SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
“The Cisco approach to security can be a valuable reference point
not just for the Smart Cities of the near future but for any public or
private organization.”
Guido Arnone, Director of Technical and Digital Innovation, Expo 2015
During the six months Expo Milan 2015 lasted, Cisco security made it possible
to block more than half a million intrusion attempts and over 10,000 attempts
to take control of applications and devices, while the Operational Control
Center correlated all the events detected by the network-connected cameras
and sensors, guaranteeing the complete success of the event.
Protect visitors and pavilions with an advanced, effective and
pervasive security system able to manage both the physical and
the digital components from a single control platform.
Challenge
The Cisco security
strategy behind the
success of Expo Milan
2015
Physical security and IT security: at Expo Milan
2015 the protection of people, resources, data
and devices was a key factor in the success of the
event. From video surveillance to the prevention
of cyber attacks, Cisco’s IP network, the pervasive
multilevel security and a task force dedicated to
monitoring the entire infrastructure allowed the
organizers to concentrate on operational tasks
knowing that the event was in safe hands.
Expo Milan 2015 did not take place in one of the most peaceful moments in
recent history. Going ahead with an international event of this magnitude and
visibility, and making it the success it was, meant adopting appropriate security
measures. Because of its importance and broad international participation, the
event was a particularly sensitive target during all of the six months it lasted,
potentially at risk of protests and boycotts.
First off, it was very important to put in place all the tools and processes that
could be used to physically protect persons and property. From this perspective,
the Cisco multiservice IP network played a crucial role. “We provided the
organizers with an infrastructure capable of enabling all the security systems
© 2016 Cisco Systems, Inc. All rights reserved. 1
Cisco designed a network for Expo Milan
2015 that prioritized security with the high
levels of protection characteristic of next-
generation infrastructure
The Cisco approach to advanced protection from security
threats, across the network and in all phases of an attack
in a context of the Internet of Everything.
Solution
dedicated to the safety of the visitors, operators and pavilions,” confirmed Mirko
Berlier, Cisco Systems Engineer & Expo 2015 Architect. “The systems of video
surveillance, access control for the Expo area and even the sensors for fire and
intrusion detection were all connected to the IP network”.
All the information and data collected and correlated in real time was shared
with the Command and Control Center, whose team played a decisive role by
taking charge of all the systems designed to protect people and property.
Tightly integrated with the physical security systems, IT security played
a leading role at Expo 2015, the first in history to be entirely supported
by systems and solutions based on an IP network. All the Expo Smart
City services, the heart of the event, in other words, were enabled by
digital applications and platforms. “A successful attack could have totally
jeopardized Expo,” noted Berlier, “by preventing the turnstiles from opening,
for example, or jamming the physical security systems, or blocking the
attractions in the pavilions, with serious damage to the event and the
reputation of the organizers.”
So Cisco designed a network infrastructure that consistently prioritized
security, to ensure a level of protection that corresponded to next
generation criteria. “The events detected by physical security devices like
the video surveillance cameras and the sensors were matched with the
protections against attacks and malware,” said Guido Arnone, Director of
Technical and Digital Innovation for Expo 2015. “Applying Cisco’s Internet of
Everything approach to safeguarding persons and property was a winning
move, because the correlation of data and processes enabled the Control
Center to make and implement the most appropriate choices.”
Traditional security policy functionalities were guaranteed by the high-
performance Cisco ASA (Adaptive Security Appliance) firewall which served
the security needs of the central data centers and the pavilions. “Thanks to
this architecture, we were able to control all traffic to and from the public
network and the cloud,” said Berlier.
© 2016 Cisco Systems, Inc. All rights reserved. 2
More than half a million intrusion attempts and over
10,000 attempts to take control of applications and
devices were blocked by Cisco security, pervasive right
across the network.
Results
Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
www.cisco.com
Tel.: 001 408 526-4000
Italian Headquarters
Cisco Systems Italy
Via Torri Bianche, 8
20871 Vimercate (MB)
www.cisco.com/it
Toll Free: 800 782648
Fax: 039 6295299
Rome Branch Office
Cisco Systems Italy
Via del Serafico, 200
00142 Roma
Toll Free: 800 782648
Fax: 06 51645001
There are more than 200 Cisco branch offices around the world. Their addresses, telephone and fax numbers are available on the Cisco website:
www.cisco.com/go/offices.
© 2016 Cisco Systems, Inc. All rights reserved. The Cisco logo is the registered trademark of Cisco Systems, Inc. in the United States and a number of other countries.
All the other trademarks or registered marks referred to in this document or on the Cisco Website are the property of their respective companies.
To complement these functionalities and implement a next-generation
security approach adequate to the needs of a complex infrastructure like
the one fielded at Expo, the organization was provided with tools that
could detect any abnormal network behavior or intrusion attempts in real
time for all application traffic. “ A Cisco Sourcefire architecture with all its
dedicated systems, like Advanced Malware Protection, Intrusion Prevention,
Application Visibility & Control and URL Filtering, was implemented across
the entire Expo network,” explained Berlier. “These tools can analyze up to
40Gbps of traffic.”
Upstream, the integration of the Cisco Identity Service Engine enabled
secure access management of the entire wired and wireless network for
visitors and all personnel employed during the event. “The Cisco Identity
Service Engine prevented any unauthorized access to the network while
providing highly flexible operational access management, thanks to
centralized policy management and automated network management and
configuration procedures,” said Berlier.
The results achieved at Expo Milan 2015 confirm that a security strategy
based on Cisco solutions is a winning move. “During the six months the
event lasted, the system enabled us to detect and block over half a million
intrusion attempts from all over the world”, concluded Berlier, “not to
mention the 10,000+ attempts to take control of applications and systems
that were prevented by the security embedded across the IP network.” All
to ensure that the organizers could operate in absolute tranquility, thereby
contributing to the huge success of the event and the security of people,
facilities, data and devices. The security fielded at Expo 2015 is a reference
approach, not just for the Smart Cities of the near future, but for any public
or private organization.
Products and services
• Cisco ASA Next Gen Firewalls with
FirePower (ASA5585 and smaller
platforms)
• Cisco FirePOWER Appliances 8370
• Cisco FireSIGHT Management
Center
• Cisco Identity Services Engine for
advanced network admission control
and flexible management

Contenu connexe

Tendances

Tendances (20)

Bauer
Bauer Bauer
Bauer
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything
 
IIC's Top 10 Accomplishments 2016
IIC's Top 10 Accomplishments 2016IIC's Top 10 Accomplishments 2016
IIC's Top 10 Accomplishments 2016
 
Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot Iot tunisia forum 2017 security, confidentiality and privacy in iot
Iot tunisia forum 2017 security, confidentiality and privacy in iot
 
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPTInternet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
 
IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel IoT Panel- Cisco and Intel
IoT Panel- Cisco and Intel
 
Internet of everything
Internet of everything Internet of everything
Internet of everything
 
WatchGuard Firewall & Network Security
WatchGuard Firewall & Network SecurityWatchGuard Firewall & Network Security
WatchGuard Firewall & Network Security
 
推動數位革命
推動數位革命推動數位革命
推動數位革命
 
IoT security reference architecture
IoT security  reference architectureIoT security  reference architecture
IoT security reference architecture
 
Cisco connect winnipeg 2018 accelerating the secure digital business throug...
Cisco connect winnipeg 2018   accelerating the secure digital business throug...Cisco connect winnipeg 2018   accelerating the secure digital business throug...
Cisco connect winnipeg 2018 accelerating the secure digital business throug...
 
MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne MILCOM 2013 Keynote Presentation: Larry Payne
MILCOM 2013 Keynote Presentation: Larry Payne
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings IntegrationThe Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
 
Safety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoTSafety reliability and security lessons from defense for IoT
Safety reliability and security lessons from defense for IoT
 
CyberSecurity_for_the_IoT
CyberSecurity_for_the_IoTCyberSecurity_for_the_IoT
CyberSecurity_for_the_IoT
 
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
Harvard GSD Exec.Ed Leading Organizations _ lecture, february 5 2014
 
SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform  SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform
 
Webinar - Transforming Manufacturing with IoT
Webinar - Transforming Manufacturing with IoTWebinar - Transforming Manufacturing with IoT
Webinar - Transforming Manufacturing with IoT
 
IoT Update Oktober 2019 | Wilfred Harbers CTO Benelux @ Software AG
IoT Update Oktober 2019 |  Wilfred Harbers CTO Benelux @ Software AGIoT Update Oktober 2019 |  Wilfred Harbers CTO Benelux @ Software AG
IoT Update Oktober 2019 | Wilfred Harbers CTO Benelux @ Software AG
 

En vedette

Case Study: Cisco Acquisition
Case Study: Cisco AcquisitionCase Study: Cisco Acquisition
Case Study: Cisco Acquisition
Djadja Sardjana
 
Cadbury manages a crisis with integrated marketing communication
Cadbury manages a crisis with integrated marketing communicationCadbury manages a crisis with integrated marketing communication
Cadbury manages a crisis with integrated marketing communication
Praveenkumar Katnalli
 
Kingfisher airlines financial crisis
Kingfisher airlines financial crisisKingfisher airlines financial crisis
Kingfisher airlines financial crisis
manish kumar
 
A case study on restructuring philips
A case study on restructuring  philipsA case study on restructuring  philips
A case study on restructuring philips
anusharma1987
 

En vedette (20)

Il Gruppo Marcegaglia
Il Gruppo MarcegagliaIl Gruppo Marcegaglia
Il Gruppo Marcegaglia
 
Lomma Kommun
Lomma Kommun Lomma Kommun
Lomma Kommun
 
Expo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_ITExpo Milano 2015 Case Study_IT
Expo Milano 2015 Case Study_IT
 
Lufthansa Case Study
Lufthansa Case StudyLufthansa Case Study
Lufthansa Case Study
 
Case Study: Cisco Acquisition
Case Study: Cisco AcquisitionCase Study: Cisco Acquisition
Case Study: Cisco Acquisition
 
Dulux paints the town red (or any colour you like) with augmented reality - S...
Dulux paints the town red (or any colour you like) with augmented reality - S...Dulux paints the town red (or any colour you like) with augmented reality - S...
Dulux paints the town red (or any colour you like) with augmented reality - S...
 
Dulux case study
Dulux case studyDulux case study
Dulux case study
 
Cisco Systems: A company Analysis
Cisco Systems: A company AnalysisCisco Systems: A company Analysis
Cisco Systems: A company Analysis
 
Dulux paints
Dulux paintsDulux paints
Dulux paints
 
Cisco System, Inc: Implementing ERP
Cisco System, Inc: Implementing ERPCisco System, Inc: Implementing ERP
Cisco System, Inc: Implementing ERP
 
Cadbury manages a crisis with integrated marketing communication
Cadbury manages a crisis with integrated marketing communicationCadbury manages a crisis with integrated marketing communication
Cadbury manages a crisis with integrated marketing communication
 
Dabur India- Case Study
Dabur India- Case StudyDabur India- Case Study
Dabur India- Case Study
 
Kingfisher airlines financial crisis
Kingfisher airlines financial crisisKingfisher airlines financial crisis
Kingfisher airlines financial crisis
 
A case study on restructuring philips
A case study on restructuring  philipsA case study on restructuring  philips
A case study on restructuring philips
 
Cadbury's worm case
Cadbury's worm caseCadbury's worm case
Cadbury's worm case
 
Dabur case study
Dabur case studyDabur case study
Dabur case study
 
Cadbury Case Study
Cadbury Case StudyCadbury Case Study
Cadbury Case Study
 
Pharmaceutical Marketing Presentation
Pharmaceutical Marketing PresentationPharmaceutical Marketing Presentation
Pharmaceutical Marketing Presentation
 
Kingfisher Airlines- A Case Study
Kingfisher Airlines- A Case StudyKingfisher Airlines- A Case Study
Kingfisher Airlines- A Case Study
 
Nestle Maggi
Nestle MaggiNestle Maggi
Nestle Maggi
 

Similaire à Expo Milan 2015 Case Study_EN

March_Networks_News_03-09
March_Networks_News_03-09March_Networks_News_03-09
March_Networks_News_03-09
Kendall Addison
 
TECTECO V3.20160526.key (2)
TECTECO V3.20160526.key (2)TECTECO V3.20160526.key (2)
TECTECO V3.20160526.key (2)
Mark De Simone
 
Connected Vineyards
Connected VineyardsConnected Vineyards
Connected Vineyards
Ericsson
 

Similaire à Expo Milan 2015 Case Study_EN (20)

SecureMAG vol9
SecureMAG vol9SecureMAG vol9
SecureMAG vol9
 
Giuseppe Meazza Stadium
Giuseppe Meazza StadiumGiuseppe Meazza Stadium
Giuseppe Meazza Stadium
 
NEC-IBM_Event_093015
NEC-IBM_Event_093015NEC-IBM_Event_093015
NEC-IBM_Event_093015
 
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ... Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
Fintech Belgium_Webinar 3: Cybersecurity / Covid-19: Home Working Challenge ...
 
March_Networks_News_03-09
March_Networks_News_03-09March_Networks_News_03-09
March_Networks_News_03-09
 
Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018 Conférence ENGIE ACSS 2018
Conférence ENGIE ACSS 2018
 
Smart Analytics for The Big Unknown
Smart Analytics for The Big UnknownSmart Analytics for The Big Unknown
Smart Analytics for The Big Unknown
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the CloudCE Cybersecurity Trends and Strategies for Hosting in the Cloud
CE Cybersecurity Trends and Strategies for Hosting in the Cloud
 
TECTECO V3.20160526.key (2)
TECTECO V3.20160526.key (2)TECTECO V3.20160526.key (2)
TECTECO V3.20160526.key (2)
 
Connected Vineyards
Connected VineyardsConnected Vineyards
Connected Vineyards
 
IRJET- CHAOS based Security for Online Transactions through GUI Implementation
IRJET- CHAOS based Security for Online Transactions through GUI ImplementationIRJET- CHAOS based Security for Online Transactions through GUI Implementation
IRJET- CHAOS based Security for Online Transactions through GUI Implementation
 
SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7SecureMag 2015 :: Volume 7
SecureMag 2015 :: Volume 7
 
Micro Technologies India ltd
Micro Technologies India ltdMicro Technologies India ltd
Micro Technologies India ltd
 
Conference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoTConference Security by Design - Gemalto - Security in IoT
Conference Security by Design - Gemalto - Security in IoT
 
Internet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_finalInternet of things_by_economides_keynote_speech_at_ccit2014_final
Internet of things_by_economides_keynote_speech_at_ccit2014_final
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Ministry of Foreign Affairs
Ministry of Foreign AffairsMinistry of Foreign Affairs
Ministry of Foreign Affairs
 
EuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the skyEuroCACS 2016 There are giants in the sky
EuroCACS 2016 There are giants in the sky
 

Plus de Cisco Case Studies

Plus de Cisco Case Studies (16)

Equitix
Equitix Equitix
Equitix
 
ScanPlus
ScanPlusScanPlus
ScanPlus
 
Odeabank Case Study
Odeabank Case StudyOdeabank Case Study
Odeabank Case Study
 
Mankiewicz Gebr & Co
Mankiewicz Gebr & Co Mankiewicz Gebr & Co
Mankiewicz Gebr & Co
 
Skipton Building Society
Skipton Building SocietySkipton Building Society
Skipton Building Society
 
Anyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End UsersAnyweb: Enabling IT Teams to Delight End Users
Anyweb: Enabling IT Teams to Delight End Users
 
Rai Radio Televisione Italiana
Rai Radio Televisione ItalianaRai Radio Televisione Italiana
Rai Radio Televisione Italiana
 
P-Pro's
P-Pro'sP-Pro's
P-Pro's
 
Netcloud
NetcloudNetcloud
Netcloud
 
AVIT
AVITAVIT
AVIT
 
Mankiewicz Gebr & Co
Mankiewicz Gebr & Co Mankiewicz Gebr & Co
Mankiewicz Gebr & Co
 
Radio 538
Radio 538 Radio 538
Radio 538
 
Beachbody, LLC
Beachbody, LLCBeachbody, LLC
Beachbody, LLC
 
Port Aventura
Port AventuraPort Aventura
Port Aventura
 
Crif
CrifCrif
Crif
 
CAME Group Spa
CAME Group SpaCAME Group Spa
CAME Group Spa
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Expo Milan 2015 Case Study_EN

  • 1. “The Cisco approach to security can be a valuable reference point not just for the Smart Cities of the near future but for any public or private organization.” Guido Arnone, Director of Technical and Digital Innovation, Expo 2015 During the six months Expo Milan 2015 lasted, Cisco security made it possible to block more than half a million intrusion attempts and over 10,000 attempts to take control of applications and devices, while the Operational Control Center correlated all the events detected by the network-connected cameras and sensors, guaranteeing the complete success of the event. Protect visitors and pavilions with an advanced, effective and pervasive security system able to manage both the physical and the digital components from a single control platform. Challenge The Cisco security strategy behind the success of Expo Milan 2015 Physical security and IT security: at Expo Milan 2015 the protection of people, resources, data and devices was a key factor in the success of the event. From video surveillance to the prevention of cyber attacks, Cisco’s IP network, the pervasive multilevel security and a task force dedicated to monitoring the entire infrastructure allowed the organizers to concentrate on operational tasks knowing that the event was in safe hands. Expo Milan 2015 did not take place in one of the most peaceful moments in recent history. Going ahead with an international event of this magnitude and visibility, and making it the success it was, meant adopting appropriate security measures. Because of its importance and broad international participation, the event was a particularly sensitive target during all of the six months it lasted, potentially at risk of protests and boycotts. First off, it was very important to put in place all the tools and processes that could be used to physically protect persons and property. From this perspective, the Cisco multiservice IP network played a crucial role. “We provided the organizers with an infrastructure capable of enabling all the security systems © 2016 Cisco Systems, Inc. All rights reserved. 1
  • 2. Cisco designed a network for Expo Milan 2015 that prioritized security with the high levels of protection characteristic of next- generation infrastructure The Cisco approach to advanced protection from security threats, across the network and in all phases of an attack in a context of the Internet of Everything. Solution dedicated to the safety of the visitors, operators and pavilions,” confirmed Mirko Berlier, Cisco Systems Engineer & Expo 2015 Architect. “The systems of video surveillance, access control for the Expo area and even the sensors for fire and intrusion detection were all connected to the IP network”. All the information and data collected and correlated in real time was shared with the Command and Control Center, whose team played a decisive role by taking charge of all the systems designed to protect people and property. Tightly integrated with the physical security systems, IT security played a leading role at Expo 2015, the first in history to be entirely supported by systems and solutions based on an IP network. All the Expo Smart City services, the heart of the event, in other words, were enabled by digital applications and platforms. “A successful attack could have totally jeopardized Expo,” noted Berlier, “by preventing the turnstiles from opening, for example, or jamming the physical security systems, or blocking the attractions in the pavilions, with serious damage to the event and the reputation of the organizers.” So Cisco designed a network infrastructure that consistently prioritized security, to ensure a level of protection that corresponded to next generation criteria. “The events detected by physical security devices like the video surveillance cameras and the sensors were matched with the protections against attacks and malware,” said Guido Arnone, Director of Technical and Digital Innovation for Expo 2015. “Applying Cisco’s Internet of Everything approach to safeguarding persons and property was a winning move, because the correlation of data and processes enabled the Control Center to make and implement the most appropriate choices.” Traditional security policy functionalities were guaranteed by the high- performance Cisco ASA (Adaptive Security Appliance) firewall which served the security needs of the central data centers and the pavilions. “Thanks to this architecture, we were able to control all traffic to and from the public network and the cloud,” said Berlier. © 2016 Cisco Systems, Inc. All rights reserved. 2 More than half a million intrusion attempts and over 10,000 attempts to take control of applications and devices were blocked by Cisco security, pervasive right across the network. Results
  • 3. Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA www.cisco.com Tel.: 001 408 526-4000 Italian Headquarters Cisco Systems Italy Via Torri Bianche, 8 20871 Vimercate (MB) www.cisco.com/it Toll Free: 800 782648 Fax: 039 6295299 Rome Branch Office Cisco Systems Italy Via del Serafico, 200 00142 Roma Toll Free: 800 782648 Fax: 06 51645001 There are more than 200 Cisco branch offices around the world. Their addresses, telephone and fax numbers are available on the Cisco website: www.cisco.com/go/offices. © 2016 Cisco Systems, Inc. All rights reserved. The Cisco logo is the registered trademark of Cisco Systems, Inc. in the United States and a number of other countries. All the other trademarks or registered marks referred to in this document or on the Cisco Website are the property of their respective companies. To complement these functionalities and implement a next-generation security approach adequate to the needs of a complex infrastructure like the one fielded at Expo, the organization was provided with tools that could detect any abnormal network behavior or intrusion attempts in real time for all application traffic. “ A Cisco Sourcefire architecture with all its dedicated systems, like Advanced Malware Protection, Intrusion Prevention, Application Visibility & Control and URL Filtering, was implemented across the entire Expo network,” explained Berlier. “These tools can analyze up to 40Gbps of traffic.” Upstream, the integration of the Cisco Identity Service Engine enabled secure access management of the entire wired and wireless network for visitors and all personnel employed during the event. “The Cisco Identity Service Engine prevented any unauthorized access to the network while providing highly flexible operational access management, thanks to centralized policy management and automated network management and configuration procedures,” said Berlier. The results achieved at Expo Milan 2015 confirm that a security strategy based on Cisco solutions is a winning move. “During the six months the event lasted, the system enabled us to detect and block over half a million intrusion attempts from all over the world”, concluded Berlier, “not to mention the 10,000+ attempts to take control of applications and systems that were prevented by the security embedded across the IP network.” All to ensure that the organizers could operate in absolute tranquility, thereby contributing to the huge success of the event and the security of people, facilities, data and devices. The security fielded at Expo 2015 is a reference approach, not just for the Smart Cities of the near future, but for any public or private organization. Products and services • Cisco ASA Next Gen Firewalls with FirePower (ASA5585 and smaller platforms) • Cisco FirePOWER Appliances 8370 • Cisco FireSIGHT Management Center • Cisco Identity Services Engine for advanced network admission control and flexible management