Enabling the Borderless Organization

2,751 views

Published on

This presentation looks at the new Borderless Networks solutions that deliver the capabilities you need to transform your business into one that is borderless and future-ready.

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,751
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
68
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • Beyond these drivers for Cloud, we’re seeing two technology trends impact the growth for services:Device proliferation, user diversity are driving mobile requirements onto IT.7B reference for mobile devicesABI Research: Wi-Fi IC Market Data, release date of May 5th, 2010http://www.instat.com/catalog/wcatalogue.asp?id=167#IN0904005WSVideo projected to quadruple IP traffic by 2014 to 767 exabytes*. http://newsroom.cisco.com/dlls/2010/prod_060210.html
  • Beyond these drivers for Cloud, we’re seeing two technology trends impact the growth for services:Device proliferation, user diversity are driving mobile requirements onto IT.7B reference for mobile devicesABI Research: Wi-Fi IC Market Data, release date of May 5th, 2010http://www.instat.com/catalog/wcatalogue.asp?id=167#IN0904005WSVideo projected to quadruple IP traffic by 2014 to 767 exabytes*. http://newsroom.cisco.com/dlls/2010/prod_060210.html
  • According to a recent Cisco Enterprise customer poll, 50% of those surveyed are interested in deploying cloudCloud adoption is already over 25% in North America, and continues to grow in Europe – Forrester “Sourcing Groups Prepare For 2011 -- Cloud Is Key Initiative 11/10”There are many reasons for migration to Cloud. Here are just a few, centered on Mobility, Business Agility, and Operational SimplicityMobilityApplication portability – this means that cloud workloads are dynamic and adapt based on a user’s locationProvider flexibilityImproved SLAs due to clouds of scaleBusiness Agility (65% organizations cite business response as key driver – SandHill)Organizations can innovate and expand into new business modelsThe time to prototype and change new concepts is shortenedOperational SimplicityOrganizations dramatically reduce CapEx and shift to OpExChange costs are reducedElasticity comes with provider and workload scale
  • Organizations that deliver the experience we just described, are truly borderless - Connecting anyone - employees, partners and customers, to anything, anywhere anytime. Delivering the same productivity, the same access to the information and the same responsiveness. We call it the borderless experience. …securely, reliably, and seamlesslyLet’s take a look [CLICK – Transition] at how Borderless Networks delivers on that vision.
  • However as organizations move to the cloud, new vulnerabilities are introduced. When you think about all the varied devices and connection types accessing private and public cloud services, whether they might be WebEx or an Oracle HR application, they become prone to malware or Web vulnerabilities? There’s also the risk of data loss.Ultimately, IT is faced with “can the network secure these connections, users, and data in a manner that ensures reliability and seamlessness?”Gartner poses the question “Is Your Network the Weak Link in Cloud?”An architectural approach based on Cisco Borderless Networks can help.
  • The diagram you see here outlines the main components of the borderless network architecture – it links applications, users, and end-point devices with operational processes and the network.It serves as both a framework for our system and architecture roadmap, as well as the deployment blueprint for Borderless Organizations. Let me briefly walk through its main elements. There are key pillars of functionality that Cisco Borderless Networks delivers on – primarily video, green, security, mobility, and application performance—on an end-to-end basis. For innovative organizations, these are key areas of investment and differentiation. The critical network services and proof-points of these pillars include Medianet, TrustSec and EnergyWise; they are delivered by the core infrastructure including routing, switching, mobility, security and WAN Optimization components. Equally important to the Borderless Network architecture is how the user experience is impacted by these network services—when mobile, when engaging with video, and in the workplace—however it’s defined. Network services integrate with endpoint technologies like AnyConnect, to deliver always-on, seamless, reliable, secure connectivity regardless of location or device.Meanwhile, Borderless Management and Policy are built into Network and User Services, offering a flexible and dynamic framework for policy definition and enforcement that spans across video, green, security, mobility, and application performance. The focus here is to connect the right user, the right device, the right application at the right place, at the right time, to the right network. It enables organizations to offer different levels of access privileges or performance characteristics to users, devices and applications.In this framework, policy definition and administration are centralized while control, visibility and enforcement are distributed via the application of dynamic policy assignments.Finally, we have the end-point devices that Cisco extends intelligence and awareness to, including cameras, video terminals, IP Phones, and mobile devices so that the experience is seamless and end to end. It is this blended approach of technologies and new capabilities that will enable new business models and allow your organization to go Borderless. Let’s take a look now at each of those critical network services I mentioned.services including mobile collaboration and secure mobility
  • Making IT from reactive to proactive
  • Making IT from reactive to proactive
  • We need to get the top 3 quantifiable benefits from themSession Directory: Tracks active users and devicesIntegrated offering: Optimize where services runManaged Service Group Access: Keeps existing logical design (staff or guests – business level)Policy extensibility – link in policy information pointsSystem wide monitoring and troubleshooting – consolidate data; 3 click drill-inGranular rules with scalable distribution saving device level configurationSupport more users and devices in any flavor consistentlyProtect sensitive company data consistently and scalably
  • Making IT from reactive to proactive
  • Cisco is leading the industry with the introduction of Cisco Prime for Enterprise. Cisco Prime for Enterprise is a portfolio of products that deliver converged management for Borderless Networks, Data Center, and Collaboration. Cisco Prime for Enterprise offerings simplify and automate the management of network services and operations for the enterprise helping to decrease operational costs and increase IT efficiency. The first major proof point for Cisco Prime for Enterprise is the Network Control System 1.0 that offers the ability to evolve from wireless only management into user and endpoint management across wired and wireless. NCS also becomes the management solution for the Identity Services Engine. Additionally, the LMS 4.1 solution delivers complete management of network services including EnergyWise and Medianet as well as new Smart Services. Of course, both NCS and LMS handle the ongoing box (or element) level management for switching, routing and wireless. To provide network and application visibility to quickly isolate and troubleshoot application performance issues, we have enhanced our Cisco Prime Network Analysis Module (NAM) with software release 5.1. This release also includes a new 10 Gigabit blade for the Catalyst 6500 Series, availability on ISRG2 /SRE, integration with Performance Agent on ISRG2 and integrated reporting with WAAS Central Manager.Please remove the line below for external presentations. Should only be used as speaker notes for internal presos.Longer term, the NCS and LMS solutions converge into a single platform to provide a single framework for complete lifecycle management of the wired and wireless networks. (This is NDA information)
  • In this scenario, we see Cisco Prime NCS at work. NCS takes a user centric approach to network management. Amy is trying to get access to some specific corporate financial data which she feels is necessary to do her job. Unfortunately she’s having connectivity issues and has tried accessing the information when connecting to the wired and wireless network. Feeling frustrated she contacts the help desk to try and troubleshoot the problem. The level 1 helpdesk assistant is able to search directly on Amy by entering her name. Using Cisco NCS the helpdesk assistant is able to see directly where the problem is. While Amy was able to connect to the network, get an IP address and authenticate into the network, she is being blocked from accessing the corporate data by the Identity Services Engine because she is a contractor. This example not only shows how NCS can deliver user-centric management, but also how it can integrate with ISE to provide policy details as well.
  • What happens to the network and mission-critical applications as video becomes pervasive in organizations ?Video not only loads networks, it changes networks. A network that is automated for multimedia provides the best opportunity to optimize not only video applications, but also important business applications that are critical for your organization. New capabilities in automated multimedia enable Pre-planning to test the capabilities of the network for video, Autoconfiguration to enable plug and play functionality on the network, visibility and reporting to monitor the traffic patterns and fine tune the video quality of experience, optimization to reduce traffic and server load and optimize the use of the network to achieve successful end-to-end video streaming, and finally troubleshooting capabilities that can track video network problems even in the middle of the video session.This leads to more effective capacity planning, lower operational costs, and predictable application delivery from the network.
  • Automated Multimedia provides a network with smarter endpoints, rich services and a smarter network which is managed by a variety of management tools.Cisco video endpoints are smarter due to Media Services Interface (MSI) client that builds network intelligence into Cisco endpoints so that the network can :* Identify the device and location *Auto configure the device *Tag applications with Metadata *Set priorities and policiesA subset of these capabilities is available through Media Services Proxy on behalf of legacy video endpoints. By extending the visibility all the way to the endpoints, better network optimization is possible end to end.With the rich media and collaboration services such as Metadata tagging and the any to any transformation of video by the Media eXperience Engine, video truly is available on any device, anywhere throughout the network and adds specific reporting and analytics capabilities. Metadata tagging performed by MSI-enabled endpoints ensure that proper policies are adhered to as the video traffic travels across the network.The network becomes smarter as well. With advanced, automated multimedia capabilities in the network over Catalyst switches and Cisco routers, the network becomes media aware. An IPSLA VO session can test whether the network is optimized for video in advance. Media Monitoring provides enhanced visibility and troubleshooting into the network without the need for probes. Cisco video endpoints can be automatically configured via auto smart ports on Catalyst switches and best practices and policies are automatically applied. Pre-planning with the Medianet Readiness assessment provides the blueprint to help customers of all types successfully deploy video at scale and efficiently evolve to meet future video and collaboration needs.To help ensure video quality in point-to-point and multipoint video sessions and deep network path visibility from Medianet capable devices, we are introducing Cisco Prime Collaboration Manager (CM) 1.0 - a new web-based user experience for managing and quickly troubleshooting end-to-end video collaboration over a Borderless Network.And we are extending these multimedia management capabilities to our wide ecosystem of developers across the globe with our Cisco Developer Network. CDN provides a set of APIs which enableorganizations to use Cisco technology to develop innovative digital signage and social video solutions for their customers.Now, how do all these capabilities benefit the business?
  • These benefits are best described with an example, putting them to use. An IT manager, using Cisco Collaboration Manager, happens to notice a particular Telepresence session – because the device is MSI-enabled, he could gain the session specifics and learn that it is a VP-level conference and that there are issues. Using the Media monitoring capabilities Mediatrace, he is able to track, hop by hop to where the congestion problems are and improve the telepresence session while in process.
  • The benefits of investing in Cisco Prime are numerous. However, the first clear benefit is that Cisco Prime – especially NCS, is designed to evolve network management to meet the changing dynamics of the modern workplace. Specifically, most enterprises have embraced mobility and are required to support numerous mobile devices and endpoints. As such, IT needs a management solution that not only handles box-level management, but more important can provide user centric troubleshooting and diagnostic capabilities. Also, Cisco Prime NCS delivers a user experience that seamlessly manages the connectivity and policy issues that may occur on the wired and wireless network. This single interface means faster resolution times to solve problems as they occur. Finally, Cisco Prime NCS and LMS make managing the wired and wireless networks easier. IT can troubleshoot and solve problems quickly by using each platform’s automated easy-to-use diagnostic tools
  • Making IT from reactive to proactive
  • It has been interesting to note the pace of change in security.Always a new threat, always a new set of responses. This process has continued for decades, action and reaction. Actions result in immediate reactions: threats materialize, we respond, and the attackers change their tactics in a never-ending cycle. Our world has become increasingly complex. A constant onslaught of threats demands our attention, but each new threat helps us develop better responses.  
  • This may seem like common sense, but this regular cycle of action and reaction is beginning to be disrupted.The pervasiveness of technology is dramatically reshaping how we work and play.
  • However, I feel that today we are poised for a period of significant change in the way we build and deploy security solutions. Not the 2 dimensional dance of problem meets solution, but a multi-dimensional problem that is causing us to tear up the old framework that we have used to develop security, and rethink the entire system. This change is not in response to a new class of threats, but rather it is in response to some massive shifts in the way we work, and the way we think about the workplace.
  • Today, work is no longer a place you go, it’s something you do. Think about that for a second. People don’t want to be tied to a specific place, a specific device, or a specific schedule. They crave the freedom to work without borders or barriers. And so they are….  But this is creating some massive complexities for our IT infrastructure, and the way we keep that infrastructure secure.
  • At Cisco, we saw this coming, so we enacted an any device policy: whatever you want, we’ll support it. Rebecca Jacoby, our CIO, regards these devices as fundamentally fashion items, so Cisco employees can choose and purchase whatever expresses their personal style and taste—iPads, iPhones, Androids, Blackberries, Windows Mobile phones, whatever. Cisco covers the service. This might seem like a huge burden on IT, but the results have been astounding: a 200% increase in user satisfaction, and a 25% decrease in cost. Turns out that freedom of choice is also good for business.
  • At Cisco, we saw this coming, so we enacted an any device policy: whatever you want, we’ll support it. Rebecca Jacoby, our CIO, regards these devices as fundamentally fashion items, so Cisco employees can choose and purchase whatever expresses their personal style and taste – iPads, iPhones, Androids, Blackberries, Windows Mobile phones, whatever. Cisco covers the service. This might seem like a huge burden on IT, but the results have been astounding: a 200% increase in user satisfaction, and a 25% decrease in cost. Turns out that freedom of choice is also good for business.
  • Here we have eight critical questions to consider. In a nutshell, can your existing network protect users, devices, and content across wired and wireless environments, on-premises to off premises with a media rich experience from an array of user devices?Perhaps the most important question here is #8—Where am I now and how do I start.Cisco and its partners have an answer.
  • We’re also announcing SBA 2.0 with Borderless Access. This blueprint for mid-market customers with 100 to 1000 users provides a reference architecture with design and implementation guides based on fully tested solutions encompassing Borderless Networks, Collaboration, and Data Center.As a result, you’re able to purchase and deploy with confidence while realizing a lower TCO.Lower Total Cost of OwnershipNetwork performance is improvedwith a pretested architecturePrescriptive SolutionsPreselected Cisco solutions providethe right functions for customersModular Design for the FutureBuild a network platform ready to support future deployments of unified communications, switching, wireless, routing, video, and data center
  • To summarize:Today’s market transitions—increasing video traffic, a wider range of access devices, and more and more mobile and remote workers are driving the need for a Borderless Organization. A Borderless Network Architecture is an imperative if an organization wants to ensure seamless, secure, reliable communications between employees, partners, and customers.Cisco is uniquely equipped to deliver the end-to-end architecture with its deep and broad technology heritage as well as technology and market leadership.Cisco’s new platforms, solutions, and services enable organizations to “Go Borderless”. Thank you. I’d like to open it up to questions.
  • For those interested in copies of this year’s conference presentations, please visit our Event Landing Page at www.networkerssolutionsforum.com. Here you will find the presentations for download.Lastly, we are interested in your feedback. Please take the time to fill-out the Conference Evaluation Form. If you did not receive an Eval Form with today’s Conference Guide, please see one of our Registration Attendants. The Eval Forms will be used for the prize draws at the Cocktail Reception.
  • Let’s look at what happens when you Cloud-enable the Borderless Network and roll out Private Cloud services.In the context of cloud, applications are known as workloads.The data center or campus core hosts the workloads and users at the branch/remote office consume the private cloud services. The key to an effective experience is what happens between the campus core and the remote branch, specifically across the WANHere, technologies such as WAAS play a critical role in optimizing bandwidth and workloadsThree key Borderless Network Services come into play to optimize cloud workloads:MedianetApplication VelocityTrustSecWhat IT gets is maximization of investment, embedded routing optimization, and application performance/bandwidth efficiencyData, devices, workloads become secure and users get device, application choice, while IT maintains controlApplications are optimized: rich media applications prioritized by network, applications routed to best public, private cloud resource, IT gets visibility and predictability
  • As you Consolidate, Virtualize, Automate, Borderless Networks services extend into the data centerIntersecting with Unified Network Services, Borderless Networks can deliver optimized workloads with security, application performance, and network analysisMany of the key Borderless Networks technologies can be deployed in a Data Center including Security, Application Performance, Multimedia, and Network Analysis/ManagementFlexibilityAgility and on-demand delivery of virtual servicesApplication performanceWorkload Portability and MobilityOptimized experienceDevice, application choice with IT controlCloud OptimizationSecure multi-tenant cloud experienceRich media applications prioritized by networkVisibility and predictabilityWhat the embedded Network Services do is balance Cloud Workloads and optimize business applications including WebEx, email, and HR applications.
  • Let’s see what happens when a mobile user traverses between the private cloud and the public cloud:A user connects to a video session on his iPad using WiFi in the branch office. Embedded Network Services optimize the Mobile ExperienceLater the user leaves the branch and connects using 3G from a coffee house.Cisco AnyConnect enables a secure always on connection back to the private cloud for access to internal applications like email.However for other applications like WebEx or Salesforce.com, the workload is delivered from the public cloud.ScanSafe integration with AnyWhere+ provides security enforcement and protection closest to the user (over the private cloud) so data does not have to be backhauled to the branch or campus core and then routed to the internet.The result:Maximize IT InvestmentRouter embedded services increase performance and availabilityVirtualized services provide scale, rapid ROISecure Data, Devices, WorkloadsSecurity enforcement points closest to userFederated security between cloudsDevice, application choice with IT controlOptimize ApplicationsRich media applications prioritized by networkApplications routed to best public, private cloud resourceVisibility and predictability
  • Enabling the Borderless Organization

    1. 1. Borderless Networks. Enabling the Borderless Organization.<br />Maciej Kranz<br />Vice President, Borderless Networks<br />#CNSF2011<br />
    2. 2. Proliferation of Wireless Devices – Consumerization<br />7 BillionNew Wireless Devices by 2015<br />MARCEL: Hello Team<br />Source: Forrester Research, Cisco IBSG<br />
    3. 3. Growth of Connected Devices<br />Total 500 Million<br />Total 35 Billion<br />Total 50 Billion<br />Total 500 Billion~<br />1/10thof a Device per<br />Person on Earth<br />5Devices per<br />Person on Earth<br />7Devices per<br />Person on Earth<br />70~Devices per<br />Person on Earth<br />2007<br />2010<br />2013<br />2020<br />Source: Forrester Research, Cisco IBSG<br />
    4. 4. World of Applications<br />3,000<br />160,000<br />1,500,000<br />Total Mobile Apps<br />iPhone Apps Alone<br />Apps Worldwide<br />2007<br />2010<br />2013<br />
    5. 5. Growth of Video<br />486 Exabytes<br />Global Consumer Internet Traffic<br />Global Consumer Internet Traffic<br />486 Exabytes<br />Video Traffic<br />Video Traffic<br />MARCEL: Hello Team<br />91%<br />of all Consumer Internet Traffic will be Video in 2013<br />91%<br />of all Consumer Internet Traffic will be Video in 2013<br />767 ExabytesVideo projected toquadruple IP traffic by 2014<br />180 Exabytes<br />180 Exabytes<br />36 Exabytes<br />36 Exabytes<br />2007<br />2010<br />2013<br />2007<br />2010<br />2013<br />
    6. 6. Adoption of Public, Private, Hybrid Clouds<br />“Cloud adoption is already overin North America”<br />–Forrester Research<br />50%<br />25%<br />“More than of customers moving to private clouds” <br />–Cisco ETAB<br />Mobility<br />Business Agility<br />Operational Simplicity<br /><ul><li>New commercial models
    7. 7. Rapid prototype, development, change
    8. 8. Variable operationalcost structure
    9. 9. Lower change costs
    10. 10. Service elasticity
    11. 11. Dynamic workloads
    12. 12. Provider choice
    13. 13. Enhanced SLAs</li></li></ul><li>The New Borderless OrganizationBorderless Experiences<br />ANYONE<br />ANYTHING<br />ANYWHERE<br />ANYTIME<br />Securely, Reliably, Seamlessly<br />
    14. 14. Borderless Organization Introduces Opportunities, But ComplexitiesWorkloads Must Maintain Integrity, Security<br />Devices<br />Applications<br />Secure<br />Reliable<br />Data LossDevice Theft<br />Web Vulnerabilities<br />Seamless<br />Email<br />
    15. 15. Traditional Way<br />SCLs<br />
    16. 16. Traditional Way<br />Per device CLIs<br />
    17. 17. Borderless Network Architecture<br />Architecture for Agile Delivery of the Borderless Experience<br />BORDERLESS END-POINT/USER SERVICES<br />POLICY<br />Securely, Reliably, Seamlessly:AnyConnect<br />MANAGEMENT<br />App Performance: App Velocity<br />Energy Management: EnergyWise<br />Multimedia Optimization: Medianet<br />BORDERLESS NETWORK SERVICES<br />Mobility:Motion<br />Security:TrustSec<br />CISCO SMARTSERVICES<br />Unified<br />Access<br />CampusCore<br />Unified Fabric<br />Extended Cloud<br />ExtendedEdge<br />BORDERLESS NETWORK SYSTEMS<br />CISCO LIFECYCLE SERVICES<br />Application Networking/ Optimization<br />BORDERLESSINFRASTRUCTURE<br />Switching<br />Security<br />Routing<br />Wireless<br />
    18. 18. Borderless Networks: Simplify<br />CENTRALIZEDPOLICY<br />UNIFIEDMANAGEMENT &<br />DEPLOYMENT<br />COMPREHENSIVE SECURITY<br />
    19. 19. CENTRALIZEDPOLICY<br />
    20. 20. Policy Impact on the Organization<br />Business Goals and Objectives Executed Through Company Polices<br />Example: Shared Corporate Policy<br />“Protect Intellectual Property While Providing Anytime, Anywhere Access.”<br />Compliance Policy<br />Security Policy<br />Network Policy<br />Application Policy<br />“Audit to ensure IP protection and compliance to regulations”<br />“Control access to users and prevent data leakage”<br />“Control access to networks with sensitive assets.”<br />“Identify applications that access sensitive data and control access.”<br />
    21. 21. Centralized Policy Engine - All Access to the Network<br />Policy Rules<br />Troubleshooting<br />Monitoring<br />Profiling<br />Authentication<br />Posture<br />Network Enforcement<br />Endpoints<br />TrustSec Planning and Design Service <br />
    22. 22. HOSPITAL<br />COFFEE SHOP<br />Centralized Policy in Action<br />
    23. 23. Policy Governed Networks in Action<br />Policy Teams<br />Policy Governed Networks<br />Security<br />Business<br />Compliance<br />IT Systems Mgmt, Cisco Network Mgmt Policy & Rules<br />Centralized Policy Platform<br />Customer Data<br />Context awareness <br />Business Relevance<br />Product Bookings<br />MPLS<br />Identity Services Engine (ISE)<br />Full<br />Encrypt<br />Corporate Laptop<br />Visibility and Control<br />Application, Context<br />Device, Location<br />Service, Context<br />User, Role<br />Centralized View<br />Restricted<br />SalesForce.com<br />ASR/ISR/ASA<br />Router/Switch<br />iPad<br />Applications in Data Center or Cloud<br />Third-Party Applications<br />Central Dashboard, Reports, Measurements, Troubleshooting<br />
    24. 24. Centralized Policy: Benefits<br />Improve Security and Compliance<br />Permit or deny access to any resource based on granular rules<br />Flexibility to support any device or application dynamically with consistent policies<br />Employee Satisfaction <br />Reduce Time to Deployment <br />Single IT interface for policy creation and scaled enforcement<br />CENTRALIZEDPOLICY<br />
    25. 25. Borderless Networks: Simplify<br />CENTRALIZEDPOLICY<br />UNIFIEDMANAGEMENT &<br />DEPLOYMENT<br />COMPREHENSIVE SECURITY<br />
    26. 26. Unified Management for Architectures, Services<br />Cisco Prime for Enterprise<br />Wireless LAN Planning and Design Service <br /><ul><li>NCS 1.0: Unified access management for wired and wireless networks
    27. 27. LMS 4.1: Enhanced Borderless Networks services management and Smart Interactions
    28. 28. NAM 5.1: Integrated application and performance visibility across the network
    29. 29. Collaboration Manager 1.0: Medianet monitoring and troubleshooting</li></li></ul><li>I can’t get access to the financial data I need. I guess both the wireless and wired networks must be down! <br />Sorry Amy, as a contractor, you are not authorized to access financial data.<br />The tech searches on her name and immediately can see full diagnostics. <br />
    30. 30. Automated Video and Voice<br />Quality of Experience<br />Rapid <br />Problem Resolution<br />Auto<br />Configuration<br />Visibility and Monitoring<br />Optimization<br />Planning<br />Automation and rapid problem resolution in the network to deliver application quality of experience, particularly video<br />Any to Any Video Adaptation<br />
    31. 31. Automated Video and Voice<br />Network Management<br />Endpoints / Users<br />Cisco Prime: <br />Collaboration Manager 1.0<br />LAN Management Solution 4.1<br />Network Analysis Module 5.1<br />Medianet Services<br />Media Monitoring:<br /><ul><li>Performance monitor
    32. 32. Mediatrace
    33. 33. IPSLA VO</li></ul>Auto Configuration:<br /><ul><li>Auto smart ports</li></ul>Flow Metadata<br />Media Services Interface<br />Media Services Proxy<br />Cisco Developer Network Tools<br />Network Elements<br />Medianet Readiness Assessment Service<br />
    34. 34. Medianet and Collaboration Manager<br />Hmmm… Mediatrace identifies the bottleneck to be between New York and Toronto<br />A remote expert joins a TelePresence sessionbetween the VP of sales and the customer ad-hoc via TelePresence<br />
    35. 35. Unified Management: Benefits<br />Expanded from box-level to user and endpoint management<br />Management for the modern workplace <br />Single interface for solving wired and wireless connectivity and policy issues<br />Faster time to problem resolution<br />Intuitive, consistent user interface with automated tools for problem resolution<br />Increasing IT efficiency and reducing training<br />UNIFIEDMANAGEMENT &<br />DEPLOYMENT<br />
    36. 36. Borderless Networks: Simplify<br />CENTRALIZEDPOLICY<br />UNIFIEDMANAGEMENT &<br />DEPLOYMENT<br />COMPREHENSIVE SECURITY<br />
    37. 37. anti-spam<br />anti-bot<br />anti-virus<br />spam<br />bot<br />virus<br />
    38. 38.
    39. 39. Significant <br />Change<br />
    40. 40.
    41. 41.
    42. 42. The Network<br />Cisco SecureX Architecture<br />The Network<br />
    43. 43. Application Programming Interfaces<br />Cisco SIO<br />Context Aware Policy<br />Context Aware Enforcement<br />Partners<br />Services<br />Management<br />Appliance<br />Module<br />Cloud<br />AnyConnect<br />Virtual and Cloud<br />Cisco SecureX Architecture<br />TrustSec<br />TrustSec<br />The Network<br />
    44. 44. Secure Branch<br /> IPSec VPN<br />Branch Office<br />DMZ<br />
    45. 45.
    46. 46. 200%<br />25%<br />Decrease in cost<br />Increase in user satisfaction<br />
    47. 47. 50%<br />30%<br />95%<br />reduction <br />in time<br />increase in<br />application performance<br />decrease in<br />server footprint<br />
    48. 48. Critical Questions to Consider<br />Do I have a consistent Access Policy Architecture across my network for all users and devices?<br />Can mobile devices access my network securely, reliably and seamlessly?<br />Can my network deliver real-time collaboration experiences? <br />Can my network deliver protection from the premises to the Cloud?<br />Can my network optimize performance of applications anytime, anywhere?<br />Am I using my network to reduce my energy costs?<br />Is my network ready for current and future regulatory requirements?<br />Where am I now? Where do I start?<br />
    49. 49. SBA Designs and Cisco Validated Designs <br />Lower Total Cost of Ownership<br />Prescriptive Solutions<br />Modular Design for the Future<br />70%<br />Comprehensive designs with deployment guides<br />http://www.cisco.com/en/US/partner/netsol/ns982/networking_solutions_program_home.html<br /> http://www.cisco.com/web/CA/solutions/strategy/government/networking_solutions_sub_program_home_fr.html<br />
    50. 50. Go Borderless<br />Cloud and Mobility Driving Enterprise Network Transformation<br />Cisco Delivers Policy, Management, Security to Simplify this Transformation <br />Cisco Borderless Networks Is Your Platform for Next Gen Netwrok<br />© 2011 Cisco and/or its affiliates. All rights reserved.<br />
    51. 51. Q & A<br />#CNSF2011<br />
    52. 52. For conference presentations visit: <br />www.networkerssolutionsforum.com<br />Please take a moment to complete the <br />Networkers Conference Event Evaluation Form<br />#CNSF2011<br />
    53. 53. #CNSF2011<br />
    54. 54. Borderless Networks Enables Private CloudEmbedded Network Services Optimize the Experience<br />Benefits<br /><ul><li>Maximize IT Investment</li></ul>Embedded routing optimizationApplication performance<br />Bandwidth efficiency<br /><ul><li>Secure Data, Devices, Workloads</li></ul>Device, application choice with IT control<br /><ul><li>Optimize Applications</li></ul>Rich media applications prioritized by network<br />Applications routed to best public, private cloud resource<br />Visibility and predictability<br />VoiceVideo<br />VoiceVideo<br />Security<br />Security<br />Remote Office<br />Campus Core<br />Private Cloud<br />Application Performance<br />Application Performance<br />Routing<br />Routing<br />
    55. 55. Borderless Networks with Unified Network ServicesEmbedded Network Services Balance Cloud Workloads<br />Optimal user experience based on location<br />Benefits<br /><ul><li>Maximize IT Investment</li></ul>DC services extended to Campus Core<br />Virtualized services provide scale, rapid ROI<br /><ul><li>Secure Data, Devices, Workloads</li></ul>Device, application choice with IT control<br /><ul><li>Optimize Applications</li></ul>Rich-media, business applications prioritized by network<br />Applications routed to best public, private cloud resource<br />Visibility and predictability<br />VoiceVideo<br />Security<br />Private Cloud<br />VoiceVideo<br />Security<br />Data CenterUnified Fabric<br />ApplicationPerformance<br />NetworkAnalysis<br />Application Performance<br />Routing<br />Business Applications<br />Email<br />
    56. 56. Borderless Networks Enables Public, Hybrid Cloud Embedded Network Optimize the Mobile Experience<br />Internet<br />AnyConnect<br />ScanSafe w/AnyWhere+<br />VoiceVideo<br />Security<br />Private Cloud<br /><ul><li>Maximize IT Investment</li></ul>Router embedded services increase performance and availability<br />Virtualized services provide scale, rapid ROI<br /><ul><li>Secure Data, Devices, Workloads</li></ul>Security enforcement points closest to userFederated security between clouds<br />Device, application choice with IT control<br /><ul><li>Optimize Applications</li></ul>Rich media applications prioritized by network<br />Applications routed to best public, private cloud resource<br />Visibility and predictability<br />Application Performance<br />Routing<br />Email<br />
    57. 57. Cisco Borderless NetworksRouting, Application Performance, and Security Innovations Enable Cloud<br />Application Velocity<br />SecureX<br />Medianet<br />VoiceVideo<br />Security<br />Cisco Borderless Networks<br />Application Performance<br />Routing<br />Secure Cloud InfrastructureServices and Access<br /><ul><li>ASA/ASA SM
    58. 58. AnyConnect
    59. 59. ScanSafe (ISR G2)
    60. 60. IronPort, SIO</li></ul>Performance Optimized WAN<br /><ul><li>WAAS on ISR/SRE
    61. 61. vWAAS
    62. 62. UCS Express
    63. 63. NAM</li></ul>Video Scale, Prioritization<br /><ul><li>Medianet
    64. 64. ISR G2 Integrated Video Conferencing
    65. 65. WebEx Node for ASR 1000
    66. 66. PfR, NBAR</li>

    ×