© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Connect 11© 2012 Cisco and/or its affiliates. All rights reserved.
Toronto, Canada
May 30, 2013
BYOD Transforming
The Enterprise
Tom Wilburn
VP, Cisco Global Enterprise Networks
Follow us on Twitter at #CiscoConnect_TO
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Industry Trends
Cisco’s Network Vision
Delivering The BYOD Experience
Adding Cloud Networking
Adding Business Value
SDN – Open Network Environment
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
The Intelligent Network
More Innovation and Change
Than at Any Other Point in Our Lifetime
SOCIAL NETWORKS
POWER OF COMMUNITY
OPEN APPLICATIONS
SaaS CONSUMPTION
ACCELERATING
DEVICE INNOVATION CYCLES
EXPLOSION OF VIDEO
OVER WIRED & WIRELESS
NETWORKS
PERSONALISED
COLLABORATIVE WORKSPACE
BYOD
CLOUD ECONOMICS
INDUSTRY STANDARD
SYSTEMS AND AUTOMATION
VIRTUAL DESKTOP SECURITY
AND COMPLIANCE
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Source: Cisco VNI Mobile Forecast. 2013
Figures in legend refer to device/connection share in 2017
% Growth
300%
250%
0
2012 2013 2014 2015 2016 2017
200%
150%
100%
50%
Device Growth
Tablets (46%)
Smartphones (20%)
M2M (36%)
Laptops (11%)
% Growth
300%
250%
0
2012 2013 2014 2015 2016 2017
200%
150%
100%
50%
Traffic Growth
Tablets (113%)
Smartphones (81%)
M2M (89%)
Laptops (31%)
Petabytes per Month
12,000
6,000
0
2011 2012 2013 2014 2015 2016
10%
39%
51%
29% CAGR 2011-2016
Mobile Data (78%)
Fixed Wired Data (20%)
Fixed Wi-Fi (34%)
Cisco VNI Report: The Zettabyte Era, 2012
Mobile and Wi-Fi Accelerating, Wired Still Growing
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
o f o r g a n i z a t i o n s w i l l a l l o w
personal devices for work use. —Gartner90%
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
100%of IT
is struggling to keep
up with mobility trends.
—Gartner
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
How You Worked Depended on This…
Now It Depends on This…
WIRED WIRELESS
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Workspace Solutions Must Be Based On Use Case
Virtual Desktop plus
Enterprise Collaborative
Applications
VXI Smart Solution
Native or Web-Based
Applications, Securely
BYOD Smart Solution
INTELLIGENT
NETWORK
Hybrid Approach
VXI and BYOD
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
29,864
iPhones
8,463
Android Devices
5,658
BlackBerry Devices
844
Other Devices
83,099
Windows PCs
30,990
Apple Macs
7,269
Linux Desktops
3,041
Desktop
Virtualization
TABLET BASED DEVICES
MOBILE SMARTPHONE DEVICES
DESKTOP LANDSCAPE
14,312 iPads
Samsung Tablets
146
Nexus Tablets
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Delivering The BYOD Experience
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
12© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
13© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
14© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
15© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
Trusted
WiFi
 Authenticate User
 Fingerprint Device
 Apply Corporate Config
 Enterprise Apps
 Automatic Policies
IT
User
Identity Based
Access Control
Mobile Device
Management
802.11n Wi-Fi
At the Office
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
16© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
WiFi
Trusted
Apply defined policy
profiles based on:
 Device Type
 User
 Location
 Application
Identity Based
Access Control
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
17© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
Trusted
WiFi
Corporate Applications
Mobile TelePresence
Email
Instant Messenger
YesNo
Access: FULL
Identity Based
Access Control
Mobile Device
Management
802.11n Wi-Fi
 Location
 Voice and Video
Optimization
 Spectrum
Intelligence
 Client Acceleration
At the Office
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
18© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
PassPoint
802.11n
Wi-Fi
Web/Email
Security
Identity
Based
Access
Control
VPN
Collaboration/
UC
Untrusted WiFi
Access: Limited
Corporate Applications
Mobile TelePresence
Email
Instant Messenger
YesNo
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
19© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
Corporate Applications
Mobile TelePresence
Email
Instant Messenger
YesNo
3G/4G
Access: Limited
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
20© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
Corporate Applications
Mobile TelePresence
Email
Instant Messenger
YesNo
Trusted
WiFi
Access: FULL
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
21© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
Collaboration/UC
802.11n Wi-Fi
Trusted
WiFi
Full Service
Home Router
Bandwidth Priority
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
22© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
23© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
One Management
One Policy
One Network
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Cisco’s Network Vision
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
99%
of “things” are unconnected
We Are Entering the Age of the Internet of Everything
The Network Is the Platform to Connect the Previously Unconnected
To Solve for IoE the Network must
Unify for Scale and Performance
Devices
25+ Billion devices by 2015
7.2+ Billion population by 2015
~3.47 devices average per user
*Cisco VNI Study 2012
Traffic
50+% will be wireless by 2015
50+% will be video by 2015
50+% Cloud based by 2015
Secure
Scalable
BusinessValue
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Premise
One Policy – One Management –
One Network – ownership model
Cisco Unified Access
Two Approaches
Simplicity Flexibility
Cloud
One Policy – One Management –
One Network – subscription model
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
One Policy Simplified and unified policy definition and
enforcement across LAN and WLAN
One Management Simplified and unified network and lifecycle
management across LAN and WLAN
One Network • Simplified and unified operating system and
fabric for LAN and WLAN
Cisco Unified Access
Premise model
Making IT More Responsive to the Business
Less Time on IT Operations, More Time on IT Business Innovation
Simple
Secure
Business Value
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
End-User
Devices
Access
Infrastructure
Management
and Troubleshooting
IT Focus
Policy
Enforcement
LAN Wireless Security
Wired Policies Wireless Policies Guest / VPN Policies
LAN Mgmt. Wireless Mgmt. Identity Mgmt.
Access Switch Access Switch Wireless Controller
Access Point
Wireless Controller
Access Point
Wired Devices Laptops Mobile Phones Tablets BYOD Growth
Before Unified Access
Access Point Access Point
Application Mgmt.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
End-User
Devices
Access
Infrastructure
Management
and Troubleshooting
IT Focus
Policy
Enforcement
LAN Wireless Security
LAN Mgmt. Wireless Mgmt. Identity Mgmt.
Access Switch Access Switch Wireless Controller
Access Point
Wireless Controller
Access Point
Wired Devices Laptops Mobile Phones Tablets BYOD Growth
Wired Policies Wireless Policies Guest / VPN Policies
Access Point Access Point
Application Mgmt.
Cisco ISE
Prime Infrastructure
Catalyst 3850
Next Gen IT Next Gen IT
One Policy
One Management
One Network
With Cisco Unified Access
Next-Gen IT
End-User
Simple
Secure
Unified
New Connected Experiences
Increased Productivity
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
UnifiedAccessArchitecture - Premise
One Policy, One Management, One Network
Good
MDM
Manager
Cisco Prime
Infrastructure
Cisco
Catalyst
Switches
Wired
Network
AnyConnect VPN
Cisco WLAN
Controller
Wireless
Network
Identity Services
Engine and
TrustSec
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
One Policy – Cisco Identity Services Engine (ISE)
Simplified Policy Management
Context-Aware
Comprehensive secure
access based on Who, What,
When, Where, How
Central Policy
Platform
Consistent policy for
LAN, WLAN, and VPN
MDM Integration
Compliance assessment and
network access control of
mobile endpoints
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Benefits of One Policy
Simplified Onboarding
via My Device page
Improves User Experience
Contextual Device
Profiling and Posture
Provides Comprehensive Secure Access
Unified Policy
Management
Improves Operational Efficiency
Network Enforcement
and Control Point
Decreases Operational Costs
Mobile Device
Management
(MDM) Integration
Extends the Reach of Leading MDM Solutions
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Operational
Productivity
LAN and WLAN lifecycle
management and assurance
End-User
Productivity
360 degree view improves user
experience, speeds problem remediation
Operational
Excellence
Integrated best practices
assure consistency and
speeds device rollouts
One Management – Cisco Prime Infrastructure (PI)
Simplified Network Management
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Single View of Wired and Wireless Deep Application Visibility and Control
Automated End-User Troubleshooting User and Device 360° View Integrated Best Practices
Benefits of One Management
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
One Network
Simplified Network Operation
Converged LAN
and WLAN
Infrastructure
One common LAN and WLAN
fabric optimized for flexibility
and performance
Network-Wide
Visibility and
Intelligence
One common operating system
optimized for flexibility and
visibility
Cisco OnePK
Integration
One common set of APs and
SDKs in readiness for Software
Defined Networking
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
?
Show Run
Config
Common Cisco IOS for LAN
and WLAN – with the same
well known commands
*Cisco VNI Study 2012
DebugClear
Ping
Save
Copy
AP
Wireless Management Interface
Wireless Mobility Controller
RenameAntenna dot11
One Network in Action – Common Fabric and OS
Common LAN and WLAN
Fabric – Unified Access
Data Plane ASIC (UADP)
SetProgrammable SDN-Ready
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Common Cisco IOS for LAN
and WLAN – with the same
well known commands
*Cisco VNI Study 2012
One Network in Action – Common Fabric and OS
Common LAN and WLAN
Fabric – Unified Access
Data Plane ASIC (UADP)
Programmable SDN-Ready
Show
Run Save
SetConfig
Debug
Clear
Ping
Copy
AP
Antenna
dot11
?
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Network-wide Visibility
Faster troubleshooting – with end to end
Application Visibility and Control
Consistent Policy
across LAN and WLAN
Improved user experience – policy that
follows the user across the LAN and WLAN
Common LAN and
WLAN fabric and
operating system
Reduce CLI clutter and fatigue, consistent
features across LAN and WLAN
Scale and Performance
for 802.11ac
Eliminate bottlenecks – distributed the data
and control plane to the edge for performance
and scale
Maximum Resiliency
Non-stop operation of the LAN and WLAN with
Stateful Switchover
Benefits of One Network
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Adding Cloud Networking
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Extending Unified Access Vision to Mid-Market
With Cloud-Managed (Meraki) Networking Solutions
Cisco Networking Portfolio
Cisco Enterprise Portfolio Cisco Cloud Managed
Cloud Management
and Policy
Prime ISE
Unparalleled Deployment Flexibility
Catalyst 2K/3K/4K/6K
ISR- AX: Routing, Security, WAAS, UCS-E
Aironet Access Points
3rd Party MDM Integration
Catalyst 3850
with integrated
controller
WLAN Controllers
Ease of Use
MS Switch
MX Series Security
Appliances
MR AP’s
Systems Manager
Cloud Controller
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Designed with
specific
customers in
mind
Who is this customer?
• Distributed sites
• Lean IT staff
• Supports rapidly changing IT landscape
• Looks for simplicity in management, purchase,
deployment
What are they dealing with?
• 10x more devices with fixed staff
• High bandwidth web apps
• BYOD
• Demand for access everywhere
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
Meraki MS
Ethernet Switches
Meraki SM
Mobile Device Management
Meraki MR
Wireless LAN
Meraki MX
Security Appliances
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
Simple: Cloud License & Meraki Hardware
Scalable: Unlimited throughput and sites
Reliable: 99.99% uptime SLA
Secure: No user traffic through cloud
Current: SaaS always up to date
Management
data (1 kb/s)
WAN
LAN
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Scales to million user deployments
Telmex Infinitum Movil
Hotspot / 3G offload in Starbucks, McDonalds,
Burger King, Chili’s, 7-11, California Pizza
Kitchen, …
Large-scale 10,000+ access point deployments
Accor North America
Nationwide deployment covering 100,000 rooms
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Adding Business Value
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
GUEST PRESENCE
Mobile device and characteristics
detected before they enter the venue
GUEST ACCESS
Seamless and secure Wi-Fi connectivity
Preferences, profile, device and roaming
credentials identified
GUEST EXPERIENCE
Highly-relevant content and services
based on user attributes and real-
time location
Connected Mobile Experiences
How It Works
DETECT CONNECT ENGAGE
ADVANCED LOCATION ANALYTICS
Insights Into User Online and Onsite Behavior, Traffic Paths, Dwell Times, Location Density Etc.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
• Context-rich
notifications
• Encouraged use of
loyalty app
• In-venue high value
shopper engagement
• Indoor maps with
featured attractions
• Personalized 3rd party
advertising
• Special promotions
• Café and gift shop
orders and delivery
• Maps and way finding
integrated into
patient apps
• Nearby services
notifications
• Campus maps
directions
• Stadium sales athletic
event experience
• Real-time bus maps
• Better planning for high
traffic areas
• Transportation
updates; indoor
directions
• 3rd party advertising
opportunities
CONNECTED
CONSUMERS
CONNECTED
GUESTS
CONNECTED
PATIENTS
CONNECTED
STUDENTS
CONNECTED
TRAVELERS
RETAIL HOSPITALITY TRANSPORTATION HEALTHCARE EDUCATION
Imagine The Possibilities
Industry Use Cases
Download Fernbank App
Local Services
50%DOWNLOAD
COMPLETE
3G
JESSICA_
Hi, I am Jack.
I’ll be your tour
guide today.
Hear that
Roar?
ROAR
View Note Card
You are now in the
Great Room. See how
the Giganotosaurus
lived millions of
years ago!
Continue
Please Follow
Route to find
NatureQuest
A.
B.
C.
Which animal lived in
the mighty Red Oak?
PuzzleCongratulations
Jessica! You are now a
Junior Paleontologist!
Share Results
Here are some
recommendations
from our Gift Shop!
Get 10% OFF
with your QR Code
Transforming Visitor Experience with Personalized, Managed Wi-Fi Services
• Network Services
Discovery on
the Device
• Local Services
Discovery
• Seamless Handoff
from 3G/4G to
Wi-Fi Using AT&T
WISPr Client or
HotSpot 2.0
• Application
Downloaded
• Personalized
Application
• Personalized
Tour Guide
• Context-Based
Information based
on Visitor Location
• Turn by Turn
navigation
based on Location
• Context-Based
Information based
on Visitor Location
• Business
Intelligence

• Promotions

• Analytics

• Social Networking
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
SDN – Open Network Environment
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
Services
IOS
ASIC
HW
Services
IOS
ASIC
HW
Services
IOS
ASIC
HW
Services
IOS
ASIC
HW
Services
IOS
ASIC
HW
Services
IOS
ASIC
HW
Many Purpose-Built
Architectures
Switching – Routing – Wireless
Unique
Services
IOS
Variants
Purpose
Built
ASICs
Custom
HW
Multiple Products on
Common Architecture
Common Services
IOS - XE
UADP & USCP ASIC
Standard Platforms
Simple, Secure, Reduced TCO
Cisco ONE Architecture
Software-Defined
Services
IOS - XE
UADP & USCP ASIC
Standard Platforms
Cisco ONE
Management &
Policy
Agile Software Model
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
Thank you.
Be sure to follow us on Twitter at #CiscoConnect_TO
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
Thank you.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Cisco ONEArchitecture
NETWORK
APPLICATION LAYER
CONTROL
LAYER
NETWORK
ELEMENT
LAYER
Cisco
ISE
Cisco
Prime
Cloud
Services
Security
Services
Mobility
Services
Application
Services
Network Service Functions
Cisco ONE Controller (Network Services APIs)
Discovery Topology …. QoS Location
Device API – One PK, OpenFlow, CLI
Cisco Network Operating Systems (Enterprise, Data Center, Service Provider)
ASIC
DATA PLANE
SOFTWARE
DATA PLANE

BYOD Transforming the Enterprise

  • 1.
    © 2011 Ciscoand/or its affiliates. All rights reserved. Cisco Connect 11© 2012 Cisco and/or its affiliates. All rights reserved. Toronto, Canada May 30, 2013 BYOD Transforming The Enterprise Tom Wilburn VP, Cisco Global Enterprise Networks Follow us on Twitter at #CiscoConnect_TO
  • 2.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 2 Industry Trends Cisco’s Network Vision Delivering The BYOD Experience Adding Cloud Networking Adding Business Value SDN – Open Network Environment
  • 3.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 3 The Intelligent Network More Innovation and Change Than at Any Other Point in Our Lifetime SOCIAL NETWORKS POWER OF COMMUNITY OPEN APPLICATIONS SaaS CONSUMPTION ACCELERATING DEVICE INNOVATION CYCLES EXPLOSION OF VIDEO OVER WIRED & WIRELESS NETWORKS PERSONALISED COLLABORATIVE WORKSPACE BYOD CLOUD ECONOMICS INDUSTRY STANDARD SYSTEMS AND AUTOMATION VIRTUAL DESKTOP SECURITY AND COMPLIANCE
  • 4.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 4 Source: Cisco VNI Mobile Forecast. 2013 Figures in legend refer to device/connection share in 2017 % Growth 300% 250% 0 2012 2013 2014 2015 2016 2017 200% 150% 100% 50% Device Growth Tablets (46%) Smartphones (20%) M2M (36%) Laptops (11%) % Growth 300% 250% 0 2012 2013 2014 2015 2016 2017 200% 150% 100% 50% Traffic Growth Tablets (113%) Smartphones (81%) M2M (89%) Laptops (31%) Petabytes per Month 12,000 6,000 0 2011 2012 2013 2014 2015 2016 10% 39% 51% 29% CAGR 2011-2016 Mobile Data (78%) Fixed Wired Data (20%) Fixed Wi-Fi (34%) Cisco VNI Report: The Zettabyte Era, 2012 Mobile and Wi-Fi Accelerating, Wired Still Growing
  • 5.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 5 o f o r g a n i z a t i o n s w i l l a l l o w personal devices for work use. —Gartner90%
  • 6.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 6 100%of IT is struggling to keep up with mobility trends. —Gartner
  • 7.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 7 How You Worked Depended on This… Now It Depends on This… WIRED WIRELESS
  • 8.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 8 Workspace Solutions Must Be Based On Use Case Virtual Desktop plus Enterprise Collaborative Applications VXI Smart Solution Native or Web-Based Applications, Securely BYOD Smart Solution INTELLIGENT NETWORK Hybrid Approach VXI and BYOD
  • 9.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 9 29,864 iPhones 8,463 Android Devices 5,658 BlackBerry Devices 844 Other Devices 83,099 Windows PCs 30,990 Apple Macs 7,269 Linux Desktops 3,041 Desktop Virtualization TABLET BASED DEVICES MOBILE SMARTPHONE DEVICES DESKTOP LANDSCAPE 14,312 iPads Samsung Tablets 146 Nexus Tablets
  • 10.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 10 Delivering The BYOD Experience
  • 11.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 11
  • 12.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 12 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
  • 13.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 13 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
  • 14.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 14 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
  • 15.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 15 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID Trusted WiFi  Authenticate User  Fingerprint Device  Apply Corporate Config  Enterprise Apps  Automatic Policies IT User Identity Based Access Control Mobile Device Management 802.11n Wi-Fi At the Office
  • 16.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 16 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID WiFi Trusted Apply defined policy profiles based on:  Device Type  User  Location  Application Identity Based Access Control
  • 17.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 17 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID Trusted WiFi Corporate Applications Mobile TelePresence Email Instant Messenger YesNo Access: FULL Identity Based Access Control Mobile Device Management 802.11n Wi-Fi  Location  Voice and Video Optimization  Spectrum Intelligence  Client Acceleration At the Office
  • 18.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 18 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID PassPoint 802.11n Wi-Fi Web/Email Security Identity Based Access Control VPN Collaboration/ UC Untrusted WiFi Access: Limited Corporate Applications Mobile TelePresence Email Instant Messenger YesNo
  • 19.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 19 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID Corporate Applications Mobile TelePresence Email Instant Messenger YesNo 3G/4G Access: Limited
  • 20.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 20 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID Corporate Applications Mobile TelePresence Email Instant Messenger YesNo Trusted WiFi Access: FULL
  • 21.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 21 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID Collaboration/UC 802.11n Wi-Fi Trusted WiFi Full Service Home Router Bandwidth Priority
  • 22.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 22 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
  • 23.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 23 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID One Management One Policy One Network
  • 24.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 24 Cisco’s Network Vision
  • 25.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 25 99% of “things” are unconnected We Are Entering the Age of the Internet of Everything The Network Is the Platform to Connect the Previously Unconnected To Solve for IoE the Network must Unify for Scale and Performance Devices 25+ Billion devices by 2015 7.2+ Billion population by 2015 ~3.47 devices average per user *Cisco VNI Study 2012 Traffic 50+% will be wireless by 2015 50+% will be video by 2015 50+% Cloud based by 2015 Secure Scalable BusinessValue
  • 26.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 27 Premise One Policy – One Management – One Network – ownership model Cisco Unified Access Two Approaches Simplicity Flexibility Cloud One Policy – One Management – One Network – subscription model
  • 27.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 28 One Policy Simplified and unified policy definition and enforcement across LAN and WLAN One Management Simplified and unified network and lifecycle management across LAN and WLAN One Network • Simplified and unified operating system and fabric for LAN and WLAN Cisco Unified Access Premise model Making IT More Responsive to the Business Less Time on IT Operations, More Time on IT Business Innovation Simple Secure Business Value
  • 28.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 29 End-User Devices Access Infrastructure Management and Troubleshooting IT Focus Policy Enforcement LAN Wireless Security Wired Policies Wireless Policies Guest / VPN Policies LAN Mgmt. Wireless Mgmt. Identity Mgmt. Access Switch Access Switch Wireless Controller Access Point Wireless Controller Access Point Wired Devices Laptops Mobile Phones Tablets BYOD Growth Before Unified Access Access Point Access Point Application Mgmt.
  • 29.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 30 End-User Devices Access Infrastructure Management and Troubleshooting IT Focus Policy Enforcement LAN Wireless Security LAN Mgmt. Wireless Mgmt. Identity Mgmt. Access Switch Access Switch Wireless Controller Access Point Wireless Controller Access Point Wired Devices Laptops Mobile Phones Tablets BYOD Growth Wired Policies Wireless Policies Guest / VPN Policies Access Point Access Point Application Mgmt. Cisco ISE Prime Infrastructure Catalyst 3850 Next Gen IT Next Gen IT One Policy One Management One Network With Cisco Unified Access Next-Gen IT End-User Simple Secure Unified New Connected Experiences Increased Productivity
  • 30.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 31 UnifiedAccessArchitecture - Premise One Policy, One Management, One Network Good MDM Manager Cisco Prime Infrastructure Cisco Catalyst Switches Wired Network AnyConnect VPN Cisco WLAN Controller Wireless Network Identity Services Engine and TrustSec
  • 31.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 32 One Policy – Cisco Identity Services Engine (ISE) Simplified Policy Management Context-Aware Comprehensive secure access based on Who, What, When, Where, How Central Policy Platform Consistent policy for LAN, WLAN, and VPN MDM Integration Compliance assessment and network access control of mobile endpoints
  • 32.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 33 Benefits of One Policy Simplified Onboarding via My Device page Improves User Experience Contextual Device Profiling and Posture Provides Comprehensive Secure Access Unified Policy Management Improves Operational Efficiency Network Enforcement and Control Point Decreases Operational Costs Mobile Device Management (MDM) Integration Extends the Reach of Leading MDM Solutions
  • 33.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 34 Operational Productivity LAN and WLAN lifecycle management and assurance End-User Productivity 360 degree view improves user experience, speeds problem remediation Operational Excellence Integrated best practices assure consistency and speeds device rollouts One Management – Cisco Prime Infrastructure (PI) Simplified Network Management
  • 34.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 35 Single View of Wired and Wireless Deep Application Visibility and Control Automated End-User Troubleshooting User and Device 360° View Integrated Best Practices Benefits of One Management
  • 35.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 36 One Network Simplified Network Operation Converged LAN and WLAN Infrastructure One common LAN and WLAN fabric optimized for flexibility and performance Network-Wide Visibility and Intelligence One common operating system optimized for flexibility and visibility Cisco OnePK Integration One common set of APs and SDKs in readiness for Software Defined Networking
  • 36.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 37 ? Show Run Config Common Cisco IOS for LAN and WLAN – with the same well known commands *Cisco VNI Study 2012 DebugClear Ping Save Copy AP Wireless Management Interface Wireless Mobility Controller RenameAntenna dot11 One Network in Action – Common Fabric and OS Common LAN and WLAN Fabric – Unified Access Data Plane ASIC (UADP) SetProgrammable SDN-Ready
  • 37.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 38 Common Cisco IOS for LAN and WLAN – with the same well known commands *Cisco VNI Study 2012 One Network in Action – Common Fabric and OS Common LAN and WLAN Fabric – Unified Access Data Plane ASIC (UADP) Programmable SDN-Ready Show Run Save SetConfig Debug Clear Ping Copy AP Antenna dot11 ?
  • 38.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 39 Network-wide Visibility Faster troubleshooting – with end to end Application Visibility and Control Consistent Policy across LAN and WLAN Improved user experience – policy that follows the user across the LAN and WLAN Common LAN and WLAN fabric and operating system Reduce CLI clutter and fatigue, consistent features across LAN and WLAN Scale and Performance for 802.11ac Eliminate bottlenecks – distributed the data and control plane to the edge for performance and scale Maximum Resiliency Non-stop operation of the LAN and WLAN with Stateful Switchover Benefits of One Network
  • 39.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 40 Adding Cloud Networking
  • 40.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 41 Extending Unified Access Vision to Mid-Market With Cloud-Managed (Meraki) Networking Solutions Cisco Networking Portfolio Cisco Enterprise Portfolio Cisco Cloud Managed Cloud Management and Policy Prime ISE Unparalleled Deployment Flexibility Catalyst 2K/3K/4K/6K ISR- AX: Routing, Security, WAAS, UCS-E Aironet Access Points 3rd Party MDM Integration Catalyst 3850 with integrated controller WLAN Controllers Ease of Use MS Switch MX Series Security Appliances MR AP’s Systems Manager Cloud Controller
  • 41.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 42 Designed with specific customers in mind Who is this customer? • Distributed sites • Lean IT staff • Supports rapidly changing IT landscape • Looks for simplicity in management, purchase, deployment What are they dealing with? • 10x more devices with fixed staff • High bandwidth web apps • BYOD • Demand for access everywhere
  • 42.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 43 Meraki MS Ethernet Switches Meraki SM Mobile Device Management Meraki MR Wireless LAN Meraki MX Security Appliances
  • 43.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 44 Simple: Cloud License & Meraki Hardware Scalable: Unlimited throughput and sites Reliable: 99.99% uptime SLA Secure: No user traffic through cloud Current: SaaS always up to date Management data (1 kb/s) WAN LAN
  • 44.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 45 Scales to million user deployments Telmex Infinitum Movil Hotspot / 3G offload in Starbucks, McDonalds, Burger King, Chili’s, 7-11, California Pizza Kitchen, … Large-scale 10,000+ access point deployments Accor North America Nationwide deployment covering 100,000 rooms
  • 45.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 46 Adding Business Value
  • 46.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 47 GUEST PRESENCE Mobile device and characteristics detected before they enter the venue GUEST ACCESS Seamless and secure Wi-Fi connectivity Preferences, profile, device and roaming credentials identified GUEST EXPERIENCE Highly-relevant content and services based on user attributes and real- time location Connected Mobile Experiences How It Works DETECT CONNECT ENGAGE ADVANCED LOCATION ANALYTICS Insights Into User Online and Onsite Behavior, Traffic Paths, Dwell Times, Location Density Etc.
  • 47.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 48 • Context-rich notifications • Encouraged use of loyalty app • In-venue high value shopper engagement • Indoor maps with featured attractions • Personalized 3rd party advertising • Special promotions • Café and gift shop orders and delivery • Maps and way finding integrated into patient apps • Nearby services notifications • Campus maps directions • Stadium sales athletic event experience • Real-time bus maps • Better planning for high traffic areas • Transportation updates; indoor directions • 3rd party advertising opportunities CONNECTED CONSUMERS CONNECTED GUESTS CONNECTED PATIENTS CONNECTED STUDENTS CONNECTED TRAVELERS RETAIL HOSPITALITY TRANSPORTATION HEALTHCARE EDUCATION Imagine The Possibilities Industry Use Cases
  • 48.
    Download Fernbank App LocalServices 50%DOWNLOAD COMPLETE 3G JESSICA_ Hi, I am Jack. I’ll be your tour guide today. Hear that Roar? ROAR View Note Card You are now in the Great Room. See how the Giganotosaurus lived millions of years ago! Continue Please Follow Route to find NatureQuest A. B. C. Which animal lived in the mighty Red Oak? PuzzleCongratulations Jessica! You are now a Junior Paleontologist! Share Results Here are some recommendations from our Gift Shop! Get 10% OFF with your QR Code Transforming Visitor Experience with Personalized, Managed Wi-Fi Services • Network Services Discovery on the Device • Local Services Discovery • Seamless Handoff from 3G/4G to Wi-Fi Using AT&T WISPr Client or HotSpot 2.0 • Application Downloaded • Personalized Application • Personalized Tour Guide • Context-Based Information based on Visitor Location • Turn by Turn navigation based on Location • Context-Based Information based on Visitor Location • Business Intelligence
 • Promotions
 • Analytics
 • Social Networking
  • 49.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 50 SDN – Open Network Environment
  • 50.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 51 Services IOS ASIC HW Services IOS ASIC HW Services IOS ASIC HW Services IOS ASIC HW Services IOS ASIC HW Services IOS ASIC HW Many Purpose-Built Architectures Switching – Routing – Wireless Unique Services IOS Variants Purpose Built ASICs Custom HW Multiple Products on Common Architecture Common Services IOS - XE UADP & USCP ASIC Standard Platforms Simple, Secure, Reduced TCO Cisco ONE Architecture Software-Defined Services IOS - XE UADP & USCP ASIC Standard Platforms Cisco ONE Management & Policy Agile Software Model
  • 51.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 52 Thank you. Be sure to follow us on Twitter at #CiscoConnect_TO
  • 52.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 53 Thank you.
  • 53.
    © 2013 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 54 Cisco ONEArchitecture NETWORK APPLICATION LAYER CONTROL LAYER NETWORK ELEMENT LAYER Cisco ISE Cisco Prime Cloud Services Security Services Mobility Services Application Services Network Service Functions Cisco ONE Controller (Network Services APIs) Discovery Topology …. QoS Location Device API – One PK, OpenFlow, CLI Cisco Network Operating Systems (Enterprise, Data Center, Service Provider) ASIC DATA PLANE SOFTWARE DATA PLANE