Your SlideShare is downloading. ×

Monetizing the Enterprise: Borderless Networks

588

Published on

Meeting the business and technical challenges of today's organizations requires an architectural approach. The Cisco Borderless Network Architecture is the technical architecture that allows …

Meeting the business and technical challenges of today's organizations requires an architectural approach. The Cisco Borderless Network Architecture is the technical architecture that allows organizations to connect anyone, anywhere, anytime, and on any device - securely, reliably, and seamlessly. It is built on an infrastructure of scalable and resilient hardware and software. Components of the architecture come together to build network systems that span your organization from network access to the cloud. Intelligent network, endpoint, and user services provide the flexibility, speed, and scale to support new devices, applications, and deployment models.

The impact of the consumerization of IT and mobility cannot be understated. The impact that these two key business elements have on the evolution of Enterprise Architecture and for Service Provider's ability to offer services to Enterprises, Governments, and Consumers will be addressed in this webinar. We will talk about the importance of the shift and movement of the secure network edge leads to a very close examination of the changing threat vectors and vulnerabilities impacting your businesses today. We will also detail service delivery and consumption on the three 'service horizons,' (Mobile Endpoint and CPE, Virtualized Network Edge/Data Center Edge, and the Cloud).

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
588
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
5
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Monetizing The Enterprise: Borderless NetworksMichael Geller – Architect, SP Chief Technology Office4 October, 2011© 2010 Cisco and/or its affiliates. All rights reserved. 1
  • 2. CONSUMERIZATION CLOUD & VIRTUALIZATION RICH COLLABORATIONBring Your Own Device Access to Anything, Anywhere Rich Video & Social Media Person To Wait For Page To Load Before Navigating Away 8 secs 5 secs 3 secs 2000 2005 2009 User Experience Networks Drive Drives Business User Experience Impact
  • 3. PUBLIC CLOUD THE NETWORKCustomers Service Provider PRIVATE CLOUD Uncontrolled Public & Diverse, Rich, Device + Private + Collaborative Proliferation Cloud Applications We are at an Inflection Point
  • 4. 1 Context & Application Aware 2 Security Built-In PUBLIC CLOUD THE NETWORK 3 Performance OptimizedBRANCH HEADEND 4 Services On-Demand 5 Simplified Management PRIVATE CLOUD
  • 5. Abstract• The impact of the consumerization of IT and mobility cannot be understated. The impact that these two key business elements have on the evolution of Enterprise Architecture and for Service Provider’s ability to offer services to Enterprises, Governments, and Consumers is addressed in this webinar. The importance of the shift and movement of the secure network edge leads to a very close examination of the changing threat vectors and vulnerabilities impacting our businesses today. Service delivery and consumption on the three “service horizons,” (Mobile Endpoint and CPE, Virtualized Network Edge/Data Center Edge, and the Cloud) is detailed.
  • 6. Visibility and Control Building a Secure Infrastructure for Profitable ServicesTotal Visibilityin all aspects ofyour network. Complete ControlGuaranteed Availability over all traffic inof all services. the network & cloud.
  • 7. Visibility & PostureEndpt / CPE ACCESS/AGGREGATION CORE DC/CLOUD Public, Private & Hybrid PE(s) Clouds L2 Agg. P P Mobility PE DSL Internet & Fixed P Peering Edge Wireless P Cable P P Enterprise Multi-Tenant Access and Access and aggregation: CPE: Full Service Branch Basic infrastructure Operations andData Center/Cloud Data/Service • Firewall Security • aggregation: Services • Session role security Border Controller Center • IDS • Firewall • Control Plane Security • Encryption (IPSEC IPSEC & SSL VPN • IDS/IPS Plane Security • Host Security & SSL) & Data •Security MonitoringIPSEC VPN Management VA PT Web Assessment & SSO MNAC • Firewall Telstra Cloud: • Trust & Identity Control Plane • BNG (Subscriber Controls) IDS/IPS • Nexus Center: Service 1kV (Netflow/VSG) • Email Security Security • SSL VPN IPSEC VPN • Remediation (quarantine) • UCS: Software based Security • Web/Content Forwarding Plane Securityand Identity • Trust Operations Center DHCP—subscriber • Services (FW, VPN,Services One Time …) Intrusion Detection/Prevention Security • Web/Content Security SSL VPN • Nexus 7k Security Services Mod • VM Security & Nexus 1000V • NAC Security Email • Email and Identity Trust Security • Anomaly • vWAAS detection/Scrubbing • WAN Optimization Web/Content Security Experts SOC Processes Plane Toolsets • DLP Web/Content Security • Policy Control SOC • Enterprise-Hosted Ironport Security • Email Security • Web/Content/Email Security/DLP Firewall & XML Firewall • NAC • Scansafe Web Security • Web/Content/Email Security SIO, Platform Telemetry, 3 rd party rules and systems, Regulatory Policy & Influence • Identity/Policy Service Control
  • 8. www.ciscoknowledgenetwork.com© © 2010 Cisco and/or its affiliates. All rights reserved. 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8

×