Welcome - thank you for coming. In today’s session I will outline Cisco’s Borderless Networks vision and strategy. (Probe them on their top of mind issues, which you can then weave into the session.)
Updated:June 18. 2012/ SME: John McCool (jmccool)/Joe Samagond (jsamagon)Today we’re going to talk about the new Borderless Networks solutions that deliver the capabilities you need to transform your business into one that is borderless and future-ready. Let’s take a look at what this means and what is happening in the market to drive this transformation. We have 3 key stakeholders whose needs we want to fully address. The traditional IT department which is charged in managing the company’s network and delivering the latest capabilities seamlessly, on-time and on-budget; IT is tasked with delivering more at the same or lower cost and is clearly tasked with assuring security is robust in an increasingly complex mobile/cloud environment. Business owners are looking to IT to provide transformation, to quickly integrate new assets, to drive global business infrastructure 24x7 and to evolve to a new set of tech saavy users and customers. Finally, the user is more aware of their IT “experience” expecting seamless access and rich media capability. Unfortunately, these users are quick to “work around” obstacles leveraging consumerized IT solutions that may silo information, inhibit collaboration or worse, put the companies information assets at risk.
Updated:June 18. 2012/ SME: Joe Samagond (jsamagon)Describe the changing environment. Select from the factoids below:MOBILITYIn 2011, the number of mobile-connected tablets tripled to 34 million, and each tablet generated 3.4 times more traffic than the average smartphone.Smartphones represent only 12 percent of total global handsets in use today, but they represent over 82 percent of total global handset trafficTwo-thirds of the world’s mobile data traffic will be video by 2016. There will be 15 billion mobile networked devices by 2015; over 2X the world populationIn early 2012, Apple's iPhone Business Alone Is Now Bigger Than All Of MicrosoftThere are 315 million iPhone, iPad and iPod touch device owners worldwide (March 2012) CLOUDBy 2014, more than 50 percent of all workloads will be processed in the cloud.Overall, cloud IP traffic will grow at a CAGR of 66 percent from 2010 to 2015 and will account for more than one-third (34 percent) of total data center traffic by 2015.IPhone Apps (March 2012)550K Applications25 Billion App downloadsThere are 850k Android activations per day (Feb 2012) COLLABORATION2 out of 3 surveyed say they want the flexibility to work from anywhere, and an office is unnecessary for being productive (Cisco Work Force Study)Close to 50% of firms now issue Macs56% of US information workers spend time working outside the office (Forrester)The old provisioning model of a ‘standard PC image’ has evolved into an App Store model C-on-C factoids 146K IP Telephones and 74K Soft phones in use0.5 Million WebEx meetings take place every month1069 TP rooms available22K video endpoints (CTS units) deployed
Updated:June 18. 2012/ SME: John McCool (jmccool)/Joe Samagond (jsamagon)So how does this fit in with the broader Cisco?Cisco believes when IT takes a structured approach to their IT assets, the cost of operating assets is lower over their lifetime, IT provides better flexibility to the business and IT will work better.Cisco has put forward an architectural point of view for our enterprise customers that centers on three key principles - Collaboration, Data Center/Virtualization, and Borderless NetworksEssentially this means that all of Cisco’s technologies, products and services are aligned to one of these three Enterprise architectures – and they are not mutually exclusive.With Cisco’s heritage as the leader in networking , the Borderless Network provides a base architecture, providing strong linkage for Collaboration and Data Center into the underlying network.So for example with Collaboration and Borderless Networks, video represents a common service involving components of each architecture. With Medianet on Cisco routers and switches, you can have embedded video processing and optimization such that the network manages endpoint detection, QoS, bandwidth, prioritization, and normalization to make video as easy as voice. Similarly when you look at Borderless Networks and Virtualization, you can find some common technology and resources. For instance, Cisco EnergyWise functionality might extend into the Data Center through a switch module. This switch could then manage energy for a local or remote building HVAC system as well as control all of the IP Phones and access points in the Data Center building. Also in this example, common policy and access would be common to both architectures. Clearly the product components of the Borderless Network Architecture intersect with both of the other two architectures. Switching, Routing, Security, Wireless and WAN Optimization all play a role with Collaboration and Virtualization.… but it’s not about products, it’s about a tightly coupled architecture which exposes and delivers a key set of network services from these underlying solutions
Updated:June 18. 2012/ SME: Joe Samagond (jsamagon)So how does this change the business landscape?Traditionally companies looked at themselves as siloed entities – the enterprise with its perimeter… with external facing applications, internal operations, and everything was secured.But what we see today is a shifting of those boundaries; things are becoming more borderless. As the number of mobile and remote workers continues to rise, we have to overcome the location border so we can work from anywhere. At the same time, the increasingly broad range of devices we are using (MACs, PCs, iPhones, smartphones) —whether in the office, at home, or on the go—requires us to reconsider the Device Border. Another shift happening is the application border: Software as a service, video, cloud. You want your applications to work everywhere, regardless of device or location.As the borders of the traditional enterprise perimeter fall away, we face new challenges as a network, as an IT team, as a company.These changes increase the complexity of the CIO’s environment.
Updated:June 18. 2012/ SME: Joe Samagond (jsamagon)As the environment becomes more complex, certain areas of concern remain: Scalability, Availability, Performance, Security, and Manageability.In the past, the way IT addressed these things was very linear:Network not big enough? Add another switchNeed better availability? Deploy more products or features to increase availability.Poor performance? Tweak the QoS.Today the problem is very multi-dimensional – IT has to do the same thing, but across the device, the application, and the location border.And guess what? They still have to ensure scalability, availability, performance, security and Manageability – but now, not just over IT controlled stuff, but also over non-IT-controlled devices. We’ve talked about the market transitions, the changing environment, and the increasing CIO’s complexity. These are the factors that inspired Cisco’s Borderless Network Architecture. Let’s look at a snapshot of the Borderless Experience.
Updated:June 18. 2012/ SME: Joe Samagond (jsamagon)So how does this change the business landscape?Traditionally companies looked at themselves as siloed entities – the enterprise with its perimeter… with external facing applications, internal operations, and everything was secured.But what we see today is a shifting of those boundaries; things are becoming more borderless. As the number of mobile and remote workers continues to rise, we have to overcome the location border so we can work from anywhere. At the same time, the increasingly broad range of devices we are using (MACs, PCs, iPhones, smartphones) —whether in the office, at home, or on the go—requires us to reconsider the Device Border. Another shift happening is the application border: Software as a service, video, cloud. You want your applications to work everywhere, regardless of device or location.As the borders of the traditional enterprise perimeter fall away, we face new challenges as a network, as an IT team, as a company.These changes increase the complexity of the CIO’s environment.
Updated:June 18. 2012/ SME: Alan Amrod (alcuella)Look around - the majority of new network devices being introduced to the market do not have a Wired Ethernet port on them and never will. Within a few short years the primary connectivity for the growing number of devices and the applications they will run will connect to enterprise networks via Wi-Fi and it is critical to note that Wi-Fi is not Ethernet! Wi-Fi is a shared medium that operates within a limited spectrum and negotiates speed with every packet sent, whereas Ethernet is a switched medium with infinite capacity (just keep adding ports) that maintains the speed negotiated when you initially plug in.Here is what you have to take note of: Majority of new network devices will have no wired port Users are starting to bring in more than one Mobile/WLAN device Mobile devices have become an extension of our personality Users will change devices more frequently than in the past Users will want the Wireless network to be as predictable as the Wired networkBy 2015 we expect 802.11ac will be fully depoyed. It offers up to 500MB/sec – we will need improved wireless and RF coverage. Theoretically, this specification will enable multi-station WLAN throughput of at least 1 Gigabit per second and a maximum single link throughput of at least 500 megabits per second (500 Mbit/s). .11ac gets its higher level of performance from a combination of factors- by extending the air interface concepts embraced by 802.11n: wider RF bandwidth (up to 160 MHz), more MIMO spatial streams (up to 8), multi-user MIMO, and high-density modulation (up to 256 QAM).
Updated:June 18. 2012/ SME: Alan Amrod (alcuella)With the Freedom BYOD offers comes “risk” – both Business and Technical – as users will increasingly want to get more than just Mobilemail on their devices and that means you will have to apply a secure policy to every device and every user at some level..Here is what you have to note of: Business Risk You will have to achieve a balance between Intellectual Property access and Employee productivity You will have to determine what action needs to be taken by the employee and the company when a device is stolen or goes missing You will have to develop a rights and use policy that achieves a balance between corporate and personal for personally owned devices You may have to extend your compliance tracking to personal devices Technical Risk You make have to get to a point where you have to apply policy to every packet generated You may have to implement random checks to verify that a user or device has not been compromised As much as you may not want to – with so many personal devices attaching to your network – posture assessment may be a must have in the near future User will want to Wireless network to be as predictable as the Wired network
Updated:June 18. 2012/ SME: Alan Amrod (alcuella)Today’s end users view mobility as a utility and want to continuously be connected to family, friends, and work using any device, from anywhere, and at anytime. Employees want to be able to access their information from anywhere, using whatever device is most optimal at the time. But not every employee has the same needs, nor the same facilities. Therefore, an organization needs a platform strategy that enables ANY combination of basic and advanced services, tailored to each worker type.
Updated:June 18. 2012/ SME: Alan Amrod (alcuella)To effectively integrate BYOD into their organization, IT needs to accommodate a growing number of diverse devices and applications that require immediate and secure connectivity to the Wireless, Wired, and VPN Access Network . The Wired, Wireless, and VPN Access Network elements must become ONE NETWORK that is centrally managed and centrally secured with a Unified Network Management and Unified Policy Management solution that simplifies IT operation while saving time, effort, and money by providing a single pane of glass view and management of users, devices, identity, and policy across all Access Network elements for both IPv4 and IPv6.
Updated:June 18. 2012/ SME: Alan Amrod (alcuella)Why Cisco Unified Access? Unfortunately, many customers are operating disparate access networks. While this approach may have worked in the past, we believe that will it will not scale effectively under the onslaught of new devices. The way to contain costs while driving effective security is to align all forms of network asset, wired, wireless and vpn into a common framework for management and access policy. Cisco’s unified access strategy provides: ONE NETWORK – predictable and seamless services and prioritization across all Access Network elements ONE MANAGEMENT – unified view of all devices and users across all Access Network elementsONE POLICY – unified policy creation, enforcement, and managed of all devices and all user across all Access Network elementsBroadest and newest portfolio of Switches, Access Points, Controllers, Management, Policy, and VPN applications that were all designed and tested to work together as a system to fit any use case and any economic constraint along with the best Global Support capability in the industry
Updated:June 18. 2012/ SME: Alan Amrod (alcuella)Policy Management tackles this problemBYOD multiple components – have to bring a broader policy solution set to cover this market to differentiatePolicy gives access and on-boards the devices, and now that they are on the network, the end user needs a good working experienceThat means that the wireless infrastructure needs to be reliable, predicable and to have high performance, Especially since the antennas on most mobile devices do not provide a high quality experience in and of themselves,Policy / security need to be defined per devices Cisco ISE:… is a third generation fully integrated secure policy and guest management solution…is available as an appliance or can be software licensed to operate in a VM environment…is the only fully integrated guest, AAA, and PPP solution in the industry…provides a single policy view ( whereas Aruba requires four disparate policy views )…has a single user interface (whereas Aruba’s has four different user interface)…is fully integrated with management and location
Updated:June 18. 2012/ SME: Alan Amrod (alcuella)With so many users selecting their own mobile devices and attaching them to the corporate network, the network becomes vulnerable to security holes. Cisco AnyConnect Secure Mobility = Always On / Context-ware VPN that extends corporate security to the broadest selection of mobile devices in the industry – works with ASA, ISE, IronPort, and ScanSafeCisco AnyConnect: Context-aware / Always On VPN Extends corporate security to BYOD Broadest OS support in the industry Automatically selects the optimal network access
Updated:June 18. 2012/ SME: Alan Amrod (alcuella)Unified Network ManagementExtends visibility beyond the edge to both wired and wireless usersUnifies wired, wireless and security visibility into a single viewAligns to how networks and organizations are evolving for efficient operations and faster troubleshootingLifecycle ManagementComprehensive lifecycle management of 802.11n and 802.11a/b/g enterprise-class indoor and outdoor wireless networksDelivers a wide array of tools and resources for effective planning, deployment, monitoring and troubleshooting, remediation, and optimizationIntegration with Cisco Identity Services EngineCisco Prime NCS retrieves information directly from clients: Wired, wireless and authenticated, unauthenticatedEnables client posture status and client profiled viewsDirectly links from Cisco Prime NCS to ISEHighly ScalableMonitor thousands of switches and Manage hundreds of Cisco wireless LAN controllers and thousand of Aironet access pointsSeamlessly integrates with Cisco context-aware software, Adaptive Wireless Intrusion Protections System (AWIPS), CleanAir, and the Cisco Integrated Services Router
Updated:June 18. 2012/ SME: Scott Van de Houten (svandeho)This is just an example of data seen within the Cisco enterprise. The dramatic growth seen in the past 5 years required an architectural approach.Cisco IT is constantly evolving this architectural approach aligning to the IT as a Service strategy that is in place.This approach is crucial in controlling escalating OpEx
Updated:June 18. 2012/ SME: Scott Van de Houten (svandeho)There are several factors that are driving the increase in service level demands – bandwidth, latency, jitter, availability. Video usage continues to escalate – including more users with desktop based video such as YouTube, along with video conferencing applications such as TelePresence and WebExCloud applications, both public and private, are driving demands for latency control as the applications become more remote to the users Public cloud usage, when combined with a centralized approach to access to the cloud, results in hairpinning of traffic by requiring that all public cloud traffic accumulate at the site where the connectivity is provided. VDI changes multiple dynamics. As the workspace becomes virtualized in the cloud, a dramatic increase in traffic occurs as all video display traffic, keyboard, etc are all transmitted over the WAN. In many cases, the visibility of that traffic can be limited, resulting in a reduced ability to provide optimization Video traffic in the VDI environment is especially significant since it results in uncompressed video being transmitted over the network unless effort is done to mitigate that. Also, multiple users at the branch site results in multiple streams, further escalating the traffic increase.Availability is crucial as well at the branch. Circuit or WAN failure for a single access WAN design results in a potential for users to lose all ability to access data and applications, resulting in end users becoming less productive and WAN design for high availability become critical
The drivers behind medianet come from the need for customers to support an increasingly wide range of rich media applications, each with their own specific network service requirements. Interactive video such as Cisco TelePresence is extremely sensitive to packet loss, jitter and delay. By comparison, streaming video is not as sensitive to delay but is often challenged when trying to scale the delivery of content to a large number of remotely connected users. But its not just a case of bandwidth.Real time interactive like Telepresence and collaboration are sensitive to latency and lossStreaming media must support large volumes of sessions and needs scalable delivery through multicastSo what we need is a network architecture that can not only optimize key resources such as bandwidth we must also have the means to support other key servicesDiscussions about video provide an opportunity to review the existing network infrastructure. With the rapid uptake of business video, medianet provides an ideal platform for a network refresh discussion with the customer’s networks team.
The AppVelocity Network Service is the key to the fastest application performance in the industry, fully integrated into Cisco’s Borderless Networks.There are 3 major components to AppVelocity – with one common theme – network integrationApplication Visibility – as we move into ever more complex application flows (like virtualized desktops) – the ability to recognize applications and make decisions about them is more critical than ever. Enhanced NBAR expands the number of apps we can recognize and act on by approximately 1000%Application Control and Agility – with deeper visibility, we can tie business priorities to network behavior – media-aware prioritization and reliable delivery mechanisms that ensure business critical applications get the best performance.Application Optimization – speeding application response times while conserving bandwidth.AppVelocity will deliver the best possible application performance for your organization. Analyst/additional info “deeper dive”: deeper network integration (Enhanced NBAR, WAAS Express, WAASSRE), survivability (App Virtualization on UCS Express).
Updated: August 7,2012/ SME: Ish Limkakeng (limkake), Tom Schepers (tscheper) or Scott Van de Houten (svandeho)KEY MESSAGE:We are seeing the vision of the Borderless Networks come to life, with more and more employees demanding flexibility in the way they work, when and where they work and on what devices they work.Addressing BYOD is only the first step – allowing users to bring their own devices securely into the network.But companies must move beyond basic BYOD connectivitytoprovide an uncompromised experience in any workspace.Companies need to address the increased network usage, increased video usage, virtual desktops, etc. SOUND BITE: Therules of the game are changing, and companies mustmove beyond the basic first step of BYOD connectivity to meet employee expectationsCisco’s own CIO Rebecca Jacobi said that the challenge is more than just getting users on the network, it’s about what users can do once they are on the network.On March 20th Cisco is introducing a set of capabilities across the broad wireless infrastructure, security and policy, network management, and more to address these expectations.We are firing on all cylinders enhancing every aspect in the overall solution…
Updated:June 18. 2012/ SME: Michael Fabian (mifabian)MARKET SEGMENT FOCUSBusinesses are increasingly interested in collecting and analyzing information from, as well as centralizing control of, their factory floors, oil rigs, mining operations, etc.That’s because they can generate value through operational or industrial technology—by making every object in their value chains smarter and networking these objects so they yield up information that can raise capital productivity, prevent loss and improve worker safety.But to capture the value, they need to converge those non-IP networks with their traditional enterprise networks. And that’s where Cisco comes in. Cisco is focusing on these four overall markets:- Process Control (such as Oil and Gas, pharmaceutical, aluminium smelters etc)- Transportation (eg urban and main line rail, intelligent highways)- Discrete manufacturing (such as Mining, Automotive, food and beverage)- Machine-to-machine applications (like robotics, energy management and sensor networksCAPABILITIESSeveral examples include: Not only does a Cisco Borderless Network improve ones experience in the station and on the train, it allows the train to send operational information back to headquarters to help improve the train’s performance or anticipate a malfunction. In mining companies, it allows automation of the activities along the process and the transmission of real time data. In an oil refinery, it provides a mobile network for staff and information gathered from pervasive sensors about levels, temperatures and pressureThere’s a movement underway to unify legacy proprietary networks of “things” like industrial equipment, healthcare devices, sensors, etc., and integrated them into traditional IP networks so companies, utilities and government can operate more efficiently. Cisco already produces an array of ruggedized products suitable for demanding environments.
Updated:June 18. 2012/ SME: Michael Fabian (mifabian)- However, the Operational space today, whether it be in manufacturing, process control or transportation, typically consists of a number of disparate and unconnected networks. These legacy networks are closed loop, increasingly expensive to maintain and do not allow an overall view of the business operations. With the introduction of each new asset, usually with its own accompanying vendor specific network, the situation becomes less and less efficientCustomers have expensive assets and the need to sweat them to the maximum is key. The need to reduce both planned and unplanned down time is critical. This cannot be properly accomplished unless real time information is transmitted to the right people to allow them to take real time decisionsWith the great increase in competition businesses are facing in our global economy, the need to increase productivity and efficiency is imperative
Updated:June 18. 2012/ SME: John McCool (jmccool)/Michael Fabian (mifabian)Cisco started by connecting IT systemsAll of it moved to IP, driven by the marklet and customer needsConsumer market segment next saw the efficiencies by moving multiple legacy metworks to IPFinite adjacenciesThis is third wave legacy proprietary networks that will go to IP, smart gird, manufacturing traffic control systems, transportationBuild the platform for the internet of thingsMainframes, PCsTransition: What’s different, what’s driving these changes? Much of it … being driven by the global network … everything is becoming connectedIn 2001… 300 million devices connected… Primarily what you’d expect… computers, cell phones, PDAsThis year,14 billion things will be connectedNot just talking cell phones anymore…Cars, buildings, security cameras … toilets (nutrition example)Soon, 1 trillion things!By 2017, World Wireless Research Forum’s (WWRF) predicts 7 trillion devices for 7 billion peopleEach “personal network.”RFID tags on every physical object on the planetOne thousand devices, like laptops, telephones, mp3 players, games, sensors and other technology.http://cordis.europa.eu/ictresults/index.cfm?section=news&tpl=article&id=90199
Updated:June 18. 2012/ SME: Michael Fabian (mifabian)The situation described on the previous slide is now changing – IP is the enablerAll industrial and transportation players are moving at their own pace to IPIP/Ethernet will allow a move from the closed, vendor specific systems and protocols that are difficult and expensive to maintain to open standardsNo longer will each part of the business work in its own siloed manner but rather in a connected and collaborative one – allowing real gains in productivity and reductions in costsWith its world leading experience in IP in the Enterprise space, Cisco is well positioned to help companies transform their businesses through moving to IP
Updated:June 18. 2012/ SME: Michael Fabian (mifabian)Cisco’s vision is for a fully connected and integrated business where all the siloes / barriers to efficiency are removed and the business is able to operate in a lean, efficient and collaborative mannerThe key enabler is the NetworkMoreover, as the IP network extends from the IT space to the Operational floor, this will result in overall convergence so that the distinction between IT and OT will be removed and the whole business will function in one connected manner.
Transcript:\r\nSo, starting with the big data. You know, one of the key things that if you look around at what's happening as a big trend is significantly more amount of data being generated. And this is actually a quote from IBM that talks about 90% of all of data on the planet was created in the last two years. I mean, it's truly amazing how last few years based on a new trend-- and we'll cover that here in a minute-- what those key drivers behind this data is-- but truly is driving the amount of data to a tremendous level.\r\n\r\nAuthor's Original Notes:
Transcript:\r\nAs all this data is being created, organizations and the CIOs are continuously trying to figure out, hey, how can we harness the capabilities of this data and drive growth and profitability and customer experience and personalization-- all those different factors. So according to Inside Squared Infographic, they mention that an average Fortune 100 company could grow their top line by over $2 billion if they could just improve the usability of all the data they capture from all their sources-- their customers and vendors and all that-- by 10%, which is amazing.\r\n\r\nAuthor's Original Notes:
Transcript:\r\nAnd the next slide shows about the use cases for analytics across different enterprise verticals. If you are in finance, there are many use cases for analytics. I'll pick one. Let's say, fraud detection. If you are running, let's say, American Express, and one of the biggest factor for your profitability is to minimize fraud detection. And the key to do that is the closest to the point of fail. There are so many variables when somebody swipes a card that are factored into figuring out, hey, is this an OK transaction? And they want to be able to continuously improve that. Because it directly affects their bottom line. An example I like to give here is we were actually in session with one of these credit card companies. And we're just brainstorming how analytics and how a service provider network potentially could really play a role in helping that further. And the thought was, hey, how about if somebody swipes their card-- we have to make sure the latency and all of that is taken care of-- at the same time, as soon as that card's swiped, there is a check that happens saying, hey, this user-- again, the user has to opt in for security upfront, but assuming that happens, they do a check saying, hey, where is this person's cell phone at the moment of that swipe? And if their cell phone is-- again, the percentage of the times I don't have my cell phone on me is pretty low. Most of the time I have that on me. And if they don't have their cell phone-- again, based on real time, location, APIs, and capabilities from a service provider mobile network. If they can correlate that data and put that as one of the feeds into the fraud protection algorithm, that could perhaps enhance that and, again, further helps their bottom line. Another example in health care is patient monitoring and early warning. There was a recent FCC announcement about what they call MBAN. What it means is Medical Body Area Network. They are really truly trying to drive scalability and standardization around health care and the home. And the way they do that is by putting sensors on people's body. And, again, different health care companies are actively working on that in a small scale. But for it to truly scale, they need to be able to capture sensor data and make sure they can do security assessment of the data coming in from the user-- the device-- and all that. And do that for not only thousands of sensors-- perhaps millions of sensors real time. So a lot of analytics capabilities can be leveraged in that use case.\r\n\r\nAuthor's Original Notes:Customer relationship mgmt: sales, marketing, customer service…Internal processes insights & improvement: supply chain and operation, network insights (health, ops efficiency, security)…Administration efficiency: finance & accounting, HR, legal…Information access: search, normalization…Volume, variety & velocity: can’t handle too much data, assess mixed data from multiple sourcesWhat technology to use? platforms, algorithms, protocols, API… DBMS vs. Hadoop?Big Data network impact: breaking infrastructure, optimizations…Engineering committed to solution before having a suitable problemComplex data life-cycle mgmt & matching of nodal capacity (compute & I/O needs)Today’s business has more access to potential insight than before, yet as this potential gold mine of data piles up, the percentage of data the business can process is going down. [IBM]
Transcript:\r\nAnd what that means is if you look at batch processing, where you are doing analytics at a schedule interval-- could be based on the use case on a daily basis-- every night, for example-- or on a weekly basis or even a monthly basis based on the type of data you're getting-- the type of use case-- that is being complemented or shifted to also real time. Instead of capturing the data, trying to store it, and then trying to do analytics on it later, you're actually getting so much information that you need to do that analytics analysis real time. And the key point here is when we think of big data, it's not either or. It's not moving away from structured data and going to only unstructured, or going from batch to real time. I think it's in addition of. That means your structured data still provides tremendous amount of value. But you are adding the capability to do unstructured analysis. There is specific use cases and importance of doing batch processing. But at the same time, you do need to add real time capability for analysis.\r\n\r\nAuthor's Original Notes:Examples of Structured DataDatabases: E.g. Phone Directory (by last name, first name, address, phone, zip code)XML dataData warehousesEnterprise systems (CRM, ERP, etc)Examples of Unstructured Data: Text and ContentEmail messages (the body of the message is really freeform text without any structure at all)Excel spreadsheetsWord documentsRSS feedsAudio filesVideo files
Updated:June 18. 2012/ SME: Scott Gainey (scgainey)/Bill McGee (bam)Networks are undergoing dramatic changes, including such things as BYOD, the transition to the cloud, and new applications and resources such as social media. These challenges bring risk:Mobility – new devices on my network decreases my ability to see and control who and what is on my network. How do I manage devices, applications, and mobile data?Cloud – the transition from a physical to a virtual environment requires me to rethink how I am implementing security. Where are my borders? How do I control access to data?Threats – my network was designed to keep the good stuff in and the bad stuff out. But mobility and BYOD has moved my workforce to the outside of my network, while cloud services have moved my data outside my network as well. I have basically inverted my network. New devices and applications simply enlarge my potential attack surface. What does that do to my security deployment? Are my traditional security solutions still relevant? Do they scale to this new paradigm?