Engagement story
- Customer
- Global mining company
- Industry
- Mining · IoT
- Technologies
- Cisco Secure Workload · ERSPAN collectors · Firewall policy · Application dependency mapping
The problem
IoT devices were connected to the corporate network, and the team lacked visibility into traffic flows. Without that visibility, configuring firewall rules for proper segmentation was not practical. The IoT devices ran specialized operating systems incompatible with standard agents.
How BTA delivered
BTA deployed Cisco Secure Workload to monitor and analyze network traffic, with ERSPAN collectors capturing unsampled flow data over a 4 to 5 week period. BTA then built deterministic permit-and-deny policies based on customer-defined manufacturing groupings and produced human-readable policy reports mapping to firewall rules.
Outcomes in production
Segmentation was successfully applied across dozens of applications and hundreds of IP devices, covering 20 separate manufacturing processes that represent the customer's complete steel production supply chains. Deployment completed without incident or downtime.