Cisco Cisco Prime Network Services Controller 2.1 Information Guide

Page of 3
© 2016 Cisco and/or its affiliates. All rights reserved.
2
Real-time compliance with client audits
Stroock & Stroock is meeting its clients’ requirements for micro segmentation 
by providing direct evidence of compliance in real time with screen shots and 
walk-throughs.
“That’s extremely powerful,” says Forrest. “We can easily demonstrate that 
our security controls are in place and working. And as new requirements come 
about, we can efficiently and effectively put controls in place.”
Solving problems, reducing risk
With Cisco VSG, the firm can centrally provision 
security policies to put controls around legacy 
applications that require old operating systems 
or allow certain users to access the Internet while 
blocking their access to internal resources.
“Cisco VSG is a very flexible risk mitigation tool that really makes our jobs easier,” 
says Paarin Mehta, senior security engineer at Stroock & Stroock.
An efficient approach to virtual security
By simplifying security administration and audits, the Cisco solution is helping 
the firm meet client requirements and make the best use of IT staff time.
“We like solutions that consistently mitigate more risk exposure than their 
acquisition cost, which gives us a better chance to maximize our return on 
security investment,” says Forrest. “Combining Cisco VSG and PNSC is a 
very cost-effective way to enhance our security posture.”
ENHANCED
SECURITY
SIMPLIFIES
COMPLIANCE
•  Deploy Cisco VSG as a distributed firewall 
integrated with the Cisco Nexus
®
 1000V Switch
•  Centralize management with Cisco Prime
 
Network Services Controller
Solutions
Until recently, the firm took a traditional approach to network access control, 
applying rules at each core switch and updating them manually. However, 
stricter client requirements for network segmentation led the firm to consider 
a virtual approach.
“We wanted a fluid management experience and flexibility to meet new 
requirements,” says Forrest. “We began looking for a virtual firewall that 
would give us centralized control and microsegmentation, as well as robust 
performance.”