SlideShare uma empresa Scribd logo
1 de 1
Baixar para ler offline
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
ImpactChallenges Why Cisco? SolutionCustomer Stats
McAllen Intermediate School District
• Industry: Education
• Students: 25,300
• 34 campuses
• Teachers: 1,500
• Employees: 1,500
• Location: McAllen, TX
• Pre-K-12
• 65 percent of students
are from economically
disadvantaged families.
• District provides a
learning environment to
foster creativity,
ingenuity, and
resourcefulness by
giving students
advanced technology.
• Stopped server crashes
caused by profiling, enabling
guest access to be used.
• Reduced onboarding time by
~20 percent, moving most
users to self-service
• Fosters learning initiative,
freeing district to increase
iPad distribution from 8,000
students to 24,000.
• Supports BYOD policy,
enabling teachers and staff
to securely access network
via smartphone, tablet, or
district-provided laptops.
• Ensures HIPAA, CIPA
compliance to meet initiative
grant requirements.
• Enable 24,000 students to
have secure network
access with district-
provided Apple iPads for
use anywhere, anytime –
on or off campus.
• Secure multiple devices
used by faculty and staff,
including their own and
district-provided, in
minimally restrictive
environment.
• Facilitate onboarding by
users, the majority of them
students, with some as
young as five years old.
• Support HIPAA, CIPA
compliance.
• Migrated to Cisco Identity
Services Engine (ISE) 1.2 as
best solution to level
academic environment with
secure network access:
Transforming Learning in
Campus, Classroom &
Community.
• Serve a central role in bring-
your-own-device (BYOD)
policy for faculty and staff, as
well as guest users, with
district’s MDM provider.
• Cisco ISE 1.2
• Cisco AnyConnect®
• Cisco ASA 5585 Firewall
• Cisco Web Security Appliance
• Cisco Email Security
Appliance
• Cisco Nexus® 7000
• Cisco Catalyst® 6504
• Cisco UCS®
• Cisco Wireless LAN
Controllers 5800, 1700, 2600,
3500
“With the converged Cisco
solution, we can now
centralize monitoring and
management for all our
resources and provide better
support and services to users
without increasing IT staff.”
— Brian C. Young, Infrastructure
Manager, Adena Health System
“We are an 18-year Cisco
customer due to trust in our
team and a shared passion
to enhance learning. ISE
1.2 is central to our
initiative to put an iPad in
every student’s hands who
needs a computer. Even
five-year-olds can onboard
themselves.”
-- Pat Karr, Director, Network
Services, McAllen ISD

Mais conteúdo relacionado

Mais procurados

Health_Network_cert
Health_Network_certHealth_Network_cert
Health_Network_certFrank Berdin
 
Myschool 091126210301-phpapp01
Myschool 091126210301-phpapp01Myschool 091126210301-phpapp01
Myschool 091126210301-phpapp01Peckmc1
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Internetwork Engineering (IE)
 
10 Hottest Disruptive Technologies in Higher Education
10 Hottest Disruptive Technologies in Higher Education10 Hottest Disruptive Technologies in Higher Education
10 Hottest Disruptive Technologies in Higher EducationExtreme Networks
 
ASTM Standards Intellectual Property
ASTM Standards Intellectual PropertyASTM Standards Intellectual Property
ASTM Standards Intellectual Propertyjaykg64
 
ChefConf 2013 Keynote Session – Opscode – Adam Jacob
ChefConf 2013 Keynote Session – Opscode – Adam JacobChefConf 2013 Keynote Session – Opscode – Adam Jacob
ChefConf 2013 Keynote Session – Opscode – Adam JacobChef Software, Inc.
 

Mais procurados (9)

Health_Network_cert
Health_Network_certHealth_Network_cert
Health_Network_cert
 
Myschool 091126210301-phpapp01
Myschool 091126210301-phpapp01Myschool 091126210301-phpapp01
Myschool 091126210301-phpapp01
 
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
Delivering an Exceptional Wireless Classroom Experience - Dennis Holmes Sessi...
 
10 Hottest Disruptive Technologies in Higher Education
10 Hottest Disruptive Technologies in Higher Education10 Hottest Disruptive Technologies in Higher Education
10 Hottest Disruptive Technologies in Higher Education
 
ASTM Standards Intellectual Property
ASTM Standards Intellectual PropertyASTM Standards Intellectual Property
ASTM Standards Intellectual Property
 
E learning powerpoint
E learning powerpointE learning powerpoint
E learning powerpoint
 
E learning powerpoint
E learning powerpointE learning powerpoint
E learning powerpoint
 
ChefConf 2013 Keynote Session – Opscode – Adam Jacob
ChefConf 2013 Keynote Session – Opscode – Adam JacobChefConf 2013 Keynote Session – Opscode – Adam Jacob
ChefConf 2013 Keynote Session – Opscode – Adam Jacob
 
Cyber Ed
Cyber EdCyber Ed
Cyber Ed
 

Destaque

2013 Cisco Annual Security Report
2013 Cisco Annual Security Report2013 Cisco Annual Security Report
2013 Cisco Annual Security ReportCisco Security
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyCisco Security
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the ApplicationCisco Security
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco Security
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to CloudCisco Security
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Cisco Security
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco Security
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityCisco Security
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security StrategiesCisco Security
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and PerformanceCisco Security
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security ChallengesCisco Security
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityCisco Security
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkCisco Security
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of InactivityCisco Security
 

Destaque (17)

2013 Cisco Annual Security Report
2013 Cisco Annual Security Report2013 Cisco Annual Security Report
2013 Cisco Annual Security Report
 
Enterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security SurveyEnterprise Strategy Group: Security Survey
Enterprise Strategy Group: Security Survey
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the Application
 
Cisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide DeckCisco 2015 Midyear Security Report Slide Deck
Cisco 2015 Midyear Security Report Slide Deck
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
 
From Physical to Virtual to Cloud
From Physical to Virtual to CloudFrom Physical to Virtual to Cloud
From Physical to Virtual to Cloud
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
 
Cisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling AccessCisco ISE Reduces the Attack Surface by Controlling Access
Cisco ISE Reduces the Attack Surface by Controlling Access
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
Midsize Business Solutions: Cybersecurity
Midsize Business Solutions: CybersecurityMidsize Business Solutions: Cybersecurity
Midsize Business Solutions: Cybersecurity
 
Integrated Network Security Strategies
Integrated Network Security StrategiesIntegrated Network Security Strategies
Integrated Network Security Strategies
 
Balance Data Center Security and Performance
Balance Data Center Security and PerformanceBalance Data Center Security and Performance
Balance Data Center Security and Performance
 
Data Center Security Challenges
Data Center Security ChallengesData Center Security Challenges
Data Center Security Challenges
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
A Reality Check on the State of Cybersecurity
A Reality Check on the State of CybersecurityA Reality Check on the State of Cybersecurity
A Reality Check on the State of Cybersecurity
 
Pervasive Security Across Your Extended Network
Pervasive Security Across Your Extended NetworkPervasive Security Across Your Extended Network
Pervasive Security Across Your Extended Network
 
Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 

Semelhante a McAllen Intermediate School District

Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...Abbas Shahid Baqir
 
DGDIR_74201540446PM
DGDIR_74201540446PMDGDIR_74201540446PM
DGDIR_74201540446PMcarbonatd
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusCisco Security
 
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAmazon Web Services
 
Cisco i school moo-cs and libraries (2013 09 30)
Cisco   i school moo-cs and libraries (2013 09 30)Cisco   i school moo-cs and libraries (2013 09 30)
Cisco i school moo-cs and libraries (2013 09 30)Marc Lijour, OCT, BSc, MBA
 
Internet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou SchoolInternet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou SchoolCisco Mobility
 
Week #5 slide show
Week #5 slide showWeek #5 slide show
Week #5 slide showCheryl Simon
 
Enabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsEnabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsCisco Enterprise Networks
 
DDLS Overview
DDLS OverviewDDLS Overview
DDLS OverviewDDLS
 
Cisco Networking Academy 101
Cisco Networking Academy 101Cisco Networking Academy 101
Cisco Networking Academy 101Michael Wolman
 
MerakiFor_K-12EduSummit.pptx
MerakiFor_K-12EduSummit.pptxMerakiFor_K-12EduSummit.pptx
MerakiFor_K-12EduSummit.pptxVijayIthape3
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 
Community Deck.pdf
Community Deck.pdfCommunity Deck.pdf
Community Deck.pdfSariMcCoy1
 

Semelhante a McAllen Intermediate School District (20)

University of Granada
University of Granada University of Granada
University of Granada
 
AASTMT Case Study
AASTMT Case StudyAASTMT Case Study
AASTMT Case Study
 
Qatar University
Qatar UniversityQatar University
Qatar University
 
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...
Student Shelter In Computers Cisco Networking Regional Academy & ITC Lahore P...
 
DGDIR_74201540446PM
DGDIR_74201540446PMDGDIR_74201540446PM
DGDIR_74201540446PM
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
 
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWSAWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
AWS Educate: Accelerating Cybersecurity and Cloud Workforce Preparation with AWS
 
Cisco i school moo-cs and libraries (2013 09 30)
Cisco   i school moo-cs and libraries (2013 09 30)Cisco   i school moo-cs and libraries (2013 09 30)
Cisco i school moo-cs and libraries (2013 09 30)
 
Internet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou SchoolInternet of Everything Case Study: Punahou School
Internet of Everything Case Study: Punahou School
 
Week #5 slide show
Week #5 slide showWeek #5 slide show
Week #5 slide show
 
University of Granada
University of GranadaUniversity of Granada
University of Granada
 
Enabling Personalized Learning
Enabling Personalized LearningEnabling Personalized Learning
Enabling Personalized Learning
 
Enabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 SchoolsEnabling the Digital Leap: Strategies for K–12 Schools
Enabling the Digital Leap: Strategies for K–12 Schools
 
University of Dammam-Inspiring a new generation of learners
University of Dammam-Inspiring a new generation of learnersUniversity of Dammam-Inspiring a new generation of learners
University of Dammam-Inspiring a new generation of learners
 
DDLS Overview
DDLS OverviewDDLS Overview
DDLS Overview
 
Cisco Networking Academy 101
Cisco Networking Academy 101Cisco Networking Academy 101
Cisco Networking Academy 101
 
MerakiFor_K-12EduSummit.pptx
MerakiFor_K-12EduSummit.pptxMerakiFor_K-12EduSummit.pptx
MerakiFor_K-12EduSummit.pptx
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
Community Deck.pdf
Community Deck.pdfCommunity Deck.pdf
Community Deck.pdf
 
University of Arts of London
University of Arts of LondonUniversity of Arts of London
University of Arts of London
 

Mais de Cisco Security

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityCisco Security
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation FirewallCisco Security
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsCisco Security
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicCisco Security
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Security
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardCisco Security
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Cisco Security
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessCisco Security
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls InfographicCisco Security
 
Midyear Security Report Infographic
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report InfographicCisco Security
 
Cisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Security
 
City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCisco Security
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsCisco Security
 
Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataCisco Security
 

Mais de Cisco Security (15)

Incident Response Services Template - Cisco Security
Incident Response Services Template - Cisco SecurityIncident Response Services Template - Cisco Security
Incident Response Services Template - Cisco Security
 
3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall3 Tips for Choosing a Next Generation Firewall
3 Tips for Choosing a Next Generation Firewall
 
AMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threatsAMP Helps Cisco IT Catch 50% More Malware threats
AMP Helps Cisco IT Catch 50% More Malware threats
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Infonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor ScorecardInfonetics Network and Content Security Vendor Scorecard
Infonetics Network and Content Security Vendor Scorecard
 
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
 
The Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network AccessThe Evolution of and Need for Secure Network Access
The Evolution of and Need for Secure Network Access
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
 
Midyear Security Report Infographic
Midyear Security Report InfographicMidyear Security Report Infographic
Midyear Security Report Infographic
 
Cisco Annual Security Report Infographic
Cisco Annual Security Report InfographicCisco Annual Security Report Infographic
Cisco Annual Security Report Infographic
 
City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
 

Último

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

McAllen Intermediate School District

  • 1. © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 ImpactChallenges Why Cisco? SolutionCustomer Stats McAllen Intermediate School District • Industry: Education • Students: 25,300 • 34 campuses • Teachers: 1,500 • Employees: 1,500 • Location: McAllen, TX • Pre-K-12 • 65 percent of students are from economically disadvantaged families. • District provides a learning environment to foster creativity, ingenuity, and resourcefulness by giving students advanced technology. • Stopped server crashes caused by profiling, enabling guest access to be used. • Reduced onboarding time by ~20 percent, moving most users to self-service • Fosters learning initiative, freeing district to increase iPad distribution from 8,000 students to 24,000. • Supports BYOD policy, enabling teachers and staff to securely access network via smartphone, tablet, or district-provided laptops. • Ensures HIPAA, CIPA compliance to meet initiative grant requirements. • Enable 24,000 students to have secure network access with district- provided Apple iPads for use anywhere, anytime – on or off campus. • Secure multiple devices used by faculty and staff, including their own and district-provided, in minimally restrictive environment. • Facilitate onboarding by users, the majority of them students, with some as young as five years old. • Support HIPAA, CIPA compliance. • Migrated to Cisco Identity Services Engine (ISE) 1.2 as best solution to level academic environment with secure network access: Transforming Learning in Campus, Classroom & Community. • Serve a central role in bring- your-own-device (BYOD) policy for faculty and staff, as well as guest users, with district’s MDM provider. • Cisco ISE 1.2 • Cisco AnyConnect® • Cisco ASA 5585 Firewall • Cisco Web Security Appliance • Cisco Email Security Appliance • Cisco Nexus® 7000 • Cisco Catalyst® 6504 • Cisco UCS® • Cisco Wireless LAN Controllers 5800, 1700, 2600, 3500 “With the converged Cisco solution, we can now centralize monitoring and management for all our resources and provide better support and services to users without increasing IT staff.” — Brian C. Young, Infrastructure Manager, Adena Health System “We are an 18-year Cisco customer due to trust in our team and a shared passion to enhance learning. ISE 1.2 is central to our initiative to put an iPad in every student’s hands who needs a computer. Even five-year-olds can onboard themselves.” -- Pat Karr, Director, Network Services, McAllen ISD