SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
“The Cisco approach to security can be a valuable reference point
not just for the Smart Cities of the near future but for any public or
private organization.”
Guido Arnone, Director of Technical and Digital Innovation, Expo 2015
During the six months Expo Milan 2015 lasted, Cisco security made it possible
to block more than half a million intrusion attempts and over 10,000 attempts
to take control of applications and devices, while the Operational Control
Center correlated all the events detected by the network-connected cameras
and sensors, guaranteeing the complete success of the event.
Protect visitors and pavilions with an advanced, effective and
pervasive security system able to manage both the physical and
the digital components from a single control platform.
Challenge
The Cisco security
strategy behind the
success of Expo Milan
2015
Physical security and IT security: at Expo Milan
2015 the protection of people, resources, data
and devices was a key factor in the success of the
event. From video surveillance to the prevention
of cyber attacks, Cisco’s IP network, the pervasive
multilevel security and a task force dedicated to
monitoring the entire infrastructure allowed the
organizers to concentrate on operational tasks
knowing that the event was in safe hands.
Expo Milan 2015 did not take place in one of the most peaceful moments in
recent history. Going ahead with an international event of this magnitude and
visibility, and making it the success it was, meant adopting appropriate security
measures. Because of its importance and broad international participation, the
event was a particularly sensitive target during all of the six months it lasted,
potentially at risk of protests and boycotts.
First off, it was very important to put in place all the tools and processes that
could be used to physically protect persons and property. From this perspective,
the Cisco multiservice IP network played a crucial role. “We provided the
organizers with an infrastructure capable of enabling all the security systems
© 2016 Cisco Systems, Inc. All rights reserved. 1
Cisco designed a network for Expo Milan
2015 that prioritized security with the high
levels of protection characteristic of next-
generation infrastructure
The Cisco approach to advanced protection from security
threats, across the network and in all phases of an attack
in a context of the Internet of Everything.
Solution
dedicated to the safety of the visitors, operators and pavilions,” confirmed Mirko
Berlier, Cisco Systems Engineer & Expo 2015 Architect. “The systems of video
surveillance, access control for the Expo area and even the sensors for fire and
intrusion detection were all connected to the IP network”.
All the information and data collected and correlated in real time was shared
with the Command and Control Center, whose team played a decisive role by
taking charge of all the systems designed to protect people and property.
Tightly integrated with the physical security systems, IT security played
a leading role at Expo 2015, the first in history to be entirely supported
by systems and solutions based on an IP network. All the Expo Smart
City services, the heart of the event, in other words, were enabled by
digital applications and platforms. “A successful attack could have totally
jeopardized Expo,” noted Berlier, “by preventing the turnstiles from opening,
for example, or jamming the physical security systems, or blocking the
attractions in the pavilions, with serious damage to the event and the
reputation of the organizers.”
So Cisco designed a network infrastructure that consistently prioritized
security, to ensure a level of protection that corresponded to next
generation criteria. “The events detected by physical security devices like
the video surveillance cameras and the sensors were matched with the
protections against attacks and malware,” said Guido Arnone, Director of
Technical and Digital Innovation for Expo 2015. “Applying Cisco’s Internet of
Everything approach to safeguarding persons and property was a winning
move, because the correlation of data and processes enabled the Control
Center to make and implement the most appropriate choices.”
Traditional security policy functionalities were guaranteed by the high-
performance Cisco ASA (Adaptive Security Appliance) firewall which served
the security needs of the central data centers and the pavilions. “Thanks to
this architecture, we were able to control all traffic to and from the public
network and the cloud,” said Berlier.
© 2016 Cisco Systems, Inc. All rights reserved. 2
More than half a million intrusion attempts and over
10,000 attempts to take control of applications and
devices were blocked by Cisco security, pervasive right
across the network.
Results
Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
www.cisco.com
Tel.: 001 408 526-4000
Italian Headquarters
Cisco Systems Italy
Via Torri Bianche, 8
20871 Vimercate (MB)
www.cisco.com/it
Toll Free: 800 782648
Fax: 039 6295299
Rome Branch Office
Cisco Systems Italy
Via del Serafico, 200
00142 Roma
Toll Free: 800 782648
Fax: 06 51645001
There are more than 200 Cisco branch offices around the world. Their addresses, telephone and fax numbers are available on the Cisco website:
www.cisco.com/go/offices.
© 2016 Cisco Systems, Inc. All rights reserved. The Cisco logo is the registered trademark of Cisco Systems, Inc. in the United States and a number of other countries.
All the other trademarks or registered marks referred to in this document or on the Cisco Website are the property of their respective companies.
To complement these functionalities and implement a next-generation
security approach adequate to the needs of a complex infrastructure like
the one fielded at Expo, the organization was provided with tools that
could detect any abnormal network behavior or intrusion attempts in real
time for all application traffic. “ A Cisco Sourcefire architecture with all its
dedicated systems, like Advanced Malware Protection, Intrusion Prevention,
Application Visibility & Control and URL Filtering, was implemented across
the entire Expo network,” explained Berlier. “These tools can analyze up to
40Gbps of traffic.”
Upstream, the integration of the Cisco Identity Service Engine enabled
secure access management of the entire wired and wireless network for
visitors and all personnel employed during the event. “The Cisco Identity
Service Engine prevented any unauthorized access to the network while
providing highly flexible operational access management, thanks to
centralized policy management and automated network management and
configuration procedures,” said Berlier.
The results achieved at Expo Milan 2015 confirm that a security strategy
based on Cisco solutions is a winning move. “During the six months the
event lasted, the system enabled us to detect and block over half a million
intrusion attempts from all over the world”, concluded Berlier, “not to
mention the 10,000+ attempts to take control of applications and systems
that were prevented by the security embedded across the IP network.” All
to ensure that the organizers could operate in absolute tranquility, thereby
contributing to the huge success of the event and the security of people,
facilities, data and devices. The security fielded at Expo 2015 is a reference
approach, not just for the Smart Cities of the near future, but for any public
or private organization.
Products and services
• Cisco ASA Next Gen Firewalls with
FirePower (ASA5585 and smaller
platforms)
• Cisco FirePOWER Appliances 8370
• Cisco FireSIGHT Management
Center
• Cisco Identity Services Engine for
advanced network admission control
and flexible management

Mais conteúdo relacionado

Mais procurados

Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything Cisco Canada
 
Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot IoT Tunisia
 
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPTInternet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPTMultisoft Virtual Academy
 
IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel Bessie Wang
 
Internet of everything
Internet of everything Internet of everything
Internet of everything Jayesh Pai
 
WatchGuard Firewall & Network Security
WatchGuard Firewall & Network SecurityWatchGuard Firewall & Network Security
WatchGuard Firewall & Network SecurityMarketing Team
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architectureElias Hasnat
 
Cisco connect winnipeg 2018 accelerating the secure digital business throug...
Cisco connect winnipeg 2018   accelerating the secure digital business throug...Cisco connect winnipeg 2018   accelerating the secure digital business throug...
Cisco connect winnipeg 2018 accelerating the secure digital business throug...Cisco Canada
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne AFCEA International
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSMAU
 
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings IntegrationThe Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings IntegrationMemoori
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTIoT613
 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Rick Huijbregts
 
Webinar - Transforming Manufacturing with IoT
Webinar - Transforming Manufacturing with IoTWebinar - Transforming Manufacturing with IoT
Webinar - Transforming Manufacturing with IoTHARMAN Services
 
IoT Update Oktober 2019 | Wilfred Harbers CTO Benelux @ Software AG
IoT Update Oktober 2019 |  Wilfred Harbers CTO Benelux @ Software AGIoT Update Oktober 2019 |  Wilfred Harbers CTO Benelux @ Software AG
IoT Update Oktober 2019 | Wilfred Harbers CTO Benelux @ Software AGJesse van Doren
 

Mais procurados (20)

Bauer
Bauer Bauer
Bauer
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything
 
IIC's Top 10 Accomplishments 2016
IIC's Top 10 Accomplishments 2016IIC's Top 10 Accomplishments 2016
IIC's Top 10 Accomplishments 2016
 
Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot
 
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPTInternet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
 
IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel
 
Internet of everything
Internet of everything Internet of everything
Internet of everything
 
WatchGuard Firewall & Network Security
WatchGuard Firewall & Network SecurityWatchGuard Firewall & Network Security
WatchGuard Firewall & Network Security
 
推動數位革命
推動數位革命推動數位革命
推動數位革命
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architecture
 
Cisco connect winnipeg 2018 accelerating the secure digital business throug...
Cisco connect winnipeg 2018   accelerating the secure digital business throug...Cisco connect winnipeg 2018   accelerating the secure digital business throug...
Cisco connect winnipeg 2018 accelerating the secure digital business throug...
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings IntegrationThe Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
 
CyberSecurity_for_the_IoT
CyberSecurity_for_the_IoTCyberSecurity_for_the_IoT
CyberSecurity_for_the_IoT
 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
 
SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform  SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform
 
Webinar - Transforming Manufacturing with IoT
Webinar - Transforming Manufacturing with IoTWebinar - Transforming Manufacturing with IoT
Webinar - Transforming Manufacturing with IoT
 
IoT Update Oktober 2019 | Wilfred Harbers CTO Benelux @ Software AG
IoT Update Oktober 2019 |  Wilfred Harbers CTO Benelux @ Software AGIoT Update Oktober 2019 |  Wilfred Harbers CTO Benelux @ Software AG
IoT Update Oktober 2019 | Wilfred Harbers CTO Benelux @ Software AG
 

Destaque

Expo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_ITExpo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_ITCisco Case Studies
 
Case Study: Cisco Acquisition
Case Study: Cisco AcquisitionCase Study: Cisco Acquisition
Case Study: Cisco AcquisitionDjadja Sardjana
 
Dulux paints the town red (or any colour you like) with augmented reality - S...
Dulux paints the town red (or any colour you like) with augmented reality - S...Dulux paints the town red (or any colour you like) with augmented reality - S...
Dulux paints the town red (or any colour you like) with augmented reality - S...Internet World
 
Cisco Systems: A company Analysis
Cisco Systems: A company AnalysisCisco Systems: A company Analysis
Cisco Systems: A company AnalysisNickkisha Farrell
 
Cisco System, Inc: Implementing ERP
Cisco System, Inc: Implementing ERPCisco System, Inc: Implementing ERP
Cisco System, Inc: Implementing ERPGaurav Singh
 
Cadbury manages a crisis with integrated marketing communication
Cadbury manages a crisis with integrated marketing communicationCadbury manages a crisis with integrated marketing communication
Cadbury manages a crisis with integrated marketing communicationPraveenkumar Katnalli
 
Kingfisher airlines financial crisis
Kingfisher airlines financial crisisKingfisher airlines financial crisis
Kingfisher airlines financial crisismanish kumar
 
A case study on restructuring philips
A case study on restructuring  philipsA case study on restructuring  philips
A case study on restructuring philipsanusharma1987
 
Pharmaceutical Marketing Presentation
Pharmaceutical Marketing PresentationPharmaceutical Marketing Presentation
Pharmaceutical Marketing Presentationnilbert
 
Kingfisher Airlines- A Case Study
Kingfisher Airlines- A Case StudyKingfisher Airlines- A Case Study
Kingfisher Airlines- A Case StudyChaahat Khattar
 

Destaque (20)

Il Gruppo Marcegaglia
Il Gruppo MarcegagliaIl Gruppo Marcegaglia
Il Gruppo Marcegaglia
 
Lomma Kommun
Lomma Kommun Lomma Kommun
Lomma Kommun
 
Expo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_ITExpo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_IT
 
Lufthansa Case Study
Lufthansa Case StudyLufthansa Case Study
Lufthansa Case Study
 
Case Study: Cisco Acquisition
Case Study: Cisco AcquisitionCase Study: Cisco Acquisition
Case Study: Cisco Acquisition
 
Dulux paints the town red (or any colour you like) with augmented reality - S...
Dulux paints the town red (or any colour you like) with augmented reality - S...Dulux paints the town red (or any colour you like) with augmented reality - S...
Dulux paints the town red (or any colour you like) with augmented reality - S...
 
Dulux case study
Dulux case studyDulux case study
Dulux case study
 
Cisco Systems: A company Analysis
Cisco Systems: A company AnalysisCisco Systems: A company Analysis
Cisco Systems: A company Analysis
 
Dulux paints
Dulux paintsDulux paints
Dulux paints
 
Cisco System, Inc: Implementing ERP
Cisco System, Inc: Implementing ERPCisco System, Inc: Implementing ERP
Cisco System, Inc: Implementing ERP
 
Cadbury manages a crisis with integrated marketing communication
Cadbury manages a crisis with integrated marketing communicationCadbury manages a crisis with integrated marketing communication
Cadbury manages a crisis with integrated marketing communication
 
Dabur India- Case Study
Dabur India- Case StudyDabur India- Case Study
Dabur India- Case Study
 
Kingfisher airlines financial crisis
Kingfisher airlines financial crisisKingfisher airlines financial crisis
Kingfisher airlines financial crisis
 
A case study on restructuring philips
A case study on restructuring  philipsA case study on restructuring  philips
A case study on restructuring philips
 
Cadbury's worm case
Cadbury's worm caseCadbury's worm case
Cadbury's worm case
 
Dabur case study
Dabur case studyDabur case study
Dabur case study
 
Cadbury Case Study
Cadbury Case StudyCadbury Case Study
Cadbury Case Study
 
Pharmaceutical Marketing Presentation
Pharmaceutical Marketing PresentationPharmaceutical Marketing Presentation
Pharmaceutical Marketing Presentation
 
Kingfisher Airlines- A Case Study
Kingfisher Airlines- A Case StudyKingfisher Airlines- A Case Study
Kingfisher Airlines- A Case Study
 
Nestle Maggi
Nestle MaggiNestle Maggi
Nestle Maggi
 

Semelhante a Expo Milan 2015 Case Study_EN

SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9alvin chin
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...FinTech Belgium
 
March_Networks_News_03-09
March_Networks_News_03-09March_Networks_News_03-09
March_Networks_News_03-09Kendall Addison
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big UnknownAdrian Dumitrescu
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsIRJET Journal
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupCohesive Networks
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCase IQ
 
TECTECO V3.20160526.key (2)
TECTECO V3.20160526.key (2)TECTECO V3.20160526.key (2)
TECTECO V3.20160526.key (2)Mark De Simone
 
Connected Vineyards
Connected VineyardsConnected Vineyards
Connected VineyardsEricsson
 
IRJET- CHAOS based Security for Online Transactions through GUI Implementation
IRJET- CHAOS based Security for Online Transactions through GUI ImplementationIRJET- CHAOS based Security for Online Transactions through GUI Implementation
IRJET- CHAOS based Security for Online Transactions through GUI ImplementationIRJET Journal
 
SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7Chin Wan Lim
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltdNehul Gupta
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTWitekio
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalAnastasios Economides
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber securityAurobindo Nayak
 
EuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyEuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyCarlos Chalico
 

Semelhante a Expo Milan 2015 Case Study_EN (20)

SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Giuseppe Meazza Stadium
Giuseppe Meazza StadiumGiuseppe Meazza Stadium
Giuseppe Meazza Stadium
 
NEC-IBM_Event_093015
NEC-IBM_Event_093015NEC-IBM_Event_093015
NEC-IBM_Event_093015
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 
March_Networks_News_03-09
March_Networks_News_03-09March_Networks_News_03-09
March_Networks_News_03-09
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big Unknown
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
TECTECO V3.20160526.key (2)
TECTECO V3.20160526.key (2)TECTECO V3.20160526.key (2)
TECTECO V3.20160526.key (2)
 
Connected Vineyards
Connected VineyardsConnected Vineyards
Connected Vineyards
 
IRJET- CHAOS based Security for Online Transactions through GUI Implementation
IRJET- CHAOS based Security for Online Transactions through GUI ImplementationIRJET- CHAOS based Security for Online Transactions through GUI Implementation
IRJET- CHAOS based Security for Online Transactions through GUI Implementation
 
SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltd
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_final
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Ministry of Foreign Affairs
Ministry of Foreign AffairsMinistry of Foreign Affairs
Ministry of Foreign Affairs
 
EuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyEuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the sky
 

Mais de Cisco Case Studies (16)

Equitix
Equitix Equitix
Equitix
 
ScanPlus
ScanPlusScanPlus
ScanPlus
 
Odeabank Case Study
Odeabank Case StudyOdeabank Case Study
Odeabank Case Study
 
Mankiewicz Gebr & Co
Mankiewicz Gebr & Co Mankiewicz Gebr & Co
Mankiewicz Gebr & Co
 
Skipton Building Society
Skipton Building SocietySkipton Building Society
Skipton Building Society
 
Anyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End UsersAnyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End Users
 
Rai Radio Televisione Italiana
Rai Radio Televisione ItalianaRai Radio Televisione Italiana
Rai Radio Televisione Italiana
 
P-Pro's
P-Pro'sP-Pro's
P-Pro's
 
Netcloud
NetcloudNetcloud
Netcloud
 
AVIT
AVITAVIT
AVIT
 
Mankiewicz Gebr & Co
Mankiewicz Gebr & Co Mankiewicz Gebr & Co
Mankiewicz Gebr & Co
 
Radio 538
Radio 538 Radio 538
Radio 538
 
Beachbody, LLC
Beachbody, LLCBeachbody, LLC
Beachbody, LLC
 
Port Aventura
Port AventuraPort Aventura
Port Aventura
 
Crif
CrifCrif
Crif
 
CAME Group Spa
CAME Group SpaCAME Group Spa
CAME Group Spa
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Expo Milan 2015 Case Study_EN

  • 1. “The Cisco approach to security can be a valuable reference point not just for the Smart Cities of the near future but for any public or private organization.” Guido Arnone, Director of Technical and Digital Innovation, Expo 2015 During the six months Expo Milan 2015 lasted, Cisco security made it possible to block more than half a million intrusion attempts and over 10,000 attempts to take control of applications and devices, while the Operational Control Center correlated all the events detected by the network-connected cameras and sensors, guaranteeing the complete success of the event. Protect visitors and pavilions with an advanced, effective and pervasive security system able to manage both the physical and the digital components from a single control platform. Challenge The Cisco security strategy behind the success of Expo Milan 2015 Physical security and IT security: at Expo Milan 2015 the protection of people, resources, data and devices was a key factor in the success of the event. From video surveillance to the prevention of cyber attacks, Cisco’s IP network, the pervasive multilevel security and a task force dedicated to monitoring the entire infrastructure allowed the organizers to concentrate on operational tasks knowing that the event was in safe hands. Expo Milan 2015 did not take place in one of the most peaceful moments in recent history. Going ahead with an international event of this magnitude and visibility, and making it the success it was, meant adopting appropriate security measures. Because of its importance and broad international participation, the event was a particularly sensitive target during all of the six months it lasted, potentially at risk of protests and boycotts. First off, it was very important to put in place all the tools and processes that could be used to physically protect persons and property. From this perspective, the Cisco multiservice IP network played a crucial role. “We provided the organizers with an infrastructure capable of enabling all the security systems © 2016 Cisco Systems, Inc. All rights reserved. 1
  • 2. Cisco designed a network for Expo Milan 2015 that prioritized security with the high levels of protection characteristic of next- generation infrastructure The Cisco approach to advanced protection from security threats, across the network and in all phases of an attack in a context of the Internet of Everything. Solution dedicated to the safety of the visitors, operators and pavilions,” confirmed Mirko Berlier, Cisco Systems Engineer & Expo 2015 Architect. “The systems of video surveillance, access control for the Expo area and even the sensors for fire and intrusion detection were all connected to the IP network”. All the information and data collected and correlated in real time was shared with the Command and Control Center, whose team played a decisive role by taking charge of all the systems designed to protect people and property. Tightly integrated with the physical security systems, IT security played a leading role at Expo 2015, the first in history to be entirely supported by systems and solutions based on an IP network. All the Expo Smart City services, the heart of the event, in other words, were enabled by digital applications and platforms. “A successful attack could have totally jeopardized Expo,” noted Berlier, “by preventing the turnstiles from opening, for example, or jamming the physical security systems, or blocking the attractions in the pavilions, with serious damage to the event and the reputation of the organizers.” So Cisco designed a network infrastructure that consistently prioritized security, to ensure a level of protection that corresponded to next generation criteria. “The events detected by physical security devices like the video surveillance cameras and the sensors were matched with the protections against attacks and malware,” said Guido Arnone, Director of Technical and Digital Innovation for Expo 2015. “Applying Cisco’s Internet of Everything approach to safeguarding persons and property was a winning move, because the correlation of data and processes enabled the Control Center to make and implement the most appropriate choices.” Traditional security policy functionalities were guaranteed by the high- performance Cisco ASA (Adaptive Security Appliance) firewall which served the security needs of the central data centers and the pavilions. “Thanks to this architecture, we were able to control all traffic to and from the public network and the cloud,” said Berlier. © 2016 Cisco Systems, Inc. All rights reserved. 2 More than half a million intrusion attempts and over 10,000 attempts to take control of applications and devices were blocked by Cisco security, pervasive right across the network. Results
  • 3. Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA www.cisco.com Tel.: 001 408 526-4000 Italian Headquarters Cisco Systems Italy Via Torri Bianche, 8 20871 Vimercate (MB) www.cisco.com/it Toll Free: 800 782648 Fax: 039 6295299 Rome Branch Office Cisco Systems Italy Via del Serafico, 200 00142 Roma Toll Free: 800 782648 Fax: 06 51645001 There are more than 200 Cisco branch offices around the world. Their addresses, telephone and fax numbers are available on the Cisco website: www.cisco.com/go/offices. © 2016 Cisco Systems, Inc. All rights reserved. The Cisco logo is the registered trademark of Cisco Systems, Inc. in the United States and a number of other countries. All the other trademarks or registered marks referred to in this document or on the Cisco Website are the property of their respective companies. To complement these functionalities and implement a next-generation security approach adequate to the needs of a complex infrastructure like the one fielded at Expo, the organization was provided with tools that could detect any abnormal network behavior or intrusion attempts in real time for all application traffic. “ A Cisco Sourcefire architecture with all its dedicated systems, like Advanced Malware Protection, Intrusion Prevention, Application Visibility & Control and URL Filtering, was implemented across the entire Expo network,” explained Berlier. “These tools can analyze up to 40Gbps of traffic.” Upstream, the integration of the Cisco Identity Service Engine enabled secure access management of the entire wired and wireless network for visitors and all personnel employed during the event. “The Cisco Identity Service Engine prevented any unauthorized access to the network while providing highly flexible operational access management, thanks to centralized policy management and automated network management and configuration procedures,” said Berlier. The results achieved at Expo Milan 2015 confirm that a security strategy based on Cisco solutions is a winning move. “During the six months the event lasted, the system enabled us to detect and block over half a million intrusion attempts from all over the world”, concluded Berlier, “not to mention the 10,000+ attempts to take control of applications and systems that were prevented by the security embedded across the IP network.” All to ensure that the organizers could operate in absolute tranquility, thereby contributing to the huge success of the event and the security of people, facilities, data and devices. The security fielded at Expo 2015 is a reference approach, not just for the Smart Cities of the near future, but for any public or private organization. Products and services • Cisco ASA Next Gen Firewalls with FirePower (ASA5585 and smaller platforms) • Cisco FirePOWER Appliances 8370 • Cisco FireSIGHT Management Center • Cisco Identity Services Engine for advanced network admission control and flexible management