William Paterson University

Cisco Security
Cisco SecurityFounding Partner at Cisco Security
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
ImpactChallenges Why Cisco? SolutionCustomer Stats
William Paterson University
• Industry: Education
• Students: 11,500
• Faculty/Staff: 1,150
• Location: Wayne, NJ
• Five colleges include
Arts and
Communication,
Education, Humanities
and Social Sciences,
Science and Health, and
the Cotsakos College of
Business.
• Founded in 1855.
• Facilitates secure manual
registration by users if not
802.1X compliant.
• Eliminates server crashes, for
100 percent uptime.
• Reduces staff troubleshooting
time by 10 percent.
• Streamlines security policy-
setting, enabling complex
rules to be grouped together
in sets due to design
improvements.
• Allows policy rules to be
easily upgraded.
• Unable to define policy re
how 802.1X-compatible
and non-compatible
devices accessed network
due to design limitation,
increasing network risk.
• Had issues with profiling
that would cause server
crashes when enabled.
• Experienced influx of
wireless devices brought on
campus by students,
faculty, and staff, requiring
secure network access and
increasing load, complexity,
and staff support needed.
• Transitioned to Cisco Identity
Services Engine (ISE) 1.2 to
facilitate consistent, secure
wireless network access by
students bringing range of
devices on campus,
broadening reach of bring-
your-own-device (BYOD)
policy.
• Cisco ISE 1.2
Cisco NAC
• Cisco AnyConnect®
• Cisco ASA 5585 Firewalls with
Cisco IPS SSP 10 Sensors
• Cisco Wireless LAN
Controllers 5500
“With the converged Cisco
solution, we can now
centralize monitoring and
management for all our
resources and provide better
support and services to users
without increasing IT staff.”
— Brian C. Young, Infrastructure
Manager, Adena Health System
“Our goal is to get as
many people on our
network as quickly,
securely, and reliably as
possible without our
involvement. ISE 1.2
enables us to do that.”
-- Rob Tavoularis, Netw ork
Administrator, William
Paterson University
1 of 1

Recommended

McAllen Intermediate School District by
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School DistrictCisco Security
1.3K views1 slide
Katy Independent School District Makes a Difference with Cisco Mobility: Case... by
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Katy Independent School District Makes a Difference with Cisco Mobility: Case...
Katy Independent School District Makes a Difference with Cisco Mobility: Case...Cisco Mobility
963 views3 slides
Punahou school maintains a secure and open campus with cisco - case study by
Punahou school maintains a secure and open campus with cisco - case studyPunahou school maintains a secure and open campus with cisco - case study
Punahou school maintains a secure and open campus with cisco - case studyCisco Mobility
662 views4 slides
Cisco and illinois school district make learning fun case study by
Cisco and illinois school district make learning fun case studyCisco and illinois school district make learning fun case study
Cisco and illinois school district make learning fun case studyCisco Mobility
1.6K views3 slides
Operational Support of iOS & Apple Devices at the University of Michigan Medi... by
Operational Support of iOS & Apple Devices at the University of Michigan Medi...Operational Support of iOS & Apple Devices at the University of Michigan Medi...
Operational Support of iOS & Apple Devices at the University of Michigan Medi...University of Michigan Medical School
559 views14 slides
Customer Success Story on NuEDUSEC Internet Security Service by
Customer Success Story on NuEDUSEC Internet Security Service Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service patricia franklin
25 views1 slide

More Related Content

What's hot

7 Signs Its Time to Update Your IT Infrastructure by
7 Signs Its Time to Update Your IT Infrastructure7 Signs Its Time to Update Your IT Infrastructure
7 Signs Its Time to Update Your IT InfrastructureVartek Services Inc
100 views1 slide
Eduroam network by
Eduroam networkEduroam network
Eduroam networkBittu Kumar
389 views19 slides
Myschool 091126210301-phpapp01 by
Myschool 091126210301-phpapp01Myschool 091126210301-phpapp01
Myschool 091126210301-phpapp01Peckmc1
254 views25 slides
Network security ppt by
Network security pptNetwork security ppt
Network security pptKristi DeRoche
273 views7 slides
Myschool 091126210301-phpapp01 by
Myschool 091126210301-phpapp01Myschool 091126210301-phpapp01
Myschool 091126210301-phpapp01Peckmc1
257 views24 slides
Education: Industries we Serve by
Education: Industries we ServeEducation: Industries we Serve
Education: Industries we ServeThe TNS Group
38 views9 slides

What's hot(13)

7 Signs Its Time to Update Your IT Infrastructure by Vartek Services Inc
7 Signs Its Time to Update Your IT Infrastructure7 Signs Its Time to Update Your IT Infrastructure
7 Signs Its Time to Update Your IT Infrastructure
Myschool 091126210301-phpapp01 by Peckmc1
Myschool 091126210301-phpapp01Myschool 091126210301-phpapp01
Myschool 091126210301-phpapp01
Peckmc1254 views
Myschool 091126210301-phpapp01 by Peckmc1
Myschool 091126210301-phpapp01Myschool 091126210301-phpapp01
Myschool 091126210301-phpapp01
Peckmc1257 views
Education: Industries we Serve by The TNS Group
Education: Industries we ServeEducation: Industries we Serve
Education: Industries we Serve
The TNS Group38 views
ASTM Standards Intellectual Property by jaykg64
ASTM Standards Intellectual PropertyASTM Standards Intellectual Property
ASTM Standards Intellectual Property
jaykg64454 views
10 Hottest Disruptive Technologies in Higher Education by Extreme Networks
10 Hottest Disruptive Technologies in Higher Education10 Hottest Disruptive Technologies in Higher Education
10 Hottest Disruptive Technologies in Higher Education
Extreme Networks1.4K views
Educause2011PresentationFinal by tbanks
Educause2011PresentationFinalEducause2011PresentationFinal
Educause2011PresentationFinal
tbanks50 views

Viewers also liked

2013 Cisco Annual Security Report by
2013 Cisco Annual Security Report2013 Cisco Annual Security Report
2013 Cisco Annual Security ReportCisco Security
2.3K views24 slides
Enterprise Strategy Group: Security Survey by
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyCisco Security
3.1K views5 slides
Midsize Business Solutions: Cybersecurity by
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityCisco Security
3.4K views1 slide
Integrated Network Security Strategies by
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security StrategiesCisco Security
3.5K views1 slide
Cisco 2015 Midyear Security Report Slide Deck by
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
4.4K views28 slides
Defending the Data Center: Managing Users from the Edge to the Application by
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the ApplicationCisco Security
1.1K views19 slides

Viewers also liked(15)

2013 Cisco Annual Security Report by Cisco Security
2013 Cisco Annual Security Report2013 Cisco Annual Security Report
2013 Cisco Annual Security Report
Cisco Security2.3K views
Enterprise Strategy Group: Security Survey by Cisco Security
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
Cisco Security3.1K views
Midsize Business Solutions: Cybersecurity by Cisco Security
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
Cisco Security3.4K views
Integrated Network Security Strategies by Cisco Security
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
Cisco Security3.5K views
Cisco 2015 Midyear Security Report Slide Deck by Cisco Security
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
Cisco Security4.4K views
Defending the Data Center: Managing Users from the Edge to the Application by Cisco Security
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the Application
Cisco Security1.1K views
Balance Data Center Security and Performance by Cisco Security
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
Cisco Security2.5K views
Data Center Security Challenges by Cisco Security
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
Cisco Security8.5K views
Infographic: Security for Mobile Service Providers by Cisco Security
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
Cisco Security4.6K views
From Physical to Virtual to Cloud by Cisco Security
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
Cisco Security1.7K views
A Reality Check on the State of Cybersecurity by Cisco Security
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
Cisco Security3.1K views
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur... by Cisco Security
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security4.2K views
Cisco ISE Reduces the Attack Surface by Controlling Access by Cisco Security
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco Security4.4K views
Cisco Web and Email Security Overview by Cisco Security
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
Cisco Security26.5K views
Malware and the Cost of Inactivity by Cisco Security
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
Cisco Security8.8K views

Similar to William Paterson University

Avg At Work Uk Waingels by
Avg At Work Uk WaingelsAvg At Work Uk Waingels
Avg At Work Uk WaingelsAVG Technologies
166 views2 slides
Chase_Grammar_School by
Chase_Grammar_SchoolChase_Grammar_School
Chase_Grammar_SchoolDaniela Chibac
82 views4 slides
Cyber Security_Presentation_KTH by
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
1.2K views81 slides
Paul Ho - Wireless Infrastructure for Mobile e-Learning by
Paul Ho - Wireless Infrastructure for Mobile e-LearningPaul Ho - Wireless Infrastructure for Mobile e-Learning
Paul Ho - Wireless Infrastructure for Mobile e-LearningeLearning Consortium 電子學習聯盟
592 views19 slides
Richard Athie (Resume 8:2016) by
Richard Athie (Resume 8:2016) Richard Athie (Resume 8:2016)
Richard Athie (Resume 8:2016) Richard Athie, MBA
121 views3 slides
BrewerResume2014 by
BrewerResume2014BrewerResume2014
BrewerResume2014Tim Brewer
250 views2 slides

Similar to William Paterson University(20)

Cyber Security_Presentation_KTH by Awais Shibli
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
Awais Shibli1.2K views
BrewerResume2014 by Tim Brewer
BrewerResume2014BrewerResume2014
BrewerResume2014
Tim Brewer250 views
Daniel's Resume (5.5.15) by Daniel Lee
Daniel's Resume (5.5.15)Daniel's Resume (5.5.15)
Daniel's Resume (5.5.15)
Daniel Lee160 views
rons resume Final by Ron Carter
rons resume Finalrons resume Final
rons resume Final
Ron Carter219 views
It support specialist by steve60067
It support specialistIt support specialist
It support specialist
steve6006763 views
Keion_Lymon_Resume by Keion Lymon
Keion_Lymon_ResumeKeion_Lymon_Resume
Keion_Lymon_Resume
Keion Lymon165 views
Franklin Sudi Resume.DOC by franklin sudi
Franklin Sudi Resume.DOCFranklin Sudi Resume.DOC
Franklin Sudi Resume.DOC
franklin sudi437 views
MY RESUME ANTHONY by tonny davis
MY RESUME ANTHONYMY RESUME ANTHONY
MY RESUME ANTHONY
tonny davis262 views
Dave Davis: Infrastructure Projects – What Makes then Different and Difficult? by Edunomica
Dave Davis: Infrastructure Projects – What Makes then Different and Difficult?Dave Davis: Infrastructure Projects – What Makes then Different and Difficult?
Dave Davis: Infrastructure Projects – What Makes then Different and Difficult?
Edunomica72 views
NetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14Updated by Kevin Moore MSIT, MISM
NetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14UpdatedNetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14Updated
NetSecurityProfNew_Resume_2_COVERPAGES_CCENT_VER_13_DEC_14Updated

More from Cisco Security

Incident Response Services Template - Cisco Security by
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityCisco Security
11.2K views2 slides
Pervasive Security Across Your Extended Network by
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkCisco Security
6.4K views1 slide
3 Tips for Choosing a Next Generation Firewall by
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation FirewallCisco Security
2.5K views1 slide
AMP Helps Cisco IT Catch 50% More Malware threats by
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsCisco Security
4.9K views1 slide
The Cost of Inactivity: Malware Infographic by
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicCisco Security
1.7K views1 slide
Cisco Addresses the Full Attack Continuum by
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
4.4K views21 slides

More from Cisco Security(17)

Incident Response Services Template - Cisco Security by Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
Cisco Security11.2K views
Pervasive Security Across Your Extended Network by Cisco Security
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
Cisco Security6.4K views
3 Tips for Choosing a Next Generation Firewall by Cisco Security
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
Cisco Security2.5K views
AMP Helps Cisco IT Catch 50% More Malware threats by Cisco Security
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
Cisco Security4.9K views
The Cost of Inactivity: Malware Infographic by Cisco Security
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
Cisco Security1.7K views
Cisco Addresses the Full Attack Continuum by Cisco Security
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security4.4K views
Infonetics Network and Content Security Vendor Scorecard by Cisco Security
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
Cisco Security2.2K views
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ... by Cisco Security
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Cisco Security7.3K views
The Evolution of and Need for Secure Network Access by Cisco Security
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
Cisco Security2.6K views
Cisco 2014 Midyear Security Report by Cisco Security
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
Cisco Security2.4K views
String of Paerls Infographic by Cisco Security
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
Cisco Security1.4K views
Midyear Security Report Infographic by Cisco Security
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
Cisco Security478 views
Cisco Annual Security Report Infographic by Cisco Security
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report Infographic
Cisco Security602 views
City of Tomorrow Builds in Next-Generation Security by Cisco Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
Cisco Security2.2K views
Laser Pioneer Secures Network End-to-End to Protect Assets by Cisco Security
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security1.1K views
Leveraging Context-Aware Security to Safeguard Patient Data by Cisco Security
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
Cisco Security1.1K views
Secure, Automated Network Access for Any Device on Campus by Cisco Security
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
Cisco Security669 views

Recently uploaded

Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates by
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesShapeBlue
210 views15 slides
State of the Union - Rohit Yadav - Apache CloudStack by
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStackShapeBlue
253 views53 slides
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ by
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericShapeBlue
88 views9 slides
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Safe Software
385 views86 slides
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...ShapeBlue
98 views29 slides
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
160 views29 slides

Recently uploaded(20)

Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates by ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue210 views
State of the Union - Rohit Yadav - Apache CloudStack by ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue253 views
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ by ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue88 views
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software385 views
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... by ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue98 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc160 views
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... by ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue120 views
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... by ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue144 views
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... by ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue101 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... by ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue123 views
DRBD Deep Dive - Philipp Reisner - LINBIT by ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue140 views
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... by ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue146 views
The Power of Heat Decarbonisation Plans in the Built Environment by IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE69 views
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... by ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue132 views
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue by ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlueMigrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
Migrating VMware Infra to KVM Using CloudStack - Nicolas Vazquez - ShapeBlue
ShapeBlue176 views
Future of AR - Facebook Presentation by Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty62 views
Business Analyst Series 2023 - Week 4 Session 7 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10126 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive

William Paterson University

  • 1. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 ImpactChallenges Why Cisco? SolutionCustomer Stats William Paterson University • Industry: Education • Students: 11,500 • Faculty/Staff: 1,150 • Location: Wayne, NJ • Five colleges include Arts and Communication, Education, Humanities and Social Sciences, Science and Health, and the Cotsakos College of Business. • Founded in 1855. • Facilitates secure manual registration by users if not 802.1X compliant. • Eliminates server crashes, for 100 percent uptime. • Reduces staff troubleshooting time by 10 percent. • Streamlines security policy- setting, enabling complex rules to be grouped together in sets due to design improvements. • Allows policy rules to be easily upgraded. • Unable to define policy re how 802.1X-compatible and non-compatible devices accessed network due to design limitation, increasing network risk. • Had issues with profiling that would cause server crashes when enabled. • Experienced influx of wireless devices brought on campus by students, faculty, and staff, requiring secure network access and increasing load, complexity, and staff support needed. • Transitioned to Cisco Identity Services Engine (ISE) 1.2 to facilitate consistent, secure wireless network access by students bringing range of devices on campus, broadening reach of bring- your-own-device (BYOD) policy. • Cisco ISE 1.2 Cisco NAC • Cisco AnyConnect® • Cisco ASA 5585 Firewalls with Cisco IPS SSP 10 Sensors • Cisco Wireless LAN Controllers 5500 “With the converged Cisco solution, we can now centralize monitoring and management for all our resources and provide better support and services to users without increasing IT staff.” — Brian C. Young, Infrastructure Manager, Adena Health System “Our goal is to get as many people on our network as quickly, securely, and reliably as possible without our involvement. ISE 1.2 enables us to do that.” -- Rob Tavoularis, Netw ork Administrator, William Paterson University