© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 4
Customer Case Study
EXECUTIVE SUMMARY
Customer Name: Trinity University
Industry: Education
Location: San Antonio, Texas
No. of Employees: 2600 students; 750 faculty
and staff
BUSINESS CHALLENGE
● Provide secure network access to thousands
of students, faculty, staff, and guests
● Reduce time and labor of manual onboarding
processes
● Gain visibility and control of network
connected devices
SECURITY SOLUTION
● Cisco Identity Services Engine
BUSINESS RESULTS
● Easy, automated network access for all users
and devices
● Elimination of manual administrative and help
desk processes
● Protection against malware, viruses, and
illegally downloaded content
Secure, Automated Network Access for Any Device
on Campus
Trinity University relies on Cisco ISE to enable students, faculty, and guests easy
network onboarding.
Business Challenge
Trinity University is one of the top private liberal arts institutions in
the United States. Founded in 1869, Trinity University is located on a
117-acre campus in San Antonio, Texas. It is consistently ranked as
an academic leader by publications such as Princeton Review and
U.S. News and World Report. More than 2600 undergraduate and
graduate students attend Trinity University, along with a faculty and
staff of approximately 750. The university offers a wide-ranging
curriculum that covers nearly 40 majors.
As with any large computing environment, protecting users and the
Trinity University network from viruses, malware, and illegal content
is a constant challenge. Every year, students arrive with at least two
or three personal devices they will use to connect to the Trinity
network. For Trinity, a bring-your-own-device (BYOD) policy has
been  a  cornerstone  of  the  university’s  network  access  security  policy  
for years.
In the summer, the challenge is even greater as Trinity hosts a
number of conferences that bring thousands of participants and their
devices to the campus. Another issue involves faculty and staff using their personal and school-owned computing
devices to conduct transactions across the Trinity network.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 4
From smartphones, tablets, game consoles, TVs, eBook readers, and Blu-ray players, to laptops and desktop
computers, Trinity University must cope with an ever-expanding variety of personal devices. One Trinity student
with a diabetic condition required a network connection for a monitoring device that would send status updates as
he slept.
All of these devices must be registered, granted appropriate access, and made to comply with security policies to
protect  the  integrity  of  Trinity’s  network.  For  Trinity’s  IT  administrators  and  help  desk  professionals,  these  
obligations created a substantial workload requiring many hours of labor and the use of resources that could be
better spent on other priorities.
Trinity needed a security solution that could save time by efficiently onboarding multiple device types to its network,
while helping ensure high levels of protection and granular policy control to accommodate different levels of access
for different types of users.
Solution
Trinity University decided to implement the Cisco
®
Identity Services Engine (ISE) to enable comprehensive and
consistent security for the many different types of devices attached to its network.
Cisco ISE provides all-in-one policy control, maintains high levels of security compliance for all types of personal
devices, while keeping users productive with reliable access to network data and applications. It employs rigorous
identity and policy enforcement across all connections, and it automates device onboarding to lower IT costs and
increase efficiency.
“Trinity  University  was  already  a  longtime,  end-to-end Cisco environment. We rely on Cisco security solutions to
protect  our  wired,  wireless,  and  VPN  infrastructure,  so  the  decision  to  go  with  Cisco  ISE  was  a  natural  choice,”  
says Fred Zapata, director and chief information technology officer, Trinity University.
The Cisco ISE is integrated on the Trinity campus with the Cisco ASA Next-Generation Firewall. Students living in
the dorms are required to log in through wired access with 802.1X authentication, set with the Monitoring Mode
feature of ISE providing added network protection. Cisco Wireless is used through the campus.
In  particular,  Cisco  ISE  offered  significant  benefits  for  Trinity’s  rapidly  growing  wireless  network.  About  65  percent  
of  Trinity’s  traffic  is  on  its  wireless  network,  which  has  been  expanded  several  times  in recent years due to growing
demand. At peak periods, more than 1800 wireless devices may be connected to the network. Cisco ISE helps
ensure that as the wireless network continues to grow, it can easily handle the influx of new device types and meet
the needs of mobile users who require different levels of network access.
“Our  new  facilities  are  integrated  with  the  latest  technologies for HVAC
systems, fire alarms, and door access systems that include connectivity
to  the  Trinity  network  using  Cisco  ISE,”  says  Fred  Zapata,  director  and  
chief  information  technology  officer.  “Maintaining  the  stability  of  these  
systems  is  critical.”
— Fred Zapata, Director and Chief Information Technology Officer, Trinity University
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 4
Results
With its automated device profiling and self-registration capabilities, Cisco ISE immediately provided significant
time-saving  benefits  for  Trinity’s  IT  professionals.  Hours  of  manual processes for bringing new users and devices
onto the network each week were eliminated. And during the busy summer months when the school hosts
thousands of visiting conference attendees, the help desk workload was reduced by up to 25 percent.
“We  no longer have to manually create guest accounts, maintain a series of generic accounts, or generate
passwords every day that we then hand off to our conference services people. With Cisco ISE, we can just send
new users to the self-service portal, and they are immediately granted secure network access following the
designated  protocol.  It’s  much  easier  for  us  and  a  better  experience  for  the  users,”  says  Douglas  Cooper,  systems  
administrator, Trinity University.
Cisco  ISE  also  protects  Trinity’s  network  against threats such as viruses, malware, and spyware by creating a
contextual identity for each device and applying policy controls. The policy enforcement capabilities also help
Trinity prevent the illegal downloading and sharing of copyrighted content.
“In the past, we have received copyright infringement notices from organizations such as the RIAA, MPAA, HBO,
and other media organizations. In one case, a student had to pay a large settlement. With Cisco ISE, we can
prevent users from illegally accessing copyrighted  music  or  movies  before  it  gets  to  that  point,”  says  Cooper.
The  network  security  that  Cisco  ISE  provides  also  extends  to  the  newer  “smart”  buildings  on  Trinity’s  campus.  A  
key  initiative  is  upgrading  the  university’s  science  facilities,  which  have been gutted and renovated, or torn down
and rebuilt for a state-of-the art learning environment.
“Our  new  facilities  are  integrated  with  the  latest  technologies  for  HVAC  (heating  ventilating  and  air  conditioning)  
systems, fire alarms, and door access systems  that  include  connectivity  to  the  Trinity  network  using  Cisco  ISE,”  
says  Zapata.  “Maintaining  the  stability  of  these  systems  is  critical.”
For students, faculty, and university guests, the biggest benefit of Cisco ISE is a highly efficient user experience.
Students and faculty can quickly gain trusted access to the network regardless of the type of device they are using.
And guests can easily log onto the network with their own devices with automated identity enforcement. Trinity
does not dictate what type of devices users bring with them to campus. As new devices and their educational uses
evolve,  Trinity’s  network  has  the  capacity  to  quickly  and  safely  bring  them  onboard.
“Already  we  are  seeing  faculty  using  their  iPads  to  mirror  their  content  to  projector screens, and introducing new
instruments  and  scientific  devices  with  network  connectivity  to  the  classroom,”  says  Cooper.  “With  Cisco  ISE,  our  
users  have  the  flexibility  and  freedom  to  bring  these  new  devices  onto  our  network  safely  and  easily.”
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 4
PRODUCT LIST
Security and Connectivity
● Cisco Identity Services Engine (ISE)
● Cisco ASA Next-Generation Firewall
● Cisco Web Security Appliance (WSA)
● Cisco Wireless Access Points
● Cisco Wireless Services Module 2 (WiSM2)
Routing and Switching
● Cisco 7206 Routers
● Cisco Catalyst
®
6500 Series Switches
Data Center
● Cisco Unified Computing System
™
(UCS
®
)
Cisco Voice and Unified Communications
● Cisco Unified Communications
● Cisco Emergency Responder
● Cisco Contact Center
For More Information
To find out more about the Cisco Identity Services Engine (ISE) and
the security solutions featured in this case study, go to:
http://www.cisco.com/go/ise
http://www.cisco.com/go/asa
http://www.cisco.com/go/websecurity.
Printed in USA C36-729890-00 11/13

More Related Content

DOCX
GUL Network Infrastructure
PDF
Punahou school maintains a secure and open campus with cisco - case study
PDF
B018211016
PPTX
Securing the Digital Economy: Reinventing the Internet
PDF
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
PDF
Challenges and Security Issues in Future IT Infrastructure Components
PDF
Investigative analysis of security issues and challenges in cloud computing a...
PDF
Ten Expert Tips on Internet of Things Security
GUL Network Infrastructure
Punahou school maintains a secure and open campus with cisco - case study
B018211016
Securing the Digital Economy: Reinventing the Internet
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
Challenges and Security Issues in Future IT Infrastructure Components
Investigative analysis of security issues and challenges in cloud computing a...
Ten Expert Tips on Internet of Things Security

What's hot (18)

PPTX
Internet of things
PDF
Advanced Network Security with Netmagic – Netmagic
PDF
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
PPTX
Cybersecurity in the Era of IoT
PPTX
Internet & iot security
PDF
Appsec Introduction
PPTX
101 Basic concepts of information security
PDF
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
PDF
76 s201918
PDF
Cyber Security Intelligence
PDF
PPTX
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
PDF
Fundamental Areas of Cyber Security on Latest Technology
PDF
Ci31560566
PPT
BCA – cloud technology & information security
DOC
Computer security and_privacy
PDF
Introduction to the concept of it security
PPTX
Internet of Things: Dealing with the enterprise network of things
Internet of things
Advanced Network Security with Netmagic – Netmagic
IT Security Bedrohungen optimal abwehren_Tom Turner und Andreas Wespi
Cybersecurity in the Era of IoT
Internet & iot security
Appsec Introduction
101 Basic concepts of information security
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
76 s201918
Cyber Security Intelligence
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
Fundamental Areas of Cyber Security on Latest Technology
Ci31560566
BCA – cloud technology & information security
Computer security and_privacy
Introduction to the concept of it security
Internet of Things: Dealing with the enterprise network of things
Ad

Viewers also liked (20)

PDF
The Context Aware Network A Holistic Approach to BYOD
DOCX
Cisco catalyst 3850 switch converge wired, wireless to build simple, secure, ...
PDF
Workshop "Smart cities and communities" @ La Sapienza
ODP
503 reading quiz
PDF
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
PPS
Kisah katak kecil
DOC
Teori 2
PPT
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
DOCX
Intannnnn5555
ODP
Conseqüències de la II Guerra Mundial
KEY
Taylor rita visual_resumestoryboard.zip
PPT
Cơ hội kinh doanh cùng qnet việt nam
DOCX
Customer support 1
DOCX
Demografi profil gampong kulu 1
PDF
2012 colloque mobilecréation-nova
DOC
Dapodik ltj 1
DOCX
Bab 1 nifas 2
DOC
Hipertensi 2
PPTX
To Papsie <3
PPT
Fathers day
The Context Aware Network A Holistic Approach to BYOD
Cisco catalyst 3850 switch converge wired, wireless to build simple, secure, ...
Workshop "Smart cities and communities" @ La Sapienza
503 reading quiz
IBM Smarter Commerce Florida 2014 The Furture of Privacy by Aurélie Pols & Bl...
Kisah katak kecil
Teori 2
Mar Camacho, Universitat Rovira i Virgili Faculty (Spain), Visiting scholar a...
Intannnnn5555
Conseqüències de la II Guerra Mundial
Taylor rita visual_resumestoryboard.zip
Cơ hội kinh doanh cùng qnet việt nam
Customer support 1
Demografi profil gampong kulu 1
2012 colloque mobilecréation-nova
Dapodik ltj 1
Bab 1 nifas 2
Hipertensi 2
To Papsie <3
Fathers day
Ad

Similar to Secure, Automated Network Access for Any Device on Campus (20)

DOCX
Customer case study © 2010 cisco systems, inc. all rig
PDF
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
PDF
University of Granada
PDF
Cisco i school moo-cs and libraries (2013 09 30)
PDF
University of Granada
PDF
The Polytechnic of Namibia
PDF
Information Security Management in University Campus Using Cognitive Security
PDF
Leveraging Context-Aware Security to Safeguard Patient Data
PDF
Internet of Everything Case Study: Punahou School
PDF
Cyber Security_Presentation_KTH
PDF
Ecole Polytechnique Federale de Lausanne (EPFL)
PDF
University of Arts of London
PDF
Laser Pioneer Secures Network End-to-End to Protect Assets
PDF
BITS Pilani K. K. Birla, Goa Campus (Seqrite)
PDF
Datasheet
PPTX
Needs of Network security.pptx. Cryptography
PPTX
Cloud_Security.pptx
PDF
Customer Success Story on NuEDUSEC Internet Security Service
PPT
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
PDF
AASTMT Case Study
Customer case study © 2010 cisco systems, inc. all rig
Katy Independent School District Makes a Difference with Cisco Mobility: Case...
University of Granada
Cisco i school moo-cs and libraries (2013 09 30)
University of Granada
The Polytechnic of Namibia
Information Security Management in University Campus Using Cognitive Security
Leveraging Context-Aware Security to Safeguard Patient Data
Internet of Everything Case Study: Punahou School
Cyber Security_Presentation_KTH
Ecole Polytechnique Federale de Lausanne (EPFL)
University of Arts of London
Laser Pioneer Secures Network End-to-End to Protect Assets
BITS Pilani K. K. Birla, Goa Campus (Seqrite)
Datasheet
Needs of Network security.pptx. Cryptography
Cloud_Security.pptx
Customer Success Story on NuEDUSEC Internet Security Service
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
AASTMT Case Study

More from Cisco Security (20)

PDF
Incident Response Services Template - Cisco Security
PDF
Infographic: Security for Mobile Service Providers
PDF
Cisco ISE Reduces the Attack Surface by Controlling Access
PPTX
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
PDF
Pervasive Security Across Your Extended Network
PPTX
Cisco Web and Email Security Overview
PPTX
Cisco 2015 Midyear Security Report Slide Deck
PDF
3 Tips for Choosing a Next Generation Firewall
PDF
AMP Helps Cisco IT Catch 50% More Malware threats
PDF
A Reality Check on the State of Cybersecurity
PDF
Balance Data Center Security and Performance
PDF
The Cost of Inactivity: Malware Infographic
PDF
Data Center Security Challenges
PPTX
Enterprise Strategy Group: Security Survey
PDF
Malware and the Cost of Inactivity
PDF
Midsize Business Solutions: Cybersecurity
PDF
Integrated Network Security Strategies
PDF
Cisco Addresses the Full Attack Continuum
PDF
Infonetics Network and Content Security Vendor Scorecard
PDF
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...
Incident Response Services Template - Cisco Security
Infographic: Security for Mobile Service Providers
Cisco ISE Reduces the Attack Surface by Controlling Access
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Pervasive Security Across Your Extended Network
Cisco Web and Email Security Overview
Cisco 2015 Midyear Security Report Slide Deck
3 Tips for Choosing a Next Generation Firewall
AMP Helps Cisco IT Catch 50% More Malware threats
A Reality Check on the State of Cybersecurity
Balance Data Center Security and Performance
The Cost of Inactivity: Malware Infographic
Data Center Security Challenges
Enterprise Strategy Group: Security Survey
Malware and the Cost of Inactivity
Midsize Business Solutions: Cybersecurity
Integrated Network Security Strategies
Cisco Addresses the Full Attack Continuum
Infonetics Network and Content Security Vendor Scorecard
Gartner Newsletter: Cisco TrustSec Deployed Across Enterprise Campus, Branch ...

Recently uploaded (20)

PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
Flame analysis and combustion estimation using large language and vision assi...
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPT
Geologic Time for studying geology for geologist
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
STKI Israel Market Study 2025 version august
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPTX
Build Your First AI Agent with UiPath.pptx
PPTX
TEXTILE technology diploma scope and career opportunities
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
Credit Without Borders: AI and Financial Inclusion in Bangladesh
CloudStack 4.21: First Look Webinar slides
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
Flame analysis and combustion estimation using large language and vision assi...
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Module 1 Introduction to Web Programming .pptx
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
OpenACC and Open Hackathons Monthly Highlights July 2025
Geologic Time for studying geology for geologist
The influence of sentiment analysis in enhancing early warning system model f...
STKI Israel Market Study 2025 version august
A review of recent deep learning applications in wood surface defect identifi...
Build Your First AI Agent with UiPath.pptx
TEXTILE technology diploma scope and career opportunities
4 layer Arch & Reference Arch of IoT.pdf
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
NewMind AI Weekly Chronicles – August ’25 Week IV

Secure, Automated Network Access for Any Device on Campus

  • 1. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 4 Customer Case Study EXECUTIVE SUMMARY Customer Name: Trinity University Industry: Education Location: San Antonio, Texas No. of Employees: 2600 students; 750 faculty and staff BUSINESS CHALLENGE ● Provide secure network access to thousands of students, faculty, staff, and guests ● Reduce time and labor of manual onboarding processes ● Gain visibility and control of network connected devices SECURITY SOLUTION ● Cisco Identity Services Engine BUSINESS RESULTS ● Easy, automated network access for all users and devices ● Elimination of manual administrative and help desk processes ● Protection against malware, viruses, and illegally downloaded content Secure, Automated Network Access for Any Device on Campus Trinity University relies on Cisco ISE to enable students, faculty, and guests easy network onboarding. Business Challenge Trinity University is one of the top private liberal arts institutions in the United States. Founded in 1869, Trinity University is located on a 117-acre campus in San Antonio, Texas. It is consistently ranked as an academic leader by publications such as Princeton Review and U.S. News and World Report. More than 2600 undergraduate and graduate students attend Trinity University, along with a faculty and staff of approximately 750. The university offers a wide-ranging curriculum that covers nearly 40 majors. As with any large computing environment, protecting users and the Trinity University network from viruses, malware, and illegal content is a constant challenge. Every year, students arrive with at least two or three personal devices they will use to connect to the Trinity network. For Trinity, a bring-your-own-device (BYOD) policy has been  a  cornerstone  of  the  university’s  network  access  security  policy   for years. In the summer, the challenge is even greater as Trinity hosts a number of conferences that bring thousands of participants and their devices to the campus. Another issue involves faculty and staff using their personal and school-owned computing devices to conduct transactions across the Trinity network.
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 4 From smartphones, tablets, game consoles, TVs, eBook readers, and Blu-ray players, to laptops and desktop computers, Trinity University must cope with an ever-expanding variety of personal devices. One Trinity student with a diabetic condition required a network connection for a monitoring device that would send status updates as he slept. All of these devices must be registered, granted appropriate access, and made to comply with security policies to protect  the  integrity  of  Trinity’s  network.  For  Trinity’s  IT  administrators  and  help  desk  professionals,  these   obligations created a substantial workload requiring many hours of labor and the use of resources that could be better spent on other priorities. Trinity needed a security solution that could save time by efficiently onboarding multiple device types to its network, while helping ensure high levels of protection and granular policy control to accommodate different levels of access for different types of users. Solution Trinity University decided to implement the Cisco ® Identity Services Engine (ISE) to enable comprehensive and consistent security for the many different types of devices attached to its network. Cisco ISE provides all-in-one policy control, maintains high levels of security compliance for all types of personal devices, while keeping users productive with reliable access to network data and applications. It employs rigorous identity and policy enforcement across all connections, and it automates device onboarding to lower IT costs and increase efficiency. “Trinity  University  was  already  a  longtime,  end-to-end Cisco environment. We rely on Cisco security solutions to protect  our  wired,  wireless,  and  VPN  infrastructure,  so  the  decision  to  go  with  Cisco  ISE  was  a  natural  choice,”   says Fred Zapata, director and chief information technology officer, Trinity University. The Cisco ISE is integrated on the Trinity campus with the Cisco ASA Next-Generation Firewall. Students living in the dorms are required to log in through wired access with 802.1X authentication, set with the Monitoring Mode feature of ISE providing added network protection. Cisco Wireless is used through the campus. In  particular,  Cisco  ISE  offered  significant  benefits  for  Trinity’s  rapidly  growing  wireless  network.  About  65  percent   of  Trinity’s  traffic  is  on  its  wireless  network,  which  has  been  expanded  several  times  in recent years due to growing demand. At peak periods, more than 1800 wireless devices may be connected to the network. Cisco ISE helps ensure that as the wireless network continues to grow, it can easily handle the influx of new device types and meet the needs of mobile users who require different levels of network access. “Our  new  facilities  are  integrated  with  the  latest  technologies for HVAC systems, fire alarms, and door access systems that include connectivity to  the  Trinity  network  using  Cisco  ISE,”  says  Fred  Zapata,  director  and   chief  information  technology  officer.  “Maintaining  the  stability  of  these   systems  is  critical.” — Fred Zapata, Director and Chief Information Technology Officer, Trinity University
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 4 Results With its automated device profiling and self-registration capabilities, Cisco ISE immediately provided significant time-saving  benefits  for  Trinity’s  IT  professionals.  Hours  of  manual processes for bringing new users and devices onto the network each week were eliminated. And during the busy summer months when the school hosts thousands of visiting conference attendees, the help desk workload was reduced by up to 25 percent. “We  no longer have to manually create guest accounts, maintain a series of generic accounts, or generate passwords every day that we then hand off to our conference services people. With Cisco ISE, we can just send new users to the self-service portal, and they are immediately granted secure network access following the designated  protocol.  It’s  much  easier  for  us  and  a  better  experience  for  the  users,”  says  Douglas  Cooper,  systems   administrator, Trinity University. Cisco  ISE  also  protects  Trinity’s  network  against threats such as viruses, malware, and spyware by creating a contextual identity for each device and applying policy controls. The policy enforcement capabilities also help Trinity prevent the illegal downloading and sharing of copyrighted content. “In the past, we have received copyright infringement notices from organizations such as the RIAA, MPAA, HBO, and other media organizations. In one case, a student had to pay a large settlement. With Cisco ISE, we can prevent users from illegally accessing copyrighted  music  or  movies  before  it  gets  to  that  point,”  says  Cooper. The  network  security  that  Cisco  ISE  provides  also  extends  to  the  newer  “smart”  buildings  on  Trinity’s  campus.  A   key  initiative  is  upgrading  the  university’s  science  facilities,  which  have been gutted and renovated, or torn down and rebuilt for a state-of-the art learning environment. “Our  new  facilities  are  integrated  with  the  latest  technologies  for  HVAC  (heating  ventilating  and  air  conditioning)   systems, fire alarms, and door access systems  that  include  connectivity  to  the  Trinity  network  using  Cisco  ISE,”   says  Zapata.  “Maintaining  the  stability  of  these  systems  is  critical.” For students, faculty, and university guests, the biggest benefit of Cisco ISE is a highly efficient user experience. Students and faculty can quickly gain trusted access to the network regardless of the type of device they are using. And guests can easily log onto the network with their own devices with automated identity enforcement. Trinity does not dictate what type of devices users bring with them to campus. As new devices and their educational uses evolve,  Trinity’s  network  has  the  capacity  to  quickly  and  safely  bring  them  onboard. “Already  we  are  seeing  faculty  using  their  iPads  to  mirror  their  content  to  projector screens, and introducing new instruments  and  scientific  devices  with  network  connectivity  to  the  classroom,”  says  Cooper.  “With  Cisco  ISE,  our   users  have  the  flexibility  and  freedom  to  bring  these  new  devices  onto  our  network  safely  and  easily.”
  • 4. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 4 PRODUCT LIST Security and Connectivity ● Cisco Identity Services Engine (ISE) ● Cisco ASA Next-Generation Firewall ● Cisco Web Security Appliance (WSA) ● Cisco Wireless Access Points ● Cisco Wireless Services Module 2 (WiSM2) Routing and Switching ● Cisco 7206 Routers ● Cisco Catalyst ® 6500 Series Switches Data Center ● Cisco Unified Computing System ™ (UCS ® ) Cisco Voice and Unified Communications ● Cisco Unified Communications ● Cisco Emergency Responder ● Cisco Contact Center For More Information To find out more about the Cisco Identity Services Engine (ISE) and the security solutions featured in this case study, go to: http://www.cisco.com/go/ise http://www.cisco.com/go/asa http://www.cisco.com/go/websecurity. Printed in USA C36-729890-00 11/13