Secure, Automated Network Access for Any Device on Campus

Cisco Security
Cisco SecurityFounding Partner at Cisco Security

Trinity University relies on Cisco ISE to enable students, faculty, and guests easy network onboarding.

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 4
Customer Case Study
EXECUTIVE SUMMARY
Customer Name: Trinity University
Industry: Education
Location: San Antonio, Texas
No. of Employees: 2600 students; 750 faculty
and staff
BUSINESS CHALLENGE
● Provide secure network access to thousands
of students, faculty, staff, and guests
● Reduce time and labor of manual onboarding
processes
● Gain visibility and control of network
connected devices
SECURITY SOLUTION
● Cisco Identity Services Engine
BUSINESS RESULTS
● Easy, automated network access for all users
and devices
● Elimination of manual administrative and help
desk processes
● Protection against malware, viruses, and
illegally downloaded content
Secure, Automated Network Access for Any Device
on Campus
Trinity University relies on Cisco ISE to enable students, faculty, and guests easy
network onboarding.
Business Challenge
Trinity University is one of the top private liberal arts institutions in
the United States. Founded in 1869, Trinity University is located on a
117-acre campus in San Antonio, Texas. It is consistently ranked as
an academic leader by publications such as Princeton Review and
U.S. News and World Report. More than 2600 undergraduate and
graduate students attend Trinity University, along with a faculty and
staff of approximately 750. The university offers a wide-ranging
curriculum that covers nearly 40 majors.
As with any large computing environment, protecting users and the
Trinity University network from viruses, malware, and illegal content
is a constant challenge. Every year, students arrive with at least two
or three personal devices they will use to connect to the Trinity
network. For Trinity, a bring-your-own-device (BYOD) policy has
been  a  cornerstone  of  the  university’s  network  access  security  policy  
for years.
In the summer, the challenge is even greater as Trinity hosts a
number of conferences that bring thousands of participants and their
devices to the campus. Another issue involves faculty and staff using their personal and school-owned computing
devices to conduct transactions across the Trinity network.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 4
From smartphones, tablets, game consoles, TVs, eBook readers, and Blu-ray players, to laptops and desktop
computers, Trinity University must cope with an ever-expanding variety of personal devices. One Trinity student
with a diabetic condition required a network connection for a monitoring device that would send status updates as
he slept.
All of these devices must be registered, granted appropriate access, and made to comply with security policies to
protect  the  integrity  of  Trinity’s  network.  For  Trinity’s  IT  administrators  and  help  desk  professionals,  these  
obligations created a substantial workload requiring many hours of labor and the use of resources that could be
better spent on other priorities.
Trinity needed a security solution that could save time by efficiently onboarding multiple device types to its network,
while helping ensure high levels of protection and granular policy control to accommodate different levels of access
for different types of users.
Solution
Trinity University decided to implement the Cisco
®
Identity Services Engine (ISE) to enable comprehensive and
consistent security for the many different types of devices attached to its network.
Cisco ISE provides all-in-one policy control, maintains high levels of security compliance for all types of personal
devices, while keeping users productive with reliable access to network data and applications. It employs rigorous
identity and policy enforcement across all connections, and it automates device onboarding to lower IT costs and
increase efficiency.
“Trinity  University  was  already  a  longtime,  end-to-end Cisco environment. We rely on Cisco security solutions to
protect  our  wired,  wireless,  and  VPN  infrastructure,  so  the  decision  to  go  with  Cisco  ISE  was  a  natural  choice,”  
says Fred Zapata, director and chief information technology officer, Trinity University.
The Cisco ISE is integrated on the Trinity campus with the Cisco ASA Next-Generation Firewall. Students living in
the dorms are required to log in through wired access with 802.1X authentication, set with the Monitoring Mode
feature of ISE providing added network protection. Cisco Wireless is used through the campus.
In  particular,  Cisco  ISE  offered  significant  benefits  for  Trinity’s  rapidly  growing  wireless  network.  About  65  percent  
of  Trinity’s  traffic  is  on  its  wireless  network,  which  has  been  expanded  several  times  in recent years due to growing
demand. At peak periods, more than 1800 wireless devices may be connected to the network. Cisco ISE helps
ensure that as the wireless network continues to grow, it can easily handle the influx of new device types and meet
the needs of mobile users who require different levels of network access.
“Our  new  facilities  are  integrated  with  the  latest  technologies for HVAC
systems, fire alarms, and door access systems that include connectivity
to  the  Trinity  network  using  Cisco  ISE,”  says  Fred  Zapata,  director  and  
chief  information  technology  officer.  “Maintaining  the  stability  of  these  
systems  is  critical.”
— Fred Zapata, Director and Chief Information Technology Officer, Trinity University
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 4
Results
With its automated device profiling and self-registration capabilities, Cisco ISE immediately provided significant
time-saving  benefits  for  Trinity’s  IT  professionals.  Hours  of  manual processes for bringing new users and devices
onto the network each week were eliminated. And during the busy summer months when the school hosts
thousands of visiting conference attendees, the help desk workload was reduced by up to 25 percent.
“We  no longer have to manually create guest accounts, maintain a series of generic accounts, or generate
passwords every day that we then hand off to our conference services people. With Cisco ISE, we can just send
new users to the self-service portal, and they are immediately granted secure network access following the
designated  protocol.  It’s  much  easier  for  us  and  a  better  experience  for  the  users,”  says  Douglas  Cooper,  systems  
administrator, Trinity University.
Cisco  ISE  also  protects  Trinity’s  network  against threats such as viruses, malware, and spyware by creating a
contextual identity for each device and applying policy controls. The policy enforcement capabilities also help
Trinity prevent the illegal downloading and sharing of copyrighted content.
“In the past, we have received copyright infringement notices from organizations such as the RIAA, MPAA, HBO,
and other media organizations. In one case, a student had to pay a large settlement. With Cisco ISE, we can
prevent users from illegally accessing copyrighted  music  or  movies  before  it  gets  to  that  point,”  says  Cooper.
The  network  security  that  Cisco  ISE  provides  also  extends  to  the  newer  “smart”  buildings  on  Trinity’s  campus.  A  
key  initiative  is  upgrading  the  university’s  science  facilities,  which  have been gutted and renovated, or torn down
and rebuilt for a state-of-the art learning environment.
“Our  new  facilities  are  integrated  with  the  latest  technologies  for  HVAC  (heating  ventilating  and  air  conditioning)  
systems, fire alarms, and door access systems  that  include  connectivity  to  the  Trinity  network  using  Cisco  ISE,”  
says  Zapata.  “Maintaining  the  stability  of  these  systems  is  critical.”
For students, faculty, and university guests, the biggest benefit of Cisco ISE is a highly efficient user experience.
Students and faculty can quickly gain trusted access to the network regardless of the type of device they are using.
And guests can easily log onto the network with their own devices with automated identity enforcement. Trinity
does not dictate what type of devices users bring with them to campus. As new devices and their educational uses
evolve,  Trinity’s  network  has  the  capacity  to  quickly  and  safely  bring  them  onboard.
“Already  we  are  seeing  faculty  using  their  iPads  to  mirror  their  content  to  projector screens, and introducing new
instruments  and  scientific  devices  with  network  connectivity  to  the  classroom,”  says  Cooper.  “With  Cisco  ISE,  our  
users  have  the  flexibility  and  freedom  to  bring  these  new  devices  onto  our  network  safely  and  easily.”
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 4
PRODUCT LIST
Security and Connectivity
● Cisco Identity Services Engine (ISE)
● Cisco ASA Next-Generation Firewall
● Cisco Web Security Appliance (WSA)
● Cisco Wireless Access Points
● Cisco Wireless Services Module 2 (WiSM2)
Routing and Switching
● Cisco 7206 Routers
● Cisco Catalyst
®
6500 Series Switches
Data Center
● Cisco Unified Computing System
™
(UCS
®
)
Cisco Voice and Unified Communications
● Cisco Unified Communications
● Cisco Emergency Responder
● Cisco Contact Center
For More Information
To find out more about the Cisco Identity Services Engine (ISE) and
the security solutions featured in this case study, go to:
http://www.cisco.com/go/ise
http://www.cisco.com/go/asa
http://www.cisco.com/go/websecurity.
Printed in USA C36-729890-00 11/13

Recommended

GUL Network Infrastructure by
GUL Network InfrastructureGUL Network Infrastructure
GUL Network InfrastructureMuhammad Zeeshan
931 views12 slides
Punahou school maintains a secure and open campus with cisco - case study by
Punahou school maintains a secure and open campus with cisco - case studyPunahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyCisco Mobility
662 views4 slides
B018211016 by
B018211016B018211016
B018211016IOSR Journals
133 views7 slides
Securing the Digital Economy: Reinventing the Internet by
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet accenture
907 views16 slides
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017 by
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
145 views5 slides
Challenges and Security Issues in Future IT Infrastructure Components by
Challenges and Security Issues in Future IT Infrastructure ComponentsChallenges and Security Issues in Future IT Infrastructure Components
Challenges and Security Issues in Future IT Infrastructure ComponentsMubashir Ali
864 views3 slides

More Related Content

What's hot

Internet of things by
Internet of thingsInternet of things
Internet of thingsvarungoyal98
89 views17 slides
Advanced Network Security with Netmagic – Netmagic by
Advanced Network Security with Netmagic – NetmagicAdvanced Network Security with Netmagic – Netmagic
Advanced Network Security with Netmagic – NetmagicNetmagic Solutions Pvt. Ltd.
137 views4 slides
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi by
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIBM Switzerland
715 views29 slides
Cybersecurity in the Era of IoT by
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoTAmy Daly
1.3K views26 slides
Internet & iot security by
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
326 views20 slides
Appsec Introduction by
Appsec IntroductionAppsec Introduction
Appsec IntroductionMohamed Ridha CHEBBI, CISSP
899 views33 slides

What's hot(19)

IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi by IBM Switzerland
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IBM Switzerland715 views
Cybersecurity in the Era of IoT by Amy Daly
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
Amy Daly1.3K views
Internet & iot security by Usman Anjum
Internet & iot securityInternet & iot security
Internet & iot security
Usman Anjum326 views
101 Basic concepts of information security by SsendiSamuel
101 Basic concepts of information security101 Basic concepts of information security
101 Basic concepts of information security
SsendiSamuel958 views
Trust based Mechanism for Secure Cloud Computing Environment: A Survey by inventionjournals
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
76 s201918 by IJRAT
76 s20191876 s201918
76 s201918
IJRAT45 views
Cyber Security Intelligence by ijtsrd
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
ijtsrd55 views
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032 by PECB
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB 17.8K views
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in... by CODE BLUE
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
CODE BLUE202 views
Fundamental Areas of Cyber Security on Latest Technology by ijtsrd
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
ijtsrd85 views
Computer security and_privacy by thinkict
Computer security and_privacyComputer security and_privacy
Computer security and_privacy
thinkict259 views
Internet of Things: Dealing with the enterprise network of things by Huntsman Security
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of things
Huntsman Security790 views

Viewers also liked

The Context Aware Network A Holistic Approach to BYOD by
The Context Aware Network A Holistic Approach to BYODThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYODCisco Canada
2.2K views38 slides
Cisco catalyst 3850 switch converge wired, wireless to build simple, secure, ... by
Cisco catalyst 3850 switch converge wired, wireless to build simple, secure, ...Cisco catalyst 3850 switch converge wired, wireless to build simple, secure, ...
Cisco catalyst 3850 switch converge wired, wireless to build simple, secure, ...IT Tech
1.1K views10 slides
Workshop "Smart cities and communities" @ La Sapienza by
Workshop "Smart cities and communities" @ La SapienzaWorkshop "Smart cities and communities" @ La Sapienza
Workshop "Smart cities and communities" @ La SapienzaSaverio Massaro
487 views37 slides
503 reading quiz by
503 reading quiz503 reading quiz
503 reading quizamybass
551 views33 slides
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl... by
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...FLUZO
1.2K views60 slides
Kisah katak kecil by
Kisah katak kecilKisah katak kecil
Kisah katak kecilhamdEy
404 views21 slides

Viewers also liked(20)

The Context Aware Network A Holistic Approach to BYOD by Cisco Canada
The Context Aware Network A Holistic Approach to BYODThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYOD
Cisco Canada2.2K views
Cisco catalyst 3850 switch converge wired, wireless to build simple, secure, ... by IT Tech
Cisco catalyst 3850 switch converge wired, wireless to build simple, secure, ...Cisco catalyst 3850 switch converge wired, wireless to build simple, secure, ...
Cisco catalyst 3850 switch converge wired, wireless to build simple, secure, ...
IT Tech1.1K views
Workshop "Smart cities and communities" @ La Sapienza by Saverio Massaro
Workshop "Smart cities and communities" @ La SapienzaWorkshop "Smart cities and communities" @ La Sapienza
Workshop "Smart cities and communities" @ La Sapienza
Saverio Massaro487 views
503 reading quiz by amybass
503 reading quiz503 reading quiz
503 reading quiz
amybass551 views
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl... by FLUZO
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
FLUZO1.2K views
Kisah katak kecil by hamdEy
Kisah katak kecilKisah katak kecil
Kisah katak kecil
hamdEy404 views
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a... by MobileCreation
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
MobileCreation934 views
Conseqüències de la II Guerra Mundial by malueva
Conseqüències de la II Guerra MundialConseqüències de la II Guerra Mundial
Conseqüències de la II Guerra Mundial
malueva461 views
Taylor rita visual_resumestoryboard.zip by Rita_E
Taylor rita visual_resumestoryboard.zipTaylor rita visual_resumestoryboard.zip
Taylor rita visual_resumestoryboard.zip
Rita_E955 views
Demografi profil gampong kulu 1 by Arya Ningrat
Demografi profil gampong kulu 1Demografi profil gampong kulu 1
Demografi profil gampong kulu 1
Arya Ningrat561 views
2012 colloque mobilecréation-nova by MobileCreation
2012 colloque mobilecréation-nova2012 colloque mobilecréation-nova
2012 colloque mobilecréation-nova
MobileCreation875 views

Similar to Secure, Automated Network Access for Any Device on Campus

Customer case study © 2010 cisco systems, inc. all rig by
Customer case study © 2010 cisco systems, inc. all rigCustomer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rigANIL247048
48 views18 slides
Katy Independent School District Makes a Difference with Cisco Mobility: Case... by
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Cisco Mobility
963 views3 slides
University of Granada by
University of Granada University of Granada
University of Granada Cisco Case Studies
323 views2 slides
Cisco i school moo-cs and libraries (2013 09 30) by
Cisco   i school moo-cs and libraries (2013 09 30)Cisco   i school moo-cs and libraries (2013 09 30)
Cisco i school moo-cs and libraries (2013 09 30)Marc Lijour, OCT, BSc, MBA
1.2K views17 slides
University of Granada by
University of GranadaUniversity of Granada
University of GranadaCisco Case Studies
342 views3 slides
The Polytechnic of Namibia by
The Polytechnic of NamibiaThe Polytechnic of Namibia
The Polytechnic of NamibiaCisco Case Studies
596 views3 slides

Similar to Secure, Automated Network Access for Any Device on Campus(20)

Customer case study © 2010 cisco systems, inc. all rig by ANIL247048
Customer case study © 2010 cisco systems, inc. all rigCustomer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rig
ANIL24704848 views
Katy Independent School District Makes a Difference with Cisco Mobility: Case... by Cisco Mobility
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Cisco Mobility963 views
Information Security Management in University Campus Using Cognitive Security by CSCJournals
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
CSCJournals58 views
Leveraging Context-Aware Security to Safeguard Patient Data by Cisco Security
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
Cisco Security1.1K views
Internet of Everything Case Study: Punahou School by Cisco Mobility
Internet of Everything Case Study: Punahou SchoolInternet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou School
Cisco Mobility1.2K views
Cyber Security_Presentation_KTH by Awais Shibli
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
Awais Shibli1.2K views
Ecole Polytechnique Federale de Lausanne (EPFL) by Cisco Case Studies
Ecole Polytechnique Federale de Lausanne (EPFL)Ecole Polytechnique Federale de Lausanne (EPFL)
Ecole Polytechnique Federale de Lausanne (EPFL)
Cisco Case Studies642 views
Laser Pioneer Secures Network End-to-End to Protect Assets by Cisco Security
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security1.1K views
Customer Success Story on NuEDUSEC Internet Security Service by patricia franklin
Customer Success Story on NuEDUSEC Internet Security Service Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc... by Tammy Clark
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
Tammy Clark296 views
Cyber security and cyber law by Divyank Jindal
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal797 views

More from Cisco Security

Incident Response Services Template - Cisco Security by
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityCisco Security
11.2K views2 slides
Infographic: Security for Mobile Service Providers by
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
4.6K views1 slide
Cisco ISE Reduces the Attack Surface by Controlling Access by
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco Security
4.4K views1 slide
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur... by
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Cisco Security
4.2K views36 slides
Pervasive Security Across Your Extended Network by
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkCisco Security
6.4K views1 slide
Cisco Web and Email Security Overview by
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
26.5K views51 slides

More from Cisco Security(20)

Incident Response Services Template - Cisco Security by Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
Cisco Security11.2K views
Infographic: Security for Mobile Service Providers by Cisco Security
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
Cisco Security4.6K views
Cisco ISE Reduces the Attack Surface by Controlling Access by Cisco Security
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco Security4.4K views
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur... by Cisco Security
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security4.2K views
Pervasive Security Across Your Extended Network by Cisco Security
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
Cisco Security6.4K views
Cisco Web and Email Security Overview by Cisco Security
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
Cisco Security26.5K views
Cisco 2015 Midyear Security Report Slide Deck by Cisco Security
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
Cisco Security4.4K views
3 Tips for Choosing a Next Generation Firewall by Cisco Security
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
Cisco Security2.5K views
AMP Helps Cisco IT Catch 50% More Malware threats by Cisco Security
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
Cisco Security4.9K views
A Reality Check on the State of Cybersecurity by Cisco Security
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
Cisco Security3.1K views
Balance Data Center Security and Performance by Cisco Security
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
Cisco Security2.5K views
The Cost of Inactivity: Malware Infographic by Cisco Security
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
Cisco Security1.7K views
Data Center Security Challenges by Cisco Security
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
Cisco Security8.5K views
Enterprise Strategy Group: Security Survey by Cisco Security
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
Cisco Security3.1K views
Malware and the Cost of Inactivity by Cisco Security
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
Cisco Security8.8K views
Midsize Business Solutions: Cybersecurity by Cisco Security
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
Cisco Security3.4K views
Integrated Network Security Strategies by Cisco Security
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
Cisco Security3.5K views
Cisco Addresses the Full Attack Continuum by Cisco Security
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security4.4K views
Infonetics Network and Content Security Vendor Scorecard by Cisco Security
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
Cisco Security2.2K views
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ... by Cisco Security
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Cisco Security7.3K views

Recently uploaded

The Power of Heat Decarbonisation Plans in the Built Environment by
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built EnvironmentIES VE
79 views20 slides
Ransomware is Knocking your Door_Final.pdf by
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
96 views46 slides
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... by
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...ShapeBlue
145 views17 slides
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueShapeBlue
135 views13 slides
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineShapeBlue
221 views19 slides
CryptoBotsAI by
CryptoBotsAICryptoBotsAI
CryptoBotsAIchandureddyvadala199
40 views5 slides

Recently uploaded(20)

The Power of Heat Decarbonisation Plans in the Built Environment by IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE79 views
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... by ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue145 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue135 views
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online by ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue221 views
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates by ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue252 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue161 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue198 views
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T by ShapeBlue
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
ShapeBlue152 views
Business Analyst Series 2023 - Week 4 Session 7 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10139 views
Future of AR - Facebook Presentation by Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty64 views
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ by ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue130 views
NTGapps NTG LowCode Platform by Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu423 views
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue180 views
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... by ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue184 views
Why and How CloudStack at weSystems - Stephan Bienek - weSystems by ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue238 views
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue by ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue138 views

Secure, Automated Network Access for Any Device on Campus

  • 1. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 4 Customer Case Study EXECUTIVE SUMMARY Customer Name: Trinity University Industry: Education Location: San Antonio, Texas No. of Employees: 2600 students; 750 faculty and staff BUSINESS CHALLENGE ● Provide secure network access to thousands of students, faculty, staff, and guests ● Reduce time and labor of manual onboarding processes ● Gain visibility and control of network connected devices SECURITY SOLUTION ● Cisco Identity Services Engine BUSINESS RESULTS ● Easy, automated network access for all users and devices ● Elimination of manual administrative and help desk processes ● Protection against malware, viruses, and illegally downloaded content Secure, Automated Network Access for Any Device on Campus Trinity University relies on Cisco ISE to enable students, faculty, and guests easy network onboarding. Business Challenge Trinity University is one of the top private liberal arts institutions in the United States. Founded in 1869, Trinity University is located on a 117-acre campus in San Antonio, Texas. It is consistently ranked as an academic leader by publications such as Princeton Review and U.S. News and World Report. More than 2600 undergraduate and graduate students attend Trinity University, along with a faculty and staff of approximately 750. The university offers a wide-ranging curriculum that covers nearly 40 majors. As with any large computing environment, protecting users and the Trinity University network from viruses, malware, and illegal content is a constant challenge. Every year, students arrive with at least two or three personal devices they will use to connect to the Trinity network. For Trinity, a bring-your-own-device (BYOD) policy has been  a  cornerstone  of  the  university’s  network  access  security  policy   for years. In the summer, the challenge is even greater as Trinity hosts a number of conferences that bring thousands of participants and their devices to the campus. Another issue involves faculty and staff using their personal and school-owned computing devices to conduct transactions across the Trinity network.
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 4 From smartphones, tablets, game consoles, TVs, eBook readers, and Blu-ray players, to laptops and desktop computers, Trinity University must cope with an ever-expanding variety of personal devices. One Trinity student with a diabetic condition required a network connection for a monitoring device that would send status updates as he slept. All of these devices must be registered, granted appropriate access, and made to comply with security policies to protect  the  integrity  of  Trinity’s  network.  For  Trinity’s  IT  administrators  and  help  desk  professionals,  these   obligations created a substantial workload requiring many hours of labor and the use of resources that could be better spent on other priorities. Trinity needed a security solution that could save time by efficiently onboarding multiple device types to its network, while helping ensure high levels of protection and granular policy control to accommodate different levels of access for different types of users. Solution Trinity University decided to implement the Cisco ® Identity Services Engine (ISE) to enable comprehensive and consistent security for the many different types of devices attached to its network. Cisco ISE provides all-in-one policy control, maintains high levels of security compliance for all types of personal devices, while keeping users productive with reliable access to network data and applications. It employs rigorous identity and policy enforcement across all connections, and it automates device onboarding to lower IT costs and increase efficiency. “Trinity  University  was  already  a  longtime,  end-to-end Cisco environment. We rely on Cisco security solutions to protect  our  wired,  wireless,  and  VPN  infrastructure,  so  the  decision  to  go  with  Cisco  ISE  was  a  natural  choice,”   says Fred Zapata, director and chief information technology officer, Trinity University. The Cisco ISE is integrated on the Trinity campus with the Cisco ASA Next-Generation Firewall. Students living in the dorms are required to log in through wired access with 802.1X authentication, set with the Monitoring Mode feature of ISE providing added network protection. Cisco Wireless is used through the campus. In  particular,  Cisco  ISE  offered  significant  benefits  for  Trinity’s  rapidly  growing  wireless  network.  About  65  percent   of  Trinity’s  traffic  is  on  its  wireless  network,  which  has  been  expanded  several  times  in recent years due to growing demand. At peak periods, more than 1800 wireless devices may be connected to the network. Cisco ISE helps ensure that as the wireless network continues to grow, it can easily handle the influx of new device types and meet the needs of mobile users who require different levels of network access. “Our  new  facilities  are  integrated  with  the  latest  technologies for HVAC systems, fire alarms, and door access systems that include connectivity to  the  Trinity  network  using  Cisco  ISE,”  says  Fred  Zapata,  director  and   chief  information  technology  officer.  “Maintaining  the  stability  of  these   systems  is  critical.” — Fred Zapata, Director and Chief Information Technology Officer, Trinity University
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 4 Results With its automated device profiling and self-registration capabilities, Cisco ISE immediately provided significant time-saving  benefits  for  Trinity’s  IT  professionals.  Hours  of  manual processes for bringing new users and devices onto the network each week were eliminated. And during the busy summer months when the school hosts thousands of visiting conference attendees, the help desk workload was reduced by up to 25 percent. “We  no longer have to manually create guest accounts, maintain a series of generic accounts, or generate passwords every day that we then hand off to our conference services people. With Cisco ISE, we can just send new users to the self-service portal, and they are immediately granted secure network access following the designated  protocol.  It’s  much  easier  for  us  and  a  better  experience  for  the  users,”  says  Douglas  Cooper,  systems   administrator, Trinity University. Cisco  ISE  also  protects  Trinity’s  network  against threats such as viruses, malware, and spyware by creating a contextual identity for each device and applying policy controls. The policy enforcement capabilities also help Trinity prevent the illegal downloading and sharing of copyrighted content. “In the past, we have received copyright infringement notices from organizations such as the RIAA, MPAA, HBO, and other media organizations. In one case, a student had to pay a large settlement. With Cisco ISE, we can prevent users from illegally accessing copyrighted  music  or  movies  before  it  gets  to  that  point,”  says  Cooper. The  network  security  that  Cisco  ISE  provides  also  extends  to  the  newer  “smart”  buildings  on  Trinity’s  campus.  A   key  initiative  is  upgrading  the  university’s  science  facilities,  which  have been gutted and renovated, or torn down and rebuilt for a state-of-the art learning environment. “Our  new  facilities  are  integrated  with  the  latest  technologies  for  HVAC  (heating  ventilating  and  air  conditioning)   systems, fire alarms, and door access systems  that  include  connectivity  to  the  Trinity  network  using  Cisco  ISE,”   says  Zapata.  “Maintaining  the  stability  of  these  systems  is  critical.” For students, faculty, and university guests, the biggest benefit of Cisco ISE is a highly efficient user experience. Students and faculty can quickly gain trusted access to the network regardless of the type of device they are using. And guests can easily log onto the network with their own devices with automated identity enforcement. Trinity does not dictate what type of devices users bring with them to campus. As new devices and their educational uses evolve,  Trinity’s  network  has  the  capacity  to  quickly  and  safely  bring  them  onboard. “Already  we  are  seeing  faculty  using  their  iPads  to  mirror  their  content  to  projector screens, and introducing new instruments  and  scientific  devices  with  network  connectivity  to  the  classroom,”  says  Cooper.  “With  Cisco  ISE,  our   users  have  the  flexibility  and  freedom  to  bring  these  new  devices  onto  our  network  safely  and  easily.”
  • 4. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 4 PRODUCT LIST Security and Connectivity ● Cisco Identity Services Engine (ISE) ● Cisco ASA Next-Generation Firewall ● Cisco Web Security Appliance (WSA) ● Cisco Wireless Access Points ● Cisco Wireless Services Module 2 (WiSM2) Routing and Switching ● Cisco 7206 Routers ● Cisco Catalyst ® 6500 Series Switches Data Center ● Cisco Unified Computing System ™ (UCS ® ) Cisco Voice and Unified Communications ● Cisco Unified Communications ● Cisco Emergency Responder ● Cisco Contact Center For More Information To find out more about the Cisco Identity Services Engine (ISE) and the security solutions featured in this case study, go to: http://www.cisco.com/go/ise http://www.cisco.com/go/asa http://www.cisco.com/go/websecurity. Printed in USA C36-729890-00 11/13