Managing Different Devices and
Network Access Policy Safely

Customer Case Study

One of Europe’s largest Cisco ISE deployments enables Kela to secure flexible working practices and
simplify IT management
EXECUTIVE SUMMARY
Customer Name: Kela
Industry: Government
Location: Finland
Number of Employees: 7500
Challenge
•	Introduce BYOD-enabled flexible working
while maintaining data security
•	Reduce consequent workload on IT team

Solution
•	Cisco Smart Security solution, providing
policy-based access control, identityaware networking, and data integrity
and confidentiality
•	Cisco products and services include
TrustSec, Identity Services Engine, and
Prime Infrastructure Manager

Results
•	Provided secure authentication for
7500+ users
•	Cut phone configuration time to zero
•	Improved network troubleshooting

Challenge
Kela is the national social security provider for Finland, processing more than four
million benefit applications and over €13.5 billion in benefit payments annually. Like
many public sector organizations, it is constantly looking to improve the efficiency
and quality of citizen services. Employee mobility is an intrinsic part of this plan. With
a highly distributed workforce of 15,000 employees spread across 400 locations,
the agency introduced flexible working practices over a decade ago.
At that time, the main IT focus was on securing corporate devices and vast amounts
of confidential data across wired and virtual private networks. This approach used
RADIUS access control servers and, more recently, a Cisco Secure Access Control
System. However, things changed when Kela deployed wireless networking. With
employees increasingly seeking to connect personal devices, the agency was forced
to rethink IT strategy.
“A powerful and flexible unified access security system was needed, one that
could enforce a safe bring-your-own-device policy and manage different devices
like Samsung GalaxyTabs, Nokia Lumia phones, Apple iPhones and iPads, and so
on.” says Juha Lappalainen, development manager at Kela.

Solution
Kela issued a significant public sector tender for WAN, LAN, and fixed and mobile
voice services. Elisa, a Cisco® Gold Certified Partner and already the agency’s
WAN provider, won the tender, which included security services with a Cisco
Smart Security proposal.
“In addition to the advanced security functionalities of Cisco switches, Elisa has
strong knowledge of Cisco solutions and experience of running Cisco-based
business-critical networks,” says Lappalainen. “The Cisco team actively offers
new ideas and helps us if and when needed.”

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.		

Page 1 of 3
Customer Case Study

“ISE and Prime are very
good: secure, flexible, and
offering greater network
visibility. With ISE, we can
also apply a posture health
check for workstations,
to ensure end devices
are compliant with our
security policy.”

Elisa installed the new solution following a Cisco TrustSec® Validated Design, and now
operates it on behalf of Kela. At the solution’s center is the Cisco Identity Services
Engine (ISE), which forms a security policy management and control platform. It
enforces usage policies in conjunction with Cisco TrustSec across wired and wireless
networks and potentially VPNs. Kela also uses ISE for a range of other functions,
including access control, profiling, and security posture policies on endpoints.

Juha Lappalainen
Development Manager
Kela

These integrated components protect a vast IT infrastructure comprising around 900
Cisco Catalyst® 2960, 3750, and 6509 Series Switches, with more than 300 Cisco
Aironet® 2600 Series Access Points and two Cisco 5508 Series Wireless Controllers.
For redundancy, Kela has an ISE server at both of its main data centers, along with fully
redundant Active Directory and application servers. RADIUS server load-balancing is
implemented as a feature on the Cisco Catalyst switches, along with Cisco AutoQoS
to help ensure prioritization for IP telephony and video data traffic.

This holistic approach also incorporates Cisco Prime™ Infrastructure Manager, which
is used for gaining insight into the network, troubleshooting, and in-depth reporting.
Completing the Cisco Smart Security solution, Cisco Mobility Services Engine forms a
wireless intrusion prevention system for solving connectivity problems and capturing
network events that can be used to create a knowledge base.

The organization has different access policies and mechanisms for different devices.
Extensible Authentication Protocol (EAP)-Transport Layer Security machine certificates
are used for Kela assets. Meanwhile, EAP-Protected Extensible Authentication
Protocol is used for bring-your-own-device (BYOD) endpoints. For IP phones, Kela
uses MAC Authentication Bypass (MAB) to provide limited access for endpoints that
the network does not recognize. “Machine certificates are our preferred authentication
method. They offer strong authentication and best automation for device access
control,” adds Lappalainen.

Results
The Cisco Smart Security solution provides authentication for around 7500 users and
some 8000 workstations and laptops, 3000 BYOD endpoints (mainly Apple iPads),
5000 IP phones, and more than 2000 smartphones. In addition, ISE grants access
to around 1000 multipurpose devices and printers along with 300 other assorted
network devices.
The Kela Cisco ISE deployment is one of the largest in Europe. Importantly, Kela is able
to deal with the BYOD trend easily and securely. “ISE has the intelligence to handle the
access policy for different devices and user needs,” says Lappalainen.
Furthermore, the four-strong IT team saves time whenever a new company phone
is handed out because there is no longer any need to carry out a manual port
configuration. Instead users download their phone configuration from a Trivial FTP
server and have the device registered on the system.
“ISE has automated and simplified access control for network devices such as printers,
IP phones, and thin-clients and now we have enhanced visibility of our network,”
says Ilari Saikkonen, senior IT specialist, Kela.
Pre-known phones connect via a separate VLAN with authentication through EAPMessage Digest 5 (MD5). The advantage of this access policy is that Kela can
provision new phones with zero administration effort. Similarly printer management
has been greatly simplified. Previously they had to be authenticated using MAB
with Active Directory group and location information. Now they can be added on a
plug-and-play basis using a centralized access policy over 802.1X with EAP-MD5.

© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.		

Page 2 of 3
Customer Case Study

“ISE has automated and
simplified access control
for network devices such
as printers, IP phones, and
thin-clients and now we
have enhanced visibility of
our network.”
Ilari Saikkonen,
Senior IT Specialist
Kela

User experience has also improved. “With Cisco Prime we can easily see, for
example, the wireless network status, and quickly troubleshoot if users have problems
on accessing network services,” Lappalainen says. “ISE and Prime are very good:
secure, flexible, and offering greater network visibility. With ISE, we can also apply a
posture health check for workstations, to ensure end devices are compliant with our
security policy.”

Next Steps
Further benefit is foreseen from implementing new features such as Cisco
EnergyWise™ and new products such as Catalyst 2960-X, 3850, and 4500 Series
Switches and Cisco Aironet 600 Series OfficeExtend Access Points for remote users.
This next phase of network evolution could help boost video collaboration across the
organization.
“Internet videos and video calls are common nowadays, and increasing,” Lappalainen
says. “This trend brings new demands for the LAN but especially for the wireless
LAN. More application visibility and quality of service may be needed. Because of
continuous feature development, we see the Cisco solutions as providing good
investment protection.”

For More Information
To learn more about the Cisco architectures and solutions featured in this case study
go to:
www.cisco.com/go/trustsec
www.cisco.com/go/ise
www.cisco.com/go/wireless

Product List
Wireless
•• Cisco Aironet 2600 Series Access Points
•• Cisco 5508 Series Wireless Controller
Routing and Switching
•• Cisco Catalyst 2960 Series Switches
•• Cisco Catalyst 3750 Series Switches
•• Cisco Catalyst 6509 Series Switches
Security
•• Cisco TrustSec
•• Cisco Identity Services Engine
•• Cisco Prime Infrastructure Manager
•• Cisco Mobility Services Engine
•• Cisco Wireless Intrusion Prevention System

Americas Headquarters
Cisco Systems, Inc.
San Jose, CA

Asia Pacific Headquarters
Cisco Systems (USA) Pte. Ltd.
Singapore

Europe Headquarters
Cisco Systems International BV Amsterdam,
The Netherlands

Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go
to this URL: www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply
a partnership relationship between Cisco and any other company. (1110R)
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.	

Printed in the UK	

ES/1213	

Page 3 of 3

More Related Content

PDF
IT Guide for Mobility: Making the case for Security leaders
PPTX
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
PPTX
Cisco Security DNA
PDF
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
PDF
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
PDF
Cisco Connect Ottawa 2018 Cisco digital buildings and the 4th utility w co...
PDF
TechWiseTV Workshop: Cisco DNA Center Assurance
PPTX
Office 365 kelly services
IT Guide for Mobility: Making the case for Security leaders
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Cisco Security DNA
Cisco Connect Ottawa 2018 the intelligent network with Cisco Meraki
Cisco Connect 2018 Thailand - Cisco Meraki an innovation journey to a smarter...
Cisco Connect Ottawa 2018 Cisco digital buildings and the 4th utility w co...
TechWiseTV Workshop: Cisco DNA Center Assurance
Office 365 kelly services

What's hot (20)

PDF
Cisco Meraki: Let Simple Work For You
PPTX
Beyond BYOD: Uncompromised Experience for Any Workspace
PDF
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
PDF
Cisco connect winnipeg 2018 simply powerful networking with meraki
PDF
Cisco Connect Halifax 2018 Cisco Meraki -let simple work for you
PPTX
Beyond BYOD
PDF
UniCredit Business Integrated Solutions
PDF
101 Use Cases for IoT
PDF
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
PDF
Cisco Meraki Cloud Managed Networking
PDF
Cisco Connect Halifax 2018 Simple IT
PPTX
Cisco connect winnipeg 2018 simple it leads to simple it management
PPSX
JUGITER BUSINESS PROFILE
PPTX
Internet of Things (IoT) Costs, Connectivity, Resources and Software
PPTX
3 reasons-sdp-is-replacing-vpn-in-2019
PDF
Data, Technology, and Innovation: Platform for Change
PPTX
The evolution of IT in a cloud world
PDF
Architectural Patterns in IoT Cloud Platforms
PDF
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?
PPTX
Ma story then_now_webcast_10_17_18
Cisco Meraki: Let Simple Work For You
Beyond BYOD: Uncompromised Experience for Any Workspace
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco Connect Halifax 2018 Cisco Meraki -let simple work for you
Beyond BYOD
UniCredit Business Integrated Solutions
101 Use Cases for IoT
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
Cisco Meraki Cloud Managed Networking
Cisco Connect Halifax 2018 Simple IT
Cisco connect winnipeg 2018 simple it leads to simple it management
JUGITER BUSINESS PROFILE
Internet of Things (IoT) Costs, Connectivity, Resources and Software
3 reasons-sdp-is-replacing-vpn-in-2019
Data, Technology, and Innovation: Platform for Change
The evolution of IT in a cloud world
Architectural Patterns in IoT Cloud Platforms
Meraki vs. Viptela: Which Cisco SD-WAN Solution Is Right for You?
Ma story then_now_webcast_10_17_18
Ad

Viewers also liked (11)

PDF
Growth – learning to scale an organisation
PDF
Piano aria sicilia capitolo 1 prog plurin sinanet agenda 21
PDF
PDF
Bm a4-2016-final-fra20160119131529
PDF
Music to the Ears
DOCX
PPTX
葉士瑜 我的閱讀履歷
PPTX
Иванов. Автоматизация построения предметных указателей
PPT
Operativni sistemi
PDF
FDA 2013 Clinical Investigator Training Course: Pharmacology/Toxicology in th...
Growth – learning to scale an organisation
Piano aria sicilia capitolo 1 prog plurin sinanet agenda 21
Bm a4-2016-final-fra20160119131529
Music to the Ears
葉士瑜 我的閱讀履歷
Иванов. Автоматизация построения предметных указателей
Operativni sistemi
FDA 2013 Clinical Investigator Training Course: Pharmacology/Toxicology in th...
Ad

Similar to Kela v2cs -_final (20)

PDF
case-study-cisco-ise-project copy
PDF
Bellevue Group
PDF
Ukrtransgaz
PPTX
TechWiseTV Workshop: Cisco ONE
PDF
Telecom Italia
DOCX
Definitely, cisco mobility express solution eases your wi fi deployments solu...
DOCX
Definitely, cisco mobility express solution eases your wi fi deployments solu...
PPTX
Cisco application infrastracture controller (apic) billyjones
PDF
OMV Petrom
PPTX
SP 5G: Unified Enablement Platform
PDF
Enea wytwarzanie
PDF
The Cisco IP/MPLS Backbone Solution
DOCX
How much you know about cisco, cisco router
PDF
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
PDF
PPTX
ICC Networking Value Proposition
PPTX
ICC Networking Value Proposition
PDF
Mobilize employees with the cisco mobile workspace solution
PDF
daisy_communications_cs
PDF
Daisy communications
case-study-cisco-ise-project copy
Bellevue Group
Ukrtransgaz
TechWiseTV Workshop: Cisco ONE
Telecom Italia
Definitely, cisco mobility express solution eases your wi fi deployments solu...
Definitely, cisco mobility express solution eases your wi fi deployments solu...
Cisco application infrastracture controller (apic) billyjones
OMV Petrom
SP 5G: Unified Enablement Platform
Enea wytwarzanie
The Cisco IP/MPLS Backbone Solution
How much you know about cisco, cisco router
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
ICC Networking Value Proposition
ICC Networking Value Proposition
Mobilize employees with the cisco mobile workspace solution
daisy_communications_cs
Daisy communications

More from wbrewin (7)

PDF
Ucs 5th-anniversary infographic EMEAR
PDF
Setting New Wireless Venue Benchmark
PDF
Trinity Leeds Launches Next - Generation Shopping Center
PDF
Telenor arena v3cs_final(1)
PDF
Aplus v4cs -_final
PDF
Tfl v2cs
PDF
St georges hospital
Ucs 5th-anniversary infographic EMEAR
Setting New Wireless Venue Benchmark
Trinity Leeds Launches Next - Generation Shopping Center
Telenor arena v3cs_final(1)
Aplus v4cs -_final
Tfl v2cs
St georges hospital

Recently uploaded (20)

PPTX
Modernising the Digital Integration Hub
PDF
Comparative analysis of machine learning models for fake news detection in so...
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPT
What is a Computer? Input Devices /output devices
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
The various Industrial Revolutions .pptx
PPT
Geologic Time for studying geology for geologist
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
Five Habits of High-Impact Board Members
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
UiPath Agentic Automation session 1: RPA to Agents
Modernising the Digital Integration Hub
Comparative analysis of machine learning models for fake news detection in so...
Custom Battery Pack Design Considerations for Performance and Safety
OpenACC and Open Hackathons Monthly Highlights July 2025
What is a Computer? Input Devices /output devices
Microsoft Excel 365/2024 Beginner's training
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Chapter 5: Probability Theory and Statistics
sustainability-14-14877-v2.pddhzftheheeeee
Getting started with AI Agents and Multi-Agent Systems
The various Industrial Revolutions .pptx
Geologic Time for studying geology for geologist
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Five Habits of High-Impact Board Members
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Improvisation in detection of pomegranate leaf disease using transfer learni...
A contest of sentiment analysis: k-nearest neighbor versus neural network
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
UiPath Agentic Automation session 1: RPA to Agents

Kela v2cs -_final

  • 1. Managing Different Devices and Network Access Policy Safely Customer Case Study One of Europe’s largest Cisco ISE deployments enables Kela to secure flexible working practices and simplify IT management EXECUTIVE SUMMARY Customer Name: Kela Industry: Government Location: Finland Number of Employees: 7500 Challenge • Introduce BYOD-enabled flexible working while maintaining data security • Reduce consequent workload on IT team Solution • Cisco Smart Security solution, providing policy-based access control, identityaware networking, and data integrity and confidentiality • Cisco products and services include TrustSec, Identity Services Engine, and Prime Infrastructure Manager Results • Provided secure authentication for 7500+ users • Cut phone configuration time to zero • Improved network troubleshooting Challenge Kela is the national social security provider for Finland, processing more than four million benefit applications and over €13.5 billion in benefit payments annually. Like many public sector organizations, it is constantly looking to improve the efficiency and quality of citizen services. Employee mobility is an intrinsic part of this plan. With a highly distributed workforce of 15,000 employees spread across 400 locations, the agency introduced flexible working practices over a decade ago. At that time, the main IT focus was on securing corporate devices and vast amounts of confidential data across wired and virtual private networks. This approach used RADIUS access control servers and, more recently, a Cisco Secure Access Control System. However, things changed when Kela deployed wireless networking. With employees increasingly seeking to connect personal devices, the agency was forced to rethink IT strategy. “A powerful and flexible unified access security system was needed, one that could enforce a safe bring-your-own-device policy and manage different devices like Samsung GalaxyTabs, Nokia Lumia phones, Apple iPhones and iPads, and so on.” says Juha Lappalainen, development manager at Kela. Solution Kela issued a significant public sector tender for WAN, LAN, and fixed and mobile voice services. Elisa, a Cisco® Gold Certified Partner and already the agency’s WAN provider, won the tender, which included security services with a Cisco Smart Security proposal. “In addition to the advanced security functionalities of Cisco switches, Elisa has strong knowledge of Cisco solutions and experience of running Cisco-based business-critical networks,” says Lappalainen. “The Cisco team actively offers new ideas and helps us if and when needed.” © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 3
  • 2. Customer Case Study “ISE and Prime are very good: secure, flexible, and offering greater network visibility. With ISE, we can also apply a posture health check for workstations, to ensure end devices are compliant with our security policy.” Elisa installed the new solution following a Cisco TrustSec® Validated Design, and now operates it on behalf of Kela. At the solution’s center is the Cisco Identity Services Engine (ISE), which forms a security policy management and control platform. It enforces usage policies in conjunction with Cisco TrustSec across wired and wireless networks and potentially VPNs. Kela also uses ISE for a range of other functions, including access control, profiling, and security posture policies on endpoints. Juha Lappalainen Development Manager Kela These integrated components protect a vast IT infrastructure comprising around 900 Cisco Catalyst® 2960, 3750, and 6509 Series Switches, with more than 300 Cisco Aironet® 2600 Series Access Points and two Cisco 5508 Series Wireless Controllers. For redundancy, Kela has an ISE server at both of its main data centers, along with fully redundant Active Directory and application servers. RADIUS server load-balancing is implemented as a feature on the Cisco Catalyst switches, along with Cisco AutoQoS to help ensure prioritization for IP telephony and video data traffic. This holistic approach also incorporates Cisco Prime™ Infrastructure Manager, which is used for gaining insight into the network, troubleshooting, and in-depth reporting. Completing the Cisco Smart Security solution, Cisco Mobility Services Engine forms a wireless intrusion prevention system for solving connectivity problems and capturing network events that can be used to create a knowledge base. The organization has different access policies and mechanisms for different devices. Extensible Authentication Protocol (EAP)-Transport Layer Security machine certificates are used for Kela assets. Meanwhile, EAP-Protected Extensible Authentication Protocol is used for bring-your-own-device (BYOD) endpoints. For IP phones, Kela uses MAC Authentication Bypass (MAB) to provide limited access for endpoints that the network does not recognize. “Machine certificates are our preferred authentication method. They offer strong authentication and best automation for device access control,” adds Lappalainen. Results The Cisco Smart Security solution provides authentication for around 7500 users and some 8000 workstations and laptops, 3000 BYOD endpoints (mainly Apple iPads), 5000 IP phones, and more than 2000 smartphones. In addition, ISE grants access to around 1000 multipurpose devices and printers along with 300 other assorted network devices. The Kela Cisco ISE deployment is one of the largest in Europe. Importantly, Kela is able to deal with the BYOD trend easily and securely. “ISE has the intelligence to handle the access policy for different devices and user needs,” says Lappalainen. Furthermore, the four-strong IT team saves time whenever a new company phone is handed out because there is no longer any need to carry out a manual port configuration. Instead users download their phone configuration from a Trivial FTP server and have the device registered on the system. “ISE has automated and simplified access control for network devices such as printers, IP phones, and thin-clients and now we have enhanced visibility of our network,” says Ilari Saikkonen, senior IT specialist, Kela. Pre-known phones connect via a separate VLAN with authentication through EAPMessage Digest 5 (MD5). The advantage of this access policy is that Kela can provision new phones with zero administration effort. Similarly printer management has been greatly simplified. Previously they had to be authenticated using MAB with Active Directory group and location information. Now they can be added on a plug-and-play basis using a centralized access policy over 802.1X with EAP-MD5. © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 3
  • 3. Customer Case Study “ISE has automated and simplified access control for network devices such as printers, IP phones, and thin-clients and now we have enhanced visibility of our network.” Ilari Saikkonen, Senior IT Specialist Kela User experience has also improved. “With Cisco Prime we can easily see, for example, the wireless network status, and quickly troubleshoot if users have problems on accessing network services,” Lappalainen says. “ISE and Prime are very good: secure, flexible, and offering greater network visibility. With ISE, we can also apply a posture health check for workstations, to ensure end devices are compliant with our security policy.” Next Steps Further benefit is foreseen from implementing new features such as Cisco EnergyWise™ and new products such as Catalyst 2960-X, 3850, and 4500 Series Switches and Cisco Aironet 600 Series OfficeExtend Access Points for remote users. This next phase of network evolution could help boost video collaboration across the organization. “Internet videos and video calls are common nowadays, and increasing,” Lappalainen says. “This trend brings new demands for the LAN but especially for the wireless LAN. More application visibility and quality of service may be needed. Because of continuous feature development, we see the Cisco solutions as providing good investment protection.” For More Information To learn more about the Cisco architectures and solutions featured in this case study go to: www.cisco.com/go/trustsec www.cisco.com/go/ise www.cisco.com/go/wireless Product List Wireless •• Cisco Aironet 2600 Series Access Points •• Cisco 5508 Series Wireless Controller Routing and Switching •• Cisco Catalyst 2960 Series Switches •• Cisco Catalyst 3750 Series Switches •• Cisco Catalyst 6509 Series Switches Security •• Cisco TrustSec •• Cisco Identity Services Engine •• Cisco Prime Infrastructure Manager •• Cisco Mobility Services Engine •• Cisco Wireless Intrusion Prevention System Americas Headquarters Cisco Systems, Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems (USA) Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) © 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Printed in the UK ES/1213 Page 3 of 3