Cisco Cisco Identity Services Engine Software Guía De Información
Jens Barnow
Vice President Infrastructure Application Services
NNIT
Vice President Infrastructure Application Services
NNIT
Customer Case Study
Solution
NNIT approached Cisco with the aim of creating an efficient, manageable, and
consolidated IT environment based on the latest proven network technologies and
reference architectures. The intent was that this environment would also provide
a platform for demonstrating the benefits of those technologies for customers in
the future.
consolidated IT environment based on the latest proven network technologies and
reference architectures. The intent was that this environment would also provide
a platform for demonstrating the benefits of those technologies for customers in
the future.
“We have a long-term partnership with Cisco, so the vision of a technology
showcase as a joint venture, reflecting the variety of technologies and devices
used by our customers, was very compelling,” says Jens Barnow, vice president,
infrastructure application services at NNIT.
showcase as a joint venture, reflecting the variety of technologies and devices
used by our customers, was very compelling,” says Jens Barnow, vice president,
infrastructure application services at NNIT.
NNIT implemented a Cisco® Borderless Network, a transformative concept that
addresses the traditional restrictions of fixed environments by allowing mobile
workers to remain securely connected to their core applications and services, without
interruption, regardless of the device they are using or their shifting location. “Our aim
was to have a stable, well-suited network using the latest breakthrough features,”
says Barnow, “which also promoted staff mobility, video collaboration, and a growing
number of high-tech users in a bring your own device [BYOD] environment.”
addresses the traditional restrictions of fixed environments by allowing mobile
workers to remain securely connected to their core applications and services, without
interruption, regardless of the device they are using or their shifting location. “Our aim
was to have a stable, well-suited network using the latest breakthrough features,”
says Barnow, “which also promoted staff mobility, video collaboration, and a growing
number of high-tech users in a bring your own device [BYOD] environment.”
Over that Borderless Network architecture, NNIT HD video deployment is benefiting
from
from
. Designed to automate the deployment, management, and
troubleshooting aspects of video communications, Medianet is particularly important
for prioritizing different data streams. “With video playing such an important role in
collaboration on joint bids, the ability offered by Medianet to automatically differentiate
between video streams and reserve and allocate bandwidth to preserve picture quality
is critical to success,” says Barnow.
for prioritizing different data streams. “With video playing such an important role in
collaboration on joint bids, the ability offered by Medianet to automatically differentiate
between video streams and reserve and allocate bandwidth to preserve picture quality
is critical to success,” says Barnow.
The solution comprises Cisco Catalyst® 3750 and 6500 Series Switches, and Cisco
Aironet® 3500 Series Access Points with Cisco CleanAir® technology, along with
5500 Series Wireless Controllers. It delivers bandwidths of 1Gbps to the desktop
and 400Mbps to wireless devices.
Aironet® 3500 Series Access Points with Cisco CleanAir® technology, along with
5500 Series Wireless Controllers. It delivers bandwidths of 1Gbps to the desktop
and 400Mbps to wireless devices.
Functionality in the Cisco Catalyst switches is fundamental to delivering the standards
of network security, availability, and management required by NNIT. At its center is
of network security, availability, and management required by NNIT. At its center is
, providing safe connection of users’ own devices to the corporate
network. With BYOD increasingly common among many NNIT customers, and in
keeping with NNIT internal policy, Cisco Secure-X enforces digital certification and
authentication, and compliance with industry-specific regulations.
keeping with NNIT internal policy, Cisco Secure-X enforces digital certification and
authentication, and compliance with industry-specific regulations.
The Cisco Borderless Network concept brings management of fixed and mobile
devices together for the first time, providing a common set of enforcement tools and
a simpler management approach. The
devices together for the first time, providing a common set of enforcement tools and
a simpler management approach. The
(ISE), a core
element of Secure-X, provides a context-aware security policy that automates the
compliance process as well as streamlines service delivery.
compliance process as well as streamlines service delivery.
As a unified control point, ISE provides an extra layer of security between the device
and the network, checking the profile of the device for a valid digital certificate and
user privileges before allowing it to log-in to the network. With ISE, employees can
work anywhere, as long as they are using an approved device.
and the network, checking the profile of the device for a valid digital certificate and
user privileges before allowing it to log-in to the network. With ISE, employees can
work anywhere, as long as they are using an approved device.
“ISE provides an excellent overview of the state of the network and allows us to
demonstrate to our customers what happens when a device is not compliant,”
says Thomas Laurids Pedersen, manager, customer networks at NNIT. “This is
about being more in control, with everything now managed from the same set of
enforcement parameters. Our internal deployment is itself a great case study on
how to deploy a secure wireless network.”
demonstrate to our customers what happens when a device is not compliant,”
says Thomas Laurids Pedersen, manager, customer networks at NNIT. “This is
about being more in control, with everything now managed from the same set of
enforcement parameters. Our internal deployment is itself a great case study on
how to deploy a secure wireless network.”
© 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Page 2 of 4