Unified Networks
          The Key to Business Agility



Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Network Access: THEN

                                                                                                        Limited. Siloed.
                                                                                                         Purpose-built
Yet Simple.                                                                                              Limited Application Portability
                                                                                                         Loss of Flexibility




                    DATA                                                                        VOICE               FACILITY




Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential                                        2
Network Access: NOW
                          Applications                                                                       Seamless
                          Anywhere                                                                         Connectivity




          More
          Complex.

                                                                                       Growth in Network
                                                                                       Connected Devices


              Network Complexity Can Disrupt the User Experience and Increase TCO
Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential                             3
Given Access Network Complexity…
              Consider the Right Approach to Network Design



           It’s NOT                           Point Network Access Technologies
           About

                                              Understanding the Application and User
           It’s About                         Requirements of the Business


           It’s About                         Allowing These to Determine the Right Network Topology




        The Right Approach to Network Access Enables Your Users to Cross Network
                       Borders with a Secure, Consistent Experience
Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential          4
Access Networks Comprise Wired,
              Wireless and Remote Access Technologies
                                                                               Deploy the Right Mix of
                                                                              Technologies That Support
                                                                                Your Varied Business
                                                                                   Requirements
                          Application
                                                                                                              Directives
                           Evolution
                                                Contact
                         Email                                                                            Compliance     Green
                                                Center




                           Device                                                                               Diverse
                         Proliferation                                                                           Users
                       Smart-                   Smart
                                                                                                           Engineer    Sales Exec
                       phones                   Meters




                  An Architectural Approach Provides a Holistic View Of the Three Access
                              Technologies to Drive A Borderless Experience
Presentation_ID    © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential                                      5
What Is Network Unification?


                                                                               Network              Applications


                                                            Facilities                                         Client


                                                                                      Unification              Services
                                                        Staffing


                                                                 Indoor and
                                                                                                           Management
                                                                   Outdoor

                                                                                                Security




Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential                             6
Define a Strategy with a Unification Checklist




                                                                  Access Policies for Users and Devices

                                                                  End-to-end Security

                                                                  Simple, Single View of Network Operations

                                                                  IT Support Coverage

                                                                  Compliant

                                                                  Green Considerations

                                                                  Plan for Future Growth



Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential                 7
Define a Strategy with a Unification Checklist




                                                                  Access Policies for Users and Devices

                                                                  End-to-end Security

                                                                  Simple, Single View of Network Operations

                                                                  IT Support Coverage

                                                                  Compliant

                                                                  Green Considerations

                                                                  Plan for Future Growth


                    Select a Vendor Who can Address Your End-to-End Access Needs
Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential                 8
Impact of Avoiding Unification

                Network                                     Simplifying User                     Managing       Building a “Future
            Interoperability                                 Management                         Multi-vendor     Proof” Network
                                                                                                Relationships




                                                                                 Increases Total Cost
                                                                                     of Operations

             To Lower TCO, Define an Access Strategy That Aligns with Your Business
Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential                                        9
Unification Summary
            Unification is a process – not a
             technology
            Understand your application and                                                               Network    Applications


             user requirements
                                                                                                 Facilities                      Client


            Plan your unification in steps
                                                                                                              Unification
                      Network access                                                            Staffing                         Services


                      Network services
                                                                                                    Indoor and
                                                                                                      Outdoor               Management
                      Management and policy
                                                                                                                 Security
            Wireless and wired networks are
             cooperative and interdependent




Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential                                               10
Presentation_ID   © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential   11

Bridging the wired wireless

  • 1.
    Unified Networks The Key to Business Agility Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 2.
    Network Access: THEN Limited. Siloed. Purpose-built Yet Simple. Limited Application Portability Loss of Flexibility DATA VOICE FACILITY Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3.
    Network Access: NOW Applications Seamless Anywhere Connectivity More Complex. Growth in Network Connected Devices Network Complexity Can Disrupt the User Experience and Increase TCO Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4.
    Given Access NetworkComplexity… Consider the Right Approach to Network Design It’s NOT Point Network Access Technologies About Understanding the Application and User It’s About Requirements of the Business It’s About Allowing These to Determine the Right Network Topology The Right Approach to Network Access Enables Your Users to Cross Network Borders with a Secure, Consistent Experience Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5.
    Access Networks CompriseWired, Wireless and Remote Access Technologies Deploy the Right Mix of Technologies That Support Your Varied Business Requirements Application Directives Evolution Contact Email Compliance Green Center Device Diverse Proliferation Users Smart- Smart Engineer Sales Exec phones Meters An Architectural Approach Provides a Holistic View Of the Three Access Technologies to Drive A Borderless Experience Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6.
    What Is NetworkUnification? Network Applications Facilities Client Unification Services Staffing Indoor and Management Outdoor Security Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7.
    Define a Strategywith a Unification Checklist Access Policies for Users and Devices End-to-end Security Simple, Single View of Network Operations IT Support Coverage Compliant Green Considerations Plan for Future Growth Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8.
    Define a Strategywith a Unification Checklist Access Policies for Users and Devices End-to-end Security Simple, Single View of Network Operations IT Support Coverage Compliant Green Considerations Plan for Future Growth Select a Vendor Who can Address Your End-to-End Access Needs Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9.
    Impact of AvoidingUnification Network Simplifying User Managing Building a “Future Interoperability Management Multi-vendor Proof” Network Relationships Increases Total Cost of Operations To Lower TCO, Define an Access Strategy That Aligns with Your Business Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10.
    Unification Summary  Unification is a process – not a technology  Understand your application and Network Applications user requirements Facilities Client  Plan your unification in steps Unification Network access Staffing Services Network services Indoor and Outdoor Management Management and policy Security  Wireless and wired networks are cooperative and interdependent Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11.
    Presentation_ID © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11