WHO: Identify users and provide differentiated access in a dynamic, borderless environmentWHAT: Enforcing compliance for proliferating consumer and network capable purpose-built devices WHERE:Traditional borders are blurred. Access is possible from anywhereHOW: Establish, monitor, and enforce consistent global access policies
The diagram you see here outlines the main components of the borderless network architecture – it links applications, users, and end-point devices with operational processes and the network.It serves as both a framework for our system and architecture roadmap, as well as the deployment blueprint for Borderless Organizations. Let me briefly walk through its main elements. There are key pillars of functionality that Cisco Borderless Networks delivers on – primarily video, green, security, mobility, and performance—on an end-to-end basis. For innovative organizations, these are key areas of investment and differentiation. The critical network services and proof-points of these pillars include Medianet, TrustSec and EnergyWise; they are delivered by the core infrastructure including routing, switching, mobility, security and WAN Optimization components. Equally important to the Borderless Network architecture is how the user experience is impacted by these network services—when mobile, when engaging with video, and in the workplace—however it’s defined. Network services integrate with endpoint technologies like AnyConnect, to deliver always-on, seamless, reliable, secure connectivity regardless of location or device.Meanwhile, Borderless Management and Policy are built into Network and User Services, offering a flexible and dynamic framework for policy definition and enforcement that spans across video, green, security, mobility, and performance. The focus here is to connect the right user, the right device, the right application at the right place, at the right time, to the right network. It enables organizations to offer different levels of access privileges or performance characteristics to users, devices and applications.In this framework, policy definition and administration are centralized while control, visibility and enforcement are distributed via the application of dynamic policy assignments.Finally, we have the end-point devices that Cisco extends intelligence and awareness to, including cameras, video terminals, IP Phones, and mobile devices so that the experience is seamless and end to end. It is this blended approach of technologies and new capabilities that will enable new business models and allow your organization to go Borderless. Let’s take a look now at each of those critical network services I mentioned.
Forward-Looking Statements<br />Many of the products and features described herein remain in varying stages of development and will be offered on a when-and-if-available basis. This roadmap is subject to change at the sole discretion of Cisco, and Cisco will have no liability for delay in the delivery or failure to deliver any of the products or features set forth in this document.<br /> <br />
What Exactly Is Your Network Policy?<br />Chief Information Officer<br />“We must be compliant with regulations, and be able to prove that we are compliant”<br />“Our business transactions need to be protected from malicious attack”<br />“I need to on board consumerized IT devices to reduce desktop computing costs”<br />“I need to support an organization that works globally”<br />The Network Policy is an Extension of Business Goals and Objectives<br />
Policy Evolving with Borderless Network<br />Borderless Networks<br />Anyone<br />The RIGHT Person<br />Any Device<br />An approved Device<br />Anywhere<br />In The Right Way<br />Anytime<br />
Cisco Borderless Network Architecture<br />Diverse Workforce<br />Always On Employees <br />Consumer IT Devices<br />Multi-Modal<br />Borderless End-Point/User Services<br />Infrastructure<br />WorkplaceExperience<br />Mobility<br />Video<br />Borderless Management and Policy<br />Switching<br />Secure, Reliable, Seamless, Collaborative <br />Cisco® Services for Borderless Network<br />Routing<br />Wireless<br />Mobility: Motion<br />Green:Cisco EnergyWise<br />Security:Cisco TrustSec Solutions<br />Application Performance<br />Video and Voice: Medianet<br />Security<br />WAAS<br />Cisco TrustSec® is what protects a borderless network<br />
Cisco TrustSec Solution<br />Cisco TrustSec® Securely Enables Your Business by Applying the Appropriate Policies Throughout the Network<br />I need to onboard consumerizedIT devices to enable new services while reducing our desktop computing costs”<br />Employees now get $1500 to buy Laptops and are responsible for updating but they can also get corporate issued smart phones to access corpdata anywhere any time”<br />“We need to monitor the real-time mapping of people to device for accountability and compliance”<br />
Cisco Trustsec: Identity Services Engine<br />ISE: Policies for people and devices<br />Guest Access<br />Non-User Devices<br />Authorized Access<br /><ul><li>Can I allow guests Internet-only access?
Are they being spoofed?</li></li></ul><li>A Practical Example of Policies<br />“Employees should be able to access everything but have limited access on personal devices”<br />Internet<br />“Everyone’s traffic should be encrypted”<br />Internal Resources<br />Campus Network<br />“Printers should only ever communicate internally”<br />Cisco Switch<br />Cisco® Identity Services Engine<br />Cisco Access<br />Point<br />Cisco Wireless<br />LAN Controller<br />Cisco Switch<br />