SlideShare a Scribd company logo
Maintaining a
Secure—and
Open—Campus
Punahou School is the largest coeducational, independent K-12 school on a single
campus in the United States. Located in Honolulu, the campus covers a lush 77
acres with 60 buildings, and ongoing renovation and renewal. Rigorous academics,
robust programs in athletics and the arts, and an array of cocurricular opportunities
offer an integrated, 21st-century education.
Unlike school campuses in other U.S. states, Punahou’s classroom buildings typically
lack interior hallways, and most doors open to the outdoors to take advantage of the
mild climate. In additional, much of the student experience spans multiple buildings,
and the school has intentionally remained open to the community. That fact has
important implications for campus security. Many entry points must be monitored.
Video security equipment must be designed for outdoor conditions. And, as across
the United States, safety concerns have increased.
Punahou School connects its security team with the
tools it needs to increase campus safety.
“Although our security officers are the cornerstone of campus
security, Cisco Connected Security solutions are an important
tool in their security toolset. Cameras and a human presence
across campus assure students, parents, and staff that safety and
security are of the utmost importance at Punahou School.”- Wendi Kamiya, Chief Information Officer
•	 Continue to extend and enhance safety
•	 Expand deployment of IP video security cameras while
improving coverage and image quality
•	 Continue public use of the campus without compromising safety
Challenges
Case Study | Punahou School
Size: 3,750 Students Location: Honolulu, Hawaii USA Industry: Education
© 2015 Cisco and/or its affiliates. All rights reserved. 1
“Without technology, we would have to add people and physical structures to
increase security,” says Wendi Kamiya, chief information officer at Punahou School.
“We don’t want the campus to feel restrictive or locked down, yet we need visibility
in places that might not be patrolled frequently.”
The cornerstone of Punahou’s security program is human presence. A combination
of full-time and part-time security officers patrol the campus with assistance during
the day from two law enforcement officers. Although a video security system was
deployed in 2006 at the same time as a Cisco® Wireless network, coverage was
inadequate and image quality was poor, making it difficult to positively identify a
person or vehicle if necessary.
“We needed to add cameras to cover more locations,” says Billy Luat, director of
campus security for Punahou School. “However, the vendor was not responsive, so
we were left without support for our existing cameras and couldn’t expand.”
Everything is connected as we evolve.
We don’t even debate about it. It’s part of
future-proofing our campus.
•	 Deployed Cisco® Connected Safety and Security solutions
and integrated them with the existing InformaCast system
•	 Virtualized video security with Cisco virtualized video
surveillance software on Cisco Unified Computing Systems™
(Cisco UCS®) platforms
•	 Built on the existing Cisco switched and wireless networks to
connect more processes and systems
Solutions
Better Cameras Yield Better Evidence
Punahou School turned to Cisco Video Surveillance IP Cameras for its security
expansion. The new cameras provide everything Punahou wanted in cameras:
high-definition (HD) imagery with pan, tilt, rotate, and zoom features and a wide
range of flexible resolution and frame rates. The cameras also are ruggedized to
resist vandalism and extreme outdoor conditions.
“The image quality is amazing,” says Luat. “We can see the entire campus and
target specific areas. Even mounted 75 feet from the main gate, we get license
plate quality. Now we can easily produce high-definition factual evidence, which is
important when situations arise.”
Making Video Security Actionable
With Cisco Video Surveillance Media Server Software on its Cisco UCS platforms,
Punahou has a powerful solution for maximizing situational awareness and real-
time response. No matter how many IP cameras are deployed on campus, the
security team has instant access to video frames. Luat can quickly view and play
back specific frames from his smartphone and work with campus administrators to
take appropriate action.
© 2015 Cisco and/or its affiliates. All rights reserved. 2
3
Connecting Systems with the Internet of Everything
The new solutions in place at Punahou School connect people, processes, data,
and things better than ever. This is the Internet of Everything (IoE). The original
Cisco Wireless network has grown to more than 300 access points. Cisco Unified
Communications solutions, including Cisco Unity® voicemail and Cisco Unified
IP phones are also connected, giving the school complete visibility to a common
platform. Wireless door locks and the accompanying software are connected to
the network, helping the school manage operations more efficiently. The school
can access and manage its photovoltaic sensors, which generate solar power
for the school from the network. Campus lighting and heating, ventilating, and
air conditioning (HVAC) systems connect through a VPN and Cisco firewalls for
secure remote controllability.
“As Punahou continues to create an engaging, relevant, inspiring learning
environment, everything is connected,” says David Parrish, chief architect for
Punahou School. “We don’t even debate about it. We just keep leveraging our
switch infrastructure as part of future-proofing our campus.”
•	 Improved communication, safety, and emergency response
•	 Improved processes, operational efficiency, and access to
data through the IoE
•	 Retained the accessibility and openness of the campus
while simultaneously enhancing breadth and depth of
security measures
Results
Enhancing Emergency Response
InformaCast is the heart of Punahou School’s on-campus emergency response
system. It’s integrated with the Cisco network and Cisco Connected Security
solutions to deliver full-featured emergency notification capabilities everywhere
the network reaches. The security team can reach an unlimited number of Cisco IP
phones, speakers, selected cell phones, and other devices through InformaCast in
the event of an emergency.
“We can deliver text messages on classroom phone displays to teachers and
staff instantly,” says Luat. “The system streamlines and supports our processes in
real time and lets us automate delivery of messages. We couldn’t lock down the
campus without it.”
Peace of Mind…
“Although our security officers are the cornerstone of campus security, Cisco
Connected Security solutions are an important tool in their security toolset,”
says Kamiya. “Cameras and a human presence across campus assure students,
parents, and staff that safety and security are of the utmost importance at
Punahou School.”
© 2015 Cisco and/or its affiliates. All rights reserved. 3
…With Practicality
When the security team needs to depend on the cameras, they can. Even if
officers don’t frequently patrol an area, it’s still covered. Cameras help deter
nighttime activity by their presence.
What’s Next?
Punahou School continues to add cameras as buildings are replaced and new
buildings are constructed. Originally starting with 30 cameras, today there are 85
cameras, and the school plans to deploy more than 100 by the end of 2015.
“We expect to build on our InformaCast system, adding the ability to activate
alarms from a smartphone or anywhere on campus by an authorized security
team member,” says Parrish. “We also see the potential for adding digital-
signage solutions to our network. In addition to providing daily information, they
can be turned instantly into vehicles for emergency instructions and notifications
if needed. We view Cisco IoE solutions as long-term investments in our ability to
connect everything.”
© 2015 Cisco and/or its affiliates. All rights reserved. 4
Products  Services
Data Center
•	 Cisco Unified Computing Systems™
(Cisco UCS®)
Routing and Switching
•	 Cisco Catalyst 3750 Series Switches
•	 Cisco Catalyst 3560 Series Switches
•	 Cisco Catalyst 2940 Series Switches
•	 Cisco 3800 Series Integrated Services
Routers
Fabric Interconnects
Network Management
•	 Cisco Security Monitoring, Analysis and
Response
•	 CiscoWorks LAN Management Solution
•	 Cisco Catalyst 6500 Series Network
Analysis Module
Virtualization
Applications
•	 Cisco Video Surveillance 6000 Series
IP Cameras
Voice and IP Communications
•	 Cisco Unified Enterprise Attendant
Console
•	 Cisco IP Interoperability and
Collaboration System
•	 Cisco Unified Communications Manager
•	 Catalyst 6500 Series Wireless Services
Module
•	 Cisco Wireless Control System
•	 Cisco Aironet Series wireless access
points
OS
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (1110R)
Americas Headquarters
Cisco Systems, Inc.
San Jose, CA
Asia Pacific Headquarters
Cisco Systems (USA) Pte. Ltd.
Singapore
Europe Headquarters
Cisco Systems International BV Amsterdam,
The Netherlands
DRMKT-19464 08/15

More Related Content

What's hot

William Paterson University
William Paterson UniversityWilliam Paterson University
William Paterson University
Cisco Security
 
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...
Abbas Shahid Baqir
 
Is your network ready for the Internet of Things?
Is your network ready for the Internet of Things?Is your network ready for the Internet of Things?
Is your network ready for the Internet of Things?
Alcatel-Lucent Enterprise
 
Ecole Polytechnique Federale de Lausanne (EPFL)
Ecole Polytechnique Federale de Lausanne (EPFL)Ecole Polytechnique Federale de Lausanne (EPFL)
Ecole Polytechnique Federale de Lausanne (EPFL)
Cisco Case Studies
 
Embracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud ComputingEmbracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud Computing
PECB
 
Cisco ccna security
Cisco ccna securityCisco ccna security
Cisco ccna security
Mt Mostafa
 
IRJET- IBMS: Intrusion Based Movement Detection System
IRJET- IBMS: Intrusion Based Movement Detection SystemIRJET- IBMS: Intrusion Based Movement Detection System
IRJET- IBMS: Intrusion Based Movement Detection System
IRJET Journal
 
Cisco Connect 2018 Malaysia - introducing cisco dna assurance-the future of n...
Cisco Connect 2018 Malaysia - introducing cisco dna assurance-the future of n...Cisco Connect 2018 Malaysia - introducing cisco dna assurance-the future of n...
Cisco Connect 2018 Malaysia - introducing cisco dna assurance-the future of n...
NetworkCollaborators
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Internetwork Engineering (IE)
 
Avaya Safe School Solution AlturaCS
Avaya Safe School Solution AlturaCSAvaya Safe School Solution AlturaCS
Avaya Safe School Solution AlturaCS
Altura Communication Solutions
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
PECB
 
Altinet_Education_Brochure
Altinet_Education_BrochureAltinet_Education_Brochure
Altinet_Education_BrochureHenry Doyle
 
Cyber intelligence 4 u overview for slideshare
Cyber intelligence 4 u overview for slideshareCyber intelligence 4 u overview for slideshare
Cyber intelligence 4 u overview for slideshare
M. Ariel Evans
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
Vaughan Olufemi ACIB, AICEN, ANIM
 
Networking Training in Ludhiana
Networking Training in LudhianaNetworking Training in Ludhiana
Networking Training in Ludhiana
E2Matrix
 
BCA – cloud technology & information security
BCA – cloud technology & information securityBCA – cloud technology & information security
BCA – cloud technology & information security
iNurture Education Solution pvt ltd
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
Harsh Kishore Mishra
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
PECB
 

What's hot (20)

William Paterson University
William Paterson UniversityWilliam Paterson University
William Paterson University
 
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...
 
Is your network ready for the Internet of Things?
Is your network ready for the Internet of Things?Is your network ready for the Internet of Things?
Is your network ready for the Internet of Things?
 
Ecole Polytechnique Federale de Lausanne (EPFL)
Ecole Polytechnique Federale de Lausanne (EPFL)Ecole Polytechnique Federale de Lausanne (EPFL)
Ecole Polytechnique Federale de Lausanne (EPFL)
 
Embracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud ComputingEmbracing Cybersecurity on Cloud Computing
Embracing Cybersecurity on Cloud Computing
 
Cisco ccna security
Cisco ccna securityCisco ccna security
Cisco ccna security
 
IRJET- IBMS: Intrusion Based Movement Detection System
IRJET- IBMS: Intrusion Based Movement Detection SystemIRJET- IBMS: Intrusion Based Movement Detection System
IRJET- IBMS: Intrusion Based Movement Detection System
 
CS-LRC-0114
CS-LRC-0114CS-LRC-0114
CS-LRC-0114
 
Cisco Connect 2018 Malaysia - introducing cisco dna assurance-the future of n...
Cisco Connect 2018 Malaysia - introducing cisco dna assurance-the future of n...Cisco Connect 2018 Malaysia - introducing cisco dna assurance-the future of n...
Cisco Connect 2018 Malaysia - introducing cisco dna assurance-the future of n...
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
 
Avaya Safe School Solution AlturaCS
Avaya Safe School Solution AlturaCSAvaya Safe School Solution AlturaCS
Avaya Safe School Solution AlturaCS
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
Implementing of a Cyber Security Program Framework from ISO 27032 to ISO 55001
 
Altinet_Education_Brochure
Altinet_Education_BrochureAltinet_Education_Brochure
Altinet_Education_Brochure
 
Cyber intelligence 4 u overview for slideshare
Cyber intelligence 4 u overview for slideshareCyber intelligence 4 u overview for slideshare
Cyber intelligence 4 u overview for slideshare
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Networking Training in Ludhiana
Networking Training in LudhianaNetworking Training in Ludhiana
Networking Training in Ludhiana
 
BCA – cloud technology & information security
BCA – cloud technology & information securityBCA – cloud technology & information security
BCA – cloud technology & information security
 
BYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security IssuesBYOD: Bring Your Own Device Implementation and Security Issues
BYOD: Bring Your Own Device Implementation and Security Issues
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 

Viewers also liked

IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
Cisco Mobility
 
Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceCisco Mobility
 
iPads on Your Network? Real, Secure Mobile Solutions
iPads on Your Network? Real, Secure Mobile SolutionsiPads on Your Network? Real, Secure Mobile Solutions
iPads on Your Network? Real, Secure Mobile SolutionsCisco Mobility
 
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportWireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Cisco Mobility
 
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best PracticesManaging the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Cisco Mobility
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
Cisco Mobility
 
Secure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Secure Mobility in Cisco Unified WLAN Networks for Mobile DevicesSecure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Secure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Cisco Mobility
 
Understanding CleanAir Technology to improve enterprise WLAN spectrum management
Understanding CleanAir Technology to improve enterprise WLAN spectrum managementUnderstanding CleanAir Technology to improve enterprise WLAN spectrum management
Understanding CleanAir Technology to improve enterprise WLAN spectrum management
Cisco Mobility
 
Conquering the 802.11ac Shift
Conquering the 802.11ac ShiftConquering the 802.11ac Shift
Conquering the 802.11ac Shift
Cisco Mobility
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
Cisco Mobility
 
Preparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acPreparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11ac
Cisco Mobility
 
Technical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesTechnical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switches
Cisco Mobility
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
Cisco Mobility
 
Wireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureWireless Branch Office Network Architecture
Wireless Branch Office Network Architecture
Cisco Mobility
 
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Cisco Mobility
 
Design and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless NetworksDesign and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless Networks
Cisco Mobility
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
Cisco Mobility
 
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless ServicesDeploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
Cisco Mobility
 

Viewers also liked (18)

IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Beyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any WorkspaceBeyond BYOD: Uncompromised Experience for Any Workspace
Beyond BYOD: Uncompromised Experience for Any Workspace
 
iPads on Your Network? Real, Secure Mobile Solutions
iPads on Your Network? Real, Secure Mobile SolutionsiPads on Your Network? Real, Secure Mobile Solutions
iPads on Your Network? Real, Secure Mobile Solutions
 
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportWireless Controller Comparative Performance Cisco vs Aruba Miercom Report
Wireless Controller Comparative Performance Cisco vs Aruba Miercom Report
 
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best PracticesManaging the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
Managing the Mobile Device Wave for Enterpise Wireless Networks: Best Practices
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Secure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Secure Mobility in Cisco Unified WLAN Networks for Mobile DevicesSecure Mobility in Cisco Unified WLAN Networks for Mobile Devices
Secure Mobility in Cisco Unified WLAN Networks for Mobile Devices
 
Understanding CleanAir Technology to improve enterprise WLAN spectrum management
Understanding CleanAir Technology to improve enterprise WLAN spectrum managementUnderstanding CleanAir Technology to improve enterprise WLAN spectrum management
Understanding CleanAir Technology to improve enterprise WLAN spectrum management
 
Conquering the 802.11ac Shift
Conquering the 802.11ac ShiftConquering the 802.11ac Shift
Conquering the 802.11ac Shift
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
 
Preparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acPreparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11ac
 
Technical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switchesTechnical overview of new cisco catalyst multigigabit switches
Technical overview of new cisco catalyst multigigabit switches
 
iPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and ManagementiPads on your network? Take Control with Unified Policy and Management
iPads on your network? Take Control with Unified Policy and Management
 
Wireless Branch Office Network Architecture
Wireless Branch Office Network ArchitectureWireless Branch Office Network Architecture
Wireless Branch Office Network Architecture
 
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
Hyatt Regency Transforms Guest Experiences and Bottom Line with Cisco Wi-Fi a...
 
Design and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless NetworksDesign and Deployment of Outdoor Mesh Wireless Networks
Design and Deployment of Outdoor Mesh Wireless Networks
 
Wireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
 
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless ServicesDeploying the Cisco Mobility Services Engine for Advanced Wireless Services
Deploying the Cisco Mobility Services Engine for Advanced Wireless Services
 

Similar to Internet of Everything Case Study: Punahou School

AASTMT Case Study
AASTMT Case StudyAASTMT Case Study
AASTMT Case Study
Cisco Case Studies
 
Cisco's Digital Education Platform Helps Students Learn Without Limits!
Cisco's Digital Education Platform Helps Students Learn Without Limits!Cisco's Digital Education Platform Helps Students Learn Without Limits!
Cisco's Digital Education Platform Helps Students Learn Without Limits!
Amy Blanchard
 
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation SecurityCASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
Purdicom
 
University of Granada
University of Granada University of Granada
University of Granada
Cisco Case Studies
 
Datasheet
DatasheetDatasheet
Datasheet
Carlos urrea
 
University of Granada
University of GranadaUniversity of Granada
University of Granada
Cisco Case Studies
 
The Polytechnic of Namibia
The Polytechnic of NamibiaThe Polytechnic of Namibia
The Polytechnic of Namibia
Cisco Case Studies
 
Case Study: Matthew Arnold School enhances network security with iboss
Case Study: Matthew Arnold School enhances network security with ibossCase Study: Matthew Arnold School enhances network security with iboss
Case Study: Matthew Arnold School enhances network security with iboss
Purdicom
 
McAllen Intermediate School District
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School District
Cisco Security
 
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...Tammy Clark
 
Profile IoT Anywhere Anytime Learning Experience 2015 April
Profile IoT Anywhere Anytime Learning Experience 2015 AprilProfile IoT Anywhere Anytime Learning Experience 2015 April
Profile IoT Anywhere Anytime Learning Experience 2015 AprilTerry Vahey
 
Customer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rigCustomer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rig
ANIL247048
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Securitynmullen
 
Education: Industries we Serve
Education: Industries we ServeEducation: Industries we Serve
Education: Industries we Serve
The TNS Group
 
Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service
patricia franklin
 
Epoch Universal Solution: Security Offerings
Epoch Universal Solution: Security OfferingsEpoch Universal Solution: Security Offerings
Epoch Universal Solution: Security Offerings
Epoch Universal, Inc.
 
University of the West of Scotland implements a Multi-Campus Juniper Networks...
University of the West of Scotland implements a Multi-Campus Juniper Networks...University of the West of Scotland implements a Multi-Campus Juniper Networks...
University of the West of Scotland implements a Multi-Campus Juniper Networks...
Juniper Networks UKI
 
Campus Mobility
Campus MobilityCampus Mobility
Campus Mobility
Mark Boorman
 

Similar to Internet of Everything Case Study: Punahou School (20)

AASTMT Case Study
AASTMT Case StudyAASTMT Case Study
AASTMT Case Study
 
Cisco's Digital Education Platform Helps Students Learn Without Limits!
Cisco's Digital Education Platform Helps Students Learn Without Limits!Cisco's Digital Education Platform Helps Students Learn Without Limits!
Cisco's Digital Education Platform Helps Students Learn Without Limits!
 
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation SecurityCASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
CASE STUDY: Sweyne Park School Upgrades to iBoss Next Generation Security
 
University of Granada
University of Granada University of Granada
University of Granada
 
Datasheet
DatasheetDatasheet
Datasheet
 
University of Granada
University of GranadaUniversity of Granada
University of Granada
 
The Polytechnic of Namibia
The Polytechnic of NamibiaThe Polytechnic of Namibia
The Polytechnic of Namibia
 
Case Study: Matthew Arnold School enhances network security with iboss
Case Study: Matthew Arnold School enhances network security with ibossCase Study: Matthew Arnold School enhances network security with iboss
Case Study: Matthew Arnold School enhances network security with iboss
 
McAllen Intermediate School District
McAllen Intermediate School DistrictMcAllen Intermediate School District
McAllen Intermediate School District
 
UPAEP V4CS[4]
UPAEP V4CS[4]UPAEP V4CS[4]
UPAEP V4CS[4]
 
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
 
Profile IoT Anywhere Anytime Learning Experience 2015 April
Profile IoT Anywhere Anytime Learning Experience 2015 AprilProfile IoT Anywhere Anytime Learning Experience 2015 April
Profile IoT Anywhere Anytime Learning Experience 2015 April
 
Customer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rigCustomer case study © 2010 cisco systems, inc. all rig
Customer case study © 2010 cisco systems, inc. all rig
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Security
 
Education: Industries we Serve
Education: Industries we ServeEducation: Industries we Serve
Education: Industries we Serve
 
ConnieJusticeCV-2016
ConnieJusticeCV-2016ConnieJusticeCV-2016
ConnieJusticeCV-2016
 
Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service Customer Success Story on NuEDUSEC Internet Security Service
Customer Success Story on NuEDUSEC Internet Security Service
 
Epoch Universal Solution: Security Offerings
Epoch Universal Solution: Security OfferingsEpoch Universal Solution: Security Offerings
Epoch Universal Solution: Security Offerings
 
University of the West of Scotland implements a Multi-Campus Juniper Networks...
University of the West of Scotland implements a Multi-Campus Juniper Networks...University of the West of Scotland implements a Multi-Campus Juniper Networks...
University of the West of Scotland implements a Multi-Campus Juniper Networks...
 
Campus Mobility
Campus MobilityCampus Mobility
Campus Mobility
 

More from Cisco Mobility

Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized Controllers
Cisco Mobility
 
Understanding RF Fundamentals and the Radio Design of Wireless Networks
Understanding RF Fundamentals and the Radio Design of Wireless NetworksUnderstanding RF Fundamentals and the Radio Design of Wireless Networks
Understanding RF Fundamentals and the Radio Design of Wireless Networks
Cisco Mobility
 
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCSManaging an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
Cisco Mobility
 
Design and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss NetworksDesign and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss Networks
Cisco Mobility
 
Wireless LAN Design and Deployment of Rich Media Networks
Wireless LAN Design and Deployment of Rich Media NetworksWireless LAN Design and Deployment of Rich Media Networks
Wireless LAN Design and Deployment of Rich Media Networks
Cisco Mobility
 
Cisco OfficeExtend: Secure, High-Performance Wireless for Teleworkers
Cisco OfficeExtend: Secure, High-Performance Wireless for TeleworkersCisco OfficeExtend: Secure, High-Performance Wireless for Teleworkers
Cisco OfficeExtend: Secure, High-Performance Wireless for Teleworkers
Cisco Mobility
 

More from Cisco Mobility (6)

Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized Controllers
 
Understanding RF Fundamentals and the Radio Design of Wireless Networks
Understanding RF Fundamentals and the Radio Design of Wireless NetworksUnderstanding RF Fundamentals and the Radio Design of Wireless Networks
Understanding RF Fundamentals and the Radio Design of Wireless Networks
 
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCSManaging an Enterprise WLAN with Cisco Prime NCS & WCS
Managing an Enterprise WLAN with Cisco Prime NCS & WCS
 
Design and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss NetworksDesign and Deployment of Enterprise Wirlesss Networks
Design and Deployment of Enterprise Wirlesss Networks
 
Wireless LAN Design and Deployment of Rich Media Networks
Wireless LAN Design and Deployment of Rich Media NetworksWireless LAN Design and Deployment of Rich Media Networks
Wireless LAN Design and Deployment of Rich Media Networks
 
Cisco OfficeExtend: Secure, High-Performance Wireless for Teleworkers
Cisco OfficeExtend: Secure, High-Performance Wireless for TeleworkersCisco OfficeExtend: Secure, High-Performance Wireless for Teleworkers
Cisco OfficeExtend: Secure, High-Performance Wireless for Teleworkers
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

Internet of Everything Case Study: Punahou School

  • 1. Maintaining a Secure—and Open—Campus Punahou School is the largest coeducational, independent K-12 school on a single campus in the United States. Located in Honolulu, the campus covers a lush 77 acres with 60 buildings, and ongoing renovation and renewal. Rigorous academics, robust programs in athletics and the arts, and an array of cocurricular opportunities offer an integrated, 21st-century education. Unlike school campuses in other U.S. states, Punahou’s classroom buildings typically lack interior hallways, and most doors open to the outdoors to take advantage of the mild climate. In additional, much of the student experience spans multiple buildings, and the school has intentionally remained open to the community. That fact has important implications for campus security. Many entry points must be monitored. Video security equipment must be designed for outdoor conditions. And, as across the United States, safety concerns have increased. Punahou School connects its security team with the tools it needs to increase campus safety. “Although our security officers are the cornerstone of campus security, Cisco Connected Security solutions are an important tool in their security toolset. Cameras and a human presence across campus assure students, parents, and staff that safety and security are of the utmost importance at Punahou School.”- Wendi Kamiya, Chief Information Officer • Continue to extend and enhance safety • Expand deployment of IP video security cameras while improving coverage and image quality • Continue public use of the campus without compromising safety Challenges Case Study | Punahou School Size: 3,750 Students Location: Honolulu, Hawaii USA Industry: Education © 2015 Cisco and/or its affiliates. All rights reserved. 1
  • 2. “Without technology, we would have to add people and physical structures to increase security,” says Wendi Kamiya, chief information officer at Punahou School. “We don’t want the campus to feel restrictive or locked down, yet we need visibility in places that might not be patrolled frequently.” The cornerstone of Punahou’s security program is human presence. A combination of full-time and part-time security officers patrol the campus with assistance during the day from two law enforcement officers. Although a video security system was deployed in 2006 at the same time as a Cisco® Wireless network, coverage was inadequate and image quality was poor, making it difficult to positively identify a person or vehicle if necessary. “We needed to add cameras to cover more locations,” says Billy Luat, director of campus security for Punahou School. “However, the vendor was not responsive, so we were left without support for our existing cameras and couldn’t expand.” Everything is connected as we evolve. We don’t even debate about it. It’s part of future-proofing our campus. • Deployed Cisco® Connected Safety and Security solutions and integrated them with the existing InformaCast system • Virtualized video security with Cisco virtualized video surveillance software on Cisco Unified Computing Systems™ (Cisco UCS®) platforms • Built on the existing Cisco switched and wireless networks to connect more processes and systems Solutions Better Cameras Yield Better Evidence Punahou School turned to Cisco Video Surveillance IP Cameras for its security expansion. The new cameras provide everything Punahou wanted in cameras: high-definition (HD) imagery with pan, tilt, rotate, and zoom features and a wide range of flexible resolution and frame rates. The cameras also are ruggedized to resist vandalism and extreme outdoor conditions. “The image quality is amazing,” says Luat. “We can see the entire campus and target specific areas. Even mounted 75 feet from the main gate, we get license plate quality. Now we can easily produce high-definition factual evidence, which is important when situations arise.” Making Video Security Actionable With Cisco Video Surveillance Media Server Software on its Cisco UCS platforms, Punahou has a powerful solution for maximizing situational awareness and real- time response. No matter how many IP cameras are deployed on campus, the security team has instant access to video frames. Luat can quickly view and play back specific frames from his smartphone and work with campus administrators to take appropriate action. © 2015 Cisco and/or its affiliates. All rights reserved. 2
  • 3. 3 Connecting Systems with the Internet of Everything The new solutions in place at Punahou School connect people, processes, data, and things better than ever. This is the Internet of Everything (IoE). The original Cisco Wireless network has grown to more than 300 access points. Cisco Unified Communications solutions, including Cisco Unity® voicemail and Cisco Unified IP phones are also connected, giving the school complete visibility to a common platform. Wireless door locks and the accompanying software are connected to the network, helping the school manage operations more efficiently. The school can access and manage its photovoltaic sensors, which generate solar power for the school from the network. Campus lighting and heating, ventilating, and air conditioning (HVAC) systems connect through a VPN and Cisco firewalls for secure remote controllability. “As Punahou continues to create an engaging, relevant, inspiring learning environment, everything is connected,” says David Parrish, chief architect for Punahou School. “We don’t even debate about it. We just keep leveraging our switch infrastructure as part of future-proofing our campus.” • Improved communication, safety, and emergency response • Improved processes, operational efficiency, and access to data through the IoE • Retained the accessibility and openness of the campus while simultaneously enhancing breadth and depth of security measures Results Enhancing Emergency Response InformaCast is the heart of Punahou School’s on-campus emergency response system. It’s integrated with the Cisco network and Cisco Connected Security solutions to deliver full-featured emergency notification capabilities everywhere the network reaches. The security team can reach an unlimited number of Cisco IP phones, speakers, selected cell phones, and other devices through InformaCast in the event of an emergency. “We can deliver text messages on classroom phone displays to teachers and staff instantly,” says Luat. “The system streamlines and supports our processes in real time and lets us automate delivery of messages. We couldn’t lock down the campus without it.” Peace of Mind… “Although our security officers are the cornerstone of campus security, Cisco Connected Security solutions are an important tool in their security toolset,” says Kamiya. “Cameras and a human presence across campus assure students, parents, and staff that safety and security are of the utmost importance at Punahou School.” © 2015 Cisco and/or its affiliates. All rights reserved. 3
  • 4. …With Practicality When the security team needs to depend on the cameras, they can. Even if officers don’t frequently patrol an area, it’s still covered. Cameras help deter nighttime activity by their presence. What’s Next? Punahou School continues to add cameras as buildings are replaced and new buildings are constructed. Originally starting with 30 cameras, today there are 85 cameras, and the school plans to deploy more than 100 by the end of 2015. “We expect to build on our InformaCast system, adding the ability to activate alarms from a smartphone or anywhere on campus by an authorized security team member,” says Parrish. “We also see the potential for adding digital- signage solutions to our network. In addition to providing daily information, they can be turned instantly into vehicles for emergency instructions and notifications if needed. We view Cisco IoE solutions as long-term investments in our ability to connect everything.” © 2015 Cisco and/or its affiliates. All rights reserved. 4 Products Services Data Center • Cisco Unified Computing Systems™ (Cisco UCS®) Routing and Switching • Cisco Catalyst 3750 Series Switches • Cisco Catalyst 3560 Series Switches • Cisco Catalyst 2940 Series Switches • Cisco 3800 Series Integrated Services Routers Fabric Interconnects Network Management • Cisco Security Monitoring, Analysis and Response • CiscoWorks LAN Management Solution • Cisco Catalyst 6500 Series Network Analysis Module Virtualization Applications • Cisco Video Surveillance 6000 Series IP Cameras Voice and IP Communications • Cisco Unified Enterprise Attendant Console • Cisco IP Interoperability and Collaboration System • Cisco Unified Communications Manager • Catalyst 6500 Series Wireless Services Module • Cisco Wireless Control System • Cisco Aironet Series wireless access points OS Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Americas Headquarters Cisco Systems, Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems (USA) Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands DRMKT-19464 08/15