SlideShare a Scribd company logo
Multilayered Email and Web Protection                                                                                            Customer Case Study




Proactive security solution helps Noble Foods optimise supply chain and IT operations.

                                                                  Challenge
  EXECUTIVE SUMMARY
                                                                  Noble Foods is the United Kingdom’s largest egg supplier and, following the launch of
                                                                  its Happy Egg brand, the world’s number-one free-range egg producer. With 650
  Customer Name: Noble Foods
                                                                  users based across seven divisions, the company’s operations cover the complete
  Industry: Food Production/Agriculture/Retail
                                                                  hen lifecycle: from breeding and rearing, selling the birds to farms and egg shelling
  Location: United Kingdom                                        and packing, through to the production of liquid and cooked eggs, hen disposal,
                                                                  and milling.
  Company size: 1800 employees
                                                                  This success has been achieved largely through a sustained program of
  Challenge
                                                                  organic growth and acquisitions. For example, Noble continues to diversify into
  •	Reduce spam levels without delaying
    legitimate email
                                                                  value-added fresh food categories by investing in dessert companies with attractive
                                                                  growth potential.
  •	Promote safer web and email behavior
    across company                                                With operations spread across 42 sites throughout England, Scotland, Wales, and
                                                                  France, the company relies heavily on its Cisco IP network to optimize all points
  Solution
                                                                  of its supply chain with effective communications and, in particular, an efficient
  •	Intelligent pre-gateway filtering solution,
    based on the Cisco IronPort Email and Web                     email system.
    Security Appliances integrated with the
                                                                  “We centralized IT around four years ago and run all our operations out of a central
    Sawmill Enterprise 5 Reporting tool
                                                                  data center using Citrix technology to deliver applications over a Cisco MultiProtocol
  Results                                                         Label Switching (MPLS) network,” says Ben Gordon, IT Infrastructure Manager for
  •	Over 2 million threats blocked and 99.3                       Noble Foods.
    percent less spam in first six months
  •	Less risk of delays to legitimate email
                                                                  With malware and spyware attacks on the rise, the company began to experience
                                                                  problems with excessively high levels of bogus emails. “We were receiving upward
  •	80 percent decline in spam and virus related
    IT Service Desk calls, releasing IT to focus                  of 5000 unsolicited emails a day, which created a lot of frustration with users,”
    more on business enablement projects                          says Gordon. “To make matters worse, people were also losing legitimate emails,
                                                                  because they contained words and images with pornographic connotations and
                                                                  were, therefore, being incorrectly filtered as spam.”

The situation was compounded by three separate antispam and web-filtering solutions. Designed to solve threats as they
developed, these entry-level products had been built using various proprietary technologies and open-source software and,
as a result, operated in isolation rather than working together as part of one cohesive, enterprise wide security system.

“Often we could spend the whole day dealing with spam issues, which for a small IT team serving 650 users was not
sustainable,” says Gordon.




© 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.                                             Page 1 of 3
Customer Case Study


“We needed an intelligent                                         Solution
 pre-gateway filtering                                            The company’s response was to move from a reactive approach that focused
                                                                  solely on containing threats once they had passed through the firewall, to a
 solution that would make it
                                                                  proactive one that assessed and removed risks, in real-time before they could
 easier to enforce policies                                       penetrate the network perimeter.
 and to protect users,
                                                                  “We needed an intelligent pre-gateway filtering solution that would make it easier
 without being overzealous
                                                                  to enforce policies and to protect users, without being overzealous and bringing
 and bringing the business                                        the business to a grinding halt,” says Gordon.
 to a grinding halt.”
                                                                  After extensively researching the market, Noble Foods formed a shortlist headed
                                                                  by Cisco IronPort™ solutions. “IronPort’s reputation, plus the fact that they were
Ben Gordon                                                        now part of Cisco, effectively offered two market leaders for the price of one,”
IT Infrastructure Manager
                                                                  says Gordon. “Even so, we were still looking for candid advice rather than just a
Noble Foods
                                                                  sales team simply looking to close a deal.”

                                                                  Cisco Security assembled a team of network, email, and web security experts, who
                                                                  worked closely with Noble’s IT team to identify potential vulnerabilities and scope
                                                                  requirements, before helping to plan, design, and implement the new platform.

                                                                  This advanced security solution, comprising Cisco® IronPort Email Security and
                                                                  Web Security Appliances, allows the company to benefit from the latest advances
                                                                  in threat detection and prevention. These innovations include:

                                                                  •	 Dynamic Vectoring and Streaming engine: a revolutionary scanning tool for
                                                                     signature-based spyware and malware filtering
                                                                  •	 Cisco Security Intelligence Operations (SIO): a combination of threat telemetry,
                                                                     a team of global research engineers, and sophisticated security modeling. SIO
                                                                     also includes SenderBase: a threat-tracking database that captures Internet traffic
                                                                     patterns and data from over 100,000 organizations worldwide
                                                                  •	 Pre-eXecution Environment (PXE) technology: industry-leading email encryption
                                                                     for helping ensure secure messaging compliance and regulatory requirements.

                                                                  As the project progressed, its focus widened when Noble’s HR department saw an
                                                                  opportunity to improve monitoring and governance of web usage across the company.

                                                                  Taking these new requirements, Cisco Security was able to integrate the Sawmill
                                                                  Enterprise 5 Reporting tool with the new security platform. As well as providing the
                                                                  ability to restrict inappropriate emails and visits to specific websites, the solution
                                                                  empowers HR to set up their own automated reports, drill down, and take appropriate
                                                                  corrective action.

                                                                  “For such a high-profile project, the migration was remarkably smooth and largely
                                                                  invisible to end users,” says Gordon. “Best of all, because the Cisco Security solutions
                                                                  are simple ‘plug and play,’ they required minimal configuration and maintenance.”

                                                                  Results
                                                                  Implementing the Cisco Security solutions has enabled Noble Foods to strengthen
                                                                  its web and email defences in a number of ways.

                                                                  Suspicious traffic and potential threats are now automatically intercepted in the
                                                                  cloud before they can reach the desktop. This proactive approach is supported by
                                                                  the SIO, which receives over 30 billion queries daily and increases malware catch
                                                                  rates by more than 20 percent over signature-based scanning-only products. In
                                                                  the first six months, Noble isolated over 2 million malicious threats and cut spam
                                                                  levels by 99.3 percent.




© 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information..                                              Page 2 of 3
Customer Case Study


“Calls to our IT Service                                          Employees are more aware of their responsibilities for safe Internet use. IT security
 Desk have dropped by                                             policy has been underpinned by the ability to easily and rapidly block websites
                                                                  frequently targeted by malware and spyware producers. “The Cisco IronPort solution
 80 percent. Overall, we                                          gives us much greater control,” says Gordon. “For example, remote workers at a
 hardly spend anytime                                             production site can use PCs located in the Internet cafe during their breaks. The
 fire-fighting security                                           system will let them visit certain social networking sites during specific hours, but
 problems, which means                                            prevents the use of bandwidth-hungry video flash games, thereby protecting the
 we can concentrate on                                            6Mbps network link.”
 planning and delivering                                          There is now less risk of legitimate email that could contain customer orders,
 projects that will add                                           breeder data, agreements, or documentation ending up in quarantine.
 increased value to the                                           “We’ve seen a 75 percent reduction in false positives, which are instances when
 business.”                                                       the scanner incorrectly thinks it has found a specific vulnerability,” says Gordon. “In
                                                                  layman’s terms, this means more ‘good’ email is getting through the system, which
                                                                  means our supply chain can function more effectively and efficiently. If there are any
Ben Gordon
IT Infrastructure Manager
                                                                  problems, our system even flags these to our users who are empowered to release
Noble Foods                                                       certain types of mail themselves.”

                                                                  The project has also been good news for Noble’s IT team. “Calls to our IT Service
                                                                  Desk have dropped by 80 percent,” says Gordon. “Overall, we hardly spend anytime
                                                                  fire-fighting security problems, which means we can concentrate on planning and
                                                                  delivering projects that will add increased value to the business.”

                                                                  Next Steps
                                                                  Noble Foods is already looking to enhance operations and simplify IT further still.
                                                                  As part of a phased approach, the company plans to replace aging private branch
                                                                  exchange (PBX) systems with Cisco IP Telephony, initially at its larger sites. The
                                                                  project is expected to improve collaboration and productivity, while saving money
                                                                  on calls and maintenance.



                                                                  PRODUCT LIST
                                                                  Security	and	VPN
                                                                  •	Cisco IronPort C160 Email Security Appliance
                                                                  •	Cisco IronPort S160 Web Security Appliance
                                                                  •	Web, email, and image analysis licensing

                                                                  Services
                                                                  •	Cisco Security Consultancy
                                                                  •	Integration with Sawmill Enterprise 5 Reporting tool




Americas Headquarters                                   Asia Pacific Headquarters                      Europe Headquarters
Cisco Systems, Inc.                                     Cisco Systems (USA) Pte. Ltd.                  Cisco Systems International BV Amsterdam,
San Jose, CA                                            Singapore                                      The Netherlands

Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.

Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at
www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1005R)

© 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information..             Printed in the UK      ES/11587/0611         Page 3 of 3

More Related Content

What's hot

Comprompt Solutions LLP Presentation Slides
Comprompt Solutions LLP Presentation SlidesComprompt Solutions LLP Presentation Slides
Comprompt Solutions LLP Presentation Slides
Webtech Comprompt
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
Cisco Public Relations
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco Public Relations
 
Simplificando el Contact Center en una sola plataforma de Colaboración
Simplificando el Contact Center en una sola plataforma de ColaboraciónSimplificando el Contact Center en una sola plataforma de Colaboración
Simplificando el Contact Center en una sola plataforma de Colaboración
Mundo Contact
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
Cisco Public Relations
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
tmcleland
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security
 
Alta 3-2013
Alta 3-2013Alta 3-2013
Alta 3-2013
HartVidaRaffo
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service provider
Cisco Public Relations
 
Dataplex Company Overview
Dataplex Company OverviewDataplex Company Overview
Dataplex Company Overview
dataplex systems limited
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
Arrow ECS UK
 
AMAG Pharmaceuticals Success Story
AMAG Pharmaceuticals Success StoryAMAG Pharmaceuticals Success Story
AMAG Pharmaceuticals Success Story
Imprivata
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
IBMGovernmentCA
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Arrow ECS UK
 
Bridgeworks IT Solutions 2013
Bridgeworks IT Solutions 2013Bridgeworks IT Solutions 2013
Bridgeworks IT Solutions 2013
StraightDrive Softlab LLP
 
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
HyTrust
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
IntelAPAC
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity Management
Nishant Kaushik
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
HyTrust
 

What's hot (19)

Comprompt Solutions LLP Presentation Slides
Comprompt Solutions LLP Presentation SlidesComprompt Solutions LLP Presentation Slides
Comprompt Solutions LLP Presentation Slides
 
Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
 
Simplificando el Contact Center en una sola plataforma de Colaboración
Simplificando el Contact Center en una sola plataforma de ColaboraciónSimplificando el Contact Center en una sola plataforma de Colaboración
Simplificando el Contact Center en una sola plataforma de Colaboración
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
 
Virtela Corp Brochure
Virtela Corp BrochureVirtela Corp Brochure
Virtela Corp Brochure
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
Alta 3-2013
Alta 3-2013Alta 3-2013
Alta 3-2013
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service provider
 
Dataplex Company Overview
Dataplex Company OverviewDataplex Company Overview
Dataplex Company Overview
 
Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
AMAG Pharmaceuticals Success Story
AMAG Pharmaceuticals Success StoryAMAG Pharmaceuticals Success Story
AMAG Pharmaceuticals Success Story
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
Seeing Through the Clouds – the Vision of the CTO Office, Joe Baguley - Chief...
 
Bridgeworks IT Solutions 2013
Bridgeworks IT Solutions 2013Bridgeworks IT Solutions 2013
Bridgeworks IT Solutions 2013
 
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity Management
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 

Viewers also liked

Barcelona City Council
Barcelona City CouncilBarcelona City Council
Barcelona City Council
Cisco Case Studies
 
MST
MSTMST
Bellevue Group
Bellevue GroupBellevue Group
Bellevue Group
Cisco Case Studies
 
CAME Group Spa
CAME Group SpaCAME Group Spa
CAME Group Spa
Cisco Case Studies
 
DVB Bank
DVB BankDVB Bank
Costruzioni Elettroniche Industriali Automatismi (CEIA) case study
Costruzioni Elettroniche Industriali Automatismi (CEIA) case studyCostruzioni Elettroniche Industriali Automatismi (CEIA) case study
Costruzioni Elettroniche Industriali Automatismi (CEIA) case study
Cisco Case Studies
 
WWF- Cisco
WWF- CiscoWWF- Cisco
WWF- Cisco
Cisco Case Studies
 
Cable & Wireless- Cisco
Cable & Wireless- CiscoCable & Wireless- Cisco
Cable & Wireless- Cisco
Cisco Case Studies
 

Viewers also liked (8)

Barcelona City Council
Barcelona City CouncilBarcelona City Council
Barcelona City Council
 
MST
MSTMST
MST
 
Bellevue Group
Bellevue GroupBellevue Group
Bellevue Group
 
CAME Group Spa
CAME Group SpaCAME Group Spa
CAME Group Spa
 
DVB Bank
DVB BankDVB Bank
DVB Bank
 
Costruzioni Elettroniche Industriali Automatismi (CEIA) case study
Costruzioni Elettroniche Industriali Automatismi (CEIA) case studyCostruzioni Elettroniche Industriali Automatismi (CEIA) case study
Costruzioni Elettroniche Industriali Automatismi (CEIA) case study
 
WWF- Cisco
WWF- CiscoWWF- Cisco
WWF- Cisco
 
Cable & Wireless- Cisco
Cable & Wireless- CiscoCable & Wireless- Cisco
Cable & Wireless- Cisco
 

Similar to Noble Foods- Cisco

Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentation
richard_turner
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
Cloud Expo
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
AGC Networks Ltd
 
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case StudyIndustrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Polestar IIoT
 
ScanTech Food Safety 2.0
ScanTech Food Safety 2.0ScanTech Food Safety 2.0
ScanTech Food Safety 2.0
scan15
 
Idexcel Corporate Overview
Idexcel Corporate OverviewIdexcel Corporate Overview
Idexcel Corporate Overview
Idexcel
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Security
nmullen
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
Devyani Vaidya
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
Devyani Vaidya
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
Devyani Vaidya
 
Mtil Corporate 15 07 11
Mtil Corporate 15 07 11Mtil Corporate 15 07 11
Mtil Corporate 15 07 11
bhavikmeghani
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
Netskope
 
Kela
Kela Kela
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IBM Switzerland
 
Kela v2cs -_final
Kela v2cs -_finalKela v2cs -_final
Kela v2cs -_final
wbrewin
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box
IBM Sverige
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
Rishabh Gupta
 
Advance Group
Advance Group Advance Group
Advance Group
Cisco Case Studies
 
Logicalis BYOD Briefing
Logicalis BYOD BriefingLogicalis BYOD Briefing
Logicalis BYOD Briefing
Logicalis Australia
 
Security Chat 5.0
Security Chat 5.0Security Chat 5.0
Security Chat 5.0
Raffael Marty
 

Similar to Noble Foods- Cisco (20)

Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentation
 
The Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny HeaberlinThe Secure Path to Value in the Cloud by Denny Heaberlin
The Secure Path to Value in the Cloud by Denny Heaberlin
 
CYBER-i Corporate Dossier
CYBER-i Corporate Dossier  CYBER-i Corporate Dossier
CYBER-i Corporate Dossier
 
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case StudyIndustrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
 
ScanTech Food Safety 2.0
ScanTech Food Safety 2.0ScanTech Food Safety 2.0
ScanTech Food Safety 2.0
 
Idexcel Corporate Overview
Idexcel Corporate OverviewIdexcel Corporate Overview
Idexcel Corporate Overview
 
St. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical SecuritySt. Vincents Private Hospital Physical Security
St. Vincents Private Hospital Physical Security
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Mtil Corporate 15 07 11
Mtil Corporate 15 07 11Mtil Corporate 15 07 11
Mtil Corporate 15 07 11
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
 
Kela
Kela Kela
Kela
 
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas WespiIT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
 
Kela v2cs -_final
Kela v2cs -_finalKela v2cs -_final
Kela v2cs -_final
 
Watson kista summit 2018 box
Watson kista summit 2018 box Watson kista summit 2018 box
Watson kista summit 2018 box
 
Implementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommutersImplementing an improved security for collin’s database and telecommuters
Implementing an improved security for collin’s database and telecommuters
 
Advance Group
Advance Group Advance Group
Advance Group
 
Logicalis BYOD Briefing
Logicalis BYOD BriefingLogicalis BYOD Briefing
Logicalis BYOD Briefing
 
Security Chat 5.0
Security Chat 5.0Security Chat 5.0
Security Chat 5.0
 

More from Cisco Case Studies

Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_ENExpo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
Cisco Case Studies
 
Expo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_ITExpo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_IT
Cisco Case Studies
 
Seeberger
Seeberger Seeberger
Seeberger
Cisco Case Studies
 
Neotel
Neotel Neotel
Il Gruppo Marcegaglia
Il Gruppo MarcegagliaIl Gruppo Marcegaglia
Il Gruppo Marcegaglia
Cisco Case Studies
 
Marcegaglia Group
Marcegaglia GroupMarcegaglia Group
Marcegaglia Group
Cisco Case Studies
 
SAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearwaySAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearway
Cisco Case Studies
 
AASTMT Case Study
AASTMT Case StudyAASTMT Case Study
AASTMT Case Study
Cisco Case Studies
 
Bauer
Bauer Bauer
Universal Motors Agencies
Universal Motors AgenciesUniversal Motors Agencies
Universal Motors Agencies
Cisco Case Studies
 
Equitix
Equitix Equitix
ScanPlus
ScanPlusScanPlus
Odeabank Case Study
Odeabank Case StudyOdeabank Case Study
Odeabank Case Study
Cisco Case Studies
 
IBB Energie AG
IBB Energie AGIBB Energie AG
IBB Energie AG
Cisco Case Studies
 
Lufthansa Case Study
Lufthansa Case StudyLufthansa Case Study
Lufthansa Case Study
Cisco Case Studies
 
Schmitz Cargobull
Schmitz CargobullSchmitz Cargobull
Schmitz Cargobull
Cisco Case Studies
 
Mankiewicz Gebr & Co
Mankiewicz Gebr & Co Mankiewicz Gebr & Co
Mankiewicz Gebr & Co
Cisco Case Studies
 
Lomma Kommun
Lomma Kommun Lomma Kommun
Lomma Kommun
Cisco Case Studies
 
Skipton Building Society
Skipton Building SocietySkipton Building Society
Skipton Building Society
Cisco Case Studies
 
Anyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End UsersAnyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End Users
Cisco Case Studies
 

More from Cisco Case Studies (20)

Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_ENExpo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
 
Expo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_ITExpo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_IT
 
Seeberger
Seeberger Seeberger
Seeberger
 
Neotel
Neotel Neotel
Neotel
 
Il Gruppo Marcegaglia
Il Gruppo MarcegagliaIl Gruppo Marcegaglia
Il Gruppo Marcegaglia
 
Marcegaglia Group
Marcegaglia GroupMarcegaglia Group
Marcegaglia Group
 
SAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearwaySAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearway
 
AASTMT Case Study
AASTMT Case StudyAASTMT Case Study
AASTMT Case Study
 
Bauer
Bauer Bauer
Bauer
 
Universal Motors Agencies
Universal Motors AgenciesUniversal Motors Agencies
Universal Motors Agencies
 
Equitix
Equitix Equitix
Equitix
 
ScanPlus
ScanPlusScanPlus
ScanPlus
 
Odeabank Case Study
Odeabank Case StudyOdeabank Case Study
Odeabank Case Study
 
IBB Energie AG
IBB Energie AGIBB Energie AG
IBB Energie AG
 
Lufthansa Case Study
Lufthansa Case StudyLufthansa Case Study
Lufthansa Case Study
 
Schmitz Cargobull
Schmitz CargobullSchmitz Cargobull
Schmitz Cargobull
 
Mankiewicz Gebr & Co
Mankiewicz Gebr & Co Mankiewicz Gebr & Co
Mankiewicz Gebr & Co
 
Lomma Kommun
Lomma Kommun Lomma Kommun
Lomma Kommun
 
Skipton Building Society
Skipton Building SocietySkipton Building Society
Skipton Building Society
 
Anyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End UsersAnyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End Users
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 

Noble Foods- Cisco

  • 1. Multilayered Email and Web Protection Customer Case Study Proactive security solution helps Noble Foods optimise supply chain and IT operations. Challenge EXECUTIVE SUMMARY Noble Foods is the United Kingdom’s largest egg supplier and, following the launch of its Happy Egg brand, the world’s number-one free-range egg producer. With 650 Customer Name: Noble Foods users based across seven divisions, the company’s operations cover the complete Industry: Food Production/Agriculture/Retail hen lifecycle: from breeding and rearing, selling the birds to farms and egg shelling Location: United Kingdom and packing, through to the production of liquid and cooked eggs, hen disposal, and milling. Company size: 1800 employees This success has been achieved largely through a sustained program of Challenge organic growth and acquisitions. For example, Noble continues to diversify into • Reduce spam levels without delaying legitimate email value-added fresh food categories by investing in dessert companies with attractive growth potential. • Promote safer web and email behavior across company With operations spread across 42 sites throughout England, Scotland, Wales, and France, the company relies heavily on its Cisco IP network to optimize all points Solution of its supply chain with effective communications and, in particular, an efficient • Intelligent pre-gateway filtering solution, based on the Cisco IronPort Email and Web email system. Security Appliances integrated with the “We centralized IT around four years ago and run all our operations out of a central Sawmill Enterprise 5 Reporting tool data center using Citrix technology to deliver applications over a Cisco MultiProtocol Results Label Switching (MPLS) network,” says Ben Gordon, IT Infrastructure Manager for • Over 2 million threats blocked and 99.3 Noble Foods. percent less spam in first six months • Less risk of delays to legitimate email With malware and spyware attacks on the rise, the company began to experience problems with excessively high levels of bogus emails. “We were receiving upward • 80 percent decline in spam and virus related IT Service Desk calls, releasing IT to focus of 5000 unsolicited emails a day, which created a lot of frustration with users,” more on business enablement projects says Gordon. “To make matters worse, people were also losing legitimate emails, because they contained words and images with pornographic connotations and were, therefore, being incorrectly filtered as spam.” The situation was compounded by three separate antispam and web-filtering solutions. Designed to solve threats as they developed, these entry-level products had been built using various proprietary technologies and open-source software and, as a result, operated in isolation rather than working together as part of one cohesive, enterprise wide security system. “Often we could spend the whole day dealing with spam issues, which for a small IT team serving 650 users was not sustainable,” says Gordon. © 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
  • 2. Customer Case Study “We needed an intelligent Solution pre-gateway filtering The company’s response was to move from a reactive approach that focused solely on containing threats once they had passed through the firewall, to a solution that would make it proactive one that assessed and removed risks, in real-time before they could easier to enforce policies penetrate the network perimeter. and to protect users, “We needed an intelligent pre-gateway filtering solution that would make it easier without being overzealous to enforce policies and to protect users, without being overzealous and bringing and bringing the business the business to a grinding halt,” says Gordon. to a grinding halt.” After extensively researching the market, Noble Foods formed a shortlist headed by Cisco IronPort™ solutions. “IronPort’s reputation, plus the fact that they were Ben Gordon now part of Cisco, effectively offered two market leaders for the price of one,” IT Infrastructure Manager says Gordon. “Even so, we were still looking for candid advice rather than just a Noble Foods sales team simply looking to close a deal.” Cisco Security assembled a team of network, email, and web security experts, who worked closely with Noble’s IT team to identify potential vulnerabilities and scope requirements, before helping to plan, design, and implement the new platform. This advanced security solution, comprising Cisco® IronPort Email Security and Web Security Appliances, allows the company to benefit from the latest advances in threat detection and prevention. These innovations include: • Dynamic Vectoring and Streaming engine: a revolutionary scanning tool for signature-based spyware and malware filtering • Cisco Security Intelligence Operations (SIO): a combination of threat telemetry, a team of global research engineers, and sophisticated security modeling. SIO also includes SenderBase: a threat-tracking database that captures Internet traffic patterns and data from over 100,000 organizations worldwide • Pre-eXecution Environment (PXE) technology: industry-leading email encryption for helping ensure secure messaging compliance and regulatory requirements. As the project progressed, its focus widened when Noble’s HR department saw an opportunity to improve monitoring and governance of web usage across the company. Taking these new requirements, Cisco Security was able to integrate the Sawmill Enterprise 5 Reporting tool with the new security platform. As well as providing the ability to restrict inappropriate emails and visits to specific websites, the solution empowers HR to set up their own automated reports, drill down, and take appropriate corrective action. “For such a high-profile project, the migration was remarkably smooth and largely invisible to end users,” says Gordon. “Best of all, because the Cisco Security solutions are simple ‘plug and play,’ they required minimal configuration and maintenance.” Results Implementing the Cisco Security solutions has enabled Noble Foods to strengthen its web and email defences in a number of ways. Suspicious traffic and potential threats are now automatically intercepted in the cloud before they can reach the desktop. This proactive approach is supported by the SIO, which receives over 30 billion queries daily and increases malware catch rates by more than 20 percent over signature-based scanning-only products. In the first six months, Noble isolated over 2 million malicious threats and cut spam levels by 99.3 percent. © 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.. Page 2 of 3
  • 3. Customer Case Study “Calls to our IT Service Employees are more aware of their responsibilities for safe Internet use. IT security Desk have dropped by policy has been underpinned by the ability to easily and rapidly block websites frequently targeted by malware and spyware producers. “The Cisco IronPort solution 80 percent. Overall, we gives us much greater control,” says Gordon. “For example, remote workers at a hardly spend anytime production site can use PCs located in the Internet cafe during their breaks. The fire-fighting security system will let them visit certain social networking sites during specific hours, but problems, which means prevents the use of bandwidth-hungry video flash games, thereby protecting the we can concentrate on 6Mbps network link.” planning and delivering There is now less risk of legitimate email that could contain customer orders, projects that will add breeder data, agreements, or documentation ending up in quarantine. increased value to the “We’ve seen a 75 percent reduction in false positives, which are instances when business.” the scanner incorrectly thinks it has found a specific vulnerability,” says Gordon. “In layman’s terms, this means more ‘good’ email is getting through the system, which means our supply chain can function more effectively and efficiently. If there are any Ben Gordon IT Infrastructure Manager problems, our system even flags these to our users who are empowered to release Noble Foods certain types of mail themselves.” The project has also been good news for Noble’s IT team. “Calls to our IT Service Desk have dropped by 80 percent,” says Gordon. “Overall, we hardly spend anytime fire-fighting security problems, which means we can concentrate on planning and delivering projects that will add increased value to the business.” Next Steps Noble Foods is already looking to enhance operations and simplify IT further still. As part of a phased approach, the company plans to replace aging private branch exchange (PBX) systems with Cisco IP Telephony, initially at its larger sites. The project is expected to improve collaboration and productivity, while saving money on calls and maintenance. PRODUCT LIST Security and VPN • Cisco IronPort C160 Email Security Appliance • Cisco IronPort S160 Web Security Appliance • Web, email, and image analysis licensing Services • Cisco Security Consultancy • Integration with Sawmill Enterprise 5 Reporting tool Americas Headquarters Asia Pacific Headquarters Europe Headquarters Cisco Systems, Inc. Cisco Systems (USA) Pte. Ltd. Cisco Systems International BV Amsterdam, San Jose, CA Singapore The Netherlands Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1005R) © 2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.. Printed in the UK ES/11587/0611 Page 3 of 3