Cisco Confidential 1© 2012 Cisco and/or its affiliates. All rights reserved.
Borderless Networks
Soluções Integradas
Alexa...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Rede
Data
CenterDesktop
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Desktop
Data
Center
Rede
Bring Your
Own Devi...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Data
Center
Rede
Bring Your
Own Device
Mobil...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Colaboração
Imersiva
Pervasive Video
Rede
Br...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
SaaS | DC / VBring Your
Own Device
SEGURANÇA...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
A sua Rede está Pronta ?
Como reduzo os cust...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Enabled and Driven by:
Changing How Networks...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Para video…
when 91% of global Internet tra...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Novos requerimentos para a Rede
Going Beyon...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
A Rede “Good Enough”
Aplicação / Dispositiv...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Infraestrutura
Borderless End-Point/User Se...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
CiscoConcorrente x
Custo de Aquisição
“Swit...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Custo Total considera o OpEx, Não somente
C...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Melhoria Operacional Cisco
• Simplificado:
...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Nexus 7000
ACESSO
DISTRIBUIÇÃO
CORE
Catalys...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
BASIC LAYER 2
(LAN Lite) PORTFOLIO
ADVANCED...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
3560-C IP Base Portfolio 2960-C LAN Base Po...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
600 1600 2600 3600
• 2X2 MIMO-2 Spatial
Str...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
O Portfolio da Cisco de Acesso Unificado, R...
Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 23
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
• 5 AP’s 1600 + Controller 2504 com 5 licen...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
3X3:2 MIMO
Access Point
CleanAir Express
HW...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Guest Anchor Controller
capable
Supports up...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
• Visibilidade e controle das aplicações ut...
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
• (1) Tecnologia AVC (application visibilit...
Muito Obrigado !!
Bordeless Networks Soluções Integradas
Bordeless Networks Soluções Integradas
Upcoming SlideShare
Loading in …5
×

Bordeless Networks Soluções Integradas

934 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
934
On SlideShare
0
From Embeds
0
Number of Embeds
565
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Let’s see how things have shifted over the last few years. Not so long ago, we typically had a desktop computer and a datacenter. Intelligence was built into each. <CLICK>The role of the network was to provide connectivity from that desktop to the server that hosted an application. And back then, we were identified by that singular IP address associated with that computer node. That IP address was our identity.
  • But with the rise in mobile devices and applications in the last few years, the enterprise scene is changing. Now you are no longer uniquely identified by a specific IP address. You could be on an ipad, an iphone, a cius, and be logging in from anywhere. Who you are and where you are coming in from is not so simple anymore.
  • Looking at the other side of the equation, cloud and virtualization completely changed the paradigm of where the application could be sitting. It was no longer tied to a specific server. It could move around or be in a public cloud. All of sudden you couldn’t rely on that application being exactly in the location you expected it to be.
  • Looking at the other side of the equation, cloud and virtualization completely changed the paradigm of where the application could be sitting. It was no longer tied to a specific server. It could move around or be in a public cloud. All of sudden you couldn’t rely on that application being exactly in the location you expected it to be.
  • Looking at the other side of the equation, cloud and virtualization completely changed the paradigm of where the application could be sitting. It was no longer tied to a specific server. It could move around or be in a public cloud. All of sudden you couldn’t rely on that application being exactly in the location you expected it to be.
  • How do I manage complexity and scale?
  • There is a debate raging in the IT industry about the role of the network.In the same week that a gaming company’s network was hacked and the personal information of 60 million customers was leaked [INSERT TIMELY EXAMPLE], there is a debate raging about whether the network matters.In the same moment that the iPad is being adopted by 65% of the Fortune 100 — obliterating conventional wisdom about how corporate networks support consumer devices and mobility —there is a debate raging about whether the network matters.On one side we have newcomers to the networking industry and some industry commentators who believe that the value of a network should be determined only by the cost of its components. They argue that customers should focus squarely on acquisition cost, not the value of their network assets. They argue that customers should focus on capital cost, not network capability and innovation. They believe the network has become a utility; that ‘good’ is good enough.We all understand that negotiating the best price for goods and services always makes good business sense. But this debate is about more than that.The debate is about making a choice between a tactical network where getting the lowest possible price up front is paramount – and a strategic network investment that enables customers to adapt quickly to new business imperatives and to handle the increased demands on their business.
  •  We are seeing a number of mega trends coming together here:First, the mobile, collaborative workforce. 60% of employees believe they don’t need to be in the office anymore to be productive and efficient. They are working across cities, states and borders – more productively – with less time and expense on travel, and often with their own devices. I’d like to tell youabout what customers need to know about ‘good enough’ networks and their ability to support that type of mobile workforce. Second, data center virtualization. Today, most servers still run a single application but by 2014, 70% will be virtualized and 20% of enterprise workers will use virtual desktops. I’d like to tell about what a ‘good enough’ network will and won’t do to support that type of massive shift in IT and the impact to the user experience.Third, let’s talk about Cloud computing. We’re seeing entirely new business and service models evolve in the Cloud economy. 8 out of 10 IT managers plan to use public or private cloud services over the next 3 years. That has huge implications for the network. But the best example, above all, is video. Video will become our primary means of communication. In less than 2 years, video will become 91% of the global internet traffic. That’s driving an unthinkable volume of data. 1 zettabyte.  Much of that data is coming from mobile devices. The stat’s I’ve seen show that we are approaching 7 devices per person. A good enough network simply is not enough to support that volume of video.The stat’s I’ve seen show that we are approaching 7 devices per person. A good enough network simply is not enough to support that volume of videoAnd we also see growing security concerns that can only be addressed with a next generation network, as well. 20% of employees have left devices unattended; 58% let others use their device, and we’ve seen a 46% increase in malware for mobile devices.
  • Good isn’t good enough for today’s business critical networks. A good enough network isn’t good enough for...video…when 91 percent of global Internet traffic will be internet video. a mobile workforce… when 60% of employees believe they don’t need to be in the office to be productive & efficient.  downtime…when large businesses lose an average of 3.6 percent in annual revenue due to network downtime each year. security…when20% of employees have left devices unattended; 58% let others use their device, 46% increase in malware for mobile devices. for cloud…when XXX
  • As those market transitions have unfolded, one foundational technology; one platform has grown in its relevance and its contribution. That’s the network.The network has evolved from offering basic connectivity between mainframes and terminals to enabling the creation of global networks of PCs.The network was the platform first for the transactional Web and the advent of eCommerce, and then the platform for the social Web with its rich media, collaborative and real time capabilities.
  • Network Requirements ….
  • This debate has fueled numerous myths and misperceptions in our industry. Here are the seven most important Myths of the Good Enough Network. The Application and Endpoint Ignorant Myth: Good Enough Networks typically operate on the notion that data is data—all just ones and zeroes. More sophisticated next generation networks are built on innovative products that adjust to the application being delivered and the endpoint device on which it appears.Basic QoS Myth: If a company has no plans for video applications or rolling out virtual desktops, basic QoS may suffice. However, if the business wants to take advantage of video conferencing or to reap the benefits of a virtual desktop environment without compromising the end-user experience, they need to invest in a network with advanced QoS capabilities.Single Purpose Myth: Customers investing in networks for a single purpose are missing opportunities to use the power of the network to improve carbon footprint, save energy costs, and provide unified management for wired and wireless networks.Basic Warranty Myth: Service contracts and warranties are not created equal. You usually get what you pay for. Unfortunately, you never realize how good a service contract is until you need it. Be prepared and look at the fine print.Security as a Bolt-On Myth: Network security has to keep pace with an ever-changing threat profile and the increased use of mobile devices. When different security elements don’t share information, it magnifies the challenge of creating consistent security across the entire IT environment and can leave the customer exposed to costly security incidents. Acquisition Cost Myth: When building an IT network, about 20 percent of the budget is for acquiring the hardware and 80 percent is for operating costs. If customers don’t assess the complete financial impact, building a tactical network can quickly become the more expensive network. Just Look for Standards Myth: While industry standards are extremely important, relying only on existing standards as you plan for future needs is misguided. When companies lock themselves into standards-based, good-enough networks, they miss out on higher-level service innovation. 
  • The diagram you see here outlines the main components of the borderless network architecture – it links applications, users, and end-point devices with operational processes and the network.It serves as both a framework for our system and architecture roadmap, as well as the deployment blueprint for Borderless Organizations. Let me briefly walk through its main elements. There are key pillars of functionality that Cisco Borderless Networks delivers on – primarily video, green, security, mobility, and application performance—on an end-to-end basis. For innovative organizations, these are key areas of investment and differentiation. The critical network services and proof-points of these pillars include Medianet, TrustSec and EnergyWise; they are delivered by the core infrastructure including routing, switching, mobility, security and WAN Optimization components. Equally important to the Borderless Network architecture is how the user experience is impacted by these network services—when mobile, when engaging with video, and in the workplace—however it’s defined. Network services integrate with endpoint technologies like AnyConnect, to deliver always-on, seamless, reliable, secure connectivity regardless of location or device.Meanwhile, Borderless Management and Policy are built into Network and User Services, offering a flexible and dynamic framework for policy definition and enforcement that spans across video, green, security, mobility, and application performance. The focus here is to connect the right user, the right device, the right application at the right place, at the right time, to the right network. It enables organizations to offer different levels of access privileges or performance characteristics to users, devices and applications.In this framework, policy definition and administration are centralized while control, visibility and enforcement are distributed via the application of dynamic policy assignments.Finally, we have the end-point devices that Cisco extends intelligence and awareness to, including cameras, video terminals, IP Phones, and mobile devices so that the experience is seamless and end to end. It is this blended approach of technologies and new capabilities that will enable new business models and allow your organization to go Borderless. Let’s take a look now at each of those critical network services I mentioned.services including mobile collaboration and secure mobility
  • Cisco offers a comprehensive campus switching portfolio that extend from the edge of the network to the core. The Catalyst 6500 and Nexus 7000 are ideally suited for the core layer. At the distribution layer the Catalyst 6500 is thelead platform, and in certain smaller deployments, the Catalyst 4500E. We also have Catalyst 4500-X fixed platform for distribution in space constrained environments. The Catalyst 3000 and 4000 are ideal for the access layers. Certain customers who value a single platform for end to end deployments may opt to deploy the 6500 in the access layer And of course the 2000 is an entry level option for the access layer.
  • Switch with 3D in the middle. Surrounded by 10 key benefits
  • Bordeless Networks Soluções Integradas

    1. 1. Cisco Confidential 1© 2012 Cisco and/or its affiliates. All rights reserved. Borderless Networks Soluções Integradas Alexandre Lessa Gerente de Desenvolvimento de Negócios Abril de 2013
    2. 2. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Rede Data CenterDesktop
    3. 3. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Desktop Data Center Rede Bring Your Own Device Mobilidade
    4. 4. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Data Center Rede Bring Your Own Device Mobilidade SaaS | DC / V Cloud/ Virtualização
    5. 5. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Colaboração Imersiva Pervasive Video Rede Bring Your Own Device Mobilidade SaaS | DC / V Cloud/ Virtualização SEGURANÇA EFICIÊNCIA DE TI CONTROLE DE CUSTOS
    6. 6. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 SaaS | DC / VBring Your Own Device SEGURANÇA EFICIÊNCIA DE TI CONTROLE DE CUSTOS Colaboração Imersiva Pervasive Video FRONTEIRAS UMA REDE SEMMobilidade Cloud/ Virtualização
    7. 7. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 A sua Rede está Pronta ? Como reduzo os custos operacionais?2 Como ofereço serviços de rede seguros e confiáveis ?3 1 Como gerencio esta complexidade e como escalo, como cresço ?
    8. 8. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Enabled and Driven by: Changing How Networks areArchitected Proliferação de Dispositivos / Aplicações Praticamente tudo tem mobilidade Segurança em todo o lugar CloudData Center Virtualization CollaborationVideo Motivando Inovação nos negócios e Rentabilidade
    9. 9. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Para video… when 91% of global Internet traffic will be video. Para segurança integrada… when 58% let others use their device and there is a 46% increase in malware for mobile devices. Para mobilidade… when 60% believe they won’t be in an office to be productive & efficient or when the desktop becomes virtualized. Para retorno do investimento … when saving energy, creating new business models, attracting the next-gen workforce and engaging with your customers. Para a continuidade do negócio… when downtime causes a loss of 3.6% of annual revenue. Good Enough is Not Good Enough
    10. 10. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Novos requerimentos para a Rede Going Beyond Good Enough Video Enabled Secure Resilient Mobile Business Value Medianet enabled R&S and Wireless infrastructure and endpoints SecureX – Policy driven (ISE) Context Aware security from premise to the cloud Network Resiliency features supported by 20 years of R&D with pre-integrated designs enhanced by Smart Services Advanced wireless infrastructure with VideoStream and AnyConnect to support the broadest array of endpoint devices Cisco Webex, Jabber Video, Energywise, Virtual Office deliver optimal ROI , new business models
    11. 11. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 A Rede “Good Enough” Aplicação / Dispositivos A Rede de Nova Geração Borderless Network QoS Básico Suporte / Garantia Básicos Segurança em UTM Custo de Aquisição Baseada em Padrões Inteligência para a Aplicação/Dispositivo com Segurança, Otimização e Prioridade Controle e Suporte para a Media Integração de Voz e Video Garantia, Suporte + Serviços Gerência Segurança Integrada, do dispositivo para a cloud Proteção do Investimento & ROI Padrões + Inovação = Padrões Propósito Unico Unificada (Wired/Wireless, Building and Energy Control)
    12. 12. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Infraestrutura Borderless End-Point/User Services Mobility Workplace Experience Video Seguro, Confiavel, Simples: AnyConnect Borderless Network ServicesPolíticas, Gerência, Segurança, API’s, Integração Switching Wireless WAAS Routing Security Mobility: Motion Security: TrustSec Voice/Video: Medianet Green: EnergyWise App Performance: App Velocity Serviços dos nossos parceiros de negócio: Experimente o valor de Borderless Networks Arquitetura para entregar o que a rede necessita nestes dias
    13. 13. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 CiscoConcorrente x Custo de Aquisição “Switches e Wireless são uma commodity…” “Cisco é muito caro…”
    14. 14. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Custo Total considera o OpEx, Não somente CapEx
    15. 15. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Melhoria Operacional Cisco • Simplificado:  Instalação  Configuração  Implementaçãp  Manutenção • Monitoramento Superior e Otimização de Rede • Alta Disponibilidade • Segurança • Redução do Consumo de Energia CiscoXX CiscoXX CapEx + OpEx Investimento Inicial Custo Total CapEx
    16. 16. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Nexus 7000 ACESSO DISTRIBUIÇÃO CORE Catalyst 2960 Catalyst 3560-X/3750-X Catalyst 4500-E Catalyst 4500-X Catalyst 6500-E Catalyst 6500-E
    17. 17. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 BASIC LAYER 2 (LAN Lite) PORTFOLIO ADVANCED LAYER 2 (LAN Base) PORTFOLIO Fast Ethernet Gigabit Ethernet Fast Ethernet Gigabit Ethernet Catalyst 2960 1G Uplinks Partial PoE Catalyst 2960-S 1G Uplinks Partial PoE/PoE+ Catalyst 2960 1G Uplinks Partial PoE Catalyst 2960-S 10G/1G Uplinks FlexStack Full PoE, Partial PoE+ Escalabilidade C2960S-STACK
    18. 18. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 3560-C IP Base Portfolio 2960-C LAN Base Portfolio Fast Ethernet Gigabit Ethernet IP Base 8 and 12 port FE Data or PoE+ 2 x 1G Uplinks E- LLW 3560-C Portfolio IP Base 8 port GE Data or PoE+ 2 x 1G Uplinks E- LLW Fast Ethernet Gigabit Ethernet LAN Base 8 and 12 port FE Data or PoE 2 x 1G Uplinks E- LLW 2960-C Portfolio LAN Base 8 port GE Data Only 2 x 1G Uplinks E- LLW Suporte PoE WS-C3560CPD-8PT-S WS-C2906CPD-8PT-L
    19. 19. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 600 1600 2600 3600 • 2X2 MIMO-2 Spatial Streams • Local Ethernet Ports • 3X3 MIMO-2 Spatial Streams • CleanAir Express • ClientLink 2.0 • 3X4 MIMO-3 Spatial Streams • CleanAir • ClientLink 2.0 • 4X4 MIMO–3 Spatial Streams • 802.11ac module (planned) • Security and SI module • CleanAir • ClinetLink 2.0
    20. 20. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 O Portfolio da Cisco de Acesso Unificado, Roteadores e Segurança provê a solução correta para qualquer rede: Pequena, Média ou Grande Switches e Wireless entregam Segurança, Video, Alta Disponibilidade e PoE, bem como eficiência operacional para melhor atender os desafios do negócio As inovações da Cisco melhoram o custo operacional, independente do tamanho da empresa !
    21. 21. Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 23
    22. 22. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 • 5 AP’s 1600 + Controller 2504 com 5 licenças + 1 2960C com desconto diferenciado (Dist) • Pacote com 5 AP’s + Controller + Switch com 12 portas PoE por FOB de USD 2.150,00 !! • Licenças e Serviços Adicionais válidos para a promoção. • Valido até o final do Q4 Cisco (Julho 2013) Cisco Wireless Lan Controller 2504 + 5 Access Points 1602i + 1 Switch 2960C AIR-CT2504-5-K9 GPL USD 1.295 AIR-CAP1602I-T-K9 GPL USD 695 WS-C2960C-12PC-L GPL USD 1.195
    23. 23. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 3X3:2 MIMO Access Point CleanAir Express HW Enabled ClientLink 2.0 Beamforming Sealed Ruggedized Enclosure Ext Ant Optional 802.11abgn Max Data Rate per Radio of 300 Mbps
    24. 24. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 Guest Anchor Controller capable Supports up to 1,000 clients Supports FlexConnect, Mesh and Centralized Deployment Models 802.11ac Forward Compatible Up to 1 Gbps of Wireless Throughput* Supports Up to 75 Access Points Application Visibility and control
    25. 25. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 • Visibilidade e controle das aplicações utilizadas por visitantes e funcionários através da inspeção do tráfego (1). • Portal web interno na WLC customizavel para autenticação de visitantes, e também para a criação e administração dos usuários (2). • Administração centralizada e automática dos canais WiFi, com o recurso de troca de canal automática quando forem detectadas interferencias (3). • Melhora na experiência dos usuários de smartphones e tablets através da tecnologia de beamforming que melhora a recepção do sinal do usuário e economiza bateria do dispositivo móvel; e também com o balanceando transparente dos usuários WiFi nas bandas de 2.4GHz e 5GHz (4). • Otimização na transmissão e controle de Vídeo multicast sobre WiFi (5). • Garantia do roaming rápido e seguro dos clientes wireless entre os pontos de acesso, sem interrupção da aplicação do usuário (6). • Compatível com Cisco ISE (Identity Services Engine), Cisco PI (Prime Infrastructure), Cisco MSE (Mobility Services Engine) e com Microsoft Active Directory (AD), IAS ou NPS para autenticação de usuários. Diferenciais da solução com WLC Cisco
    26. 26. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 • (1) Tecnologia AVC (application visibility and control). • (2) Funcionalidade de Lobby Ambassador. • (3) Gestão dos recursos de rádio (RRM) e se disponível integração com Access Points CleanAir. AP1600 – CleanAir Hardware Ready. • (4) Tecnologia de Beamforming e Band Select. • (5) Tecnologia VideoStream. • (6) Gerenciamento de roaming e suporte a padrão para roaming rápido e seguro como 802.11r, OKC/PKC e CCKM. Descrição da tecnologia utilizada
    27. 27. Muito Obrigado !!

    ×