- You are here:
- Home
- Praktijksituaties (belangrijk)
Praktijksituaties (belangrijk)
We zoeken geen uitgebreide referentiecases, maar korte praktijkvoorbeelden in dit format:
- Situatie / probleem
(bijv. geen inzicht in OT assets, verouderde segmentatie, auditvraag, incident, etc.)
- Aanpak door Qcast
- Resultaat / effect
(bijv. volledig asset-overzicht, audit succesvol, downtime voorkomen, risico verminderd)
Antwoord Qcast:
Qcast has worked for a manufactory client that was struggling to understand and implement their security needs for their network infrastructure. This infrastructure was built and expanded over time without a clear blueprint and security in mind, resulting in a multi-vendor, multi-technology and multi-protocol infrastructure without a clear operating and governance structure, so troubleshooting and change management was very time consuming and often resulted in network outages.
Qcast have started to setup a secure networking blueprint, covering all areas of the infrastructure, in collaboration with representatives from the IT, the OT and the facilities (or IoT) departments. In many cases we see these departments have different needs and understanding of the network, and sometimes even speak in a different jargon. Our team of consultants specialize in building the bridge and to come to a mutual understanding of the design, the topology structure and the operating model that best suits the needs of the business.
We then start building the foundational layers of the network, using best-of-class Cisco products, like Cisco Catalyst Switches and Wireless, Industrial Ethernet Switches, Routers and Access Points, and Cisco Secure Firewalls. We deploy the products using the latest available technology for Zero-Touch Provisioning (ZTP) and LAN automation, using configuration templates and building blocks, ensuring a consistent and resilient network foundation. On top of that we deploy the Zero Trust Network Security policies into all Cisco products, ensuring a fail-safe and resilient security architecture, in user identification, network segmentation, least-privileged network access and in-depth network traffic inspection, filtering and control.
Finally, we deploy the security dashboard and configure all Cisco products to contribute relevant network and security data into the data platform. This platform then analyses and correlates the data into useful information in dashboards and reports, providing real insight in the status of the network and more important, the security posture of the overall infrastructure. This then helps us and the customer to better understand the usage of the network and the security intent it needs, enabling us to start developing and deploying more granular and specific security policies, for each user and endpoint connected to the network.