SlideShare a Scribd company logo
EXECUTIVE SUMMARY
Challenge
UniCredit Business Integrated Solutions provides IT services to UniCredit Slovakia,
a universal bank with a strong focus on retail banking. A subsidiary of Italy’s
UniCredit SpA, the bank is due to become part of a larger, cross-border unit
through a forthcoming merger with another UniCredit subsidiary in the Czech
Republic. The bank maintains a network of 75 branches, with two data centers
and main offices in the Slovakian capital, Bratislava. UniCredit is seen as one of
the strongest banks in central and eastern Europe, and the merger is intended
to consolidate its market leadership.
To meet the need for comprehensive network security, UniCredit Slovakia first
deployed a Cisco® Network Access Control (NAC) solution. With Cisco switches
installed in its local area network infrastructure, the solution covered the bank’s wired
and wireless networks. It also secured some virtual local area networks (VLAN) that
provide access to users from other UniCredit subsidiaries in the Czech Republic,
Austria, or Germany.
When UniCredit Business Integrated Solutions carried out an internal security audit,
the IT team decided on an upgrade from Cisco NAC to the more advanced Cisco
Identity Services Engine (ISE). An all-in-one enterprise policy control platform that
enforces compliance, enhances security, and simplifies service operations, Cisco
ISE offers context-aware security with real time device profiling, on-boarding, and
identification of corporate devices.
The solution would provide full port authentication, eliminating the burdensome task of
manually setting up network access credentials for visitors. “The lack of expiry dates
on guest access accounts was always a security threat, and the network administrator
had to track them continually to check whether these accounts were still needed,
which took up a lot of time,” says Martin Pencev, head of IT at Unicredit Slovakia.
Customer Case Study
Bank Upgrades Security Ahead
of Cross-Border Merger
UniCredit Slovakia simplifies guest access and lays groundwork for bring-your-own-device environment
Customer Name: UniCredit Business
Integrated Solutions (Societa Consortile
per Azioni)
Industry: Finance
Location: Slovakia
Number of Employees: 1300
Challenge
•	Enhance port security for guest users as
visitor numbers rise
•	Improve IT management capabilities with
real time, granular reporting tools
•	Prepare transition to bring-your-own-
device environment when required
Solution
•	Cisco Identity Services Engine integrated
with Cisco Prime Network Control
System
•	Cisco Catalyst 3560X Series Switches
with Cisco 5508 Series Wireless
Controllers
Results
•	Wired and wireless management
integrated into single solution for OPEX
savings through reduced hardware
•	Guest portal makes visitor access
quicker and easier to manage
•	Full visibility of user and device profiles
enhances security and efficiency
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.		 Page 1 of 3
“We have more visits by
foreign managers now,
and they require corporate
access. Using the Cisco
ISE guest portal, we can
flexibly and securely create
temporary access for them.”
Martin Pencev
Head of IT
Unicredit Slovakia
Customer Case Study
Solution
The new Cisco ISE security solution was implemented by local specialist ANECT and
builds on a Cisco Borderless Network foundation. It supports a Cisco Open Network
Environment (ONE) architecture for automated provisioning and fast deployment
of services and applications. Deployed across the bank’s fixed local and wide area
networks, Cisco ISE covers all 75 branches. The solution also secures the Cisco
Unified Wireless Network at its headquarters buildings in Bratislava, managed by a
Cisco 5508 Wireless Controller in each data center, so executives can connect to
the wireless LAN using notebooks with Cisco AnyConnect software.
To optimize visibility and control, the Cisco ISE security solution was integrated with
the Cisco Prime network management platform. That combination brings together the
wired and wireless domains with security policy management in a converged package
for faster troubleshooting and more efficient network operations. This capability
enables visibility into endpoint connectivity regardless of device, network, or location.
“A key aim for us was to take advantage of the profiling capabilities of Cisco ISE for a
more secure and dynamic network without increasing management,” says Pencev.
During the implementation phase, the IT team used some of its NAC hardware
as a test environment for Cisco ISE, and has continued doing so as more ISE
features are brought into play. Since Cisco ISE requires only two physical and two
virtual servers, compared to the eight needed previously, the upgrade allows more
efficient resource deployment.
Separate service set identifiers (SSIDs) were created for corporate users, onsite
contractors, and guests. Corporate users have unrestricted access, with security
assured wherever they work. Contractors working regularly on bank premises on
domain PCs are in a different security group, and occasional visitors are authenticated
via a dedicated guest portal.
Results
For UniCredit Slovakia, the key benefit of the Cisco ISE solution is that it enables
unified security policy management and brings a significant uplift in security. “In
a penetration test that followed the ISE implementation, the auditing agency was
unable to make any headway and had to ask us for special access to continue
testing,” says Pencev.
The guest network is quicker and easier to manage: a matter of growing importance
to the bank as the number of visitors from UniCredit subsidiaries elsewhere in Europe
mounts up in advance of the planned merger. “We have many more visits by foreign
managers now, and they require corporate access,” Pencev says. “Using the Cisco
ISE guest portal, we can flexibly and securely create temporary access for them.”
In such a situation of growing cross-border staff mobility, the bring-your-own-device
(BYOD) policy enabled by Cisco ISE, allied with the existing wireless infrastructure
based on Cisco Aironet® 1142 Series Wireless Access Points and Cisco 5508 Series
Wireless Controllers will provide convenience for those itinerant managers.
Meanwhile, greater ease of troubleshooting means a corresponding gain in operational
efficiency, with less time needed to resolve incidents. Clarification of roles for the IT
team is another valuable outcome. Setting up guest network access is now a simple
matter handled by the firm’s chief security officer, freeing the network administration
team to get on with other tasks.
The new system has led to a major improvement in network management and
visibility. Any endpoint can be deployed rapidly, with granular network access based
on the endpoint type, including IP cameras, Cisco wireless access points, printers,
and so on. And the single management pane allows the IT team to see at a glance
all attributes assigned to any user.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.		 Page 2 of 3
Cisco Prime Network Control System played a central role. “We can now create
dashboards according to need,” says Martin Drozd, an IT specialist at Unicredit
Slovakia. “Our old monitoring system was less flexible and didn’t show us everything.
We now have all the necessary information displayed in one easy-to-reach place.
Cisco Prime lets us see the authentication profile for users and devices, so we know
who is connecting to the network, where they are, and what devices they’re using.”
Next Steps
The bank is enabling devices such as Androids, iPhones, and iPads to connect
wirelessly at headquarters. It also plans to integrate the ISE platform with its existing
mobile security solution from Cisco partner MobileIron. Meanwhile, Cisco TrustSec®
is being looked at as the next logical step forward in the bank’s BYOD readiness
program. TrustSec works with Cisco ISE to enforce policies in a scalable manner, and
reinforces data confidentiality with ubiquitous encryption between network devices.
Customer Case Study
“We can now create
dashboards according to
need. Cisco Prime lets
us see the authentication
profile for users and
devices, so we know who is
connecting to the network,
where they are, and what
devices they’re using.”
Martin Drozd
IT Specialist
Unicredit Slovakia
For More Information
To learn more about the Cisco architectures and solutions described in this case
study, please go to:
www.cisco.com/go/ise
www.cisco.com/go/prime
Product List
Security
•• Cisco Identity Services Engine
Management
•• Cisco Prime Network Control System
Wireless
•• Cisco Aironet 1142 Series Wireless Access Points
•• Cisco 5508 Series Wireless Controllers
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.	 Printed in the UK	 ES/0813	 Page 3 of 3
Americas Headquarters
Cisco Systems, Inc.
San Jose, CA
Asia Pacific Headquarters
Cisco Systems (USA) Pte. Ltd.
Singapore
Europe Headquarters
Cisco Systems International BV Amsterdam,
The Netherlands
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go
to this URL: www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (1110R)

More Related Content

What's hot

Presentation cisco cloud security
Presentation   cisco cloud securityPresentation   cisco cloud security
Presentation cisco cloud security
xKinAnx
 
Ixia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution BriefIxia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution Brief
Network Performance Channel GmbH
 
Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISE
Cisco Canada
 
Ise 1 2-bdm-v4
Ise 1 2-bdm-v4Ise 1 2-bdm-v4
Ise 1 2-bdm-v4
Danny Liu
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
Troy Kitch
 
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze Networks
Articulate Marketing
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
Cisco Security
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)
José Ferreiro
 
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
Netwrix Corporation
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
Narenda Wicaksono
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
Fast Lane Consulting and Education, Inc.
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
IJCNCJournal
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
scoopnewsgroup
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
Mukesh Chinta
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
scoopnewsgroup
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Ivanti
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
Ivanti
 
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_USSecuring_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Ingrid Fernandez, PhD
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
Anwesh Dixit
 
Remote Workers Webinar (Episode 3)
Remote Workers Webinar (Episode 3)Remote Workers Webinar (Episode 3)
Remote Workers Webinar (Episode 3)
Ivanti
 

What's hot (20)

Presentation cisco cloud security
Presentation   cisco cloud securityPresentation   cisco cloud security
Presentation cisco cloud security
 
Ixia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution BriefIxia/Net Optics - Visibility Architecture Solution Brief
Ixia/Net Optics - Visibility Architecture Solution Brief
 
Demystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISEDemystifying TrustSec, Identity, NAC and ISE
Demystifying TrustSec, Identity, NAC and ISE
 
Ise 1 2-bdm-v4
Ise 1 2-bdm-v4Ise 1 2-bdm-v4
Ise 1 2-bdm-v4
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
 
How SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze NetworksHow SASE can help you move securely from the PSN with VMware and Breeze Networks
How SASE can help you move securely from the PSN with VMware and Breeze Networks
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)Security Lock Down Your Computer Like the National Security Agency (NSA)
Security Lock Down Your Computer Like the National Security Agency (NSA)
 
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines ComplianceUSB Port Protection that Hardens Endpoint Security and Streamlines Compliance
USB Port Protection that Hardens Endpoint Security and Streamlines Compliance
 
Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...
 
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's ProblemsDevil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
Devil's Bargain: Sacrificing Strategic Investments to Fund Today's Problems
 
Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4Cisco cybersecurity essentials chapter 4
Cisco cybersecurity essentials chapter 4
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Navigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere WorkplaceNavigating the Zero Trust Journey for Today's Everywhere Workplace
Navigating the Zero Trust Journey for Today's Everywhere Workplace
 
Ivanti remote worker ds
Ivanti remote worker   dsIvanti remote worker   ds
Ivanti remote worker ds
 
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_USSecuring_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
 
Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)Cisco Identity Services Engine (ISE)
Cisco Identity Services Engine (ISE)
 
Remote Workers Webinar (Episode 3)
Remote Workers Webinar (Episode 3)Remote Workers Webinar (Episode 3)
Remote Workers Webinar (Episode 3)
 

Similar to UniCredit Business Integrated Solutions

case-study-cisco-ise-project copy
case-study-cisco-ise-project copycase-study-cisco-ise-project copy
case-study-cisco-ise-project copy
Lee Millington
 
Bellevue Group
Bellevue GroupBellevue Group
Bellevue Group
Cisco Case Studies
 
Mondi Group
Mondi GroupMondi Group
Mondi Group
Cisco Case Studies
 
Ukrtransgaz
UkrtransgazUkrtransgaz
Ukrtransgaz
Cisco Case Studies
 
Topdanmark- Cisco
Topdanmark- CiscoTopdanmark- Cisco
Topdanmark- Cisco
Cisco Case Studies
 
SID - First Credit
SID - First CreditSID - First Credit
SID - First Credit
Cisco Case Studies
 
idc-link-dna
idc-link-dnaidc-link-dna
idc-link-dna
Raymond Heiss
 
Cisco unified access from vision to reality
Cisco unified access from vision to realityCisco unified access from vision to reality
Cisco unified access from vision to reality
3Anetwork com
 
i-Community AG case study
i-Community AG case studyi-Community AG case study
i-Community AG case study
Cisco Case Studies
 
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of ThingsCisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
HarshitParkar6677
 
Computing solutions
Computing solutionsComputing solutions
Computing solutions
Toufik Kaci
 
Sycor GmbH
Sycor GmbHSycor GmbH
Sycor GmbH
Cisco Case Studies
 
OMV Petrom
OMV PetromOMV Petrom
OMV Petrom
Cisco Case Studies
 
Cisco application infrastracture controller (apic) billyjones
Cisco application infrastracture controller (apic) billyjonesCisco application infrastracture controller (apic) billyjones
Cisco application infrastracture controller (apic) billyjones
Billy jones Monarquia
 
MST
MSTMST
Beachbody, LLC
Beachbody, LLCBeachbody, LLC
Beachbody, LLC
Cisco Case Studies
 
Finanz Informatik Technologie Service
Finanz Informatik Technologie ServiceFinanz Informatik Technologie Service
Finanz Informatik Technologie Service
Cisco Case Studies
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto Thomas , CISSP, TOGAF, CCSP, ITIL. JNCIS
 
Cisco DNA
Cisco DNACisco DNA
IT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data CenterIT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data Center
Oleg Konovalov
 

Similar to UniCredit Business Integrated Solutions (20)

case-study-cisco-ise-project copy
case-study-cisco-ise-project copycase-study-cisco-ise-project copy
case-study-cisco-ise-project copy
 
Bellevue Group
Bellevue GroupBellevue Group
Bellevue Group
 
Mondi Group
Mondi GroupMondi Group
Mondi Group
 
Ukrtransgaz
UkrtransgazUkrtransgaz
Ukrtransgaz
 
Topdanmark- Cisco
Topdanmark- CiscoTopdanmark- Cisco
Topdanmark- Cisco
 
SID - First Credit
SID - First CreditSID - First Credit
SID - First Credit
 
idc-link-dna
idc-link-dnaidc-link-dna
idc-link-dna
 
Cisco unified access from vision to reality
Cisco unified access from vision to realityCisco unified access from vision to reality
Cisco unified access from vision to reality
 
i-Community AG case study
i-Community AG case studyi-Community AG case study
i-Community AG case study
 
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of ThingsCisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
 
Computing solutions
Computing solutionsComputing solutions
Computing solutions
 
Sycor GmbH
Sycor GmbHSycor GmbH
Sycor GmbH
 
OMV Petrom
OMV PetromOMV Petrom
OMV Petrom
 
Cisco application infrastracture controller (apic) billyjones
Cisco application infrastracture controller (apic) billyjonesCisco application infrastracture controller (apic) billyjones
Cisco application infrastracture controller (apic) billyjones
 
MST
MSTMST
MST
 
Beachbody, LLC
Beachbody, LLCBeachbody, LLC
Beachbody, LLC
 
Finanz Informatik Technologie Service
Finanz Informatik Technologie ServiceFinanz Informatik Technologie Service
Finanz Informatik Technologie Service
 
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
Cisco DNA
Cisco DNACisco DNA
Cisco DNA
 
IT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data CenterIT Innovations Engine with Cisco Unified Data Center
IT Innovations Engine with Cisco Unified Data Center
 

More from Cisco Case Studies

Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_ENExpo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
Cisco Case Studies
 
Expo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_ITExpo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_IT
Cisco Case Studies
 
Seeberger
Seeberger Seeberger
Seeberger
Cisco Case Studies
 
Neotel
Neotel Neotel
Il Gruppo Marcegaglia
Il Gruppo MarcegagliaIl Gruppo Marcegaglia
Il Gruppo Marcegaglia
Cisco Case Studies
 
Marcegaglia Group
Marcegaglia GroupMarcegaglia Group
Marcegaglia Group
Cisco Case Studies
 
SAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearwaySAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearway
Cisco Case Studies
 
AASTMT Case Study
AASTMT Case StudyAASTMT Case Study
AASTMT Case Study
Cisco Case Studies
 
Bauer
Bauer Bauer
Universal Motors Agencies
Universal Motors AgenciesUniversal Motors Agencies
Universal Motors Agencies
Cisco Case Studies
 
Equitix
Equitix Equitix
ScanPlus
ScanPlusScanPlus
Odeabank Case Study
Odeabank Case StudyOdeabank Case Study
Odeabank Case Study
Cisco Case Studies
 
IBB Energie AG
IBB Energie AGIBB Energie AG
IBB Energie AG
Cisco Case Studies
 
Lufthansa Case Study
Lufthansa Case StudyLufthansa Case Study
Lufthansa Case Study
Cisco Case Studies
 
Schmitz Cargobull
Schmitz CargobullSchmitz Cargobull
Schmitz Cargobull
Cisco Case Studies
 
Mankiewicz Gebr & Co
Mankiewicz Gebr & Co Mankiewicz Gebr & Co
Mankiewicz Gebr & Co
Cisco Case Studies
 
Lomma Kommun
Lomma Kommun Lomma Kommun
Lomma Kommun
Cisco Case Studies
 
Skipton Building Society
Skipton Building SocietySkipton Building Society
Skipton Building Society
Cisco Case Studies
 
Anyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End UsersAnyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End Users
Cisco Case Studies
 

More from Cisco Case Studies (20)

Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_ENExpo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
 
Expo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_ITExpo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_IT
 
Seeberger
Seeberger Seeberger
Seeberger
 
Neotel
Neotel Neotel
Neotel
 
Il Gruppo Marcegaglia
Il Gruppo MarcegagliaIl Gruppo Marcegaglia
Il Gruppo Marcegaglia
 
Marcegaglia Group
Marcegaglia GroupMarcegaglia Group
Marcegaglia Group
 
SAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearwaySAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearway
 
AASTMT Case Study
AASTMT Case StudyAASTMT Case Study
AASTMT Case Study
 
Bauer
Bauer Bauer
Bauer
 
Universal Motors Agencies
Universal Motors AgenciesUniversal Motors Agencies
Universal Motors Agencies
 
Equitix
Equitix Equitix
Equitix
 
ScanPlus
ScanPlusScanPlus
ScanPlus
 
Odeabank Case Study
Odeabank Case StudyOdeabank Case Study
Odeabank Case Study
 
IBB Energie AG
IBB Energie AGIBB Energie AG
IBB Energie AG
 
Lufthansa Case Study
Lufthansa Case StudyLufthansa Case Study
Lufthansa Case Study
 
Schmitz Cargobull
Schmitz CargobullSchmitz Cargobull
Schmitz Cargobull
 
Mankiewicz Gebr & Co
Mankiewicz Gebr & Co Mankiewicz Gebr & Co
Mankiewicz Gebr & Co
 
Lomma Kommun
Lomma Kommun Lomma Kommun
Lomma Kommun
 
Skipton Building Society
Skipton Building SocietySkipton Building Society
Skipton Building Society
 
Anyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End UsersAnyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End Users
 

Recently uploaded

GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
FilipTomaszewski5
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
Vadym Kazulkin
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 

Recently uploaded (20)

GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeckPoznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
Poznań ACE event - 19.06.2024 Team 24 Wrapup slidedeck
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024High performance Serverless Java on AWS- GoTo Amsterdam 2024
High performance Serverless Java on AWS- GoTo Amsterdam 2024
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
Northern Engraving | Modern Metal Trim, Nameplates and Appliance Panels
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 

UniCredit Business Integrated Solutions

  • 1. EXECUTIVE SUMMARY Challenge UniCredit Business Integrated Solutions provides IT services to UniCredit Slovakia, a universal bank with a strong focus on retail banking. A subsidiary of Italy’s UniCredit SpA, the bank is due to become part of a larger, cross-border unit through a forthcoming merger with another UniCredit subsidiary in the Czech Republic. The bank maintains a network of 75 branches, with two data centers and main offices in the Slovakian capital, Bratislava. UniCredit is seen as one of the strongest banks in central and eastern Europe, and the merger is intended to consolidate its market leadership. To meet the need for comprehensive network security, UniCredit Slovakia first deployed a Cisco® Network Access Control (NAC) solution. With Cisco switches installed in its local area network infrastructure, the solution covered the bank’s wired and wireless networks. It also secured some virtual local area networks (VLAN) that provide access to users from other UniCredit subsidiaries in the Czech Republic, Austria, or Germany. When UniCredit Business Integrated Solutions carried out an internal security audit, the IT team decided on an upgrade from Cisco NAC to the more advanced Cisco Identity Services Engine (ISE). An all-in-one enterprise policy control platform that enforces compliance, enhances security, and simplifies service operations, Cisco ISE offers context-aware security with real time device profiling, on-boarding, and identification of corporate devices. The solution would provide full port authentication, eliminating the burdensome task of manually setting up network access credentials for visitors. “The lack of expiry dates on guest access accounts was always a security threat, and the network administrator had to track them continually to check whether these accounts were still needed, which took up a lot of time,” says Martin Pencev, head of IT at Unicredit Slovakia. Customer Case Study Bank Upgrades Security Ahead of Cross-Border Merger UniCredit Slovakia simplifies guest access and lays groundwork for bring-your-own-device environment Customer Name: UniCredit Business Integrated Solutions (Societa Consortile per Azioni) Industry: Finance Location: Slovakia Number of Employees: 1300 Challenge • Enhance port security for guest users as visitor numbers rise • Improve IT management capabilities with real time, granular reporting tools • Prepare transition to bring-your-own- device environment when required Solution • Cisco Identity Services Engine integrated with Cisco Prime Network Control System • Cisco Catalyst 3560X Series Switches with Cisco 5508 Series Wireless Controllers Results • Wired and wireless management integrated into single solution for OPEX savings through reduced hardware • Guest portal makes visitor access quicker and easier to manage • Full visibility of user and device profiles enhances security and efficiency © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
  • 2. “We have more visits by foreign managers now, and they require corporate access. Using the Cisco ISE guest portal, we can flexibly and securely create temporary access for them.” Martin Pencev Head of IT Unicredit Slovakia Customer Case Study Solution The new Cisco ISE security solution was implemented by local specialist ANECT and builds on a Cisco Borderless Network foundation. It supports a Cisco Open Network Environment (ONE) architecture for automated provisioning and fast deployment of services and applications. Deployed across the bank’s fixed local and wide area networks, Cisco ISE covers all 75 branches. The solution also secures the Cisco Unified Wireless Network at its headquarters buildings in Bratislava, managed by a Cisco 5508 Wireless Controller in each data center, so executives can connect to the wireless LAN using notebooks with Cisco AnyConnect software. To optimize visibility and control, the Cisco ISE security solution was integrated with the Cisco Prime network management platform. That combination brings together the wired and wireless domains with security policy management in a converged package for faster troubleshooting and more efficient network operations. This capability enables visibility into endpoint connectivity regardless of device, network, or location. “A key aim for us was to take advantage of the profiling capabilities of Cisco ISE for a more secure and dynamic network without increasing management,” says Pencev. During the implementation phase, the IT team used some of its NAC hardware as a test environment for Cisco ISE, and has continued doing so as more ISE features are brought into play. Since Cisco ISE requires only two physical and two virtual servers, compared to the eight needed previously, the upgrade allows more efficient resource deployment. Separate service set identifiers (SSIDs) were created for corporate users, onsite contractors, and guests. Corporate users have unrestricted access, with security assured wherever they work. Contractors working regularly on bank premises on domain PCs are in a different security group, and occasional visitors are authenticated via a dedicated guest portal. Results For UniCredit Slovakia, the key benefit of the Cisco ISE solution is that it enables unified security policy management and brings a significant uplift in security. “In a penetration test that followed the ISE implementation, the auditing agency was unable to make any headway and had to ask us for special access to continue testing,” says Pencev. The guest network is quicker and easier to manage: a matter of growing importance to the bank as the number of visitors from UniCredit subsidiaries elsewhere in Europe mounts up in advance of the planned merger. “We have many more visits by foreign managers now, and they require corporate access,” Pencev says. “Using the Cisco ISE guest portal, we can flexibly and securely create temporary access for them.” In such a situation of growing cross-border staff mobility, the bring-your-own-device (BYOD) policy enabled by Cisco ISE, allied with the existing wireless infrastructure based on Cisco Aironet® 1142 Series Wireless Access Points and Cisco 5508 Series Wireless Controllers will provide convenience for those itinerant managers. Meanwhile, greater ease of troubleshooting means a corresponding gain in operational efficiency, with less time needed to resolve incidents. Clarification of roles for the IT team is another valuable outcome. Setting up guest network access is now a simple matter handled by the firm’s chief security officer, freeing the network administration team to get on with other tasks. The new system has led to a major improvement in network management and visibility. Any endpoint can be deployed rapidly, with granular network access based on the endpoint type, including IP cameras, Cisco wireless access points, printers, and so on. And the single management pane allows the IT team to see at a glance all attributes assigned to any user. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 3
  • 3. Cisco Prime Network Control System played a central role. “We can now create dashboards according to need,” says Martin Drozd, an IT specialist at Unicredit Slovakia. “Our old monitoring system was less flexible and didn’t show us everything. We now have all the necessary information displayed in one easy-to-reach place. Cisco Prime lets us see the authentication profile for users and devices, so we know who is connecting to the network, where they are, and what devices they’re using.” Next Steps The bank is enabling devices such as Androids, iPhones, and iPads to connect wirelessly at headquarters. It also plans to integrate the ISE platform with its existing mobile security solution from Cisco partner MobileIron. Meanwhile, Cisco TrustSec® is being looked at as the next logical step forward in the bank’s BYOD readiness program. TrustSec works with Cisco ISE to enforce policies in a scalable manner, and reinforces data confidentiality with ubiquitous encryption between network devices. Customer Case Study “We can now create dashboards according to need. Cisco Prime lets us see the authentication profile for users and devices, so we know who is connecting to the network, where they are, and what devices they’re using.” Martin Drozd IT Specialist Unicredit Slovakia For More Information To learn more about the Cisco architectures and solutions described in this case study, please go to: www.cisco.com/go/ise www.cisco.com/go/prime Product List Security •• Cisco Identity Services Engine Management •• Cisco Prime Network Control System Wireless •• Cisco Aironet 1142 Series Wireless Access Points •• Cisco 5508 Series Wireless Controllers © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Printed in the UK ES/0813 Page 3 of 3 Americas Headquarters Cisco Systems, Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems (USA) Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)