SlideShare a Scribd company logo
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 4
Customer Case Study
EXECUTIVE SUMMARY
Customer Name: Coherent, Inc.
Industry: Manufacturing
Location: Santa Clara, CA
Number of Employees: 2400
CHALLENGE
● Mitigate inbound, outbound web threats to
protect network
● Address cost and staff efficiencies
SOLUTION
● Integrate Cloud Web Security to protect web
access
● Institute security service-level agreement
(SLA) for more complete, cost-effective
solution
● Leverage interoperability of range of Cisco
Security products
RESULTS
● Provides tighter security measures against
cyber threats
● Reduces costs by 10 percent through
bundling security products
● Supplies more granular reporting for better
decision-making
Laser Pioneer Secures Network End-to-End to
Protect Assets
Coherent mitigates against global cyber threats with Cisco Cloud Web Security.
Challenge
Founded in 1966, Coherent, Inc. (NASDAQ: COHR) is a world leader
in photonics-based solutions, primarily lasers, for a range of
commercial and scientific research applications. The company
designs, manufactures, services, and markets lasers, laser tools,
precision optics, and related accessories. Its products are used in
microelectronics, scientific research and government programs,
original equipment manufacturer components, instrumentation, and
materials processing.
The company is headquartered in Santa Clara, California, with
locations across North America and in Europe and Asia, including 11
manufacturing sites and smaller sales and services locations. With
2400 employees, Coherent is growing at about 10 percent per year,
with accelerated expansion in Asia and Europe.
Coherent’s IT team recognized that it needed to address the growing
proliferation of web threats to its network to safeguard its business
and intellectual property. This proliferation put a strain on the team to
stay ahead of the explosion of malware, botnets, and other cyber-
security challenges worldwide. With a remote sales force and
services team, and more than 25 facilities, the company was looking
for additional inbound and outbound threat protection. Coherent wanted to help ensure protection down to its
smaller offices. The company’s IT team also needed to address cost and time savings, with its resources
increasingly limited.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 4
Solution
The company considered several competitive solutions, including Cisco
®
Cloud Web Security (CWS), due to its
longstanding relationship as a Cisco customer. After careful consideration, the Coherent IT team felt the Cisco
CWS would provide the kind of real-time protection from malware infections and improper or uncontrolled web
application use that it needed.
The inclusion of Cisco Security Intelligence Operations (SIO) to dynamically detect and block threats in real time
was of particular interest. The extension of the protection to mobile users with Cisco AnyConnect
®
Secure Mobility
Client is a critical feature for Coherent’s remote sales team.
The tight integration with Cisco ASA 5500 Series Adaptive Security Appliances and ISR G2 routers allows
extended coverage without the expense of additional hardware. The company already uses Cisco AnyConnect
VPN for its subcontractor community and third-party partners, and it uses Cisco ASA firewalls, so this simplified the
deployment.
By bundling its security solutions together through the Cisco Security Enterprise License Agreement (ELA),
Coherent found it could cost-effectively mitigate against security threats with a more complete coverage.
“In IT, it’s all about having to do more with less these days,” says Bryan Wise, director of information technology,
Coherent. “We already had experienced maintenance savings of about 70 percent by bundling Cisco’s firewall
functionality with IPS and with the VPN a few years ago. We were ready to see what other gains we might get
through the Cisco Security ELA.”
Coherent also has gained additional security protections from the Cisco Intrusion Prevention System (IPS),
integrated with the ASA firewalls, a significant feature for the company. The inclusion of the Cisco Web Security
Appliance (WSA), as well as Cloud Web Security integration on the ISR G2, in several locations provides an
additional measure of security, with the integrated web security solution giving them a choice of using McAfee or
Sophos anti-virus/anti-malware.
Cisco Email Security Appliance (ESA) has been smoothly implemented in Coherent’s environment of 2400
mailboxes. Through the ELA, the subscription is included, such that as the company adds offices, it can more
easily add users. Plans to deploy Cisco Identity Services Engine (ISE) are developing to provide network endpoint
protection for employee PCs and printers, through 802.1X authentication in their wired environment. This protection
will also be extended to their conference rooms.
“Having the entire security suite at our fingertips has given us agility to
enhance our toolbox on the fly. It’s been easy to manage, and we don’t
need to worry about whether to add security elements when we order
routers or firewalls; they just come included.”
— Bryan Wise, Director of Information Technology
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 4
PRODUCT LIST
Security
● Cisco Security Enterprise License Agreement
(ELA)
● Cisco ASA 5500 Series Adaptive Security
Appliance
● Cisco AnyConnect Secure Mobility Client
● Cisco Intrusion Prevention System (IPS)
● Cisco Cloud Web Security
● Cisco Cloud Email Security
● Cisco Web Security Appliance
● Cisco Identity Services Engine (ISE)
Routers and Switches
● Cisco ISR G2 Routers
● Cisco Catalyst
®
3750 and 6500 series
Data Center
● Cisco Unified Computing System™
(UCS®
)
C series
● Cisco Nexus
®
5500 series
Services
● Cisco Security IntelliShield
®
Results
The Cisco Security ELA gives Coherent a single point of contact
within Cisco to manage its comprehensive suite of products and
services. It also provides a blanket policy for implementation of new
products with a specific level of security.
“Since we rely so much on Cisco security, it was a bit of a no-
brainer,” says Wise. “We have identified a number of new features
we now use, including botnet tracking functionality, and other
products that were easy to turn on, because it’s all bundled together.”
“The cost savings by having all security products bundled together
versus purchasing one by one has been approximately 10 percent,”
says Wise.
According to Wise, the Coherent team has leveraged Cisco Cloud
Web Security to provide integrated protection with the Cisco ISR G2
routers, which more adeptly secures the company’s smaller sites.
“Having the entire security suite at our fingertips has given us agility
to enhance our toolbox on the fly,” Wise says. “It’s been easy to manage, and we don’t need to worry about
whether to add security elements when we order routers or firewalls; they just come included.”
The result is a time savings to the IT staff of 35 percent in reduced configuration and implementation support.
Coherent benefits from a high, consistent level of security on its network worldwide, so it can continue to grow and
focus on its business, he says.
For More Information
To find out more about Cisco Cloud Web Security, ASA 5500 Series Adaptive Security Appliance, Web Security
Appliance, Cloud Email Security, AnyConnect, Intrusion Prevention System, Identity Services Engine and ISR G2
routers, go to:
http://www.cisco.com/go/asa
http://www.cisco.com/go/anyconnect
http://www.cisco.com/go/ips
http://www.cisco.com/go/cloudwebsecurity
http://www.cisco.com/go/emailsecurity
http://www.cisco.com/go/websecurity
http://www.cisco.com/go/ise
http://www.cisco.com/go/routersecurity
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 4
Printed in USA C36-729889-01 12/13

More Related Content

What's hot

Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
Susanne Tedrick
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
NetworkCollaborators
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
Cisco Canada
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
NetworkCollaborators
 
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
NetworkCollaborators
 
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_USSecuring_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_USIngrid Fernandez, PhD
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
Wise Pacific Venture
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
NetworkCollaborators
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
Cisco Security
 
Presentation cisco cloud security
Presentation   cisco cloud securityPresentation   cisco cloud security
Presentation cisco cloud security
xKinAnx
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
scoopnewsgroup
 
Secure Data Center for Enterprise— Threat Management with NextGen IPS
Secure Data Center for Enterprise— Threat Management with NextGen IPSSecure Data Center for Enterprise— Threat Management with NextGen IPS
Secure Data Center for Enterprise— Threat Management with NextGen IPS
Cisco Russia
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
IRJET Journal
 
The Polytechnic of Namibia
The Polytechnic of NamibiaThe Polytechnic of Namibia
The Polytechnic of Namibia
Cisco Case Studies
 
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?
MarketingArrowECS_CZ
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
The TNS Group
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
Cristian Garcia G.
 
Top 5 reasons to purchase cisco asa 5500 series
Top 5 reasons to purchase cisco asa 5500 seriesTop 5 reasons to purchase cisco asa 5500 series
Top 5 reasons to purchase cisco asa 5500 seriesIT Tech
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
ChaitanyaS
 

What's hot (20)

Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition Cisco Connect 2018 Singapore - Easing the Transition
Cisco Connect 2018 Singapore - Easing the Transition
 
Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere Tomorrow Starts Here - Security Everywhere
Tomorrow Starts Here - Security Everywhere
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
 
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_USSecuring_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
 
CCSK, cloud security framework, Indonesia
CCSK, cloud security framework, IndonesiaCCSK, cloud security framework, Indonesia
CCSK, cloud security framework, Indonesia
 
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud WorldCisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
Cisco Connect 2018 Singapore - Transforming Enterprises in a Multi-Cloud World
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
Presentation cisco cloud security
Presentation   cisco cloud securityPresentation   cisco cloud security
Presentation cisco cloud security
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Secure Data Center for Enterprise— Threat Management with NextGen IPS
Secure Data Center for Enterprise— Threat Management with NextGen IPSSecure Data Center for Enterprise— Threat Management with NextGen IPS
Secure Data Center for Enterprise— Threat Management with NextGen IPS
 
Advance security in cloud computing for military weapons
Advance security in cloud computing for military weaponsAdvance security in cloud computing for military weapons
Advance security in cloud computing for military weapons
 
The Polytechnic of Namibia
The Polytechnic of NamibiaThe Polytechnic of Namibia
The Polytechnic of Namibia
 
Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?Automatizovaná bezpečnost – nadstandard nebo nutnost?
Automatizovaná bezpečnost – nadstandard nebo nutnost?
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
Top 5 reasons to purchase cisco asa 5500 series
Top 5 reasons to purchase cisco asa 5500 seriesTop 5 reasons to purchase cisco asa 5500 series
Top 5 reasons to purchase cisco asa 5500 series
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
 

Viewers also liked

The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
 
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
MobileCreation
 
Demografi profil gampong kulu
Demografi profil gampong kuluDemografi profil gampong kulu
Demografi profil gampong kuluArya Ningrat
 
Conseqüències de la II Guerra Mundial
Conseqüències de la II Guerra MundialConseqüències de la II Guerra Mundial
Conseqüències de la II Guerra Mundial
malueva
 
To Papsie <3
To Papsie <3To Papsie <3
To Papsie <3
Jeanz Wearable
 
Paola Voci, «In support of lightness: mobile phones and transient cultures »
Paola Voci, «In support of lightness: mobile phones and transient cultures »Paola Voci, «In support of lightness: mobile phones and transient cultures »
Paola Voci, «In support of lightness: mobile phones and transient cultures »
MobileCreation
 
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
FLUZO
 
Lan presentation ed tech 541
Lan presentation ed tech 541Lan presentation ed tech 541
Lan presentation ed tech 541amybass
 
Ian Christie, “Towards a personalised ethnography of mobile communications: m...
Ian Christie, “Towards a personalised ethnography of mobile communications: m...Ian Christie, “Towards a personalised ethnography of mobile communications: m...
Ian Christie, “Towards a personalised ethnography of mobile communications: m...
MobileCreation
 
Storyboard ikan anyaman kpd 3026
Storyboard ikan anyaman kpd 3026Storyboard ikan anyaman kpd 3026
Storyboard ikan anyaman kpd 3026
Affizan Eady
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
FLUZO
 
Workshop "Smart cities and communities" @ La Sapienza
Workshop "Smart cities and communities" @ La SapienzaWorkshop "Smart cities and communities" @ La Sapienza
Workshop "Smart cities and communities" @ La Sapienza
Saverio Massaro
 
Republika wawancara
Republika wawancaraRepublika wawancara
Republika wawancaraArya Ningrat
 
Bertamasya ke banda
Bertamasya ke bandaBertamasya ke banda
Bertamasya ke bandaArya Ningrat
 
Máy lọc nước Home Pure
Máy lọc nước Home PureMáy lọc nước Home Pure
Máy lọc nước Home Pure
Jos Trần Danh Đàn
 
Kasus neurobehaviour ke
Kasus neurobehaviour keKasus neurobehaviour ke
Kasus neurobehaviour keArya Ningrat
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
FLUZO
 

Viewers also liked (20)

The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
 
Demografi profil gampong kulu
Demografi profil gampong kuluDemografi profil gampong kulu
Demografi profil gampong kulu
 
Catalog of prime-industrial-components
Catalog of prime-industrial-componentsCatalog of prime-industrial-components
Catalog of prime-industrial-components
 
Conseqüències de la II Guerra Mundial
Conseqüències de la II Guerra MundialConseqüències de la II Guerra Mundial
Conseqüències de la II Guerra Mundial
 
Kelompok 9
Kelompok 9Kelompok 9
Kelompok 9
 
To Papsie <3
To Papsie <3To Papsie <3
To Papsie <3
 
Paola Voci, «In support of lightness: mobile phones and transient cultures »
Paola Voci, «In support of lightness: mobile phones and transient cultures »Paola Voci, «In support of lightness: mobile phones and transient cultures »
Paola Voci, «In support of lightness: mobile phones and transient cultures »
 
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
Analytics cultures in Europe (Web Analytics Congress de Utrecht 13-14 marzo 2...
 
Lan presentation ed tech 541
Lan presentation ed tech 541Lan presentation ed tech 541
Lan presentation ed tech 541
 
Ian Christie, “Towards a personalised ethnography of mobile communications: m...
Ian Christie, “Towards a personalised ethnography of mobile communications: m...Ian Christie, “Towards a personalised ethnography of mobile communications: m...
Ian Christie, “Towards a personalised ethnography of mobile communications: m...
 
Storyboard ikan anyaman kpd 3026
Storyboard ikan anyaman kpd 3026Storyboard ikan anyaman kpd 3026
Storyboard ikan anyaman kpd 3026
 
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
 
Workshop "Smart cities and communities" @ La Sapienza
Workshop "Smart cities and communities" @ La SapienzaWorkshop "Smart cities and communities" @ La Sapienza
Workshop "Smart cities and communities" @ La Sapienza
 
Roster 2
Roster 2Roster 2
Roster 2
 
Republika wawancara
Republika wawancaraRepublika wawancara
Republika wawancara
 
Bertamasya ke banda
Bertamasya ke bandaBertamasya ke banda
Bertamasya ke banda
 
Máy lọc nước Home Pure
Máy lọc nước Home PureMáy lọc nước Home Pure
Máy lọc nước Home Pure
 
Kasus neurobehaviour ke
Kasus neurobehaviour keKasus neurobehaviour ke
Kasus neurobehaviour ke
 
A Global Marketer's Guide to Privacy
A Global Marketer's Guide to PrivacyA Global Marketer's Guide to Privacy
A Global Marketer's Guide to Privacy
 

Similar to Laser Pioneer Secures Network End-to-End to Protect Assets

Marcegaglia Group
Marcegaglia GroupMarcegaglia Group
Marcegaglia Group
Cisco Case Studies
 
Secure Data Center for Enterprise
Secure Data Center for EnterpriseSecure Data Center for Enterprise
Secure Data Center for Enterprise
Cisco Russia
 
UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated Solutions
Cisco Case Studies
 
Beachbody, LLC
Beachbody, LLCBeachbody, LLC
Beachbody, LLC
Cisco Case Studies
 
PSOIOT-1151.pdf
PSOIOT-1151.pdfPSOIOT-1151.pdf
PSOIOT-1151.pdf
AlekseySolomin
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco Service Provider
 
Cloud security with Sage Construction Anywhere
Cloud security with Sage Construction AnywhereCloud security with Sage Construction Anywhere
Cloud security with Sage Construction Anywhere
Sage Construction and Real Estate
 
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
United States Cybersecurity Institute (USCSI®)
 
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdfUNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
United States Cybersecurity Institute (USCSI®)
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
Amazon Web Services
 
Arup
ArupArup
IoT Day 2019 Naples - Microsoft Azure Shpere
IoT Day 2019 Naples - Microsoft Azure ShpereIoT Day 2019 Naples - Microsoft Azure Shpere
IoT Day 2019 Naples - Microsoft Azure Shpere
Mirco Vanini
 
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of ThingsCisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
HarshitParkar6677
 
Computing solutions
Computing solutionsComputing solutions
Computing solutions
Toufik Kaci
 
Cisco Hybrid Cloud Solution for IT Capacity Augmentation
Cisco Hybrid Cloud Solution for IT Capacity AugmentationCisco Hybrid Cloud Solution for IT Capacity Augmentation
Cisco Hybrid Cloud Solution for IT Capacity Augmentation
Paulo Renato
 
Cisco connect winnipeg 2018 simple it leads to simple it management
Cisco connect winnipeg 2018   simple it leads to simple it managementCisco connect winnipeg 2018   simple it leads to simple it management
Cisco connect winnipeg 2018 simple it leads to simple it management
Cisco Canada
 
Mondi Group
Mondi GroupMondi Group
Mondi Group
Cisco Case Studies
 

Similar to Laser Pioneer Secures Network End-to-End to Protect Assets (20)

Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
Marcegaglia Group
Marcegaglia GroupMarcegaglia Group
Marcegaglia Group
 
Secure Data Center for Enterprise
Secure Data Center for EnterpriseSecure Data Center for Enterprise
Secure Data Center for Enterprise
 
UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated Solutions
 
Beachbody, LLC
Beachbody, LLCBeachbody, LLC
Beachbody, LLC
 
PSOIOT-1151.pdf
PSOIOT-1151.pdfPSOIOT-1151.pdf
PSOIOT-1151.pdf
 
Intercloud_Fabric
Intercloud_FabricIntercloud_Fabric
Intercloud_Fabric
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
Cloud security with Sage Construction Anywhere
Cloud security with Sage Construction AnywhereCloud security with Sage Construction Anywhere
Cloud security with Sage Construction Anywhere
 
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
Understanding Cloud Security - An In-Depth Exploration For Business Growth | ...
 
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdfUNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
UNDERSTANDING CLOUD SECURITY- AN IN-DEPTH EXPLORATION FOR BUSINESS GROWTH.pdf
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 
Arup
ArupArup
Arup
 
IoT Day 2019 Naples - Microsoft Azure Shpere
IoT Day 2019 Naples - Microsoft Azure ShpereIoT Day 2019 Naples - Microsoft Azure Shpere
IoT Day 2019 Naples - Microsoft Azure Shpere
 
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of ThingsCisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
 
Computing solutions
Computing solutionsComputing solutions
Computing solutions
 
CapAug
CapAugCapAug
CapAug
 
Cisco Hybrid Cloud Solution for IT Capacity Augmentation
Cisco Hybrid Cloud Solution for IT Capacity AugmentationCisco Hybrid Cloud Solution for IT Capacity Augmentation
Cisco Hybrid Cloud Solution for IT Capacity Augmentation
 
Cisco connect winnipeg 2018 simple it leads to simple it management
Cisco connect winnipeg 2018   simple it leads to simple it managementCisco connect winnipeg 2018   simple it leads to simple it management
Cisco connect winnipeg 2018 simple it leads to simple it management
 
Mondi Group
Mondi GroupMondi Group
Mondi Group
 

More from Cisco Security

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
Cisco Security
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
Cisco Security
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco Security
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Cisco Security
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
Cisco Security
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
Cisco Security
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
Cisco Security
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
Cisco Security
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
Cisco Security
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
Cisco Security
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
Cisco Security
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
Cisco Security
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
Cisco Security
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
Cisco Security
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
Cisco Security
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
Cisco Security
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
Cisco Security
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Cisco Security
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
Cisco Security
 

More from Cisco Security (20)

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 

Recently uploaded

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

Laser Pioneer Secures Network End-to-End to Protect Assets

  • 1. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 4 Customer Case Study EXECUTIVE SUMMARY Customer Name: Coherent, Inc. Industry: Manufacturing Location: Santa Clara, CA Number of Employees: 2400 CHALLENGE ● Mitigate inbound, outbound web threats to protect network ● Address cost and staff efficiencies SOLUTION ● Integrate Cloud Web Security to protect web access ● Institute security service-level agreement (SLA) for more complete, cost-effective solution ● Leverage interoperability of range of Cisco Security products RESULTS ● Provides tighter security measures against cyber threats ● Reduces costs by 10 percent through bundling security products ● Supplies more granular reporting for better decision-making Laser Pioneer Secures Network End-to-End to Protect Assets Coherent mitigates against global cyber threats with Cisco Cloud Web Security. Challenge Founded in 1966, Coherent, Inc. (NASDAQ: COHR) is a world leader in photonics-based solutions, primarily lasers, for a range of commercial and scientific research applications. The company designs, manufactures, services, and markets lasers, laser tools, precision optics, and related accessories. Its products are used in microelectronics, scientific research and government programs, original equipment manufacturer components, instrumentation, and materials processing. The company is headquartered in Santa Clara, California, with locations across North America and in Europe and Asia, including 11 manufacturing sites and smaller sales and services locations. With 2400 employees, Coherent is growing at about 10 percent per year, with accelerated expansion in Asia and Europe. Coherent’s IT team recognized that it needed to address the growing proliferation of web threats to its network to safeguard its business and intellectual property. This proliferation put a strain on the team to stay ahead of the explosion of malware, botnets, and other cyber- security challenges worldwide. With a remote sales force and services team, and more than 25 facilities, the company was looking for additional inbound and outbound threat protection. Coherent wanted to help ensure protection down to its smaller offices. The company’s IT team also needed to address cost and time savings, with its resources increasingly limited.
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 4 Solution The company considered several competitive solutions, including Cisco ® Cloud Web Security (CWS), due to its longstanding relationship as a Cisco customer. After careful consideration, the Coherent IT team felt the Cisco CWS would provide the kind of real-time protection from malware infections and improper or uncontrolled web application use that it needed. The inclusion of Cisco Security Intelligence Operations (SIO) to dynamically detect and block threats in real time was of particular interest. The extension of the protection to mobile users with Cisco AnyConnect ® Secure Mobility Client is a critical feature for Coherent’s remote sales team. The tight integration with Cisco ASA 5500 Series Adaptive Security Appliances and ISR G2 routers allows extended coverage without the expense of additional hardware. The company already uses Cisco AnyConnect VPN for its subcontractor community and third-party partners, and it uses Cisco ASA firewalls, so this simplified the deployment. By bundling its security solutions together through the Cisco Security Enterprise License Agreement (ELA), Coherent found it could cost-effectively mitigate against security threats with a more complete coverage. “In IT, it’s all about having to do more with less these days,” says Bryan Wise, director of information technology, Coherent. “We already had experienced maintenance savings of about 70 percent by bundling Cisco’s firewall functionality with IPS and with the VPN a few years ago. We were ready to see what other gains we might get through the Cisco Security ELA.” Coherent also has gained additional security protections from the Cisco Intrusion Prevention System (IPS), integrated with the ASA firewalls, a significant feature for the company. The inclusion of the Cisco Web Security Appliance (WSA), as well as Cloud Web Security integration on the ISR G2, in several locations provides an additional measure of security, with the integrated web security solution giving them a choice of using McAfee or Sophos anti-virus/anti-malware. Cisco Email Security Appliance (ESA) has been smoothly implemented in Coherent’s environment of 2400 mailboxes. Through the ELA, the subscription is included, such that as the company adds offices, it can more easily add users. Plans to deploy Cisco Identity Services Engine (ISE) are developing to provide network endpoint protection for employee PCs and printers, through 802.1X authentication in their wired environment. This protection will also be extended to their conference rooms. “Having the entire security suite at our fingertips has given us agility to enhance our toolbox on the fly. It’s been easy to manage, and we don’t need to worry about whether to add security elements when we order routers or firewalls; they just come included.” — Bryan Wise, Director of Information Technology
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 4 PRODUCT LIST Security ● Cisco Security Enterprise License Agreement (ELA) ● Cisco ASA 5500 Series Adaptive Security Appliance ● Cisco AnyConnect Secure Mobility Client ● Cisco Intrusion Prevention System (IPS) ● Cisco Cloud Web Security ● Cisco Cloud Email Security ● Cisco Web Security Appliance ● Cisco Identity Services Engine (ISE) Routers and Switches ● Cisco ISR G2 Routers ● Cisco Catalyst ® 3750 and 6500 series Data Center ● Cisco Unified Computing System™ (UCS® ) C series ● Cisco Nexus ® 5500 series Services ● Cisco Security IntelliShield ® Results The Cisco Security ELA gives Coherent a single point of contact within Cisco to manage its comprehensive suite of products and services. It also provides a blanket policy for implementation of new products with a specific level of security. “Since we rely so much on Cisco security, it was a bit of a no- brainer,” says Wise. “We have identified a number of new features we now use, including botnet tracking functionality, and other products that were easy to turn on, because it’s all bundled together.” “The cost savings by having all security products bundled together versus purchasing one by one has been approximately 10 percent,” says Wise. According to Wise, the Coherent team has leveraged Cisco Cloud Web Security to provide integrated protection with the Cisco ISR G2 routers, which more adeptly secures the company’s smaller sites. “Having the entire security suite at our fingertips has given us agility to enhance our toolbox on the fly,” Wise says. “It’s been easy to manage, and we don’t need to worry about whether to add security elements when we order routers or firewalls; they just come included.” The result is a time savings to the IT staff of 35 percent in reduced configuration and implementation support. Coherent benefits from a high, consistent level of security on its network worldwide, so it can continue to grow and focus on its business, he says. For More Information To find out more about Cisco Cloud Web Security, ASA 5500 Series Adaptive Security Appliance, Web Security Appliance, Cloud Email Security, AnyConnect, Intrusion Prevention System, Identity Services Engine and ISR G2 routers, go to: http://www.cisco.com/go/asa http://www.cisco.com/go/anyconnect http://www.cisco.com/go/ips http://www.cisco.com/go/cloudwebsecurity http://www.cisco.com/go/emailsecurity http://www.cisco.com/go/websecurity http://www.cisco.com/go/ise http://www.cisco.com/go/routersecurity
  • 4. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 4 Printed in USA C36-729889-01 12/13