SlideShare a Scribd company logo
EXECUTIVE SUMMARY Challenge
Barack Obama, President of the United States, called nuclear terrorism one of
the greatest threats to international security. With that in mind, he hosted the first
Nuclear Security Summit (NSS) in Washington D.C. in 2010 to draw attention to
the need to secure nuclear material.
Four years later, 58 world leaders attended the NSS 2014 Summit in The Hague (after
2012 in Seoul). The conference charted progress over the past two years. It focused
on unmet goals and proposed ways to achieve them. The venue’s network simply had
to work. It had to be secure. For a cost-effective implementation, it needed a set-up
that could be re-used elsewhere.
Solution
The site, with five buildings and four tents, had a number of small networks. The
Dutch Ministry of Foreign Affairs had switched these off. It knew that only building
a new network from the ground up would offer sufficient bandwidth and security.
In collaboration with the ministry, Cisco Services worked on the high-level network
design. It planned a secure wired and wireless network with mobile extension, plus
IP telephony. Cisco Prime™ was added for tracking and management. Products
were chosen for their future value to other parts of the Ministry.
Cisco Services also did the low-level network design. Together with the ministry it
planned a Wi-Fi network with over 250 Access Points. A Cisco expert set up the
security devices. Four Cisco Services staff joined the network operations center for
the event. “Knowing we had the help of Cisco experts gave us added confidence,”
says Han-Maurits Schaapveld, project director, NSS2014.
Results
The tension climbed as the event neared. The NSS launched an application in place of a delegate’s handbook, so visitors could
check location, program, and participants on their portable devices. And as NSS began, the app’s security was mentioned on social
media. This sparked further fears of attacks, but the network held. There were no security breaches. “We had 100 percent uptime,”
says Bob van Graft, director of joint IT services NSS.
Customer Case Study
Summit Leaders Connect
with Confidence
Nuclear Security Summit 2014 gets safe, reliable Cisco network
Customer Name: Ministry of Foreign
Affairs
Industry: Government
Location: Netherlands
Number of Employees: 2500
Challenge
•	Keep network up at all times
•	Stop IT attacks
•	Reuse equipment
Solution
•	A good team
•	Good architecture
•	Many capable suppliers
•	Cisco networking, wireless, security, and
collaboration
•	Cisco Services
Results
•	90 percent of devices re-used; 10
percent held in store
•	No security breaches and no downtime
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.		 Page 1 of 2
“Knowing we had the help
of Cisco experts gave us
added confidence.”
Han-Maurits Schaapveld
NSS Project Director
Ministry of Foreign Affairs
Customer Case Study
The Ministry set up, in effect, a virtual embassy with secure links for the organization.
Some 1500 delegates, 2500 press, and 1000 Ministry staff were able to connect
freely and securely, with a Wi-Fi network that could perform at 450 Mbps. Wired links
allowed some sessions to be streamed to press rooms. For security, the press had its
own VLAN. Reporters used it to file reports and images from the event.
The Ministry also met its aim of re-using equipment. After two months of planning, the
network came down in just two days. Van Graft says: “Most people plan a network to
last. We planned ours to be broken up. About 90 percent of the set-up is on its way to
be re-used. The other 10 percent is being stored for other events.”
For More Information
To learn more about the Cisco solutions in this case study go to:
www.cisco.com/go/collaboration
www.cisco.com/go/wireless
www.cisco.com/go/security
www.cisco.com/go/services
Product List
Data Center
•• Cisco Unified Computing System™ (UCS®)
--Cisco UCS C220 M3 Rack Servers
Collaboration
•• Cisco Unified Communications Manager Version 9.0
•• Cisco Unified IP Phone 7945G
Routing and Switching
•• Cisco Catalyst® 3750-X, 3850, and 6504-E Series Switches
•• Cisco Catalyst 3560CG-8PC-S Compact Switches
•• Cisco 2900 Series Integrated Services Routers
Wireless
•• Cisco Aironet® 3600 Series Access Points
•• Cisco 5508 Wireless Controllers
Network Management
•• Cisco Prime Infrastructure
•• Cisco Prime Security Manager
Security
•• Cisco ASA 5545-X Next-Generation Firewall
•• Cisco Identity Services Engine
Services
•• High-level and low-level design
•• Implementation support
•• Network Operations Center
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.	 Printed in the UK	 ES/0814	 Page 2 of 2
Americas Headquarters
Cisco Systems, Inc.
San Jose, CA
Asia Pacific Headquarters
Cisco Systems (USA) Pte. Ltd.
Singapore
Europe Headquarters
Cisco Systems International BV Amsterdam,
The Netherlands
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go
to this URL: www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (1110R)

More Related Content

What's hot

Web hacking using Cyber range
Web hacking using Cyber rangeWeb hacking using Cyber range
Web hacking using Cyber range
Priyanka Aash
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network Intuitive
NetworkCollaborators
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
Cristian Garcia G.
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
Dr David Probert
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
Nur Shiqim Chok
 
The End of the Fortress: The new Approach to Cybersecurity
The End of the Fortress: The new Approach to CybersecurityThe End of the Fortress: The new Approach to Cybersecurity
The End of the Fortress: The new Approach to Cybersecurity
Marc Nader
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
NetworkCollaborators
 
The view of auditor on cybercrime
The view of auditor on cybercrimeThe view of auditor on cybercrime
The view of auditor on cybercrime
Marc Vael
 
Development of Jisc security programme - Networkshop44
Development of Jisc security programme - Networkshop44Development of Jisc security programme - Networkshop44
Development of Jisc security programme - Networkshop44
Jisc
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANCisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WAN
NetworkCollaborators
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
NetworkCollaborators
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
Dr David Probert
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
NetworkCollaborators
 
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
Forcepoint LLC
 
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Dr David Probert
 
Bridgera enterprise IoT security
Bridgera enterprise IoT securityBridgera enterprise IoT security
Bridgera enterprise IoT security
Ron Pascuzzi
 
Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...
Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...
Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...
Thomas Mehlhorn
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!
Dr David Probert
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
NetworkCollaborators
 

What's hot (20)

Web hacking using Cyber range
Web hacking using Cyber rangeWeb hacking using Cyber range
Web hacking using Cyber range
 
Cisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network IntuitiveCisco Connect 2018 Singapore - The Network Intuitive
Cisco Connect 2018 Singapore - The Network Intuitive
 
Seguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable DataSeguridad en Capas: Smart & Actionable Data
Seguridad en Capas: Smart & Actionable Data
 
Cybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and OperationsCybersecurity Technologies, Standards and Operations
Cybersecurity Technologies, Standards and Operations
 
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy [Cisco Connect 2018 - Vietnam] Brian cotaz   cyber security strategy
[Cisco Connect 2018 - Vietnam] Brian cotaz cyber security strategy
 
The End of the Fortress: The new Approach to Cybersecurity
The End of the Fortress: The new Approach to CybersecurityThe End of the Fortress: The new Approach to Cybersecurity
The End of the Fortress: The new Approach to Cybersecurity
 
Cisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security EquationCisco Connect 2018 Singapore - Changing the Security Equation
Cisco Connect 2018 Singapore - Changing the Security Equation
 
The view of auditor on cybercrime
The view of auditor on cybercrimeThe view of auditor on cybercrime
The view of auditor on cybercrime
 
Development of Jisc security programme - Networkshop44
Development of Jisc security programme - Networkshop44Development of Jisc security programme - Networkshop44
Development of Jisc security programme - Networkshop44
 
Cisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response ServicesCisco Connect 2018 Singapore - Cisco Incident Response Services
Cisco Connect 2018 Singapore - Cisco Incident Response Services
 
Cisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WANCisco Connect 2018 Singapore - Cisco SD-WAN
Cisco Connect 2018 Singapore - Cisco SD-WAN
 
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
Cisco Connect 2018 Singapore - Secure data center building a secure zero trus...
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy  Cisco Connect 2018 Singapore - Cybersecurity strategy
Cisco Connect 2018 Singapore - Cybersecurity strategy
 
An Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial ServicesAn Inside-Out Approach to Security in Financial Services
An Inside-Out Approach to Security in Financial Services
 
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
Cyber Tools and Trends - Next 7 Years: 2018 - 2025 !
 
Bridgera enterprise IoT security
Bridgera enterprise IoT securityBridgera enterprise IoT security
Bridgera enterprise IoT security
 
Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...
Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...
Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...
 
CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!CyberSecurity Vision: 2017-2027 & Beyond!
CyberSecurity Vision: 2017-2027 & Beyond!
 
Cisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMXCisco Connect 2018 Singapore - Cisco CMX
Cisco Connect 2018 Singapore - Cisco CMX
 

Viewers also liked

bilateral_trade_treaties_20080508105059
bilateral_trade_treaties_20080508105059bilateral_trade_treaties_20080508105059
bilateral_trade_treaties_20080508105059
Neha Jindal
 
Diversifcation through innovation: The case for small island developing states
Diversifcation through innovation: The case for small island developing statesDiversifcation through innovation: The case for small island developing states
Diversifcation through innovation: The case for small island developing states
Commonwealth Secretariat
 
Kenya-s ICT Policy in Practice
Kenya-s ICT Policy in PracticeKenya-s ICT Policy in Practice
Kenya-s ICT Policy in Practice
Kennedy Kibukho
 
Climate Change Policy for Kenya
Climate Change Policy for KenyaClimate Change Policy for Kenya
Climate Change Policy for Kenya
ipcc-media
 
N ds zambia-presentation1
N ds zambia-presentation1N ds zambia-presentation1
N ds zambia-presentation1
Julien Grollier
 
Federal ministry of foreign affairs
Federal ministry of foreign affairsFederal ministry of foreign affairs
Federal ministry of foreign affairs
Otoide Ayemere
 
Diplomacy in singapore
Diplomacy in singaporeDiplomacy in singapore
Diplomacy in singapore
Jit Hui
 
Unit 5 Chap.13
Unit 5 Chap.13Unit 5 Chap.13
Unit 5 Chap.13
ahmengchye
 
Professionalism@Ministry of Foreign affairs,Thailand,2014
Professionalism@Ministry of Foreign affairs,Thailand,2014Professionalism@Ministry of Foreign affairs,Thailand,2014
Professionalism@Ministry of Foreign affairs,Thailand,2014
Gumporn S.,RMUTP,Thailand
 

Viewers also liked (9)

bilateral_trade_treaties_20080508105059
bilateral_trade_treaties_20080508105059bilateral_trade_treaties_20080508105059
bilateral_trade_treaties_20080508105059
 
Diversifcation through innovation: The case for small island developing states
Diversifcation through innovation: The case for small island developing statesDiversifcation through innovation: The case for small island developing states
Diversifcation through innovation: The case for small island developing states
 
Kenya-s ICT Policy in Practice
Kenya-s ICT Policy in PracticeKenya-s ICT Policy in Practice
Kenya-s ICT Policy in Practice
 
Climate Change Policy for Kenya
Climate Change Policy for KenyaClimate Change Policy for Kenya
Climate Change Policy for Kenya
 
N ds zambia-presentation1
N ds zambia-presentation1N ds zambia-presentation1
N ds zambia-presentation1
 
Federal ministry of foreign affairs
Federal ministry of foreign affairsFederal ministry of foreign affairs
Federal ministry of foreign affairs
 
Diplomacy in singapore
Diplomacy in singaporeDiplomacy in singapore
Diplomacy in singapore
 
Unit 5 Chap.13
Unit 5 Chap.13Unit 5 Chap.13
Unit 5 Chap.13
 
Professionalism@Ministry of Foreign affairs,Thailand,2014
Professionalism@Ministry of Foreign affairs,Thailand,2014Professionalism@Ministry of Foreign affairs,Thailand,2014
Professionalism@Ministry of Foreign affairs,Thailand,2014
 

Similar to Ministry of Foreign Affairs

Mondi Group
Mondi GroupMondi Group
Mondi Group
Cisco Case Studies
 
MST
MSTMST
Ukrtransgaz
UkrtransgazUkrtransgaz
Ukrtransgaz
Cisco Case Studies
 
Public Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case StudiesPublic Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case Studies
Connected Futures
 
Beachbody, LLC
Beachbody, LLCBeachbody, LLC
Beachbody, LLC
Cisco Case Studies
 
Skyscape Cloud Services
Skyscape Cloud ServicesSkyscape Cloud Services
Skyscape Cloud Services
Cisco Case Studies
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
James Nesbitt
 
Intercloud_Fabric
Intercloud_FabricIntercloud_Fabric
Intercloud_Fabric
Paulo Renato
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Security
inside-BigData.com
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
Cisco Canada
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
Carl De Groote
 
Arup
ArupArup
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
Electric Imp
 
Ecole Polytechnique Federale de Lausanne (EPFL)
Ecole Polytechnique Federale de Lausanne (EPFL)Ecole Polytechnique Federale de Lausanne (EPFL)
Ecole Polytechnique Federale de Lausanne (EPFL)
Cisco Case Studies
 
UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated Solutions
Cisco Case Studies
 
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
Amazon Web Services
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
CodeOps Technologies LLP
 
EuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyEuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the sky
Carlos Chalico
 
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v22-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
Charles "Chuck" Speicher Jr.
 

Similar to Ministry of Foreign Affairs (20)

Mondi Group
Mondi GroupMondi Group
Mondi Group
 
MST
MSTMST
MST
 
Ukrtransgaz
UkrtransgazUkrtransgaz
Ukrtransgaz
 
Public Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case StudiesPublic Safety and the Internet of Everything Case Studies
Public Safety and the Internet of Everything Case Studies
 
Beachbody, LLC
Beachbody, LLCBeachbody, LLC
Beachbody, LLC
 
Skyscape Cloud Services
Skyscape Cloud ServicesSkyscape Cloud Services
Skyscape Cloud Services
 
Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7Industrial Control Security USA Sacramento California Oct 6/7
Industrial Control Security USA Sacramento California Oct 6/7
 
Intercloud_Fabric
Intercloud_FabricIntercloud_Fabric
Intercloud_Fabric
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Security
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
 
Winning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud EnvironmentsWinning Strategy For Hybrid Cloud Environments
Winning Strategy For Hybrid Cloud Environments
 
Arup
ArupArup
Arup
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
Ecole Polytechnique Federale de Lausanne (EPFL)
Ecole Polytechnique Federale de Lausanne (EPFL)Ecole Polytechnique Federale de Lausanne (EPFL)
Ecole Polytechnique Federale de Lausanne (EPFL)
 
UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated Solutions
 
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
AWS Summit Singapore - Best Practices for Cloud Security in the Cloud Adoptio...
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
EuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyEuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the sky
 
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v22-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
 

More from Cisco Case Studies

Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_ENExpo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
Cisco Case Studies
 
Expo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_ITExpo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_IT
Cisco Case Studies
 
Seeberger
Seeberger Seeberger
Seeberger
Cisco Case Studies
 
Neotel
Neotel Neotel
Il Gruppo Marcegaglia
Il Gruppo MarcegagliaIl Gruppo Marcegaglia
Il Gruppo Marcegaglia
Cisco Case Studies
 
Marcegaglia Group
Marcegaglia GroupMarcegaglia Group
Marcegaglia Group
Cisco Case Studies
 
SAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearwaySAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearway
Cisco Case Studies
 
AASTMT Case Study
AASTMT Case StudyAASTMT Case Study
AASTMT Case Study
Cisco Case Studies
 
Bauer
Bauer Bauer
Universal Motors Agencies
Universal Motors AgenciesUniversal Motors Agencies
Universal Motors Agencies
Cisco Case Studies
 
Equitix
Equitix Equitix
ScanPlus
ScanPlusScanPlus
Odeabank Case Study
Odeabank Case StudyOdeabank Case Study
Odeabank Case Study
Cisco Case Studies
 
IBB Energie AG
IBB Energie AGIBB Energie AG
IBB Energie AG
Cisco Case Studies
 
Lufthansa Case Study
Lufthansa Case StudyLufthansa Case Study
Lufthansa Case Study
Cisco Case Studies
 
Schmitz Cargobull
Schmitz CargobullSchmitz Cargobull
Schmitz Cargobull
Cisco Case Studies
 
Mankiewicz Gebr & Co
Mankiewicz Gebr & Co Mankiewicz Gebr & Co
Mankiewicz Gebr & Co
Cisco Case Studies
 
Lomma Kommun
Lomma Kommun Lomma Kommun
Lomma Kommun
Cisco Case Studies
 
Skipton Building Society
Skipton Building SocietySkipton Building Society
Skipton Building Society
Cisco Case Studies
 
Anyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End UsersAnyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End Users
Cisco Case Studies
 

More from Cisco Case Studies (20)

Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_ENExpo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
 
Expo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_ITExpo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_IT
 
Seeberger
Seeberger Seeberger
Seeberger
 
Neotel
Neotel Neotel
Neotel
 
Il Gruppo Marcegaglia
Il Gruppo MarcegagliaIl Gruppo Marcegaglia
Il Gruppo Marcegaglia
 
Marcegaglia Group
Marcegaglia GroupMarcegaglia Group
Marcegaglia Group
 
SAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearwaySAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearway
 
AASTMT Case Study
AASTMT Case StudyAASTMT Case Study
AASTMT Case Study
 
Bauer
Bauer Bauer
Bauer
 
Universal Motors Agencies
Universal Motors AgenciesUniversal Motors Agencies
Universal Motors Agencies
 
Equitix
Equitix Equitix
Equitix
 
ScanPlus
ScanPlusScanPlus
ScanPlus
 
Odeabank Case Study
Odeabank Case StudyOdeabank Case Study
Odeabank Case Study
 
IBB Energie AG
IBB Energie AGIBB Energie AG
IBB Energie AG
 
Lufthansa Case Study
Lufthansa Case StudyLufthansa Case Study
Lufthansa Case Study
 
Schmitz Cargobull
Schmitz CargobullSchmitz Cargobull
Schmitz Cargobull
 
Mankiewicz Gebr & Co
Mankiewicz Gebr & Co Mankiewicz Gebr & Co
Mankiewicz Gebr & Co
 
Lomma Kommun
Lomma Kommun Lomma Kommun
Lomma Kommun
 
Skipton Building Society
Skipton Building SocietySkipton Building Society
Skipton Building Society
 
Anyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End UsersAnyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End Users
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 

Ministry of Foreign Affairs

  • 1. EXECUTIVE SUMMARY Challenge Barack Obama, President of the United States, called nuclear terrorism one of the greatest threats to international security. With that in mind, he hosted the first Nuclear Security Summit (NSS) in Washington D.C. in 2010 to draw attention to the need to secure nuclear material. Four years later, 58 world leaders attended the NSS 2014 Summit in The Hague (after 2012 in Seoul). The conference charted progress over the past two years. It focused on unmet goals and proposed ways to achieve them. The venue’s network simply had to work. It had to be secure. For a cost-effective implementation, it needed a set-up that could be re-used elsewhere. Solution The site, with five buildings and four tents, had a number of small networks. The Dutch Ministry of Foreign Affairs had switched these off. It knew that only building a new network from the ground up would offer sufficient bandwidth and security. In collaboration with the ministry, Cisco Services worked on the high-level network design. It planned a secure wired and wireless network with mobile extension, plus IP telephony. Cisco Prime™ was added for tracking and management. Products were chosen for their future value to other parts of the Ministry. Cisco Services also did the low-level network design. Together with the ministry it planned a Wi-Fi network with over 250 Access Points. A Cisco expert set up the security devices. Four Cisco Services staff joined the network operations center for the event. “Knowing we had the help of Cisco experts gave us added confidence,” says Han-Maurits Schaapveld, project director, NSS2014. Results The tension climbed as the event neared. The NSS launched an application in place of a delegate’s handbook, so visitors could check location, program, and participants on their portable devices. And as NSS began, the app’s security was mentioned on social media. This sparked further fears of attacks, but the network held. There were no security breaches. “We had 100 percent uptime,” says Bob van Graft, director of joint IT services NSS. Customer Case Study Summit Leaders Connect with Confidence Nuclear Security Summit 2014 gets safe, reliable Cisco network Customer Name: Ministry of Foreign Affairs Industry: Government Location: Netherlands Number of Employees: 2500 Challenge • Keep network up at all times • Stop IT attacks • Reuse equipment Solution • A good team • Good architecture • Many capable suppliers • Cisco networking, wireless, security, and collaboration • Cisco Services Results • 90 percent of devices re-used; 10 percent held in store • No security breaches and no downtime © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 2
  • 2. “Knowing we had the help of Cisco experts gave us added confidence.” Han-Maurits Schaapveld NSS Project Director Ministry of Foreign Affairs Customer Case Study The Ministry set up, in effect, a virtual embassy with secure links for the organization. Some 1500 delegates, 2500 press, and 1000 Ministry staff were able to connect freely and securely, with a Wi-Fi network that could perform at 450 Mbps. Wired links allowed some sessions to be streamed to press rooms. For security, the press had its own VLAN. Reporters used it to file reports and images from the event. The Ministry also met its aim of re-using equipment. After two months of planning, the network came down in just two days. Van Graft says: “Most people plan a network to last. We planned ours to be broken up. About 90 percent of the set-up is on its way to be re-used. The other 10 percent is being stored for other events.” For More Information To learn more about the Cisco solutions in this case study go to: www.cisco.com/go/collaboration www.cisco.com/go/wireless www.cisco.com/go/security www.cisco.com/go/services Product List Data Center •• Cisco Unified Computing System™ (UCS®) --Cisco UCS C220 M3 Rack Servers Collaboration •• Cisco Unified Communications Manager Version 9.0 •• Cisco Unified IP Phone 7945G Routing and Switching •• Cisco Catalyst® 3750-X, 3850, and 6504-E Series Switches •• Cisco Catalyst 3560CG-8PC-S Compact Switches •• Cisco 2900 Series Integrated Services Routers Wireless •• Cisco Aironet® 3600 Series Access Points •• Cisco 5508 Wireless Controllers Network Management •• Cisco Prime Infrastructure •• Cisco Prime Security Manager Security •• Cisco ASA 5545-X Next-Generation Firewall •• Cisco Identity Services Engine Services •• High-level and low-level design •• Implementation support •• Network Operations Center © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Printed in the UK ES/0814 Page 2 of 2 Americas Headquarters Cisco Systems, Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems (USA) Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)