SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
EXECUTIVE SUMMARY
Company: The Polytechnic of Namibia
Industry: University
Location: Windhoek, Namibia
Students/Employees: 13,000 students,
1000–1500 faculty/staff
Challenge
• Prepare network for anticipated doubling of
student body size
• Strengthen network security against
increasing infections and attacks
• Simplify security implementations and
management for limited staff
Solution
• Cisco ASA 5585-X Series Next-Generation
Firewalls
• Cisco Identity Services Engine
• Cisco AnyConnect
Results
• Simplified integration of Cisco solutions with
planned roadmap
• Virtualized firewalls to ease and simplify
deployments
• Gained scalability to meet future needs
Challenge
Unlike traditional hacking targets such as financial institutions, universities are open
and inviting. Their faculty, staff, students, and visitors expect fast, easy access to
on-campus resources, as well as the ability to quickly connect their own devices
to the network. Faculty, in particular, has special needs, such as accessing other
universities’ systems. Unfortunately, that openness and accessibility often create
vulnerabilities in network security. These vulnerabilities could place university assets
– as well as those of students, faculty, staff, and guests themselves – at risk.
At The Polytechnic of Namibia, a 13,000-student university with 11 offices across
the country, Marco Maartens, network manager, says major network outages due to
virus infections and worms increased from one to several per year. More troubling,
however, was the trend he saw - prevalent in universities worldwide - toward
hackers using the university as a conduit to launch external attacks – the well-known
botnets.
“Universities in general are not known for securing themselves well, and we have
a lot of equipment available to serve very diverse needs. We’ve seen a rise in
instances where hackers invade our infrastructure, not to steal anything here, but to
use it to go after more valuable targets,” Maartens says.
The Polytechnic of Namibia has an IT staff of 60, with just five people, including
Maartens, focused on network security. In addition to addressing the growing threat
from outside hackers, Maartens’ team had to develop a roadmap to manage the
dramatic growth that the university predicts for the next several years.
The university will change its name in 2015 to Namibia University of Science &
Technology, and by 2017 expects to serve 20,000 students - almost twice as many
as are now enrolled. At least one more campus will be added, and the number
of faculty and staff will increase as well. For Maartens and his team, that means
thousands more users - and devices - to secure, while still maintaining the ease of
access that those users expect.
Growing University in Namibia
Moves to Next-Generation Security
1 © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Customer Case Study
Polytechnic of Namibia secures campuses and offices across
country with Cisco ASA 5585-X Series.
“Students are here to learn, and academics are here to give classes and to do
research. They’re not here to fiddle with patching machines and updating them
before they can connect,” says Maartens. “That’s why we need security measures
in place on the back end, so users don’t have to worry about it.”
Solution
The Polytechnic of Namibia began moving to end-to-end Cisco solutions about 10
years ago when the previous vendor stopped providing support. When Maartens
came on board about three years ago, he recognized the growing security threats
and the need for increased scalability. He began moving the university toward a
virtualized solution with two Cisco® ASA 5585-X Series Next-Generation Firewalls
supporting about 26 virtual firewalls.
The Cisco ASA 5585-X firewalls were the only such devices that Maartens could
find that had 10 GB/s throughput as well as a powerful and fully enabled intrusion
prevention system (IPS). The ASA appliances are partitioned into multiple virtual
devices, or security contexts. That effectively segments the network, so each faculty
member, as well as departments such as finance, has its own virtual firewall through
which all traffic passes.
The university is also in the midst of implementing Cisco Identity Services Engine
(ISE) to perform profiling and posture assessments before allowing access to the
network. “Right now, we fight fires one at a time, so for example, if someone adds
an infected machine to the network, we have to track where it is and disconnect it.
With ISE, it won’t get connected to begin with,” says Maartens, “in line with the goal
of providing seamless yet secure connectivity.”
ISE will be a key part of the university’s bring-your-own-device policy, which
provides unique levels of access for staff, students, and computer labs. His team
will be looking at how Cisco TrustSec® can provide role-based access for every
user and every device, from smartphones to printers and laptops, both wireless and
wired.
Results
Given his small staff, Maartens indicated that a key part of his decision to go with
Cisco solutions was the ease of implementation and support. “I only have nine staff
for network and telephony,” he says, “so I didn’t want to waste time trying to get
multiple vendors to integrate with each other. If I have a problem, I can just get on a
call with Cisco and get it resolved quickly.”
The need to save time also factored into Maartens’ decision to virtualize dozens
of firewalls from just two Cisco ASA 5585-X appliances. In fact, he says his entire
network design was based on that feature. “With the ASA, we don’t have to cable
up 20 boxes; we only have to cable up two. It’s obviously easier to manage that way,
and it takes a lot less time to test and monitor the cabling,” he says.
The ability to scale rapidly is also extremely important as the university continues to
grow. That point became clear recently when the university outsourced its printing
operations, which in the past would have been delayed six to eight weeks while a
new firewall appliance was procured and implemented. Instead, Maartens and his
team simply added another virtual firewall, which was ready in less than two days.
Customer Case Study
“We don’t have to change
our security policy to match
the Cisco hardware we
buy. The hardware does
what our security policies
demand, which is very
important to us.”
Marco Maartens
Network Manager
The Polytechnic of Namibia
2 © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Additionally, Maartens’ team can segment access to social media, such as
Facebook, according to user protocols, to further protect the network.
Implementing Cisco ISE will further strengthen the university’s network visibility
and control, with 802.1x port authentication capability for wired access, and
wireless access for mobile devices. In the future, Maartens says he will add
Cisco AnyConnect®, Cisco ASA Botnet Traffic Filter, and more advanced security
solutions, as well as rapidly expanding the number of wireless access points.
Maartens indicated that it makes his job easier to have one company with integrated
solutions that he can rely on. “We don’t have to change our security policy to
match the Cisco hardware we buy,” he says. “The hardware does what our security
policies demand, which is very important to us.”
For More Information
To find out more about the Cisco ASA-5585-X Next-Generation Firewall and other
Cisco Security products, go to:
http://www.cisco.com/go/asa
http://www.cisco.com/go/ise
http://www.cisco.com/go/anyconnect
http://www.cisco.com/go/ips
http://www.cisco.com/go/trustsec
PRODUCT LIST
Security
• Cisco ASA 5585-X Next-Generation Firewall
• Cisco Identity Services Engine
• Cisco AnyConnect
• Cisco Intrusion Prevention System (IPS)
• Cisco TrustSec
Data Center
• Cisco Nexus 5585UP
• Cisco UCS B-Series Blade Servers
Routers and Switches
• Cisco Nexus® 5585P
• Cisco ASR 1002 Routers
Wireless
• Cisco Flex® 7500 Series Wireless Controllers
• Cisco 3600, 3500, 1300 Series Access Points
Customer Case Study
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.	 C36-732194-00 07/14
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Americas Headquarters
Cisco Systems, Inc.
San Jose, CA
Asia Pacific Headquarters
Cisco Systems (USA) Pte. Ltd.
Singapore
Europe Headquarters
Cisco Systems International BV Amsterdam,
The Netherlands

Weitere ähnliche Inhalte

Was ist angesagt?

Iaona handbook for network security - draft rfc 0.4
Iaona   handbook for network security - draft rfc 0.4Iaona   handbook for network security - draft rfc 0.4
Iaona handbook for network security - draft rfc 0.4Ivan Carmona
 
Advice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT CybersecurityAdvice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT CybersecurityMighty Guides, Inc.
 
Cloud Encounters: Measuring the computing cloud
Cloud Encounters: Measuring the computing cloudCloud Encounters: Measuring the computing cloud
Cloud Encounters: Measuring the computing cloudPeter HJ van Eijk
 
Ohm2013 cloud security 101 slideshare
Ohm2013 cloud security 101 slideshareOhm2013 cloud security 101 slideshare
Ohm2013 cloud security 101 slidesharePeter HJ van Eijk
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...Yiannis Verginadis
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...IAEME Publication
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001PECB
 
Information flow control for secure cloud computing
Information flow control for secure cloud computingInformation flow control for secure cloud computing
Information flow control for secure cloud computingNexgen Technology
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC Advisory Group
 
Skyline Certificate of Completion
Skyline Certificate of CompletionSkyline Certificate of Completion
Skyline Certificate of CompletionChad Leggett
 
cloud-security
cloud-securitycloud-security
cloud-securityAsun Sada
 
Iaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloudIaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloudIaetsd Iaetsd
 
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...Tchelinux
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyNetworkCollaborators
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword EU Project
 
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote WorkforceClose the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforcejlieberman07
 
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1EnergySec
 
Reliable security in cloud computing environment 2-3-4-5-6
Reliable security in cloud computing environment 2-3-4-5-6Reliable security in cloud computing environment 2-3-4-5-6
Reliable security in cloud computing environment 2-3-4-5-6IAEME Publication
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceAustin Eppstein
 

Was ist angesagt? (20)

Iaona handbook for network security - draft rfc 0.4
Iaona   handbook for network security - draft rfc 0.4Iaona   handbook for network security - draft rfc 0.4
Iaona handbook for network security - draft rfc 0.4
 
Advice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT CybersecurityAdvice for CISOs: How to Approach OT Cybersecurity
Advice for CISOs: How to Approach OT Cybersecurity
 
Cloud Encounters: Measuring the computing cloud
Cloud Encounters: Measuring the computing cloudCloud Encounters: Measuring the computing cloud
Cloud Encounters: Measuring the computing cloud
 
Ohm2013 cloud security 101 slideshare
Ohm2013 cloud security 101 slideshareOhm2013 cloud security 101 slideshare
Ohm2013 cloud security 101 slideshare
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 
Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...Investigative analysis of security issues and challenges in cloud computing a...
Investigative analysis of security issues and challenges in cloud computing a...
 
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah Sheikh
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
Information flow control for secure cloud computing
Information flow control for secure cloud computingInformation flow control for secure cloud computing
Information flow control for secure cloud computing
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
 
Skyline Certificate of Completion
Skyline Certificate of CompletionSkyline Certificate of Completion
Skyline Certificate of Completion
 
cloud-security
cloud-securitycloud-security
cloud-security
 
Iaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloudIaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloud
 
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
Ethical Hacking - Ferramentas Open Source para Pentest - Mateus Buogo - Tchel...
 
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity StrategyCisco Connect 2018 Indonesia - Cybersecurity Strategy
Cisco Connect 2018 Indonesia - Cybersecurity Strategy
 
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
 
Close the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote WorkforceClose the Security Gaps of a Remote Workforce
Close the Security Gaps of a Remote Workforce
 
Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1Cybersecurity for Control Systems: Current State and Future Vision pt.1
Cybersecurity for Control Systems: Current State and Future Vision pt.1
 
Reliable security in cloud computing environment 2-3-4-5-6
Reliable security in cloud computing environment 2-3-4-5-6Reliable security in cloud computing environment 2-3-4-5-6
Reliable security in cloud computing environment 2-3-4-5-6
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
 

Ähnlich wie The Polytechnic of Namibia

Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusCisco Security
 
UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsCisco Case Studies
 
Costruzioni Elettroniche Industriali Automatismi (CEIA) case study
Costruzioni Elettroniche Industriali Automatismi (CEIA) case studyCostruzioni Elettroniche Industriali Automatismi (CEIA) case study
Costruzioni Elettroniche Industriali Automatismi (CEIA) case studyCisco Case Studies
 
Australia's early adopters of network virtualization_Report
Australia's early adopters of network virtualization_ReportAustralia's early adopters of network virtualization_Report
Australia's early adopters of network virtualization_ReportBlake Douglas
 
Gobierno de Castilla la Mancha
Gobierno de Castilla la ManchaGobierno de Castilla la Mancha
Gobierno de Castilla la ManchaCisco Case Studies
 
Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataCisco Security
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksMighty Guides, Inc.
 
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
Tonight, March 5th – Class 7 (last class)   your test” on ICS.docxTonight, March 5th – Class 7 (last class)   your test” on ICS.docx
Tonight, March 5th – Class 7 (last class) your test” on ICS.docxturveycharlyn
 
Secure Data Center for Enterprise
Secure Data Center for EnterpriseSecure Data Center for Enterprise
Secure Data Center for EnterpriseCisco Russia
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 

Ähnlich wie The Polytechnic of Namibia (20)

Mondi Group
Mondi GroupMondi Group
Mondi Group
 
Marcegaglia Group
Marcegaglia GroupMarcegaglia Group
Marcegaglia Group
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
 
New Charter Housing Trust
New Charter Housing TrustNew Charter Housing Trust
New Charter Housing Trust
 
IntelAdapt
IntelAdaptIntelAdapt
IntelAdapt
 
UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated Solutions
 
Costruzioni Elettroniche Industriali Automatismi (CEIA) case study
Costruzioni Elettroniche Industriali Automatismi (CEIA) case studyCostruzioni Elettroniche Industriali Automatismi (CEIA) case study
Costruzioni Elettroniche Industriali Automatismi (CEIA) case study
 
Beachbody, LLC
Beachbody, LLCBeachbody, LLC
Beachbody, LLC
 
Datasheet
DatasheetDatasheet
Datasheet
 
University of Granada
University of Granada University of Granada
University of Granada
 
Ukrtransgaz
UkrtransgazUkrtransgaz
Ukrtransgaz
 
University of Granada
University of GranadaUniversity of Granada
University of Granada
 
Australia's early adopters of network virtualization_Report
Australia's early adopters of network virtualization_ReportAustralia's early adopters of network virtualization_Report
Australia's early adopters of network virtualization_Report
 
Gobierno de Castilla la Mancha
Gobierno de Castilla la ManchaGobierno de Castilla la Mancha
Gobierno de Castilla la Mancha
 
Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
 
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber AttacksLessons Learned: Protecting Critical Infrastructure from Cyber Attacks
Lessons Learned: Protecting Critical Infrastructure from Cyber Attacks
 
Ministry of Foreign Affairs
Ministry of Foreign AffairsMinistry of Foreign Affairs
Ministry of Foreign Affairs
 
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
Tonight, March 5th – Class 7 (last class)   your test” on ICS.docxTonight, March 5th – Class 7 (last class)   your test” on ICS.docx
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
 
Secure Data Center for Enterprise
Secure Data Center for EnterpriseSecure Data Center for Enterprise
Secure Data Center for Enterprise
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 

Mehr von Cisco Case Studies (20)

Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_ENExpo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
 
Expo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_ITExpo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_IT
 
Seeberger
Seeberger Seeberger
Seeberger
 
Neotel
Neotel Neotel
Neotel
 
Il Gruppo Marcegaglia
Il Gruppo MarcegagliaIl Gruppo Marcegaglia
Il Gruppo Marcegaglia
 
SAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearwaySAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearway
 
AASTMT Case Study
AASTMT Case StudyAASTMT Case Study
AASTMT Case Study
 
Bauer
Bauer Bauer
Bauer
 
Universal Motors Agencies
Universal Motors AgenciesUniversal Motors Agencies
Universal Motors Agencies
 
Equitix
Equitix Equitix
Equitix
 
ScanPlus
ScanPlusScanPlus
ScanPlus
 
Odeabank Case Study
Odeabank Case StudyOdeabank Case Study
Odeabank Case Study
 
IBB Energie AG
IBB Energie AGIBB Energie AG
IBB Energie AG
 
Lufthansa Case Study
Lufthansa Case StudyLufthansa Case Study
Lufthansa Case Study
 
Schmitz Cargobull
Schmitz CargobullSchmitz Cargobull
Schmitz Cargobull
 
Mankiewicz Gebr & Co
Mankiewicz Gebr & Co Mankiewicz Gebr & Co
Mankiewicz Gebr & Co
 
Lomma Kommun
Lomma Kommun Lomma Kommun
Lomma Kommun
 
Skipton Building Society
Skipton Building SocietySkipton Building Society
Skipton Building Society
 
Anyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End UsersAnyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End Users
 
Rai Radio Televisione Italiana
Rai Radio Televisione ItalianaRai Radio Televisione Italiana
Rai Radio Televisione Italiana
 

Kürzlich hochgeladen

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Kürzlich hochgeladen (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

The Polytechnic of Namibia

  • 1. EXECUTIVE SUMMARY Company: The Polytechnic of Namibia Industry: University Location: Windhoek, Namibia Students/Employees: 13,000 students, 1000–1500 faculty/staff Challenge • Prepare network for anticipated doubling of student body size • Strengthen network security against increasing infections and attacks • Simplify security implementations and management for limited staff Solution • Cisco ASA 5585-X Series Next-Generation Firewalls • Cisco Identity Services Engine • Cisco AnyConnect Results • Simplified integration of Cisco solutions with planned roadmap • Virtualized firewalls to ease and simplify deployments • Gained scalability to meet future needs Challenge Unlike traditional hacking targets such as financial institutions, universities are open and inviting. Their faculty, staff, students, and visitors expect fast, easy access to on-campus resources, as well as the ability to quickly connect their own devices to the network. Faculty, in particular, has special needs, such as accessing other universities’ systems. Unfortunately, that openness and accessibility often create vulnerabilities in network security. These vulnerabilities could place university assets – as well as those of students, faculty, staff, and guests themselves – at risk. At The Polytechnic of Namibia, a 13,000-student university with 11 offices across the country, Marco Maartens, network manager, says major network outages due to virus infections and worms increased from one to several per year. More troubling, however, was the trend he saw - prevalent in universities worldwide - toward hackers using the university as a conduit to launch external attacks – the well-known botnets. “Universities in general are not known for securing themselves well, and we have a lot of equipment available to serve very diverse needs. We’ve seen a rise in instances where hackers invade our infrastructure, not to steal anything here, but to use it to go after more valuable targets,” Maartens says. The Polytechnic of Namibia has an IT staff of 60, with just five people, including Maartens, focused on network security. In addition to addressing the growing threat from outside hackers, Maartens’ team had to develop a roadmap to manage the dramatic growth that the university predicts for the next several years. The university will change its name in 2015 to Namibia University of Science & Technology, and by 2017 expects to serve 20,000 students - almost twice as many as are now enrolled. At least one more campus will be added, and the number of faculty and staff will increase as well. For Maartens and his team, that means thousands more users - and devices - to secure, while still maintaining the ease of access that those users expect. Growing University in Namibia Moves to Next-Generation Security 1 © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Customer Case Study Polytechnic of Namibia secures campuses and offices across country with Cisco ASA 5585-X Series.
  • 2. “Students are here to learn, and academics are here to give classes and to do research. They’re not here to fiddle with patching machines and updating them before they can connect,” says Maartens. “That’s why we need security measures in place on the back end, so users don’t have to worry about it.” Solution The Polytechnic of Namibia began moving to end-to-end Cisco solutions about 10 years ago when the previous vendor stopped providing support. When Maartens came on board about three years ago, he recognized the growing security threats and the need for increased scalability. He began moving the university toward a virtualized solution with two Cisco® ASA 5585-X Series Next-Generation Firewalls supporting about 26 virtual firewalls. The Cisco ASA 5585-X firewalls were the only such devices that Maartens could find that had 10 GB/s throughput as well as a powerful and fully enabled intrusion prevention system (IPS). The ASA appliances are partitioned into multiple virtual devices, or security contexts. That effectively segments the network, so each faculty member, as well as departments such as finance, has its own virtual firewall through which all traffic passes. The university is also in the midst of implementing Cisco Identity Services Engine (ISE) to perform profiling and posture assessments before allowing access to the network. “Right now, we fight fires one at a time, so for example, if someone adds an infected machine to the network, we have to track where it is and disconnect it. With ISE, it won’t get connected to begin with,” says Maartens, “in line with the goal of providing seamless yet secure connectivity.” ISE will be a key part of the university’s bring-your-own-device policy, which provides unique levels of access for staff, students, and computer labs. His team will be looking at how Cisco TrustSec® can provide role-based access for every user and every device, from smartphones to printers and laptops, both wireless and wired. Results Given his small staff, Maartens indicated that a key part of his decision to go with Cisco solutions was the ease of implementation and support. “I only have nine staff for network and telephony,” he says, “so I didn’t want to waste time trying to get multiple vendors to integrate with each other. If I have a problem, I can just get on a call with Cisco and get it resolved quickly.” The need to save time also factored into Maartens’ decision to virtualize dozens of firewalls from just two Cisco ASA 5585-X appliances. In fact, he says his entire network design was based on that feature. “With the ASA, we don’t have to cable up 20 boxes; we only have to cable up two. It’s obviously easier to manage that way, and it takes a lot less time to test and monitor the cabling,” he says. The ability to scale rapidly is also extremely important as the university continues to grow. That point became clear recently when the university outsourced its printing operations, which in the past would have been delayed six to eight weeks while a new firewall appliance was procured and implemented. Instead, Maartens and his team simply added another virtual firewall, which was ready in less than two days. Customer Case Study “We don’t have to change our security policy to match the Cisco hardware we buy. The hardware does what our security policies demand, which is very important to us.” Marco Maartens Network Manager The Polytechnic of Namibia 2 © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
  • 3. Additionally, Maartens’ team can segment access to social media, such as Facebook, according to user protocols, to further protect the network. Implementing Cisco ISE will further strengthen the university’s network visibility and control, with 802.1x port authentication capability for wired access, and wireless access for mobile devices. In the future, Maartens says he will add Cisco AnyConnect®, Cisco ASA Botnet Traffic Filter, and more advanced security solutions, as well as rapidly expanding the number of wireless access points. Maartens indicated that it makes his job easier to have one company with integrated solutions that he can rely on. “We don’t have to change our security policy to match the Cisco hardware we buy,” he says. “The hardware does what our security policies demand, which is very important to us.” For More Information To find out more about the Cisco ASA-5585-X Next-Generation Firewall and other Cisco Security products, go to: http://www.cisco.com/go/asa http://www.cisco.com/go/ise http://www.cisco.com/go/anyconnect http://www.cisco.com/go/ips http://www.cisco.com/go/trustsec PRODUCT LIST Security • Cisco ASA 5585-X Next-Generation Firewall • Cisco Identity Services Engine • Cisco AnyConnect • Cisco Intrusion Prevention System (IPS) • Cisco TrustSec Data Center • Cisco Nexus 5585UP • Cisco UCS B-Series Blade Servers Routers and Switches • Cisco Nexus® 5585P • Cisco ASR 1002 Routers Wireless • Cisco Flex® 7500 Series Wireless Controllers • Cisco 3600, 3500, 1300 Series Access Points Customer Case Study © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. C36-732194-00 07/14 Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Americas Headquarters Cisco Systems, Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems (USA) Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands