This presentation looks at the new Borderless Networks solutions that deliver the capabilities you need to transform your business into one that is borderless and future-ready.
Beyond these drivers for Cloud, we’re seeing two technology trends impact the growth for services:Device proliferation, user diversity are driving mobile requirements onto IT.7B reference for mobile devicesABI Research: Wi-Fi IC Market Data, release date of May 5th, 2010http://www.instat.com/catalog/wcatalogue.asp?id=167#IN0904005WSVideo projected to quadruple IP traffic by 2014 to 767 exabytes*. http://newsroom.cisco.com/dlls/2010/prod_060210.html
Beyond these drivers for Cloud, we’re seeing two technology trends impact the growth for services:Device proliferation, user diversity are driving mobile requirements onto IT.7B reference for mobile devicesABI Research: Wi-Fi IC Market Data, release date of May 5th, 2010http://www.instat.com/catalog/wcatalogue.asp?id=167#IN0904005WSVideo projected to quadruple IP traffic by 2014 to 767 exabytes*. http://newsroom.cisco.com/dlls/2010/prod_060210.html
According to a recent Cisco Enterprise customer poll, 50% of those surveyed are interested in deploying cloudCloud adoption is already over 25% in North America, and continues to grow in Europe – Forrester “Sourcing Groups Prepare For 2011 -- Cloud Is Key Initiative 11/10”There are many reasons for migration to Cloud. Here are just a few, centered on Mobility, Business Agility, and Operational SimplicityMobilityApplication portability – this means that cloud workloads are dynamic and adapt based on a user’s locationProvider flexibilityImproved SLAs due to clouds of scaleBusiness Agility (65% organizations cite business response as key driver – SandHill)Organizations can innovate and expand into new business modelsThe time to prototype and change new concepts is shortenedOperational SimplicityOrganizations dramatically reduce CapEx and shift to OpExChange costs are reducedElasticity comes with provider and workload scale
Organizations that deliver the experience we just described, are truly borderless - Connecting anyone - employees, partners and customers, to anything, anywhere anytime. Delivering the same productivity, the same access to the information and the same responsiveness. We call it the borderless experience. …securely, reliably, and seamlesslyLet’s take a look [CLICK – Transition] at how Borderless Networks delivers on that vision.
However as organizations move to the cloud, new vulnerabilities are introduced. When you think about all the varied devices and connection types accessing private and public cloud services, whether they might be WebEx or an Oracle HR application, they become prone to malware or Web vulnerabilities? There’s also the risk of data loss.Ultimately, IT is faced with “can the network secure these connections, users, and data in a manner that ensures reliability and seamlessness?”Gartner poses the question “Is Your Network the Weak Link in Cloud?”An architectural approach based on Cisco Borderless Networks can help.
The diagram you see here outlines the main components of the borderless network architecture – it links applications, users, and end-point devices with operational processes and the network.It serves as both a framework for our system and architecture roadmap, as well as the deployment blueprint for Borderless Organizations. Let me briefly walk through its main elements. There are key pillars of functionality that Cisco Borderless Networks delivers on – primarily video, green, security, mobility, and application performance—on an end-to-end basis. For innovative organizations, these are key areas of investment and differentiation. The critical network services and proof-points of these pillars include Medianet, TrustSec and EnergyWise; they are delivered by the core infrastructure including routing, switching, mobility, security and WAN Optimization components. Equally important to the Borderless Network architecture is how the user experience is impacted by these network services—when mobile, when engaging with video, and in the workplace—however it’s defined. Network services integrate with endpoint technologies like AnyConnect, to deliver always-on, seamless, reliable, secure connectivity regardless of location or device.Meanwhile, Borderless Management and Policy are built into Network and User Services, offering a flexible and dynamic framework for policy definition and enforcement that spans across video, green, security, mobility, and application performance. The focus here is to connect the right user, the right device, the right application at the right place, at the right time, to the right network. It enables organizations to offer different levels of access privileges or performance characteristics to users, devices and applications.In this framework, policy definition and administration are centralized while control, visibility and enforcement are distributed via the application of dynamic policy assignments.Finally, we have the end-point devices that Cisco extends intelligence and awareness to, including cameras, video terminals, IP Phones, and mobile devices so that the experience is seamless and end to end. It is this blended approach of technologies and new capabilities that will enable new business models and allow your organization to go Borderless. Let’s take a look now at each of those critical network services I mentioned.services including mobile collaboration and secure mobility
Making IT from reactive to proactive
Making IT from reactive to proactive
We need to get the top 3 quantifiable benefits from themSession Directory: Tracks active users and devicesIntegrated offering: Optimize where services runManaged Service Group Access: Keeps existing logical design (staff or guests – business level)Policy extensibility – link in policy information pointsSystem wide monitoring and troubleshooting – consolidate data; 3 click drill-inGranular rules with scalable distribution saving device level configurationSupport more users and devices in any flavor consistentlyProtect sensitive company data consistently and scalably
Making IT from reactive to proactive
Cisco is leading the industry with the introduction of Cisco Prime for Enterprise. Cisco Prime for Enterprise is a portfolio of products that deliver converged management for Borderless Networks, Data Center, and Collaboration. Cisco Prime for Enterprise offerings simplify and automate the management of network services and operations for the enterprise helping to decrease operational costs and increase IT efficiency. The first major proof point for Cisco Prime for Enterprise is the Network Control System 1.0 that offers the ability to evolve from wireless only management into user and endpoint management across wired and wireless. NCS also becomes the management solution for the Identity Services Engine. Additionally, the LMS 4.1 solution delivers complete management of network services including EnergyWise and Medianet as well as new Smart Services. Of course, both NCS and LMS handle the ongoing box (or element) level management for switching, routing and wireless. To provide network and application visibility to quickly isolate and troubleshoot application performance issues, we have enhanced our Cisco Prime Network Analysis Module (NAM) with software release 5.1. This release also includes a new 10 Gigabit blade for the Catalyst 6500 Series, availability on ISRG2 /SRE, integration with Performance Agent on ISRG2 and integrated reporting with WAAS Central Manager.Please remove the line below for external presentations. Should only be used as speaker notes for internal presos.Longer term, the NCS and LMS solutions converge into a single platform to provide a single framework for complete lifecycle management of the wired and wireless networks. (This is NDA information)
In this scenario, we see Cisco Prime NCS at work. NCS takes a user centric approach to network management. Amy is trying to get access to some specific corporate financial data which she feels is necessary to do her job. Unfortunately she’s having connectivity issues and has tried accessing the information when connecting to the wired and wireless network. Feeling frustrated she contacts the help desk to try and troubleshoot the problem. The level 1 helpdesk assistant is able to search directly on Amy by entering her name. Using Cisco NCS the helpdesk assistant is able to see directly where the problem is. While Amy was able to connect to the network, get an IP address and authenticate into the network, she is being blocked from accessing the corporate data by the Identity Services Engine because she is a contractor. This example not only shows how NCS can deliver user-centric management, but also how it can integrate with ISE to provide policy details as well.
What happens to the network and mission-critical applications as video becomes pervasive in organizations ?Video not only loads networks, it changes networks. A network that is automated for multimedia provides the best opportunity to optimize not only video applications, but also important business applications that are critical for your organization. New capabilities in automated multimedia enable Pre-planning to test the capabilities of the network for video, Autoconfiguration to enable plug and play functionality on the network, visibility and reporting to monitor the traffic patterns and fine tune the video quality of experience, optimization to reduce traffic and server load and optimize the use of the network to achieve successful end-to-end video streaming, and finally troubleshooting capabilities that can track video network problems even in the middle of the video session.This leads to more effective capacity planning, lower operational costs, and predictable application delivery from the network.
Automated Multimedia provides a network with smarter endpoints, rich services and a smarter network which is managed by a variety of management tools.Cisco video endpoints are smarter due to Media Services Interface (MSI) client that builds network intelligence into Cisco endpoints so that the network can :* Identify the device and location *Auto configure the device *Tag applications with Metadata *Set priorities and policiesA subset of these capabilities is available through Media Services Proxy on behalf of legacy video endpoints. By extending the visibility all the way to the endpoints, better network optimization is possible end to end.With the rich media and collaboration services such as Metadata tagging and the any to any transformation of video by the Media eXperience Engine, video truly is available on any device, anywhere throughout the network and adds specific reporting and analytics capabilities. Metadata tagging performed by MSI-enabled endpoints ensure that proper policies are adhered to as the video traffic travels across the network.The network becomes smarter as well. With advanced, automated multimedia capabilities in the network over Catalyst switches and Cisco routers, the network becomes media aware. An IPSLA VO session can test whether the network is optimized for video in advance. Media Monitoring provides enhanced visibility and troubleshooting into the network without the need for probes. Cisco video endpoints can be automatically configured via auto smart ports on Catalyst switches and best practices and policies are automatically applied. Pre-planning with the Medianet Readiness assessment provides the blueprint to help customers of all types successfully deploy video at scale and efficiently evolve to meet future video and collaboration needs.To help ensure video quality in point-to-point and multipoint video sessions and deep network path visibility from Medianet capable devices, we are introducing Cisco Prime Collaboration Manager (CM) 1.0 - a new web-based user experience for managing and quickly troubleshooting end-to-end video collaboration over a Borderless Network.And we are extending these multimedia management capabilities to our wide ecosystem of developers across the globe with our Cisco Developer Network. CDN provides a set of APIs which enableorganizations to use Cisco technology to develop innovative digital signage and social video solutions for their customers.Now, how do all these capabilities benefit the business?
These benefits are best described with an example, putting them to use. An IT manager, using Cisco Collaboration Manager, happens to notice a particular Telepresence session – because the device is MSI-enabled, he could gain the session specifics and learn that it is a VP-level conference and that there are issues. Using the Media monitoring capabilities Mediatrace, he is able to track, hop by hop to where the congestion problems are and improve the telepresence session while in process.
The benefits of investing in Cisco Prime are numerous. However, the first clear benefit is that Cisco Prime – especially NCS, is designed to evolve network management to meet the changing dynamics of the modern workplace. Specifically, most enterprises have embraced mobility and are required to support numerous mobile devices and endpoints. As such, IT needs a management solution that not only handles box-level management, but more important can provide user centric troubleshooting and diagnostic capabilities. Also, Cisco Prime NCS delivers a user experience that seamlessly manages the connectivity and policy issues that may occur on the wired and wireless network. This single interface means faster resolution times to solve problems as they occur. Finally, Cisco Prime NCS and LMS make managing the wired and wireless networks easier. IT can troubleshoot and solve problems quickly by using each platform’s automated easy-to-use diagnostic tools
Making IT from reactive to proactive
It has been interesting to note the pace of change in security.Always a new threat, always a new set of responses. This process has continued for decades, action and reaction. Actions result in immediate reactions: threats materialize, we respond, and the attackers change their tactics in a never-ending cycle. Our world has become increasingly complex. A constant onslaught of threats demands our attention, but each new threat helps us develop better responses.
This may seem like common sense, but this regular cycle of action and reaction is beginning to be disrupted.The pervasiveness of technology is dramatically reshaping how we work and play.
However, I feel that today we are poised for a period of significant change in the way we build and deploy security solutions. Not the 2 dimensional dance of problem meets solution, but a multi-dimensional problem that is causing us to tear up the old framework that we have used to develop security, and rethink the entire system. This change is not in response to a new class of threats, but rather it is in response to some massive shifts in the way we work, and the way we think about the workplace.
Today, work is no longer a place you go, it’s something you do. Think about that for a second. People don’t want to be tied to a specific place, a specific device, or a specific schedule. They crave the freedom to work without borders or barriers. And so they are…. But this is creating some massive complexities for our IT infrastructure, and the way we keep that infrastructure secure.
At Cisco, we saw this coming, so we enacted an any device policy: whatever you want, we’ll support it. Rebecca Jacoby, our CIO, regards these devices as fundamentally fashion items, so Cisco employees can choose and purchase whatever expresses their personal style and taste—iPads, iPhones, Androids, Blackberries, Windows Mobile phones, whatever. Cisco covers the service. This might seem like a huge burden on IT, but the results have been astounding: a 200% increase in user satisfaction, and a 25% decrease in cost. Turns out that freedom of choice is also good for business.
At Cisco, we saw this coming, so we enacted an any device policy: whatever you want, we’ll support it. Rebecca Jacoby, our CIO, regards these devices as fundamentally fashion items, so Cisco employees can choose and purchase whatever expresses their personal style and taste – iPads, iPhones, Androids, Blackberries, Windows Mobile phones, whatever. Cisco covers the service. This might seem like a huge burden on IT, but the results have been astounding: a 200% increase in user satisfaction, and a 25% decrease in cost. Turns out that freedom of choice is also good for business.
Here we have eight critical questions to consider. In a nutshell, can your existing network protect users, devices, and content across wired and wireless environments, on-premises to off premises with a media rich experience from an array of user devices?Perhaps the most important question here is #8—Where am I now and how do I start.Cisco and its partners have an answer.
We’re also announcing SBA 2.0 with Borderless Access. This blueprint for mid-market customers with 100 to 1000 users provides a reference architecture with design and implementation guides based on fully tested solutions encompassing Borderless Networks, Collaboration, and Data Center.As a result, you’re able to purchase and deploy with confidence while realizing a lower TCO.Lower Total Cost of OwnershipNetwork performance is improvedwith a pretested architecturePrescriptive SolutionsPreselected Cisco solutions providethe right functions for customersModular Design for the FutureBuild a network platform ready to support future deployments of unified communications, switching, wireless, routing, video, and data center
To summarize:Today’s market transitions—increasing video traffic, a wider range of access devices, and more and more mobile and remote workers are driving the need for a Borderless Organization. A Borderless Network Architecture is an imperative if an organization wants to ensure seamless, secure, reliable communications between employees, partners, and customers.Cisco is uniquely equipped to deliver the end-to-end architecture with its deep and broad technology heritage as well as technology and market leadership.Cisco’s new platforms, solutions, and services enable organizations to “Go Borderless”. Thank you. I’d like to open it up to questions.
For those interested in copies of this year’s conference presentations, please visit our Event Landing Page at www.networkerssolutionsforum.com. Here you will find the presentations for download.Lastly, we are interested in your feedback. Please take the time to fill-out the Conference Evaluation Form. If you did not receive an Eval Form with today’s Conference Guide, please see one of our Registration Attendants. The Eval Forms will be used for the prize draws at the Cocktail Reception.
Let’s look at what happens when you Cloud-enable the Borderless Network and roll out Private Cloud services.In the context of cloud, applications are known as workloads.The data center or campus core hosts the workloads and users at the branch/remote office consume the private cloud services. The key to an effective experience is what happens between the campus core and the remote branch, specifically across the WANHere, technologies such as WAAS play a critical role in optimizing bandwidth and workloadsThree key Borderless Network Services come into play to optimize cloud workloads:MedianetApplication VelocityTrustSecWhat IT gets is maximization of investment, embedded routing optimization, and application performance/bandwidth efficiencyData, devices, workloads become secure and users get device, application choice, while IT maintains controlApplications are optimized: rich media applications prioritized by network, applications routed to best public, private cloud resource, IT gets visibility and predictability
As you Consolidate, Virtualize, Automate, Borderless Networks services extend into the data centerIntersecting with Unified Network Services, Borderless Networks can deliver optimized workloads with security, application performance, and network analysisMany of the key Borderless Networks technologies can be deployed in a Data Center including Security, Application Performance, Multimedia, and Network Analysis/ManagementFlexibilityAgility and on-demand delivery of virtual servicesApplication performanceWorkload Portability and MobilityOptimized experienceDevice, application choice with IT controlCloud OptimizationSecure multi-tenant cloud experienceRich media applications prioritized by networkVisibility and predictabilityWhat the embedded Network Services do is balance Cloud Workloads and optimize business applications including WebEx, email, and HR applications.
Let’s see what happens when a mobile user traverses between the private cloud and the public cloud:A user connects to a video session on his iPad using WiFi in the branch office. Embedded Network Services optimize the Mobile ExperienceLater the user leaves the branch and connects using 3G from a coffee house.Cisco AnyConnect enables a secure always on connection back to the private cloud for access to internal applications like email.However for other applications like WebEx or Salesforce.com, the workload is delivered from the public cloud.ScanSafe integration with AnyWhere+ provides security enforcement and protection closest to the user (over the private cloud) so data does not have to be backhauled to the branch or campus core and then routed to the internet.The result:Maximize IT InvestmentRouter embedded services increase performance and availabilityVirtualized services provide scale, rapid ROISecure Data, Devices, WorkloadsSecurity enforcement points closest to userFederated security between cloudsDevice, application choice with IT controlOptimize ApplicationsRich media applications prioritized by networkApplications routed to best public, private cloud resourceVisibility and predictability