Salvation Army Case Study Essay

Improved Essays
Salvation Army Case Study
The Salvation Army Automates Guest Access & Expands BYOD
SH: Uses Network Sentry’s Unique Multiple Portal Feature to Unify Guest Experience
Network Profile: A Cisco network that integrates 80 different locations.
Challenges
• Automate the guest access provisioning process for 80 locations
• Provide a unified look and feel for 80 access portals, all with different local provisioning
• Expand BYOD wireless connectivity options without sacrificing security or compliance
Solution: Network Sentry, Bradford’s Security Automation & Orchestration Solution
Results
• An automated wireless provisioning process that places devices on the appropriate network with the proper level of access
• Unified mobile and guest access experiences
…show more content…
“One of our biggest concerns was the multiple wireless SSIDs. Anytime we wanted a new LAN or additional guest access to be provisioned, we were manually configuring access on SS1 – 7,” stated Christian Cundell, head of messaging services for the Salvation Army UK & Republic of Ireland.” In addition, with employees, guests and contractors traveling between the different locations, the organization also wanted to maintain a unified guest experience. The Salvation Army UK & Republic of Ireland needed to automate mobile access management, simplify guest access at its 80 locations, and increase endpoint security.
As the Salvation Army UK & Republic of Ireland looked for solutions, Network Sentry quickly surpasses the other competitors due to its unique multiple portal functionality. Network Sentry’s multiple portal feature was one of the only solutions robust enough to secure 80 different sites that all have slightly different provisioning based on local requirements, while still providing a similar look and feel for each access portal. To implement this solution, the organization selects Khipu Networks, a Bradford Networks partner with significant Wifi
…show more content…
Network Sentry has helped the organization to automate and unify guest access, reduce the burden on IT staff, increase endpoint security and expand BYOD access. The process has gone so smoothly, that the organization is already considering expanding the use of Network Sentry to include automated threat response, before installation was even completed at all 80 locations. “The implementation went smoothly. Network Sentry has eliminated our internal guest access challenges, while providing a great user experience. We are very pleased with the product and installation,” Cundell

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 1 Lab 1

    • 439 Words
    • 2 Pages

    Speed, availability, and reliability are vital for a successful network infrastructure in terms of productivity and user experience. When first configuring this lab, I had to make the decision of whether or not to use one server to run all of the services or if the load should be distributed amongst multiple machines. I decided to go with the later, having a separate server hosting the wiki, another providing monitor services, and yet another acting as the DHCP, DNS and AD controller. While the last three were not required in the scope of this lab, I wanted to set up my initial network in a scalable manner, and this was the best solution for future growth. Distributing the services across multiple machines helps to reduce the processing that each box is required to do in order to fulfill requests.…

    • 439 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    CHALLENGE: Reigning in security management and reducing complexities at remote sites. SOLUTION: Palo Alto Networks PA-3020 and PA500’s, simplifies security at Data Center and advanced security policy deployment for the remote offices RESULTS: Simplify network security with powerful security controls, ease of use and powerful reporting. Visibility into the specific identity of each application helps enforce appropriate usage policies.…

    • 750 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 1

    • 768 Words
    • 4 Pages

    Specify which users can connect to your intranet through Remote Access, Set up a remote access server, Create a customized remote access connection or service profile. Use tokens, smart cards, certificates, or SMS solutions. 8. Secure the Wireless Network: Aside from using an SSID that can’t be easily associated with the company, also be sure to use the strongest encryption type you can, IE: WPA2. Also, set up a guest network so you can prevent visitors to even connect to your internal network. 9.…

    • 768 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Lab 1

    • 1712 Words
    • 7 Pages

    1. Goal Following the introduction of Windows-based systems into our virtual environment in Lab 3, this final individual lab takes the base Microsoft administrative technologies put in place such as Active Directory, and pushes them forward with more advanced systems administration features. The major new additions to the infrastructure are Group Policy and fine-grained password policies where users, computers, and groups are given a more personalized as well as secure computing experience based on the role and importance those objects play in the overall infrastructure. I found the information as well as skills learned in this lab invaluable due to how important Group Policy is to Active Directory and how end systems as well as users are…

    • 1712 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    For a low, one-time cost of $999, Baylor can install 20 NetGear WiFi routers around key campus locations where internet activity hits its peak such as libraries, dorms, and academic buildings. Since the routers all take an ethernet line to connect to the internet, replacing the older outdated ones is as simple as switching them out. Afterwards, Baylor students will be able to instantly connect to the internet at faster speeds. With industry-standard security and universally compatible internet routers, students will be able to print documents, access the internet, study and complete their assignments with ease - no more outages! A faster AirBear network allows students to thrive in their academics all across…

    • 744 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Wyoming Medical Center, Los Angeles County, and Raymond James all share similar struggles with how to secure the network, computers and mobile devices. Control and security are a concern from both inside and outside of the facilities and organizations. Each organization deployed a multi-level/tier approach was needed to protect the data. The Novell ZenWorks agents are used to manage the operating systems and software that is installed on the desktops/workstations; it allows the information technology group to customize the software for installation and patch management.…

    • 302 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Security Considerations The issues with the current set up of our lab in an enterprise environment are control and exceptions. Control is an issue because with all of the computers on a different domain password policies and other security features will not be implemented. This hurts the organization because it is not prepared for an intrusion of their network. A good fix for this issue is to get the network on the same domain and keep control over all users.…

    • 604 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Summary: Capstone Project

    • 522 Words
    • 3 Pages

    Capstone Project Summary This project will be to develop an overall written as well as a lab tested environment concept plan for a live implementation for a government contract. There is a need to lessen the number of running hardware services, implement high level security access for both physical access as well as any needed remote connections, to lessen the overall possible attack surfaces for the environment from potential attackers, make this a unilateral implementation anywhere, as well as follow and apply any and all Security Technical Implementation Guides (STIGs). We will be convert an older antiquated hardware server environment that is coming to end of life and will be in need up replacement or upgrade.…

    • 522 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    The Salvation Army Essay

    • 960 Words
    • 4 Pages

    “30 million people receive help from the Salvation Army last year”. (The Salvation Army USA) The Salvation Army is made to help all kinds of people in many different ways. They have programs that can help adults get back on their feet, help elderly get the help or love the need, and help the homeless find food and shelter. They also help combat human trafficking and help families reunite with each other.…

    • 960 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Herein contains personal thoughts of learning technologies as used for academic purposes and broad-spectrum primary, secondary and tertiary education. The terms education and technology are currently, the penultimate buzzwords. If one was to reach for a new source or social media outlet one could come to the belief that six-year-olds can build their own Deathstars out of marbles and pre-chewed marshmallows because of the power of technology and its implementation of educational domain. Children who were once so feebleminded, that watching television and chewing gum was an impossibility; are now able to write haikus in Finnish, Urdu, and Cuneiform. All through the power of technology.…

    • 745 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The purpose of this paper is to describe the network configuration, explaining the role of each component and connection of the scenario provided. Specifically, I will discuss the functions of the components and describe how they contribute to the network. Along with this I will modify the appropriate components of the provided database with the information regarding the employees’ computers and the upgrade. Network Configuration Network configuration allows a system admin to set up a network to use to communicate. Per Techopedia, “Network configuration is the process of setting a network 's controls, flow and operation to support the network communication of an organization and/or network owner.”…

    • 923 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Computers have entirely changed the way we live, learn and work. People have now accepted the digital advanced technology and the Internet at a quicker rate than TV. Numerous homes and nearly all businesses own and operate more than one computer. We send and get a massive amount of email, balance our checkbooks and shop online for different products and services consistently with the use of these computers. Small organizations use computers and networks to stay connected with their clients, partner’s friends, and to place orders with suppliers.…

    • 1902 Words
    • 8 Pages
    Great Essays