SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
EXECUTIVE SUMMARY
Organization: Gobierno de Castilla-La
Mancha (Government of Castilla-La Mancha)
Industry: Government
Location: Spain
Employees: 63,000
Challenge
• Streamline delivery of regional
government’s public services
• Identify users’ navigation habits to assign
appropriate security policies
• Update, simplify email management with
easy-to-deploy email security solution
Solution
• Cisco Web Security Appliance
• Cisco Email Security Appliance
• Cisco ASA 5585-SSP-60 Adaptive Security
Appliance
Results
• Significantly reduced external Internet
access malware threats, improving user
experience
• Stabilized email security, dramatically
improving performance
• Provided easy-to-deploy and manage
solutions, freeing up IT staff time to handle
other initiatives
Challenge
The Gobierno de Castilla-La Mancha, the Regional Government of Castilla-La
Mancha in Spain, provides health, education, and administration services for
a widely dispersed population of more than two million residents. The regional
government employs approximately 20,000 healthcare workers, 18,000 educators,
12,000 remote access teleworkers, and 12,000 administrators. The government
also is responsible for managing the agricultural and economic needs of the region.
A staff of just four IT professionals is responsible for implementing and managing
the IT network and security for this wide range of employees across Spain’s largest
area. With limited resources, the IT team must rely on streamlining their operations
to securely deliver services to the region’s residents and businesses.
“We provide Internet services for teachers, healthcare workers, as well as
government employees. Each group has websites they visit as part of their jobs,”
says Pedro Jesus Rodriguez Gonzalez, coordinator, Information Technology,
Community Board, Gobierno de Castilla-La Mancha. “We needed a solution that
could manage the different identities, manage the URLs of the websites they were
visiting, and quickly resolve blocked addresses, if necessary.”
Maintaining strong network security in the face of the different user access and
identities was a concern. The organization needed a more simple way to control
the different user profiles and to make sure users could get to the resources they
needed while still protecting the core network. They also needed to be able to
centrally manage their significantly expanded network without adding more staff.
Additionally, to address the needs of the growing region, the IT team also needed a
way to secure its email system of 100,000 users and to handle 500,000 messages
per day, protecting the network from inbound and outbound email threats.
Protecting Against Security Threats,
Streamlining Service Delivery
1 © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
Customer Case Study
Gobierno de Castilla-La Mancha secures Internet access, email
with Web Security Appliance and Email Security Appliance.
Solution
Castilla-La Mancha’s IT team sought a solution that could meet identity and access
policy requirements, along with additional robust web security. After researching
different market options, the IT team selected the Cisco® Web Security Appliance
(WSA), Cisco Email Security Appliance (ESA), and ASA 5585 Adaptive Security
Appliance to help them address the needs of the organization. Cisco Identity
Services Engine (ISE) and TrustSec® support the use of wireless devices accessing
the network.
With the Cisco WSA, the government now has better threat defense, advanced
malware protection, and application visibility and control.
“Before the Cisco solution – particularly in regards to our malware and URL
management – we had to spend a lot of time managing black lists and white lists.
There was a huge misclassification rate, which led to challenges for users and a low
availability rate,” says Rodriguez Gonzalez.
In addition, the IT group needed easy, insight-filled reporting. “Previously, we had to
piece together reports,” says Rodriguez Gonzalez. “With the Cisco WSA, when a user
reports a problem, it’s easy to see what they are talking about and address the issue.”
The WSA also gives Castilla-La Mancha complete control over how end users
access the Internet. By identifying hundreds of applications and more than 150,000
micro-applications, the WSA has helped the IT staff create policies that match the
different needs of healthcare, education, and government employees. Specific
features such as chat, messaging, video, and audio can be allowed or blocked,
according to the requirements of various departments and users - without the need
to block entire websites.
Castilla-La Mancha also relies on the Cisco Email Security Appliance (ESA) to provide
advanced threat protection, block spam, and deliver easy enforcement of policies.
“With more than a half-million emails per day, rapidly rising spam volumes are a
continual challenge,” says Rodriguez Gonzalez.
The ASA 5585 Adaptive Security Appliance enables the Castilla-La Mancha team
to allow or deny access to and from the different parts of their distinct regional
services and corporate network, each with their own website.
He also notes that the work population includes users who rely on mobile devices
such as laptops, while others use desktops or workstations. Castilla-La Mancha
can address the wireless needs of both by protecting the network using the Identity
Services Engine to monitor who has access, to what part of the network and using
what device, in concert with the Wireless Controller.
Results
The results of the new solutions have been seen almost immediately. The IT team
now has a more centralized view and on-demand reporting capabilities of their entire
network of WSAs through the Content Security Management Appliance. The ability
to track web traffic in real-time enables the team to manage threats as they arise
and to make changes as needs change.
Customer Case Study
“Previously, we had to piece
together reports. With the
Cisco WSA, when a user
reports a problem, it’s easy
to see what they are talking
about and address the
issue.”
Pedro Jesus Rodriguez Gonzalez
Coordinator, Information Technology
Community Board
Gobierno de Castilla-La Mancha
2 © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
The addition of more granular reporting enables Castilla-La Mancha to securely
create specific reports, including top visited websites, bandwidth usage, and viruses
and malware that have been blocked.
The team can produce reports according to how their specific websites are
categorized, to know which category is the most visited by users, such as
government and law, or social networking.
WSA has provided a better, more reliable online experience for its users with
improved performance, throughput, and redundancy. Users also need only to provide
their credentials once; the team is looking at leveraging single sign-on in the future.
In the future, the team aims to leverage ISE and TrustSec also to integrate wired
networks in order to authenticate, authorize and account for their VPN use. This will
give the Castilla-La Mancha team greater security controls.
For More Information
To find out more about the Cisco Security products used, go to:
•	 http://www.cisco.com/go/wsa
•	 http://www.cisco.com/go/esa
•	 http://www.cisco.com/go/asa
•	 http://www.cisco.com/go/ise
•	 http://www.cisco.com/go/trustsec
•	 http://www.cisco.com/go/sma
PRODUCT LIST
Security
• Cisco Web Security Appliance
• Cisco Email Security Appliance
• Cisco ASA 5585-SSP-60 Adaptive Security Appliance
• Cisco Content Security Management Appliance
• Cisco Identity Services Engine
• Cisco TrustSec
Data Center
• Cisco Unified Computing System™
• Cisco Vblock System
• Cisco 6248 and 6124 Fabric Interconnects
Routers and Switches
• Cisco 7204 Routers
• Cisco Nexus 3500 Series Switches
• Cisco Catalyst 6509 Switches
Customer Case Study
© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.	 C36-732189-00 07/14
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Americas Headquarters
Cisco Systems, Inc.
San Jose, CA
Asia Pacific Headquarters
Cisco Systems (USA) Pte. Ltd.
Singapore
Europe Headquarters
Cisco Systems International BV Amsterdam,
The Netherlands

Mais conteúdo relacionado

Mais procurados

Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills GapStephen Cobb
 
Contractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataContractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataDigital Shadows
 
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...Cláudia Alves
 
information control and Security system
information control and Security systeminformation control and Security system
information control and Security systembhavesh lande
 
DATA SECURITY FOR MOBILE HEALTHCAREv
DATA SECURITY FOR MOBILE HEALTHCAREvDATA SECURITY FOR MOBILE HEALTHCAREv
DATA SECURITY FOR MOBILE HEALTHCAREvYudha Eri Saputra
 
Microsoft Intelligent Communications - Skype and Teams with Office 365
Microsoft Intelligent Communications - Skype and Teams with Office 365Microsoft Intelligent Communications - Skype and Teams with Office 365
Microsoft Intelligent Communications - Skype and Teams with Office 365David J Rosenthal
 
What I Learned at RSAC 2020
What I Learned at RSAC 2020What I Learned at RSAC 2020
What I Learned at RSAC 2020Ulf Mattsson
 
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITYDYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY anurama
 
IDERA Live | Mitigating Data Risks from Cloud to Ground
IDERA Live | Mitigating Data Risks from Cloud to GroundIDERA Live | Mitigating Data Risks from Cloud to Ground
IDERA Live | Mitigating Data Risks from Cloud to GroundIDERA Software
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentationrichard_turner
 
Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)Salim Hosen
 
Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21Ioannis Aligizakis, M.Sc.
 

Mais procurados (20)

Sizing the Cyber Skills Gap
Sizing the Cyber Skills GapSizing the Cyber Skills Gap
Sizing the Cyber Skills Gap
 
Microsoft Digital Crimes Unit
Microsoft Digital Crimes UnitMicrosoft Digital Crimes Unit
Microsoft Digital Crimes Unit
 
Cybersecurity Threat Intelligence Briefing
Cybersecurity Threat Intelligence BriefingCybersecurity Threat Intelligence Briefing
Cybersecurity Threat Intelligence Briefing
 
Contractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataContractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive Data
 
Cyber attacks in 2021
Cyber attacks in 2021Cyber attacks in 2021
Cyber attacks in 2021
 
Three trends in cybersecurity
Three trends in cybersecurityThree trends in cybersecurity
Three trends in cybersecurity
 
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
 
information control and Security system
information control and Security systeminformation control and Security system
information control and Security system
 
DATA SECURITY FOR MOBILE HEALTHCAREv
DATA SECURITY FOR MOBILE HEALTHCAREvDATA SECURITY FOR MOBILE HEALTHCAREv
DATA SECURITY FOR MOBILE HEALTHCAREv
 
Microsoft Intelligent Communications - Skype and Teams with Office 365
Microsoft Intelligent Communications - Skype and Teams with Office 365Microsoft Intelligent Communications - Skype and Teams with Office 365
Microsoft Intelligent Communications - Skype and Teams with Office 365
 
What I Learned at RSAC 2020
What I Learned at RSAC 2020What I Learned at RSAC 2020
What I Learned at RSAC 2020
 
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITYDYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
IDERA Live | Mitigating Data Risks from Cloud to Ground
IDERA Live | Mitigating Data Risks from Cloud to GroundIDERA Live | Mitigating Data Risks from Cloud to Ground
IDERA Live | Mitigating Data Risks from Cloud to Ground
 
Fy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate PresentationFy11 Clearswift Corporate Presentation
Fy11 Clearswift Corporate Presentation
 
2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
 
Data security
Data securityData security
Data security
 
Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)
 
Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21
 

Semelhante a Gobierno de Castilla la Mancha

City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCisco Security
 
Kela v2cs -_final
Kela v2cs -_finalKela v2cs -_final
Kela v2cs -_finalwbrewin
 
Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataCisco Security
 
INSECURE Magazine - 39
INSECURE Magazine - 39INSECURE Magazine - 39
INSECURE Magazine - 39Felipe Prado
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Netpluz Asia Pte Ltd
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
 
Cyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseCyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseWavecrest Computing
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusCisco Security
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
 

Semelhante a Gobierno de Castilla la Mancha (20)

City of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation SecurityCity of Tomorrow Builds in Next-Generation Security
City of Tomorrow Builds in Next-Generation Security
 
New Charter Housing Trust
New Charter Housing TrustNew Charter Housing Trust
New Charter Housing Trust
 
The Polytechnic of Namibia
The Polytechnic of NamibiaThe Polytechnic of Namibia
The Polytechnic of Namibia
 
University of Granada
University of Granada University of Granada
University of Granada
 
Arup
ArupArup
Arup
 
Kela v2cs -_final
Kela v2cs -_finalKela v2cs -_final
Kela v2cs -_final
 
Leveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient DataLeveraging Context-Aware Security to Safeguard Patient Data
Leveraging Context-Aware Security to Safeguard Patient Data
 
Kela
Kela Kela
Kela
 
TP IND MIS - DI TORO, ULISES
TP IND MIS - DI TORO, ULISESTP IND MIS - DI TORO, ULISES
TP IND MIS - DI TORO, ULISES
 
Ukrtransgaz
UkrtransgazUkrtransgaz
Ukrtransgaz
 
University of Granada
University of GranadaUniversity of Granada
University of Granada
 
INSECURE Magazine - 39
INSECURE Magazine - 39INSECURE Magazine - 39
INSECURE Magazine - 39
 
The New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler ArchitectureThe New Intelligent Network: Building a Smarter, Simpler Architecture
The New Intelligent Network: Building a Smarter, Simpler Architecture
 
PAN CIPA Requirements
PAN CIPA RequirementsPAN CIPA Requirements
PAN CIPA Requirements
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
Cyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWiseCyblock Cloud - Effortless Integration With ConnectWise
Cyblock Cloud - Effortless Integration With ConnectWise
 
Secure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on CampusSecure, Automated Network Access for Any Device on Campus
Secure, Automated Network Access for Any Device on Campus
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Ds next gen it monitoring
Ds   next gen it monitoringDs   next gen it monitoring
Ds next gen it monitoring
 

Mais de Cisco Case Studies (20)

Expo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_ENExpo Milan 2015 Case Study_EN
Expo Milan 2015 Case Study_EN
 
Expo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_ITExpo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_IT
 
Seeberger
Seeberger Seeberger
Seeberger
 
Neotel
Neotel Neotel
Neotel
 
Il Gruppo Marcegaglia
Il Gruppo MarcegagliaIl Gruppo Marcegaglia
Il Gruppo Marcegaglia
 
Marcegaglia Group
Marcegaglia GroupMarcegaglia Group
Marcegaglia Group
 
SAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearwaySAAOne Case Study: Private cloud for data clearway
SAAOne Case Study: Private cloud for data clearway
 
AASTMT Case Study
AASTMT Case StudyAASTMT Case Study
AASTMT Case Study
 
Bauer
Bauer Bauer
Bauer
 
Universal Motors Agencies
Universal Motors AgenciesUniversal Motors Agencies
Universal Motors Agencies
 
Equitix
Equitix Equitix
Equitix
 
ScanPlus
ScanPlusScanPlus
ScanPlus
 
Odeabank Case Study
Odeabank Case StudyOdeabank Case Study
Odeabank Case Study
 
IBB Energie AG
IBB Energie AGIBB Energie AG
IBB Energie AG
 
Lufthansa Case Study
Lufthansa Case StudyLufthansa Case Study
Lufthansa Case Study
 
Schmitz Cargobull
Schmitz CargobullSchmitz Cargobull
Schmitz Cargobull
 
Mankiewicz Gebr & Co
Mankiewicz Gebr & Co Mankiewicz Gebr & Co
Mankiewicz Gebr & Co
 
Lomma Kommun
Lomma Kommun Lomma Kommun
Lomma Kommun
 
Skipton Building Society
Skipton Building SocietySkipton Building Society
Skipton Building Society
 
Anyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End UsersAnyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End Users
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Gobierno de Castilla la Mancha

  • 1. EXECUTIVE SUMMARY Organization: Gobierno de Castilla-La Mancha (Government of Castilla-La Mancha) Industry: Government Location: Spain Employees: 63,000 Challenge • Streamline delivery of regional government’s public services • Identify users’ navigation habits to assign appropriate security policies • Update, simplify email management with easy-to-deploy email security solution Solution • Cisco Web Security Appliance • Cisco Email Security Appliance • Cisco ASA 5585-SSP-60 Adaptive Security Appliance Results • Significantly reduced external Internet access malware threats, improving user experience • Stabilized email security, dramatically improving performance • Provided easy-to-deploy and manage solutions, freeing up IT staff time to handle other initiatives Challenge The Gobierno de Castilla-La Mancha, the Regional Government of Castilla-La Mancha in Spain, provides health, education, and administration services for a widely dispersed population of more than two million residents. The regional government employs approximately 20,000 healthcare workers, 18,000 educators, 12,000 remote access teleworkers, and 12,000 administrators. The government also is responsible for managing the agricultural and economic needs of the region. A staff of just four IT professionals is responsible for implementing and managing the IT network and security for this wide range of employees across Spain’s largest area. With limited resources, the IT team must rely on streamlining their operations to securely deliver services to the region’s residents and businesses. “We provide Internet services for teachers, healthcare workers, as well as government employees. Each group has websites they visit as part of their jobs,” says Pedro Jesus Rodriguez Gonzalez, coordinator, Information Technology, Community Board, Gobierno de Castilla-La Mancha. “We needed a solution that could manage the different identities, manage the URLs of the websites they were visiting, and quickly resolve blocked addresses, if necessary.” Maintaining strong network security in the face of the different user access and identities was a concern. The organization needed a more simple way to control the different user profiles and to make sure users could get to the resources they needed while still protecting the core network. They also needed to be able to centrally manage their significantly expanded network without adding more staff. Additionally, to address the needs of the growing region, the IT team also needed a way to secure its email system of 100,000 users and to handle 500,000 messages per day, protecting the network from inbound and outbound email threats. Protecting Against Security Threats, Streamlining Service Delivery 1 © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Customer Case Study Gobierno de Castilla-La Mancha secures Internet access, email with Web Security Appliance and Email Security Appliance.
  • 2. Solution Castilla-La Mancha’s IT team sought a solution that could meet identity and access policy requirements, along with additional robust web security. After researching different market options, the IT team selected the Cisco® Web Security Appliance (WSA), Cisco Email Security Appliance (ESA), and ASA 5585 Adaptive Security Appliance to help them address the needs of the organization. Cisco Identity Services Engine (ISE) and TrustSec® support the use of wireless devices accessing the network. With the Cisco WSA, the government now has better threat defense, advanced malware protection, and application visibility and control. “Before the Cisco solution – particularly in regards to our malware and URL management – we had to spend a lot of time managing black lists and white lists. There was a huge misclassification rate, which led to challenges for users and a low availability rate,” says Rodriguez Gonzalez. In addition, the IT group needed easy, insight-filled reporting. “Previously, we had to piece together reports,” says Rodriguez Gonzalez. “With the Cisco WSA, when a user reports a problem, it’s easy to see what they are talking about and address the issue.” The WSA also gives Castilla-La Mancha complete control over how end users access the Internet. By identifying hundreds of applications and more than 150,000 micro-applications, the WSA has helped the IT staff create policies that match the different needs of healthcare, education, and government employees. Specific features such as chat, messaging, video, and audio can be allowed or blocked, according to the requirements of various departments and users - without the need to block entire websites. Castilla-La Mancha also relies on the Cisco Email Security Appliance (ESA) to provide advanced threat protection, block spam, and deliver easy enforcement of policies. “With more than a half-million emails per day, rapidly rising spam volumes are a continual challenge,” says Rodriguez Gonzalez. The ASA 5585 Adaptive Security Appliance enables the Castilla-La Mancha team to allow or deny access to and from the different parts of their distinct regional services and corporate network, each with their own website. He also notes that the work population includes users who rely on mobile devices such as laptops, while others use desktops or workstations. Castilla-La Mancha can address the wireless needs of both by protecting the network using the Identity Services Engine to monitor who has access, to what part of the network and using what device, in concert with the Wireless Controller. Results The results of the new solutions have been seen almost immediately. The IT team now has a more centralized view and on-demand reporting capabilities of their entire network of WSAs through the Content Security Management Appliance. The ability to track web traffic in real-time enables the team to manage threats as they arise and to make changes as needs change. Customer Case Study “Previously, we had to piece together reports. With the Cisco WSA, when a user reports a problem, it’s easy to see what they are talking about and address the issue.” Pedro Jesus Rodriguez Gonzalez Coordinator, Information Technology Community Board Gobierno de Castilla-La Mancha 2 © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.
  • 3. The addition of more granular reporting enables Castilla-La Mancha to securely create specific reports, including top visited websites, bandwidth usage, and viruses and malware that have been blocked. The team can produce reports according to how their specific websites are categorized, to know which category is the most visited by users, such as government and law, or social networking. WSA has provided a better, more reliable online experience for its users with improved performance, throughput, and redundancy. Users also need only to provide their credentials once; the team is looking at leveraging single sign-on in the future. In the future, the team aims to leverage ISE and TrustSec also to integrate wired networks in order to authenticate, authorize and account for their VPN use. This will give the Castilla-La Mancha team greater security controls. For More Information To find out more about the Cisco Security products used, go to: • http://www.cisco.com/go/wsa • http://www.cisco.com/go/esa • http://www.cisco.com/go/asa • http://www.cisco.com/go/ise • http://www.cisco.com/go/trustsec • http://www.cisco.com/go/sma PRODUCT LIST Security • Cisco Web Security Appliance • Cisco Email Security Appliance • Cisco ASA 5585-SSP-60 Adaptive Security Appliance • Cisco Content Security Management Appliance • Cisco Identity Services Engine • Cisco TrustSec Data Center • Cisco Unified Computing System™ • Cisco Vblock System • Cisco 6248 and 6124 Fabric Interconnects Routers and Switches • Cisco 7204 Routers • Cisco Nexus 3500 Series Switches • Cisco Catalyst 6509 Switches Customer Case Study © 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. C36-732189-00 07/14 Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Americas Headquarters Cisco Systems, Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems (USA) Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands