SlideShare a Scribd company logo
1 of 44
Download to read offline
#CNSF2011
© 2010 Cisco and/or its affiliates. All rights reserved.               1
7 Billion


Source: Forrester Research, Cisco IBSG
© 2010 Cisco and/or its affiliates. All rights reserved.               2
Total 500 Million                          Total 35 Billion   Total 50 Billion   Total 500 Billion~




               1/10th of a Device per                        5 Devices per      7 Devices per     70~ Devices per
                  Person on Earth                           Person on Earth    Person on Earth    Person on Earth
                              2007                            2010               2013                2020
© 2010 Cisco and/or its affiliates. All rights reserved.                                                              3
Source: Forrester Research, Cisco IBSG
Total Mobile Apps        iPhone Apps Alone   Apps Worldwide
                                                  2007          2010              2013
© 2010 Cisco and/or its affiliates. All rights reserved.                                        4
Global Consumer Internet Traffic                 486 Exabytes

                                                           Video Traffic




                                                                                     180 Exabytes          767 Exabytes
                                                                                                                91%
                                                                                                                           of all Consumer
                                                                                                                           Internet Traffic
                                                                                                                           will
                                            36 Exabytes                                                                    be Video in
                                                                                                                           2013


                                                                  2007                              2010                          2013
© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                      5
50%
                                    Mobility                        Business Agility     –Cisco ETAB
                                                                                                   Operational Simplicity




• Dynamic workloads                                         • New commercial models                • Variable operational
• Provider choice                                           • Rapid prototype, development,          cost structure
• Enhanced SLAs                                               change                               • Lower change costs
                                                                                                   • Service elasticity
 © 2010 Cisco and/or its affiliates. All rights reserved.                                                                   6
Borderless Experiences




                              ANYONE                                                    ANYTHING




                              ANYWHERE                                                  ANYTIME



© 2010 Cisco and/or its affiliates. All rights reserved.
                                                           Securely, Reliably, Seamlessly          7
Workloads Must Maintain Integrity, Security
                         Devices                                                 Applications




                                                               Secure
                                                               Reliable
                                                               Data Loss
                                                              Seamless
                                                              Device Theft
                                                           Web Vulnerabilities




                                                                                  Email
© 2010 Cisco and/or its affiliates. All rights reserved.                                        8
SCLs


© 2010 Cisco and/or its affiliates. All rights reserved.          9
Per device CLIs


© 2010 Cisco and/or its affiliates. All rights reserved.                     10
Architecture for Agile Delivery of the Borderless Experience




                                                         BORDERLESS END-
                                                         POINT/USER SERVICES
POLICY
                                                                                                             Securely, Reliably, Seamlessly: AnyConnect
MANAGEMENT
                                                         BORDERLESS NETWORK                               Energy                                   App              Multimedia
                                                                                  Mobility:                                 Security:
CISCO SMART                                              SERVICES                                       Management:                           Performance:         Optimization:
                                                                                  Motion                                    TrustSec
                                                                                                        EnergyWise                            App Velocity          Medianet
SERVICES
                                                         BORDERLESS
CISCO                                                    NETWORK                              Unified          Campus           Unified        Extended        Extended
LIFECYCLE                                                SYSTEMS                              Access            Core            Fabric           Edge           Cloud
SERVICES

                                                                                                                                                    Application
                                                    BORDERLESS                     Wireless                 Routing           Switching             Networking/             Security
                                                    INFRASTRUCTURE                                                                                  Optimization

  © 2010 Cisco and/or its affiliates. All rights reserved.                                                                                                                             11
UNIFIED        COMPREHENSIVE
                                    CENTRALIZED
                                                           MANAGEMENT &   SECURITY
                                    POLICY
                                                           DEPLOYMENT

© 2010 Cisco and/or its affiliates. All rights reserved.                                  12
CENTRALIZED
                                    POLICY


© 2010 Cisco and/or its affiliates. All rights reserved.   13
Business Goals and Objectives Executed Through Company Polices




                                                                              Example: Shared Corporate Policy
                                                           “Protect Intellectual Property While Providing Anytime, Anywhere Access.”

                                    Network Policy                             Application Policy         Security Policy         Compliance Policy

                                   “Control access to                       “Identify applications that   “Control access to       “Audit to ensure IP
                                      networks with                         access sensitive data and     users and prevent          protection and
                                    sensitive assets.”                           control access.”           data leakage”            compliance to
                                                                                                                                      regulations”

© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                                 14
Policy Rules                           Troubleshooting
                                                           Authentication          Profiling    Posture               Monitoring




                                                                            Network Enforcement



            Endpoints



                                                                            TrustSec Planning and Design Service
© 2010 Cisco and/or its affiliates. All rights reserved.                                                                             15
COFFEE SHOP
            HOSPITAL




© 2010 Cisco and/or its affiliates. All rights reserved.                 16
Policy Teams

                                                                         Business                  Security                   Compliance

                                                                        IT Systems Mgmt, Cisco Network Mgmt Policy & Rules




                                                                                                                                                                           Product
                                                                                                                                                                          Bookings
                                                                                Identity Services Engine (ISE)
                                                                                                   MPLS



     Corporate Laptop                                 Full                                                       Encrypt
                                                                                        Device, Location       Service,           Application,
                                                                          User, Role                                               Context                           Customer Data
                                                                                                               Context

                                                                                                                                                                       SalesForce.com
                                                                                   Centralized Policy Platform
                 iPad                            Restricted
                                                                                       ASR/ISR/ASA            Router/Switch                                 Applications in Data Center or Cloud




                                                    Third-Party                                                                  Central Dashboard, Reports,
                                                    Applications                                                                Measurements, Troubleshooting
                                                                                                  Centralized View
© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                                                                           17
Improve Security and                                        Permit or deny access to any
    Compliance                                              resource based on granular rules

                                                           Flexibility to support any device or
                    Employee
                                                           application dynamically with
                   Satisfaction
                                                           consistent policies

          Reduce Time                                      Single IT interface for policy
         to Deployment                                     creation and scaled enforcement


                                    CENTRALIZED
                                    POLICY


© 2010 Cisco and/or its affiliates. All rights reserved.                                          18
UNIFIED        COMPREHENSIVE
                                    CENTRALIZED
                                                           MANAGEMENT &   SECURITY
                                    POLICY
                                                           DEPLOYMENT

© 2010 Cisco and/or its affiliates. All rights reserved.                                  19
Cisco Prime for Enterprise




                                                                     Wireless LAN Planning and Design Service

•   NCS 1.0: Unified access management for wired and wireless networks
•   LMS 4.1: Enhanced Borderless Networks services management and Smart Interactions
•   NAM 5.1: Integrated application and performance visibility across the network
•   Collaboration Manager 1.0: Medianet monitoring and troubleshooting
    © 2010 Cisco and/or its affiliates. All rights reserved.                                                    20
I can’t get access to the financial data I need.
                                                           I guess both the wireless and wired networks must be down!



                                                                                Sorry Amy, as a contractor, you are
                                                                               not authorized to access financial data.




                      The tech searches on her name and immediately can see full diagnostics.
© 2010 Cisco and/or its affiliates. All rights reserved.                                                                  21
Quality of Experience
                                                              Auto              Visibility and              Rapid
                Planning                                                                              Problem Resolution       Optimization
                                                           Configuration         Monitoring




                                                                                      Any to Any
                                                                                   Video Adaptation




                                                           Automation and rapid problem resolution in the network to deliver
                                                                 application quality of experience, particularly video
© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                      22
Network
                                                                                                                                Management
                                                                      Endpoints / Users



                                                                                                                                    Cisco Prime:
                                                                         Medianet Services                                    Collaboration Manager 1.0
                                                                                                                            LAN Management Solution 4.1
                                                           Media Monitoring:              Auto Configuration:                Network Analysis Module 5.1
                                                            • Performance monitor          • Auto smart ports
                                                            • Mediatrace
                                                            • IPSLA VO                    Flow Metadata
                                                                        Media Services Interface
                                                                         Media Services Proxy




                                                                                                                            Cisco Developer Network Tools
                                                                      Network Elements

                                                                                    Medianet Readiness Assessment Service
© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                                    23
Hmmm… Mediatrace identifies the bottleneck to be
                                                                between New York and Toronto




                                            A remote expert joins a TelePresence session
                                  between the VP of sales and the customer ad-hoc via TelePresence
© 2010 Cisco and/or its affiliates. All rights reserved.                                                      24
Management for the                                 Expanded from box-level to
         modern workplace                                   user and endpoint management


            Faster time to                                   Single interface for solving wired and
          problem resolution                                 wireless connectivity and policy issues


Increasing IT efficiency and                                Intuitive, consistent user interface with
     reducing training                                      automated tools for problem resolution

                                                                             UNIFIED
                                                                             MANAGEMENT &
                                                                             DEPLOYMENT

 © 2010 Cisco and/or its affiliates. All rights reserved.                                               25
UNIFIED        COMPREHENSIVE
                                    CENTRALIZED
                                                           MANAGEMENT &   SECURITY
                                    POLICY
                                                           DEPLOYMENT

© 2010 Cisco and/or its affiliates. All rights reserved.                                  26
anti-spam   anti-bot   anti-virus




                                                            spam        bot        virus




© 2010 Cisco and/or its affiliates. All rights reserved.                                       27
© 2010 Cisco and/or its affiliates. All rights reserved.   28
Significant
                                                           Change



© 2010 Cisco and/or its affiliates. All rights reserved.                 29
© 2010 Cisco and/or its affiliates. All rights reserved.   30
© 2010 Cisco and/or its affiliates. All rights reserved.   31
Cisco SecureX Architecture




                                                                 The Network


                                                                 The Network




© 2010 Cisco and/or its affiliates. All rights reserved.                                32
Cisco SecureX Architecture

                                                                                                         Cisco SIO


                                                                                                      Context Aware Policy




                                                                                                                                                            Virtual and Cloud
                                                       AnyConnect




                                                                                                                                                 TrustSec
                                                                    TrustSec                     Context Aware Enforcement
                                                                                          Appliance          Module           Cloud




                                                                                                      The Network

                                                                                               Application Programming Interfaces
                                                                               Partners                    Management                 Services




© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                                                        33
Secure Branch


                                                                    IPSec VPN


Branch Office




                                                                                DMZ




© 2010 Cisco and/or its affiliates. All rights reserved.                              34
Do I have a consistent Access Policy Architecture across my network
 for all users and devices?

 Can mobile devices access my network securely, reliably and
 seamlessly?


 Can my network deliver real-time collaboration experiences?


 Can my network deliver protection from the premises to the Cloud?

 Can my network optimize performance of applications anytime,
 anywhere?

 Am I using my network to reduce my energy costs?

 Is my network ready for current and future
 regulatory requirements?

 Where am I now? Where do I start?
© 2010 Cisco and/or its affiliates. All rights reserved.               35
Lower Total Cost of Ownership


 Prescriptive Solutions


 Modular Design for the Future




http://www.cisco.com/en/US/partner/netsol/ns982/networking_solutions_program_home.html
http://www.cisco.com/web/CA/solutions/strategy/government/networking_solutions_sub_program_home_fr.html
 © 2010 Cisco and/or its affiliates. All rights reserved.                                                 36
Cloud and Mobility Driving            Cisco Delivers Policy, Management,
                                                                                                Cisco Borderless Networks Is Your
                        Enterprise Network                       Security to Simplify this
                                                                                                  Platform for Next Gen Netwrok
                          Transformation                             Transformation




© 2011 Cisco and/or its affiliates. All rights reserved.
© 2010 Cisco and/or its affiliates. All rights reserved.                                                                            37
#CNSF2011
© 2010 Cisco and/or its affiliates. All rights reserved.               38
#CNSF2011
© 2010 Cisco and/or its affiliates. All rights reserved.               39
Thank you.




             #CNSF2011
Embedded Network Services Optimize the Experience


                                                                                                Voice
                                                                                                                           Security
                                                                                                Video

                                                                                                        Campus Core

                                                                                                                        • Maximize IT Investment
                                                                                            Routing                         Application
                                                                                                                           Embedded routing optimization
                                                                                                                           Performance
                                                                                                                           Application performance
                                                                                                        Remote Office      Bandwidth efficiency

                                                                                                                        • Secure Data, Devices, Workloads
                                                     Voice
                                                                                                                           Device, application choice with IT control
                                                                             Security
                                                     Video


                                                             Private Cloud                                              • Optimize Applications
                                                                                                                           Rich media applications prioritized by network
                                                                              Application
                                              Routing
                                                                             Performance                                   Applications routed to best public, private cloud resource
                                                                                                                           Visibility and predictability




© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                                                                41
Embedded Network Services Balance Cloud Workloads

                                                             Optimal user experience
                                                             based on location

                                                                                                       • Maximize IT Investment
                                                                                                          DC services extended to Campus Core
                                                                                                          Virtualized services provide scale, rapid ROI

                                                                                                       • Secure Data, Devices, Workloads
                                                                                                          Device, application choice with IT control
                                                     Voice
                                                     Voice                            Security
                                                                                      Security
                                                     Video
                                                     Video

                                           Network               Data Center             Application
                                                                                                       • Optimize Applications
                                                                 Private Cloud
                                           Analysis             Unified Fabric          Performance       Rich-media, business applications prioritized by network
                                              Routing                                  Application        Applications routed to best public, private cloud resource
                                                                                      Performance
                             Email                                                                        Visibility and predictability

                                                              Business Applications




© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                                               42
Embedded Network Optimize the Mobile Experience


                                                                                                 Internet
                                                                                                                                         AnyConnect
                                                                                                                                         ScanSafe w/
                                                                                                                                         AnyWhere+


                                                                                            • Maximize IT Investment
                                                                                               Router embedded services increase performance and availability
                                                                                               Virtualized services provide scale, rapid ROI

                                                     Voice
                                                  Video
                                                                             Security       • Secure Data, Devices, Workloads
                                                Email                                          Security enforcement points closest to user
                                                             Private Cloud                     Federated security between clouds
                                                                                               Device, application choice with IT control
                                              Routing                         Application
                                                                             Performance
                                                                                            • Optimize Applications
                                                                                               Rich media applications prioritized by network
                                                                                               Applications routed to best public, private cloud resource
                                                                                               Visibility and predictability

© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                                        43
Routing, Application Performance, and Security Innovations Enable Cloud




                                                     Voice
                                                                                         Security
                                                     Video

                                                             Cisco Borderless Networks


                                      MedianetRouting                                     Application
                                                                                                               Application                       SecureX
                                                                                         Performance
                                                                                                               Velocity
       Video Scale, Prioritization                                                                      Performance Optimized WAN   Secure Cloud Infrastructure
       • Medianet                                                                                       • WAAS on ISR/SRE           Services and Access
       • ISR G2 Integrated Video                                                                        • vWAAS                     • ASA/ASA SM
         Conferencing                                                                                                               • AnyConnect
                                                                                                        • UCS Express
       • WebEx Node for ASR 1000
                                                                                                        • NAM                       • ScanSafe (ISR G2)
       • PfR, NBAR
 © 2010 Cisco and/or its affiliates. All rights reserved.                                                                           • IronPort, SIO               44

More Related Content

What's hot

Lucas Challamel NetBiscuits Preso
Lucas Challamel NetBiscuits PresoLucas Challamel NetBiscuits Preso
Lucas Challamel NetBiscuits PresoAnnNic
 
Mobile Monday Sydney - 06/06/2011
Mobile Monday Sydney - 06/06/2011Mobile Monday Sydney - 06/06/2011
Mobile Monday Sydney - 06/06/2011m2opublishing
 
Tpg Services Ppt Jvd
Tpg Services Ppt JvdTpg Services Ppt Jvd
Tpg Services Ppt JvdJeff vanDien
 
Soluciones de Seguridad para Banca & Finanzas
Soluciones de Seguridad para Banca & FinanzasSoluciones de Seguridad para Banca & Finanzas
Soluciones de Seguridad para Banca & FinanzasAEC Networks
 
Avaya Sip Within Your Enterprise
Avaya   Sip Within Your EnterpriseAvaya   Sip Within Your Enterprise
Avaya Sip Within Your Enterprisehypknight
 
Japan Case Study: Mobile 2.0 and the Next Generation of Mobile Applications
Japan Case Study: Mobile 2.0 and the Next Generation of Mobile ApplicationsJapan Case Study: Mobile 2.0 and the Next Generation of Mobile Applications
Japan Case Study: Mobile 2.0 and the Next Generation of Mobile ApplicationsInfinita Inc.
 
Монетизания: Достижение прибыльности мобильного Интернета нового поколения.
 Монетизания: Достижение прибыльности мобильного Интернета нового поколения. Монетизания: Достижение прибыльности мобильного Интернета нового поколения.
Монетизания: Достижение прибыльности мобильного Интернета нового поколения.Cisco Russia
 
Network automation seminar
Network automation seminarNetwork automation seminar
Network automation seminarpatmisasi
 
Who says Elephant Can't Dance?
Who says Elephant Can't Dance?Who says Elephant Can't Dance?
Who says Elephant Can't Dance?Anand Sharma
 
Andy huckridge
Andy huckridgeAndy huckridge
Andy huckridgeCarl Ford
 

What's hot (14)

Lucas Challamel NetBiscuits Preso
Lucas Challamel NetBiscuits PresoLucas Challamel NetBiscuits Preso
Lucas Challamel NetBiscuits Preso
 
Mobile Monday Sydney - 06/06/2011
Mobile Monday Sydney - 06/06/2011Mobile Monday Sydney - 06/06/2011
Mobile Monday Sydney - 06/06/2011
 
Tpg Services Ppt Jvd
Tpg Services Ppt JvdTpg Services Ppt Jvd
Tpg Services Ppt Jvd
 
Soluciones de Seguridad para Banca & Finanzas
Soluciones de Seguridad para Banca & FinanzasSoluciones de Seguridad para Banca & Finanzas
Soluciones de Seguridad para Banca & Finanzas
 
La experiencia de la Colaboración
La experiencia de la ColaboraciónLa experiencia de la Colaboración
La experiencia de la Colaboración
 
COLLABORATION
COLLABORATIONCOLLABORATION
COLLABORATION
 
Business Video
Business VideoBusiness Video
Business Video
 
Avaya Sip Within Your Enterprise
Avaya   Sip Within Your EnterpriseAvaya   Sip Within Your Enterprise
Avaya Sip Within Your Enterprise
 
Japan Case Study: Mobile 2.0 and the Next Generation of Mobile Applications
Japan Case Study: Mobile 2.0 and the Next Generation of Mobile ApplicationsJapan Case Study: Mobile 2.0 and the Next Generation of Mobile Applications
Japan Case Study: Mobile 2.0 and the Next Generation of Mobile Applications
 
Монетизания: Достижение прибыльности мобильного Интернета нового поколения.
 Монетизания: Достижение прибыльности мобильного Интернета нового поколения. Монетизания: Достижение прибыльности мобильного Интернета нового поколения.
Монетизания: Достижение прибыльности мобильного Интернета нового поколения.
 
Network automation seminar
Network automation seminarNetwork automation seminar
Network automation seminar
 
Who says Elephant Can't Dance?
Who says Elephant Can't Dance?Who says Elephant Can't Dance?
Who says Elephant Can't Dance?
 
Andy huckridge
Andy huckridgeAndy huckridge
Andy huckridge
 
102 1630 1700
102 1630 1700102 1630 1700
102 1630 1700
 

Similar to Enabling the Borderless Organization

Cloud Computing at Cisco
Cloud Computing at CiscoCloud Computing at Cisco
Cloud Computing at CiscoCisco Canada
 
Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Cloud Briefing and Experiences for Cloud Slam 2011Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Cloud Briefing and Experiences for Cloud Slam 2011Cisco Collaboration
 
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data CenterCloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data CenterCisco Service Provider
 
Daniel cornejo cisco. centros de datos unificados y su evolución hacia la nub...
Daniel cornejo cisco. centros de datos unificados y su evolución hacia la nub...Daniel cornejo cisco. centros de datos unificados y su evolución hacia la nub...
Daniel cornejo cisco. centros de datos unificados y su evolución hacia la nub...datacentersummit
 
Talk by sateesh_addepalli_at_nasa_cmu_workshop
Talk by sateesh_addepalli_at_nasa_cmu_workshopTalk by sateesh_addepalli_at_nasa_cmu_workshop
Talk by sateesh_addepalli_at_nasa_cmu_workshopsateeshadd
 
The New Collaboration Technologies Experience
The New Collaboration Technologies Experience The New Collaboration Technologies Experience
The New Collaboration Technologies Experience Cisco Canada
 
Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011bluechipper
 
Cisco Video Data Explosion
Cisco Video Data ExplosionCisco Video Data Explosion
Cisco Video Data Explosionmenkento
 
Setting the Foundation for Data Center Virtualization
Setting the Foundation for Data Center Virtualization Setting the Foundation for Data Center Virtualization
Setting the Foundation for Data Center Virtualization Cisco Canada
 
Cisco @ Canadian Construction Association 2012
Cisco @ Canadian Construction Association 2012Cisco @ Canadian Construction Association 2012
Cisco @ Canadian Construction Association 2012Rick Huijbregts
 
Smart+Connected Communities Canada
Smart+Connected Communities CanadaSmart+Connected Communities Canada
Smart+Connected Communities CanadaCisco Canada
 
OpenStack- The Time is Now - Lew Tucker, Cisco
OpenStack- The Time is Now - Lew Tucker, CiscoOpenStack- The Time is Now - Lew Tucker, Cisco
OpenStack- The Time is Now - Lew Tucker, Ciscoramdurairaj
 
OpenStack: Time is Now - Lew Tucker
OpenStack: Time is Now - Lew TuckerOpenStack: Time is Now - Lew Tucker
OpenStack: Time is Now - Lew TuckerLew Tucker
 
CISCO Flexible Work / Telework Presentation for RDASI
CISCO Flexible Work / Telework Presentation for RDASICISCO Flexible Work / Telework Presentation for RDASI
CISCO Flexible Work / Telework Presentation for RDASIRichard Everson
 
Cisco + Schneider: Building a Smart + Connected World, 20 February 2013
Cisco + Schneider: Building a Smart + Connected World, 20 February 2013Cisco + Schneider: Building a Smart + Connected World, 20 February 2013
Cisco + Schneider: Building a Smart + Connected World, 20 February 2013Rick Huijbregts
 
Cisco switching technical
Cisco switching technicalCisco switching technical
Cisco switching technicalImranD1
 
SIOS Private Cloud
SIOS Private CloudSIOS Private Cloud
SIOS Private CloudJim Kaskade
 

Similar to Enabling the Borderless Organization (20)

Cloud Computing at Cisco
Cloud Computing at CiscoCloud Computing at Cisco
Cloud Computing at Cisco
 
Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Cloud Briefing and Experiences for Cloud Slam 2011Cisco Cloud Briefing and Experiences for Cloud Slam 2011
Cisco Cloud Briefing and Experiences for Cloud Slam 2011
 
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data CenterCloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
Cloud Connect 2011 - Cisco and the Cloud: Within and Beyond the Data Center
 
Daniel cornejo cisco. centros de datos unificados y su evolución hacia la nub...
Daniel cornejo cisco. centros de datos unificados y su evolución hacia la nub...Daniel cornejo cisco. centros de datos unificados y su evolución hacia la nub...
Daniel cornejo cisco. centros de datos unificados y su evolución hacia la nub...
 
Talk by sateesh_addepalli_at_nasa_cmu_workshop
Talk by sateesh_addepalli_at_nasa_cmu_workshopTalk by sateesh_addepalli_at_nasa_cmu_workshop
Talk by sateesh_addepalli_at_nasa_cmu_workshop
 
Video the new voice
Video the new voiceVideo the new voice
Video the new voice
 
The New Collaboration Technologies Experience
The New Collaboration Technologies Experience The New Collaboration Technologies Experience
The New Collaboration Technologies Experience
 
Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011
 
Cisco VXI--Desktop Virtualization
Cisco VXI--Desktop VirtualizationCisco VXI--Desktop Virtualization
Cisco VXI--Desktop Virtualization
 
Cisco Video Data Explosion
Cisco Video Data ExplosionCisco Video Data Explosion
Cisco Video Data Explosion
 
Setting the Foundation for Data Center Virtualization
Setting the Foundation for Data Center Virtualization Setting the Foundation for Data Center Virtualization
Setting the Foundation for Data Center Virtualization
 
Cisco @ Canadian Construction Association 2012
Cisco @ Canadian Construction Association 2012Cisco @ Canadian Construction Association 2012
Cisco @ Canadian Construction Association 2012
 
Smart+Connected Communities Canada
Smart+Connected Communities CanadaSmart+Connected Communities Canada
Smart+Connected Communities Canada
 
OpenStack- The Time is Now - Lew Tucker, Cisco
OpenStack- The Time is Now - Lew Tucker, CiscoOpenStack- The Time is Now - Lew Tucker, Cisco
OpenStack- The Time is Now - Lew Tucker, Cisco
 
OpenStack: Time is Now - Lew Tucker
OpenStack: Time is Now - Lew TuckerOpenStack: Time is Now - Lew Tucker
OpenStack: Time is Now - Lew Tucker
 
CISCO Flexible Work / Telework Presentation for RDASI
CISCO Flexible Work / Telework Presentation for RDASICISCO Flexible Work / Telework Presentation for RDASI
CISCO Flexible Work / Telework Presentation for RDASI
 
Cisco + Schneider: Building a Smart + Connected World, 20 February 2013
Cisco + Schneider: Building a Smart + Connected World, 20 February 2013Cisco + Schneider: Building a Smart + Connected World, 20 February 2013
Cisco + Schneider: Building a Smart + Connected World, 20 February 2013
 
Cisco
CiscoCisco
Cisco
 
Cisco switching technical
Cisco switching technicalCisco switching technical
Cisco switching technical
 
SIOS Private Cloud
SIOS Private CloudSIOS Private Cloud
SIOS Private Cloud
 

More from Cisco Canada

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco Canada
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic frCisco Canada
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco Canada
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla nsCisco Canada
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco Canada
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Canada
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco Canada
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Cisco Canada
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v finalCisco Canada
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco Canada
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco Canada
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...Cisco Canada
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kineticCisco Canada
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet OverviewCisco Canada
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assuranceCisco Canada
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicingCisco Canada
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco merakiCisco Canada
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zeroCisco Canada
 

More from Cisco Canada (20)

Cisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devopsCisco connect montreal 2018 net devops
Cisco connect montreal 2018 net devops
 
Cisco connect montreal 2018 iot demo kinetic fr
Cisco connect montreal 2018   iot demo kinetic frCisco connect montreal 2018   iot demo kinetic fr
Cisco connect montreal 2018 iot demo kinetic fr
 
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal VirtualizationCisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
Cisco connect montreal 2018 - Network Slicing: Horizontal Virtualization
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018   enterprise networks - say goodbye to vla nsCisco connect montreal 2018   enterprise networks - say goodbye to vla ns
Cisco connect montreal 2018 enterprise networks - say goodbye to vla ns
 
Cisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse localeCisco connect montreal 2018 vision mondiale analyse locale
Cisco connect montreal 2018 vision mondiale analyse locale
 
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec CiscoCisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
Cisco Connect Montreal 2018 Securité : Sécuriser votre mobilité avec Cisco
 
Cisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybridesCisco connect montreal 2018 collaboration les services webex hybrides
Cisco connect montreal 2018 collaboration les services webex hybrides
 
Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018Integration cisco et microsoft connect montreal 2018
Integration cisco et microsoft connect montreal 2018
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2Cisco connect montreal 2018 saalvare md-program-xr-v2
Cisco connect montreal 2018 saalvare md-program-xr-v2
 
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
Cisco connect montreal 2018 sd wan - delivering intent-based networking to th...
 
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...Cisco Connect Toronto 2018   DNA automation-the evolution to intent-based net...
Cisco Connect Toronto 2018 DNA automation-the evolution to intent-based net...
 
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
Cisco Connect Toronto 2018   an introduction to Cisco kineticCisco Connect Toronto 2018   an introduction to Cisco kinetic
Cisco Connect Toronto 2018 an introduction to Cisco kinetic
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Cisco Connect Toronto 2018 DevNet Overview
Cisco Connect Toronto 2018  DevNet OverviewCisco Connect Toronto 2018  DevNet Overview
Cisco Connect Toronto 2018 DevNet Overview
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Cisco Connect Toronto 2018 network-slicing
Cisco Connect Toronto 2018   network-slicingCisco Connect Toronto 2018   network-slicing
Cisco Connect Toronto 2018 network-slicing
 
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
Cisco Connect Toronto 2018   the intelligent network with cisco merakiCisco Connect Toronto 2018   the intelligent network with cisco meraki
Cisco Connect Toronto 2018 the intelligent network with cisco meraki
 
Cisco Connect Toronto 2018 sixty to zero
Cisco Connect Toronto 2018   sixty to zeroCisco Connect Toronto 2018   sixty to zero
Cisco Connect Toronto 2018 sixty to zero
 

Recently uploaded

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Recently uploaded (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

Enabling the Borderless Organization

  • 1. #CNSF2011 © 2010 Cisco and/or its affiliates. All rights reserved. 1
  • 2. 7 Billion Source: Forrester Research, Cisco IBSG © 2010 Cisco and/or its affiliates. All rights reserved. 2
  • 3. Total 500 Million Total 35 Billion Total 50 Billion Total 500 Billion~ 1/10th of a Device per 5 Devices per 7 Devices per 70~ Devices per Person on Earth Person on Earth Person on Earth Person on Earth 2007 2010 2013 2020 © 2010 Cisco and/or its affiliates. All rights reserved. 3 Source: Forrester Research, Cisco IBSG
  • 4. Total Mobile Apps iPhone Apps Alone Apps Worldwide 2007 2010 2013 © 2010 Cisco and/or its affiliates. All rights reserved. 4
  • 5. Global Consumer Internet Traffic 486 Exabytes Video Traffic 180 Exabytes 767 Exabytes 91% of all Consumer Internet Traffic will 36 Exabytes be Video in 2013 2007 2010 2013 © 2010 Cisco and/or its affiliates. All rights reserved. 5
  • 6. 50% Mobility Business Agility –Cisco ETAB Operational Simplicity • Dynamic workloads • New commercial models • Variable operational • Provider choice • Rapid prototype, development, cost structure • Enhanced SLAs change • Lower change costs • Service elasticity © 2010 Cisco and/or its affiliates. All rights reserved. 6
  • 7. Borderless Experiences ANYONE ANYTHING ANYWHERE ANYTIME © 2010 Cisco and/or its affiliates. All rights reserved. Securely, Reliably, Seamlessly 7
  • 8. Workloads Must Maintain Integrity, Security Devices Applications Secure Reliable Data Loss Seamless Device Theft Web Vulnerabilities Email © 2010 Cisco and/or its affiliates. All rights reserved. 8
  • 9. SCLs © 2010 Cisco and/or its affiliates. All rights reserved. 9
  • 10. Per device CLIs © 2010 Cisco and/or its affiliates. All rights reserved. 10
  • 11. Architecture for Agile Delivery of the Borderless Experience BORDERLESS END- POINT/USER SERVICES POLICY Securely, Reliably, Seamlessly: AnyConnect MANAGEMENT BORDERLESS NETWORK Energy App Multimedia Mobility: Security: CISCO SMART SERVICES Management: Performance: Optimization: Motion TrustSec EnergyWise App Velocity Medianet SERVICES BORDERLESS CISCO NETWORK Unified Campus Unified Extended Extended LIFECYCLE SYSTEMS Access Core Fabric Edge Cloud SERVICES Application BORDERLESS Wireless Routing Switching Networking/ Security INFRASTRUCTURE Optimization © 2010 Cisco and/or its affiliates. All rights reserved. 11
  • 12. UNIFIED COMPREHENSIVE CENTRALIZED MANAGEMENT & SECURITY POLICY DEPLOYMENT © 2010 Cisco and/or its affiliates. All rights reserved. 12
  • 13. CENTRALIZED POLICY © 2010 Cisco and/or its affiliates. All rights reserved. 13
  • 14. Business Goals and Objectives Executed Through Company Polices Example: Shared Corporate Policy “Protect Intellectual Property While Providing Anytime, Anywhere Access.” Network Policy Application Policy Security Policy Compliance Policy “Control access to “Identify applications that “Control access to “Audit to ensure IP networks with access sensitive data and users and prevent protection and sensitive assets.” control access.” data leakage” compliance to regulations” © 2010 Cisco and/or its affiliates. All rights reserved. 14
  • 15. Policy Rules Troubleshooting Authentication Profiling Posture Monitoring Network Enforcement Endpoints TrustSec Planning and Design Service © 2010 Cisco and/or its affiliates. All rights reserved. 15
  • 16. COFFEE SHOP HOSPITAL © 2010 Cisco and/or its affiliates. All rights reserved. 16
  • 17. Policy Teams Business Security Compliance IT Systems Mgmt, Cisco Network Mgmt Policy & Rules Product Bookings Identity Services Engine (ISE) MPLS Corporate Laptop Full Encrypt Device, Location Service, Application, User, Role Context Customer Data Context SalesForce.com Centralized Policy Platform iPad Restricted ASR/ISR/ASA Router/Switch Applications in Data Center or Cloud Third-Party Central Dashboard, Reports, Applications Measurements, Troubleshooting Centralized View © 2010 Cisco and/or its affiliates. All rights reserved. 17
  • 18. Improve Security and Permit or deny access to any Compliance resource based on granular rules Flexibility to support any device or Employee application dynamically with Satisfaction consistent policies Reduce Time Single IT interface for policy to Deployment creation and scaled enforcement CENTRALIZED POLICY © 2010 Cisco and/or its affiliates. All rights reserved. 18
  • 19. UNIFIED COMPREHENSIVE CENTRALIZED MANAGEMENT & SECURITY POLICY DEPLOYMENT © 2010 Cisco and/or its affiliates. All rights reserved. 19
  • 20. Cisco Prime for Enterprise Wireless LAN Planning and Design Service • NCS 1.0: Unified access management for wired and wireless networks • LMS 4.1: Enhanced Borderless Networks services management and Smart Interactions • NAM 5.1: Integrated application and performance visibility across the network • Collaboration Manager 1.0: Medianet monitoring and troubleshooting © 2010 Cisco and/or its affiliates. All rights reserved. 20
  • 21. I can’t get access to the financial data I need. I guess both the wireless and wired networks must be down! Sorry Amy, as a contractor, you are not authorized to access financial data. The tech searches on her name and immediately can see full diagnostics. © 2010 Cisco and/or its affiliates. All rights reserved. 21
  • 22. Quality of Experience Auto Visibility and Rapid Planning Problem Resolution Optimization Configuration Monitoring Any to Any Video Adaptation Automation and rapid problem resolution in the network to deliver application quality of experience, particularly video © 2010 Cisco and/or its affiliates. All rights reserved. 22
  • 23. Network Management Endpoints / Users Cisco Prime: Medianet Services Collaboration Manager 1.0 LAN Management Solution 4.1 Media Monitoring: Auto Configuration: Network Analysis Module 5.1 • Performance monitor • Auto smart ports • Mediatrace • IPSLA VO Flow Metadata Media Services Interface Media Services Proxy Cisco Developer Network Tools Network Elements Medianet Readiness Assessment Service © 2010 Cisco and/or its affiliates. All rights reserved. 23
  • 24. Hmmm… Mediatrace identifies the bottleneck to be between New York and Toronto A remote expert joins a TelePresence session between the VP of sales and the customer ad-hoc via TelePresence © 2010 Cisco and/or its affiliates. All rights reserved. 24
  • 25. Management for the Expanded from box-level to modern workplace user and endpoint management Faster time to Single interface for solving wired and problem resolution wireless connectivity and policy issues Increasing IT efficiency and Intuitive, consistent user interface with reducing training automated tools for problem resolution UNIFIED MANAGEMENT & DEPLOYMENT © 2010 Cisco and/or its affiliates. All rights reserved. 25
  • 26. UNIFIED COMPREHENSIVE CENTRALIZED MANAGEMENT & SECURITY POLICY DEPLOYMENT © 2010 Cisco and/or its affiliates. All rights reserved. 26
  • 27. anti-spam anti-bot anti-virus spam bot virus © 2010 Cisco and/or its affiliates. All rights reserved. 27
  • 28. © 2010 Cisco and/or its affiliates. All rights reserved. 28
  • 29. Significant Change © 2010 Cisco and/or its affiliates. All rights reserved. 29
  • 30. © 2010 Cisco and/or its affiliates. All rights reserved. 30
  • 31. © 2010 Cisco and/or its affiliates. All rights reserved. 31
  • 32. Cisco SecureX Architecture The Network The Network © 2010 Cisco and/or its affiliates. All rights reserved. 32
  • 33. Cisco SecureX Architecture Cisco SIO Context Aware Policy Virtual and Cloud AnyConnect TrustSec TrustSec Context Aware Enforcement Appliance Module Cloud The Network Application Programming Interfaces Partners Management Services © 2010 Cisco and/or its affiliates. All rights reserved. 33
  • 34. Secure Branch IPSec VPN Branch Office DMZ © 2010 Cisco and/or its affiliates. All rights reserved. 34
  • 35. Do I have a consistent Access Policy Architecture across my network for all users and devices? Can mobile devices access my network securely, reliably and seamlessly? Can my network deliver real-time collaboration experiences? Can my network deliver protection from the premises to the Cloud? Can my network optimize performance of applications anytime, anywhere? Am I using my network to reduce my energy costs? Is my network ready for current and future regulatory requirements? Where am I now? Where do I start? © 2010 Cisco and/or its affiliates. All rights reserved. 35
  • 36. Lower Total Cost of Ownership Prescriptive Solutions Modular Design for the Future http://www.cisco.com/en/US/partner/netsol/ns982/networking_solutions_program_home.html http://www.cisco.com/web/CA/solutions/strategy/government/networking_solutions_sub_program_home_fr.html © 2010 Cisco and/or its affiliates. All rights reserved. 36
  • 37. Cloud and Mobility Driving Cisco Delivers Policy, Management, Cisco Borderless Networks Is Your Enterprise Network Security to Simplify this Platform for Next Gen Netwrok Transformation Transformation © 2011 Cisco and/or its affiliates. All rights reserved. © 2010 Cisco and/or its affiliates. All rights reserved. 37
  • 38. #CNSF2011 © 2010 Cisco and/or its affiliates. All rights reserved. 38
  • 39. #CNSF2011 © 2010 Cisco and/or its affiliates. All rights reserved. 39
  • 40. Thank you. #CNSF2011
  • 41. Embedded Network Services Optimize the Experience Voice Security Video Campus Core • Maximize IT Investment Routing Application Embedded routing optimization Performance Application performance Remote Office Bandwidth efficiency • Secure Data, Devices, Workloads Voice Device, application choice with IT control Security Video Private Cloud • Optimize Applications Rich media applications prioritized by network Application Routing Performance Applications routed to best public, private cloud resource Visibility and predictability © 2010 Cisco and/or its affiliates. All rights reserved. 41
  • 42. Embedded Network Services Balance Cloud Workloads Optimal user experience based on location • Maximize IT Investment DC services extended to Campus Core Virtualized services provide scale, rapid ROI • Secure Data, Devices, Workloads Device, application choice with IT control Voice Voice Security Security Video Video Network Data Center Application • Optimize Applications Private Cloud Analysis Unified Fabric Performance Rich-media, business applications prioritized by network Routing Application Applications routed to best public, private cloud resource Performance Email Visibility and predictability Business Applications © 2010 Cisco and/or its affiliates. All rights reserved. 42
  • 43. Embedded Network Optimize the Mobile Experience Internet AnyConnect ScanSafe w/ AnyWhere+ • Maximize IT Investment Router embedded services increase performance and availability Virtualized services provide scale, rapid ROI Voice Video Security • Secure Data, Devices, Workloads Email Security enforcement points closest to user Private Cloud Federated security between clouds Device, application choice with IT control Routing Application Performance • Optimize Applications Rich media applications prioritized by network Applications routed to best public, private cloud resource Visibility and predictability © 2010 Cisco and/or its affiliates. All rights reserved. 43
  • 44. Routing, Application Performance, and Security Innovations Enable Cloud Voice Security Video Cisco Borderless Networks MedianetRouting Application Application SecureX Performance Velocity Video Scale, Prioritization Performance Optimized WAN Secure Cloud Infrastructure • Medianet • WAAS on ISR/SRE Services and Access • ISR G2 Integrated Video • vWAAS • ASA/ASA SM Conferencing • AnyConnect • UCS Express • WebEx Node for ASR 1000 • NAM • ScanSafe (ISR G2) • PfR, NBAR © 2010 Cisco and/or its affiliates. All rights reserved. • IronPort, SIO 44

Editor's Notes

  1. Beyond these drivers for Cloud, we’re seeing two technology trends impact the growth for services:Device proliferation, user diversity are driving mobile requirements onto IT.7B reference for mobile devicesABI Research: Wi-Fi IC Market Data, release date of May 5th, 2010http://www.instat.com/catalog/wcatalogue.asp?id=167#IN0904005WSVideo projected to quadruple IP traffic by 2014 to 767 exabytes*. http://newsroom.cisco.com/dlls/2010/prod_060210.html
  2. Beyond these drivers for Cloud, we’re seeing two technology trends impact the growth for services:Device proliferation, user diversity are driving mobile requirements onto IT.7B reference for mobile devicesABI Research: Wi-Fi IC Market Data, release date of May 5th, 2010http://www.instat.com/catalog/wcatalogue.asp?id=167#IN0904005WSVideo projected to quadruple IP traffic by 2014 to 767 exabytes*. http://newsroom.cisco.com/dlls/2010/prod_060210.html
  3. According to a recent Cisco Enterprise customer poll, 50% of those surveyed are interested in deploying cloudCloud adoption is already over 25% in North America, and continues to grow in Europe – Forrester “Sourcing Groups Prepare For 2011 -- Cloud Is Key Initiative 11/10”There are many reasons for migration to Cloud. Here are just a few, centered on Mobility, Business Agility, and Operational SimplicityMobilityApplication portability – this means that cloud workloads are dynamic and adapt based on a user’s locationProvider flexibilityImproved SLAs due to clouds of scaleBusiness Agility (65% organizations cite business response as key driver – SandHill)Organizations can innovate and expand into new business modelsThe time to prototype and change new concepts is shortenedOperational SimplicityOrganizations dramatically reduce CapEx and shift to OpExChange costs are reducedElasticity comes with provider and workload scale
  4. Organizations that deliver the experience we just described, are truly borderless - Connecting anyone - employees, partners and customers, to anything, anywhere anytime. Delivering the same productivity, the same access to the information and the same responsiveness. We call it the borderless experience. …securely, reliably, and seamlesslyLet’s take a look [CLICK – Transition] at how Borderless Networks delivers on that vision.
  5. However as organizations move to the cloud, new vulnerabilities are introduced. When you think about all the varied devices and connection types accessing private and public cloud services, whether they might be WebEx or an Oracle HR application, they become prone to malware or Web vulnerabilities? There’s also the risk of data loss.Ultimately, IT is faced with “can the network secure these connections, users, and data in a manner that ensures reliability and seamlessness?”Gartner poses the question “Is Your Network the Weak Link in Cloud?”An architectural approach based on Cisco Borderless Networks can help.
  6. The diagram you see here outlines the main components of the borderless network architecture – it links applications, users, and end-point devices with operational processes and the network.It serves as both a framework for our system and architecture roadmap, as well as the deployment blueprint for Borderless Organizations. Let me briefly walk through its main elements. There are key pillars of functionality that Cisco Borderless Networks delivers on – primarily video, green, security, mobility, and application performance—on an end-to-end basis. For innovative organizations, these are key areas of investment and differentiation. The critical network services and proof-points of these pillars include Medianet, TrustSec and EnergyWise; they are delivered by the core infrastructure including routing, switching, mobility, security and WAN Optimization components. Equally important to the Borderless Network architecture is how the user experience is impacted by these network services—when mobile, when engaging with video, and in the workplace—however it’s defined. Network services integrate with endpoint technologies like AnyConnect, to deliver always-on, seamless, reliable, secure connectivity regardless of location or device.Meanwhile, Borderless Management and Policy are built into Network and User Services, offering a flexible and dynamic framework for policy definition and enforcement that spans across video, green, security, mobility, and application performance. The focus here is to connect the right user, the right device, the right application at the right place, at the right time, to the right network. It enables organizations to offer different levels of access privileges or performance characteristics to users, devices and applications.In this framework, policy definition and administration are centralized while control, visibility and enforcement are distributed via the application of dynamic policy assignments.Finally, we have the end-point devices that Cisco extends intelligence and awareness to, including cameras, video terminals, IP Phones, and mobile devices so that the experience is seamless and end to end. It is this blended approach of technologies and new capabilities that will enable new business models and allow your organization to go Borderless. Let’s take a look now at each of those critical network services I mentioned.services including mobile collaboration and secure mobility
  7. Making IT from reactive to proactive
  8. Making IT from reactive to proactive
  9. We need to get the top 3 quantifiable benefits from themSession Directory: Tracks active users and devicesIntegrated offering: Optimize where services runManaged Service Group Access: Keeps existing logical design (staff or guests – business level)Policy extensibility – link in policy information pointsSystem wide monitoring and troubleshooting – consolidate data; 3 click drill-inGranular rules with scalable distribution saving device level configurationSupport more users and devices in any flavor consistentlyProtect sensitive company data consistently and scalably
  10. Making IT from reactive to proactive
  11. Cisco is leading the industry with the introduction of Cisco Prime for Enterprise. Cisco Prime for Enterprise is a portfolio of products that deliver converged management for Borderless Networks, Data Center, and Collaboration. Cisco Prime for Enterprise offerings simplify and automate the management of network services and operations for the enterprise helping to decrease operational costs and increase IT efficiency. The first major proof point for Cisco Prime for Enterprise is the Network Control System 1.0 that offers the ability to evolve from wireless only management into user and endpoint management across wired and wireless. NCS also becomes the management solution for the Identity Services Engine. Additionally, the LMS 4.1 solution delivers complete management of network services including EnergyWise and Medianet as well as new Smart Services. Of course, both NCS and LMS handle the ongoing box (or element) level management for switching, routing and wireless. To provide network and application visibility to quickly isolate and troubleshoot application performance issues, we have enhanced our Cisco Prime Network Analysis Module (NAM) with software release 5.1. This release also includes a new 10 Gigabit blade for the Catalyst 6500 Series, availability on ISRG2 /SRE, integration with Performance Agent on ISRG2 and integrated reporting with WAAS Central Manager.Please remove the line below for external presentations. Should only be used as speaker notes for internal presos.Longer term, the NCS and LMS solutions converge into a single platform to provide a single framework for complete lifecycle management of the wired and wireless networks. (This is NDA information)
  12. In this scenario, we see Cisco Prime NCS at work. NCS takes a user centric approach to network management. Amy is trying to get access to some specific corporate financial data which she feels is necessary to do her job. Unfortunately she’s having connectivity issues and has tried accessing the information when connecting to the wired and wireless network. Feeling frustrated she contacts the help desk to try and troubleshoot the problem. The level 1 helpdesk assistant is able to search directly on Amy by entering her name. Using Cisco NCS the helpdesk assistant is able to see directly where the problem is. While Amy was able to connect to the network, get an IP address and authenticate into the network, she is being blocked from accessing the corporate data by the Identity Services Engine because she is a contractor. This example not only shows how NCS can deliver user-centric management, but also how it can integrate with ISE to provide policy details as well.
  13. What happens to the network and mission-critical applications as video becomes pervasive in organizations ?Video not only loads networks, it changes networks. A network that is automated for multimedia provides the best opportunity to optimize not only video applications, but also important business applications that are critical for your organization. New capabilities in automated multimedia enable Pre-planning to test the capabilities of the network for video, Autoconfiguration to enable plug and play functionality on the network, visibility and reporting to monitor the traffic patterns and fine tune the video quality of experience, optimization to reduce traffic and server load and optimize the use of the network to achieve successful end-to-end video streaming, and finally troubleshooting capabilities that can track video network problems even in the middle of the video session.This leads to more effective capacity planning, lower operational costs, and predictable application delivery from the network.
  14. Automated Multimedia provides a network with smarter endpoints, rich services and a smarter network which is managed by a variety of management tools.Cisco video endpoints are smarter due to Media Services Interface (MSI) client that builds network intelligence into Cisco endpoints so that the network can :* Identify the device and location *Auto configure the device *Tag applications with Metadata *Set priorities and policiesA subset of these capabilities is available through Media Services Proxy on behalf of legacy video endpoints. By extending the visibility all the way to the endpoints, better network optimization is possible end to end.With the rich media and collaboration services such as Metadata tagging and the any to any transformation of video by the Media eXperience Engine, video truly is available on any device, anywhere throughout the network and adds specific reporting and analytics capabilities. Metadata tagging performed by MSI-enabled endpoints ensure that proper policies are adhered to as the video traffic travels across the network.The network becomes smarter as well. With advanced, automated multimedia capabilities in the network over Catalyst switches and Cisco routers, the network becomes media aware. An IPSLA VO session can test whether the network is optimized for video in advance. Media Monitoring provides enhanced visibility and troubleshooting into the network without the need for probes. Cisco video endpoints can be automatically configured via auto smart ports on Catalyst switches and best practices and policies are automatically applied. Pre-planning with the Medianet Readiness assessment provides the blueprint to help customers of all types successfully deploy video at scale and efficiently evolve to meet future video and collaboration needs.To help ensure video quality in point-to-point and multipoint video sessions and deep network path visibility from Medianet capable devices, we are introducing Cisco Prime Collaboration Manager (CM) 1.0 - a new web-based user experience for managing and quickly troubleshooting end-to-end video collaboration over a Borderless Network.And we are extending these multimedia management capabilities to our wide ecosystem of developers across the globe with our Cisco Developer Network. CDN provides a set of APIs which enableorganizations to use Cisco technology to develop innovative digital signage and social video solutions for their customers.Now, how do all these capabilities benefit the business?
  15. These benefits are best described with an example, putting them to use. An IT manager, using Cisco Collaboration Manager, happens to notice a particular Telepresence session – because the device is MSI-enabled, he could gain the session specifics and learn that it is a VP-level conference and that there are issues. Using the Media monitoring capabilities Mediatrace, he is able to track, hop by hop to where the congestion problems are and improve the telepresence session while in process.
  16. The benefits of investing in Cisco Prime are numerous. However, the first clear benefit is that Cisco Prime – especially NCS, is designed to evolve network management to meet the changing dynamics of the modern workplace. Specifically, most enterprises have embraced mobility and are required to support numerous mobile devices and endpoints. As such, IT needs a management solution that not only handles box-level management, but more important can provide user centric troubleshooting and diagnostic capabilities. Also, Cisco Prime NCS delivers a user experience that seamlessly manages the connectivity and policy issues that may occur on the wired and wireless network. This single interface means faster resolution times to solve problems as they occur. Finally, Cisco Prime NCS and LMS make managing the wired and wireless networks easier. IT can troubleshoot and solve problems quickly by using each platform’s automated easy-to-use diagnostic tools
  17. Making IT from reactive to proactive
  18. It has been interesting to note the pace of change in security.Always a new threat, always a new set of responses. This process has continued for decades, action and reaction. Actions result in immediate reactions: threats materialize, we respond, and the attackers change their tactics in a never-ending cycle. Our world has become increasingly complex. A constant onslaught of threats demands our attention, but each new threat helps us develop better responses.  
  19. This may seem like common sense, but this regular cycle of action and reaction is beginning to be disrupted.The pervasiveness of technology is dramatically reshaping how we work and play.
  20. However, I feel that today we are poised for a period of significant change in the way we build and deploy security solutions. Not the 2 dimensional dance of problem meets solution, but a multi-dimensional problem that is causing us to tear up the old framework that we have used to develop security, and rethink the entire system. This change is not in response to a new class of threats, but rather it is in response to some massive shifts in the way we work, and the way we think about the workplace.
  21. Today, work is no longer a place you go, it’s something you do. Think about that for a second. People don’t want to be tied to a specific place, a specific device, or a specific schedule. They crave the freedom to work without borders or barriers. And so they are….  But this is creating some massive complexities for our IT infrastructure, and the way we keep that infrastructure secure.
  22. At Cisco, we saw this coming, so we enacted an any device policy: whatever you want, we’ll support it. Rebecca Jacoby, our CIO, regards these devices as fundamentally fashion items, so Cisco employees can choose and purchase whatever expresses their personal style and taste—iPads, iPhones, Androids, Blackberries, Windows Mobile phones, whatever. Cisco covers the service. This might seem like a huge burden on IT, but the results have been astounding: a 200% increase in user satisfaction, and a 25% decrease in cost. Turns out that freedom of choice is also good for business.
  23. At Cisco, we saw this coming, so we enacted an any device policy: whatever you want, we’ll support it. Rebecca Jacoby, our CIO, regards these devices as fundamentally fashion items, so Cisco employees can choose and purchase whatever expresses their personal style and taste – iPads, iPhones, Androids, Blackberries, Windows Mobile phones, whatever. Cisco covers the service. This might seem like a huge burden on IT, but the results have been astounding: a 200% increase in user satisfaction, and a 25% decrease in cost. Turns out that freedom of choice is also good for business.
  24. Here we have eight critical questions to consider. In a nutshell, can your existing network protect users, devices, and content across wired and wireless environments, on-premises to off premises with a media rich experience from an array of user devices?Perhaps the most important question here is #8—Where am I now and how do I start.Cisco and its partners have an answer.
  25. We’re also announcing SBA 2.0 with Borderless Access. This blueprint for mid-market customers with 100 to 1000 users provides a reference architecture with design and implementation guides based on fully tested solutions encompassing Borderless Networks, Collaboration, and Data Center.As a result, you’re able to purchase and deploy with confidence while realizing a lower TCO.Lower Total Cost of OwnershipNetwork performance is improvedwith a pretested architecturePrescriptive SolutionsPreselected Cisco solutions providethe right functions for customersModular Design for the FutureBuild a network platform ready to support future deployments of unified communications, switching, wireless, routing, video, and data center
  26. To summarize:Today’s market transitions—increasing video traffic, a wider range of access devices, and more and more mobile and remote workers are driving the need for a Borderless Organization. A Borderless Network Architecture is an imperative if an organization wants to ensure seamless, secure, reliable communications between employees, partners, and customers.Cisco is uniquely equipped to deliver the end-to-end architecture with its deep and broad technology heritage as well as technology and market leadership.Cisco’s new platforms, solutions, and services enable organizations to “Go Borderless”. Thank you. I’d like to open it up to questions.
  27. For those interested in copies of this year’s conference presentations, please visit our Event Landing Page at www.networkerssolutionsforum.com. Here you will find the presentations for download.Lastly, we are interested in your feedback. Please take the time to fill-out the Conference Evaluation Form. If you did not receive an Eval Form with today’s Conference Guide, please see one of our Registration Attendants. The Eval Forms will be used for the prize draws at the Cocktail Reception.
  28. Let’s look at what happens when you Cloud-enable the Borderless Network and roll out Private Cloud services.In the context of cloud, applications are known as workloads.The data center or campus core hosts the workloads and users at the branch/remote office consume the private cloud services. The key to an effective experience is what happens between the campus core and the remote branch, specifically across the WANHere, technologies such as WAAS play a critical role in optimizing bandwidth and workloadsThree key Borderless Network Services come into play to optimize cloud workloads:MedianetApplication VelocityTrustSecWhat IT gets is maximization of investment, embedded routing optimization, and application performance/bandwidth efficiencyData, devices, workloads become secure and users get device, application choice, while IT maintains controlApplications are optimized: rich media applications prioritized by network, applications routed to best public, private cloud resource, IT gets visibility and predictability
  29. As you Consolidate, Virtualize, Automate, Borderless Networks services extend into the data centerIntersecting with Unified Network Services, Borderless Networks can deliver optimized workloads with security, application performance, and network analysisMany of the key Borderless Networks technologies can be deployed in a Data Center including Security, Application Performance, Multimedia, and Network Analysis/ManagementFlexibilityAgility and on-demand delivery of virtual servicesApplication performanceWorkload Portability and MobilityOptimized experienceDevice, application choice with IT controlCloud OptimizationSecure multi-tenant cloud experienceRich media applications prioritized by networkVisibility and predictabilityWhat the embedded Network Services do is balance Cloud Workloads and optimize business applications including WebEx, email, and HR applications.
  30. Let’s see what happens when a mobile user traverses between the private cloud and the public cloud:A user connects to a video session on his iPad using WiFi in the branch office. Embedded Network Services optimize the Mobile ExperienceLater the user leaves the branch and connects using 3G from a coffee house.Cisco AnyConnect enables a secure always on connection back to the private cloud for access to internal applications like email.However for other applications like WebEx or Salesforce.com, the workload is delivered from the public cloud.ScanSafe integration with AnyWhere+ provides security enforcement and protection closest to the user (over the private cloud) so data does not have to be backhauled to the branch or campus core and then routed to the internet.The result:Maximize IT InvestmentRouter embedded services increase performance and availabilityVirtualized services provide scale, rapid ROISecure Data, Devices, WorkloadsSecurity enforcement points closest to userFederated security between cloudsDevice, application choice with IT controlOptimize ApplicationsRich media applications prioritized by networkApplications routed to best public, private cloud resourceVisibility and predictability