility with Device Flexibility                                                                        Customer Case Study




Cisco Medianet architecture helps Danish IT services company offer high-quality video
experience securely
                                                  Challenge
  EXECUTIVE SUMMARY
                                                  NNIT is a leading Danish IT services company, providing consultancy and
                                                  outsourcing to customers looking to make software applications, business
  Customer Name: NNIT
                                                  processes, and communication strategies more effective. It has an extensive
  Industry: Service provider                      customer base in industries such as life sciences, public and finance.
  Location: Copenhagen, Denmark (HQ)              In February 2012, the company moved into a custom-built, five-floor head office
  Number of Employees: More than 1800             in Copenhagen, bringing a business previously distributed across four buildings
                                                  under one roof. The new premises provides an interactive environment for 1300
  Challenge                                       employees, as well as facilities to showcase the technologies and architectures
  •	Increase employee efficiency and              that the company deploys for its customers.
    business opportunities by building
    optimal IT environment for secure             The move to the new building was a perfect opportunity for NNIT to construct an
    mobility and video collaboration              integrated network infrastructure that would cohesively deliver wired and wireless
  Solution                                        services, and be accessible to the wide variety of mobile devices typically used in
  •	Cisco Borderless Network, with                today’s high-tech business environment.
    Medianet, Secure-X, and CleanAir
                                                  Security was paramount: NNIT is part of the pharmaceutical giant Novo Nordisk
    capabilities
                                                  A/S and, because it shares a data network with the parent company, it is subject
  •	Cisco Identity Services Engine for            to stringent compliance. The network’s ability to deliver high‑definition (HD) video
    consistent security policy enforcement
    across wired and wireless domains
                                                  conferencing was also a priority. The new NNIT building houses a 1500-person
                                                  conference center and live broadcast capability, a meeting center with HD video
  Results                                         access for 80 people, and 25 regular meeting rooms that are also wired for
  •	Optimized HD video streaming for              HD video.
    improved collaboration between
    international offices and with clients        The company makes extensive internal use of video; its project teams and support
  •	Greater control of wireless devices for
                                                  professionals in Copenhagen collaborate regularly with colleagues in the company’s
    increased productivity and compliance         global offices in the United States, China, the Philippines, Switzerland, and the Czech
    while reducing IT management costs            Republic. And video is an increasingly important factor in external communication with
  •	Automatic detection of rogue devices          customers and partners too.
    and wireless interference for greater
                                                  NNIT needed an infrastructure that would support this degree of collaboration. This
    security and availability
                                                  was vital to the highest possible standard of user experience, and savings on travel
                                                  costs, while getting customer propositions to market more quickly and efficiently.




© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.		                             Page 1 of 4
Customer Case Study


“With video playing such                             Solution
 an important role in                                NNIT approached Cisco with the aim of creating an efficient, manageable, and
                                                     consolidated IT environment based on the latest proven network technologies and
 collaboration on joint
                                                     reference architectures. The intent was that this environment would also provide
 bids, the ability offered by                        a platform for demonstrating the benefits of those technologies for customers in
 Medianet to automatically                           the future.
 differentiate between
                                                     “We have a long-term partnership with Cisco, so the vision of a technology
 video streams and reserve                           showcase as a joint venture, reflecting the variety of technologies and devices
 and allocate bandwidth to                           used by our customers, was very compelling,” says Jens Barnow, vice president,
 preserve picture quality is                         infrastructure application services at NNIT.
 critical to success.”                               NNIT implemented a Cisco® Borderless Network, a transformative concept that
                                                     addresses the traditional restrictions of fixed environments by allowing mobile
Jens Barnow                                          workers to remain securely connected to their core applications and services, without
Vice President Infrastructure Application Services   interruption, regardless of the device they are using or their shifting location. “Our aim
NNIT
                                                     was to have a stable, well-suited network using the latest breakthrough features,”
                                                     says Barnow, “which also promoted staff mobility, video collaboration, and a growing
                                                     number of high-tech users in a bring your own device [BYOD] environment.”

                                                     Over that Borderless Network architecture, NNIT HD video deployment is benefiting
                                                     from Cisco Medianet. Designed to automate the deployment, management, and
                                                     troubleshooting aspects of video communications, Medianet is particularly important
                                                     for prioritizing different data streams. “With video playing such an important role in
                                                     collaboration on joint bids, the ability offered by Medianet to automatically differentiate
                                                     between video streams and reserve and allocate bandwidth to preserve picture quality
                                                     is critical to success,” says Barnow.

                                                     The solution comprises Cisco Catalyst® 3750 and 6500 Series Switches, and Cisco
                                                     Aironet® 3500 Series Access Points with Cisco CleanAir® technology, along with
                                                     5500 Series Wireless Controllers. It delivers bandwidths of 1Gbps to the desktop
                                                     and 400Mbps to wireless devices.

                                                     Functionality in the Cisco Catalyst switches is fundamental to delivering the standards
                                                     of network security, availability, and management required by NNIT. At its center is
                                                     Cisco Secure-X, providing safe connection of users’ own devices to the corporate
                                                     network. With BYOD increasingly common among many NNIT customers, and in
                                                     keeping with NNIT internal policy, Cisco Secure-X enforces digital certification and
                                                     authentication, and compliance with industry-specific regulations.

                                                     The Cisco Borderless Network concept brings management of fixed and mobile
                                                     devices together for the first time, providing a common set of enforcement tools and
                                                     a simpler management approach. The Cisco Identity Services Engine (ISE), a core
                                                     element of Secure-X, provides a context-aware security policy that automates the
                                                     compliance process as well as streamlines service delivery.

                                                     As a unified control point, ISE provides an extra layer of security between the device
                                                     and the network, checking the profile of the device for a valid digital certificate and
                                                     user privileges before allowing it to log-in to the network. With ISE, employees can
                                                     work anywhere, as long as they are using an approved device.

                                                     “ISE provides an excellent overview of the state of the network and allows us to
                                                     demonstrate to our customers what happens when a device is not compliant,”
                                                     says Thomas Laurids Pedersen, manager, customer networks at NNIT. “This is
                                                     about being more in control, with everything now managed from the same set of
                                                     enforcement parameters. Our internal deployment is itself a great case study on
                                                     how to deploy a secure wireless network.”




© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.		                                  Page 2 of 4
Customer Case Study


“This is about being more in                      Like many high-tech companies, NNIT has brought wireless to the center of its
 control, with everything now                     networking strategy. The Cisco CleanAir technology supports this evolution by
                                                  actively mitigating potential sources of Wi-Fi interference before wireless network
 managed from the same set                        performance starts to degrade.
 of enforcement parameters.
 Our internal deployment                          Results
 is itself a great case study                     In its former premises, NNIT could not efficiently manage the use of wireless
                                                  devices. An attempt was made unsuccessfully to implement wireless security
 on how to deploy a secure                        enforcement as an add-on to the wired network. In contrast, the NNIT integrated
 wireless network.”                               wireless strategy in the new building is already delivering important benefits. For
                                                  example, unauthorized devices are denied access to the network, and thanks to the
Thomas Laurids Pedersen                           comprehensive ISE functionality, the IT department can respond much more easily
Manager Customer Networks                         and efficiently to changes.
NNIT
                                                  “We now have a network that recognizes individual devices, and that’s allowed us
                                                  to authorize some specific platforms to access the network. And we have seen no
                                                  problems with integrating them,” says Barnow. “It’s a great relief that we can plan
                                                  ahead with the reality of a common network and a common experience for all our
                                                  users and customers. It’s a great solution, in terms of management and functionality.”

                                                  Identifying and locating rogue wireless devices and Wi-Fi interferers was also an
                                                  issue in the old building, particularly when employees introduced potentially disruptive
                                                  appliances that the IT department did not know about, or moved devices to a new
                                                  spot. Thanks to Cisco CleanAir technology, the network identifies potential interference
                                                  and changes the radio frequency without any service deterioration or interruption.

                                                  NNIT is still at an early stage in exploiting the deeper business benefits of its Cisco
                                                  Borderless Network architecture, but in the near future sees it as providing an exciting
                                                  platform for demonstrating best practice to existing and potential customers.

                                                  “Already, the response from our customers has been very positive, and they are
                                                  asking for quotes on projects that involve many aspects of our Borderless Network
                                                  deployment,” says Barnow. “It’s helping to differentiate our services and show how
                                                  elements of the network’s functionality can meet different needs. Our customers can
                                                  see it’s a good product and something to build on for the future.”

                                                  Perhaps the most visible benefit, however, has been the improvement in the delivery
                                                  of video services to the desktop and the conference suites. Previously, the IT team
                                                  was unable to prioritize video streams without knowing the IP addresses of the video
                                                  end-points and manually configuring ports on the LAN switches. Fluctuations in
                                                  bandwidth availability often led to problems with call set-up and videos freezing in
                                                  mid-play.

                                                  With Medianet, this problem has been eradicated, a requirement that was essential
                                                  for projects requiring collaboration between NNIT international offices. Employees can
                                                  now communicate with each other around the world with the ease of room-to-room
                                                  conversation. And the reporting function provided by the ISE is another highly-visible
                                                  demonstration of how effectively the Cisco Borderless Network Architecture can be
                                                  used to satisfy regulatory compliance, while also enabling the smooth delivery of
                                                  business-critical multimedia applications




© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.		                             Page 3 of 4
Customer Case Study


                                                                  For More Information
                                                                  For further information on the Cisco architectures and solutions featured within this
                                                                  case study, please go to: www.cisco.com/go/borderless


                                                                  Product List
                                                                  Switching
                                                                  •	Cisco Catalyst 3750 and 6500 Series Switches for Secure-X security framework
                                                                  Wireless
                                                                  •	Cisco Aironet 3500 Series Access Points with CleanAir technology
                                                                  •	Cisco 5500 Series Wireless Controller
                                                                  Management
                                                                  •	Cisco Identity Services Engine




Americas Headquarters                                   Asia Pacific Headquarters                      Europe Headquarters
Cisco Systems, Inc.                                     Cisco Systems (USA) Pte. Ltd.                  Cisco Systems International BV Amsterdam,
San Jose, CA                                            Singapore                                      The Netherlands

Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go
to this URL: www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (1110R)

© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.	   Printed in the UK	          ES/0712	                Page 4 of 4

Weitere ähnliche Inhalte

Andere mochten auch

E2 neannapa khajornmot presentation_29-11-09-2
E2 neannapa  khajornmot presentation_29-11-09-2E2 neannapa  khajornmot presentation_29-11-09-2
E2 neannapa khajornmot presentation_29-11-09-2Neannapa Khajornmot
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...FLUZO
 
Roster nurul walidaini
Roster nurul walidainiRoster nurul walidaini
Roster nurul walidainiArya Ningrat
 
Taylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zipTaylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zipRita_E
 
Bertamasya ke banda
Bertamasya ke bandaBertamasya ke banda
Bertamasya ke bandaArya Ningrat
 
2012 colloque mobilecréation-nova
2012 colloque mobilecréation-nova2012 colloque mobilecréation-nova
2012 colloque mobilecréation-novaMobileCreation
 
Privacy & Analytics: Yeti or Snow Fairy?
Privacy & Analytics: Yeti or Snow Fairy?Privacy & Analytics: Yeti or Snow Fairy?
Privacy & Analytics: Yeti or Snow Fairy?FLUZO
 
ทบทวนการประเมินภายนอกรอบสอง
ทบทวนการประเมินภายนอกรอบสองทบทวนการประเมินภายนอกรอบสอง
ทบทวนการประเมินภายนอกรอบสองStrisuksa Roi-Et
 
Batey Portfolio
Batey PortfolioBatey Portfolio
Batey Portfoliofrbatey
 
Ida ketik pengaruh tv terhadap anak
Ida ketik  pengaruh tv terhadap anakIda ketik  pengaruh tv terhadap anak
Ida ketik pengaruh tv terhadap anakArya Ningrat
 

Andere mochten auch (13)

E2 neannapa khajornmot presentation_29-11-09-2
E2 neannapa  khajornmot presentation_29-11-09-2E2 neannapa  khajornmot presentation_29-11-09-2
E2 neannapa khajornmot presentation_29-11-09-2
 
Rpp bio vii smt 2
Rpp bio vii smt 2Rpp bio vii smt 2
Rpp bio vii smt 2
 
Kelompok 9
Kelompok 9Kelompok 9
Kelompok 9
 
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
Smarter comm"The Future of Privacy". Aurélie Pols at IBM Smarter Commerce Glo...
 
Roster nurul walidaini
Roster nurul walidainiRoster nurul walidaini
Roster nurul walidaini
 
Taylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zipTaylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zip
 
Bertamasya ke banda
Bertamasya ke bandaBertamasya ke banda
Bertamasya ke banda
 
2012 colloque mobilecréation-nova
2012 colloque mobilecréation-nova2012 colloque mobilecréation-nova
2012 colloque mobilecréation-nova
 
Privacy & Analytics: Yeti or Snow Fairy?
Privacy & Analytics: Yeti or Snow Fairy?Privacy & Analytics: Yeti or Snow Fairy?
Privacy & Analytics: Yeti or Snow Fairy?
 
ทบทวนการประเมินภายนอกรอบสอง
ทบทวนการประเมินภายนอกรอบสองทบทวนการประเมินภายนอกรอบสอง
ทบทวนการประเมินภายนอกรอบสอง
 
Plasma e2 24-01-53
Plasma e2 24-01-53Plasma e2 24-01-53
Plasma e2 24-01-53
 
Batey Portfolio
Batey PortfolioBatey Portfolio
Batey Portfolio
 
Ida ketik pengaruh tv terhadap anak
Ida ketik  pengaruh tv terhadap anakIda ketik  pengaruh tv terhadap anak
Ida ketik pengaruh tv terhadap anak
 

Mehr von Cisco Security

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityCisco Security
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco Security
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Cisco Security
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkCisco Security
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation FirewallCisco Security
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsCisco Security
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityCisco Security
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and PerformanceCisco Security
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicCisco Security
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security ChallengesCisco Security
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyCisco Security
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of InactivityCisco Security
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityCisco Security
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security StrategiesCisco Security
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardCisco Security
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Cisco Security
 

Mehr von Cisco Security (20)

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 

Kürzlich hochgeladen

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Kürzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

[Case Study] Realizing Mobility with Device Flexibility

  • 1. Realizing Mobility with Device Flexibility Customer Case Study Cisco Medianet architecture helps Danish IT services company offer high-quality video experience securely Challenge EXECUTIVE SUMMARY NNIT is a leading Danish IT services company, providing consultancy and outsourcing to customers looking to make software applications, business Customer Name: NNIT processes, and communication strategies more effective. It has an extensive Industry: Service provider customer base in industries such as life sciences, public and finance. Location: Copenhagen, Denmark (HQ) In February 2012, the company moved into a custom-built, five-floor head office Number of Employees: More than 1800 in Copenhagen, bringing a business previously distributed across four buildings under one roof. The new premises provides an interactive environment for 1300 Challenge employees, as well as facilities to showcase the technologies and architectures • Increase employee efficiency and that the company deploys for its customers. business opportunities by building optimal IT environment for secure The move to the new building was a perfect opportunity for NNIT to construct an mobility and video collaboration integrated network infrastructure that would cohesively deliver wired and wireless Solution services, and be accessible to the wide variety of mobile devices typically used in • Cisco Borderless Network, with today’s high-tech business environment. Medianet, Secure-X, and CleanAir Security was paramount: NNIT is part of the pharmaceutical giant Novo Nordisk capabilities A/S and, because it shares a data network with the parent company, it is subject • Cisco Identity Services Engine for to stringent compliance. The network’s ability to deliver high‑definition (HD) video consistent security policy enforcement across wired and wireless domains conferencing was also a priority. The new NNIT building houses a 1500-person conference center and live broadcast capability, a meeting center with HD video Results access for 80 people, and 25 regular meeting rooms that are also wired for • Optimized HD video streaming for HD video. improved collaboration between international offices and with clients The company makes extensive internal use of video; its project teams and support • Greater control of wireless devices for professionals in Copenhagen collaborate regularly with colleagues in the company’s increased productivity and compliance global offices in the United States, China, the Philippines, Switzerland, and the Czech while reducing IT management costs Republic. And video is an increasingly important factor in external communication with • Automatic detection of rogue devices customers and partners too. and wireless interference for greater NNIT needed an infrastructure that would support this degree of collaboration. This security and availability was vital to the highest possible standard of user experience, and savings on travel costs, while getting customer propositions to market more quickly and efficiently. © 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 4
  • 2. Customer Case Study “With video playing such Solution an important role in NNIT approached Cisco with the aim of creating an efficient, manageable, and consolidated IT environment based on the latest proven network technologies and collaboration on joint reference architectures. The intent was that this environment would also provide bids, the ability offered by a platform for demonstrating the benefits of those technologies for customers in Medianet to automatically the future. differentiate between “We have a long-term partnership with Cisco, so the vision of a technology video streams and reserve showcase as a joint venture, reflecting the variety of technologies and devices and allocate bandwidth to used by our customers, was very compelling,” says Jens Barnow, vice president, preserve picture quality is infrastructure application services at NNIT. critical to success.” NNIT implemented a Cisco® Borderless Network, a transformative concept that addresses the traditional restrictions of fixed environments by allowing mobile Jens Barnow workers to remain securely connected to their core applications and services, without Vice President Infrastructure Application Services interruption, regardless of the device they are using or their shifting location. “Our aim NNIT was to have a stable, well-suited network using the latest breakthrough features,” says Barnow, “which also promoted staff mobility, video collaboration, and a growing number of high-tech users in a bring your own device [BYOD] environment.” Over that Borderless Network architecture, NNIT HD video deployment is benefiting from Cisco Medianet. Designed to automate the deployment, management, and troubleshooting aspects of video communications, Medianet is particularly important for prioritizing different data streams. “With video playing such an important role in collaboration on joint bids, the ability offered by Medianet to automatically differentiate between video streams and reserve and allocate bandwidth to preserve picture quality is critical to success,” says Barnow. The solution comprises Cisco Catalyst® 3750 and 6500 Series Switches, and Cisco Aironet® 3500 Series Access Points with Cisco CleanAir® technology, along with 5500 Series Wireless Controllers. It delivers bandwidths of 1Gbps to the desktop and 400Mbps to wireless devices. Functionality in the Cisco Catalyst switches is fundamental to delivering the standards of network security, availability, and management required by NNIT. At its center is Cisco Secure-X, providing safe connection of users’ own devices to the corporate network. With BYOD increasingly common among many NNIT customers, and in keeping with NNIT internal policy, Cisco Secure-X enforces digital certification and authentication, and compliance with industry-specific regulations. The Cisco Borderless Network concept brings management of fixed and mobile devices together for the first time, providing a common set of enforcement tools and a simpler management approach. The Cisco Identity Services Engine (ISE), a core element of Secure-X, provides a context-aware security policy that automates the compliance process as well as streamlines service delivery. As a unified control point, ISE provides an extra layer of security between the device and the network, checking the profile of the device for a valid digital certificate and user privileges before allowing it to log-in to the network. With ISE, employees can work anywhere, as long as they are using an approved device. “ISE provides an excellent overview of the state of the network and allows us to demonstrate to our customers what happens when a device is not compliant,” says Thomas Laurids Pedersen, manager, customer networks at NNIT. “This is about being more in control, with everything now managed from the same set of enforcement parameters. Our internal deployment is itself a great case study on how to deploy a secure wireless network.” © 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 4
  • 3. Customer Case Study “This is about being more in Like many high-tech companies, NNIT has brought wireless to the center of its control, with everything now networking strategy. The Cisco CleanAir technology supports this evolution by actively mitigating potential sources of Wi-Fi interference before wireless network managed from the same set performance starts to degrade. of enforcement parameters. Our internal deployment Results is itself a great case study In its former premises, NNIT could not efficiently manage the use of wireless devices. An attempt was made unsuccessfully to implement wireless security on how to deploy a secure enforcement as an add-on to the wired network. In contrast, the NNIT integrated wireless network.” wireless strategy in the new building is already delivering important benefits. For example, unauthorized devices are denied access to the network, and thanks to the Thomas Laurids Pedersen comprehensive ISE functionality, the IT department can respond much more easily Manager Customer Networks and efficiently to changes. NNIT “We now have a network that recognizes individual devices, and that’s allowed us to authorize some specific platforms to access the network. And we have seen no problems with integrating them,” says Barnow. “It’s a great relief that we can plan ahead with the reality of a common network and a common experience for all our users and customers. It’s a great solution, in terms of management and functionality.” Identifying and locating rogue wireless devices and Wi-Fi interferers was also an issue in the old building, particularly when employees introduced potentially disruptive appliances that the IT department did not know about, or moved devices to a new spot. Thanks to Cisco CleanAir technology, the network identifies potential interference and changes the radio frequency without any service deterioration or interruption. NNIT is still at an early stage in exploiting the deeper business benefits of its Cisco Borderless Network architecture, but in the near future sees it as providing an exciting platform for demonstrating best practice to existing and potential customers. “Already, the response from our customers has been very positive, and they are asking for quotes on projects that involve many aspects of our Borderless Network deployment,” says Barnow. “It’s helping to differentiate our services and show how elements of the network’s functionality can meet different needs. Our customers can see it’s a good product and something to build on for the future.” Perhaps the most visible benefit, however, has been the improvement in the delivery of video services to the desktop and the conference suites. Previously, the IT team was unable to prioritize video streams without knowing the IP addresses of the video end-points and manually configuring ports on the LAN switches. Fluctuations in bandwidth availability often led to problems with call set-up and videos freezing in mid-play. With Medianet, this problem has been eradicated, a requirement that was essential for projects requiring collaboration between NNIT international offices. Employees can now communicate with each other around the world with the ease of room-to-room conversation. And the reporting function provided by the ISE is another highly-visible demonstration of how effectively the Cisco Borderless Network Architecture can be used to satisfy regulatory compliance, while also enabling the smooth delivery of business-critical multimedia applications © 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 4
  • 4. Customer Case Study For More Information For further information on the Cisco architectures and solutions featured within this case study, please go to: www.cisco.com/go/borderless Product List Switching • Cisco Catalyst 3750 and 6500 Series Switches for Secure-X security framework Wireless • Cisco Aironet 3500 Series Access Points with CleanAir technology • Cisco 5500 Series Wireless Controller Management • Cisco Identity Services Engine Americas Headquarters Asia Pacific Headquarters Europe Headquarters Cisco Systems, Inc. Cisco Systems (USA) Pte. Ltd. Cisco Systems International BV Amsterdam, San Jose, CA Singapore The Netherlands Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) © 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Printed in the UK ES/0712 Page 4 of 4