1 / 38

Cisco’s Borderless Network Architecture Vision and Strategy

Cisco’s Borderless Network Architecture Vision and Strategy. July 2012. Why Architectures?. Agenda. Why Borderless Network Architecture?. What can a Borderless Network Architecture do for you?. Closing. What Do Enterprises Want to Achieve?. Drive Business Transformation.

doane
Download Presentation

Cisco’s Borderless Network Architecture Vision and Strategy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cisco’sBorderless Network Architecture Vision and Strategy July 2012

  2. Why Architectures? Agenda Why Borderless Network Architecture? What can a Borderless Network Architecture do for you? Closing

  3. What Do Enterprises Want to Achieve? Drive BusinessTransformation Enable ITEffectiveness Empowerthe User Total Cost of Ownership, Risk Mitigation, E2E Security, Investment Protection New Business Models, Revenue Streams & Market Opportunities User Experience, Innovation, Productivity, Efficiency

  4. MOBILITY BYOD IMMERSIVECOLLABORATION Pervasive Video CLOUD SaaS| DC / V Enterprise Megatrends THE NETWORK SECURITY, Accelerating Cyber-Threats IT EFFECTIVENESS, Service and Network Management $ COST CONTROL, TCO, Operational Efficiency

  5. Cisco’s Architectural Approach MOBILITY BYOD IMMERSIVECOLLABORATION Pervasive Video CLOUD SaaS| DC / V Collaboration Borderless Networks Data Center/ Virtualization

  6. Location Border Device Border Application Border Network Implications: Shifting Borders Mobile Worker IT Consumerization Internal Applications External-FacingApplications Borderless Networks Video/Cloud IaaS,SaaS

  7. Same Challenges: Increasing Complexity Before: Linear Now: Multidimensional • ScalabilityAvailability Performance Security and Manageability • Across Non-IT-ControlledEnvironments Scalability Location Availability Performance Device Security Manageability Cost of Ownership Application

  8. Connected Industries • Cloud Intelligent • Networks • Cloud Intelligent • Networks • Connected Industries • Unified Access • Unified Access Borderless Networks • SecureX • SecureX 2.0 Key ITInitiatives Focus Moves to Key System Pillars Addressing Customer Pain Points Systems Excellence P R I M E IT/OT Convergence Cloud Computing BYOD Pervasive Video Remote Expert Desktop Virtualization Management • EnergyWise • Energy Management Network and End-Point Services • TrustSec • Policy Enforcement • AppVelocity • AppPerformance • Medianet • MultimediaOptimization Technology Innovation • Application • Networking/ • Optimization • Security • Appliance • and Firewall • Wireless • Routing • Switching

  9. Cloud Intelligent • Networks • Connected Industries • Unified Access Borderless Networks 2.0 • SecureX Key ITInitiatives Cloud Computing Desktop Virtualization Pervasive Video Remote Expert IT/OT Convergence BYOD Focus Moves to Key System Pillars Addressing Customer Pain Points Systems Excellence P R I M E Management • EnergyWise • Energy Management Network and End-Point Services • TrustSec • Policy Enforcement • AppVelocity • AppPerformance • Medianet • MultimediaOptimization Technology Innovation • Security • Appliance • and Firewall • Application • Networking/ • Optimization • Wireless • Routing • Switching

  10. Which Workspace Will Your Customer Deliver? Traditional Workspace Next-Generation Workspace Mobile AnyDevice ImmersiveCollaboration VirtualDesktop Data Voice Enabled by: ‘Good Enough’ Network Enabled by: Borderless Network Architecture Multi-purpose: Energy Management, Building Control, Physical Security, Asset Tracking, etc. Single Purpose • Integrated Security from Premise to the Cloud Security as a Bolt-On Application and Endpoint Intelligence with Policy, Optimization, and location-awareness Application and Endpoint Ignorant Media Aware Control to Support Voice/Video Integration Basic QoS Standards + Innovations Driving Standards Standards-Based

  11. The Post PC Era Is Here B e n e f i t s Cost Control Improved Productivity Any Place, Any Time Today 56% of US workers are located outside of an office (Forrester) From 2010to 2011 there was a 30% increase in # of Consumer devices accessing business applications (IDC) By 2015, 90% of businesses will allow personal devices for work use (Gartner) By 2015, 802.11n and 802.11ac Wi-Fi technology will dominate the wireless market (ABI Research) Wi-Fi is may become the primary means by which wireless data is consumed on smart phones (The Guardian) TIME

  12. The Post PC Era Is Here …but, BYOD Brings Great Risk Business Risk • Intellectual Property vulnerability • Data loss from stolen or lost devices • Privacy rights (Personal vs Corporate Owned) • Frequently Traded in and traded up • Challenges tracking compliance Technical Risk • Difficult to secure and control • How do you know user devices haven’t been compromised already? • Malware • Access control breach • Oversubscribed Infrastructure Source: 2011 ISACA IT Risk/Reward Barometer, US Edition (www.isaca.org/risk-reward-barometer)

  13. BYOD Starts with a Business Decision:Who Should Have Access? The BYOD Access Spectrum Limited Access Basic Enhanced Advanced • Classified Networks • Compliance Issues • Critical information • Internet Access • Guest Networks • Education • User needs workspace access to application plus confidential information based on location • User needs full workspace regardless of location • IT needs to control and manage data

  14. Unified Access UNIFIED MANAGEMENT UNIFIED POLICY WIRED VPN WIRELESS

  15. Unified AccessIntegrates Wired+Wireless+VPN together simply and securely with scale Good CiscoCatalystSwitches Identity Services Engine MDMManager PrimeNCS Cisco WLAN Controller Wired Network Devices AnyConnect VPN

  16. Unified AccessPolicy Management - A System to Implement Technical Policy I want to allow the “right” users and devices on my network Authentication Services Cisco ISE Identity Services Engine I want user and devices to receive appropriate network services Authorization Services Guest Lifecycle Management I want to allow guests into the network I need to allow/deny iPADs in my network (BYOD) Profiling Services Simplified Policy Management I want to allow the “right” users and devices on my network ProvisioningServices I need a scalable way of authorizing users or devices in the network Security Group Access Management

  17. Unified Access – Policy EnforcementExceptional Control Through the Network – TrustSec Unrestricted for Employees/Partners Source Group Access Employee Partner Internet Guest Deployment Scenario with Security Group Access (SGA) Group users independent of IP address and location Packets are “tagged” based on user role and context Scalable and simplified management with a single policy per group The Solution Scalable Enforcement independent of network topology

  18. Unified Access – Securing Client MobilityNext-Generation Security – AnyConnect Unmanaged Devices, Risk ofData Loss, and Lack of Access Secure Mobile Connectivity AcceptableUse MOBILEEXECUTIVE Access Control Data Loss Prevention Can Mobile Devices Access My Network Securely, Reliably and Seamlessly?

  19. Unified Access – Simplified Management Single Pane of Glass View and Management Converged Access Management for Wired and Wireless Networks Wireless | Wired | Security Policy | Network Services • Converged Security and Policy Monitoring • Contextual status and monitoring dashboards across wired and wireless networks • Improves IT efficiency • Provides single view of all user access data • Advanced troubleshooting - Less time and resources consumed • Integration with Cisco NCS Prime Improved Network Visibility  Faster Troubleshooting  Eliminate Configuration Errors

  20. Unified AccessEnsuring Ubiquitous and High Quality Wireless CleanAir Interference Protection Detect, Classify, Locate and Mitigate Interference Improving Network Reliability and Performance Air Quality Performance ClientLink Improved Client Performance Beam Forming = More Bars Everywhere and a Superior User Quality of Experience VideoStream • Multicast to Unicast Conversion at the AP • Selectable Stream Prioritization • Resource Reservation Prevents Oversubscription Superior Video Quality Improves predictability and performance to deliver Wired-like video experience over Wireless

  21. Cloud Intelligent • Networks • Connected Industries • Unified Access Borderless Networks 2.0 • SecureX Key ITInitiatives Cloud Computing Desktop Virtualization Pervasive Video Remote Expert IT/OT Convergence BYOD Focus Moves to Key System Pillars Addressing Customer Pain Points Systems Excellence P R I M E Management • EnergyWise • Energy Management Network and End-Point Services • TrustSec • Policy Enforcement • AppVelocity • AppPerformance • Medianet • MultimediaOptimization Technology Innovation • Application • Networking/ • Optimization • Security • Appliance • and Firewall • Wireless • Routing • Switching

  22. Cisco IT Experience The Big Issue in NetworkingDramatic Increase in Network demand Bandwidth (Core CapNet) 58 Gbps 420% GROWTH 11 Gbps 2006 2011 Video End Points Cisco Virtual Offfice Users/Routers 22,000 7,000 1,366% 1,300% GROWTH GROWTH ~1,500 ~500 2006 2011 2006 2011

  23. Causes….Service Level Requirements Video Cloud VDI Video will Quadruple all IP traffic by 2014 Latency and Jitter become critical factors in deployment High Definition Video drives large bandwidth increases Cloud Technology will be used by 70% of Enterprises in 2012 More than 90% route public cloud traffic through the central site Cloud applications are bandwidth and delay sensitive Security and Availability become critical 56% of organizations want to virtualize the desktop Availability requirements increase dramatically The new workspace will increase WAN BW significantly, including voice and video Visibility and Control are greatly reduced Source: Cisco Visual Networking Index 2011, The Strategic Network - Cisco, Forrester, 2010

  24. Cisco Cloud Intelligent NetworkNext Generation Enterprise WAN Transform Enterprise WAN and Campus Core to support evolving Business Environments and Applications Secure & Scalable Architecture Rich Network Services Simplified Operation & Implementation • Modularity to support continued growth • Pervasive Security, including Cloud access • Scale from regional to global networks • High Availability to 6 9’s • Medianet for Pervasive Video • Application Performance enhanced user experience • IPv6 for emerging markets and solutions • PfR for availability and Application performance • Simplified deployment with validated designs • Prime Management for ease of operations

  25. Cloud Intelligent • Networks • Connected Industries • Unified Access Borderless Networks 2.0 • SecureX Key ITInitiatives Cloud Computing Desktop Virtualization Pervasive Video Remote Expert IT/OT Convergence BYOD Focus Moves to Key System Pillars Addressing Customer Pain Points Systems Excellence P R I M E Management • EnergyWise • Energy Management Network and End-Point Services • TrustSec • Policy Enforcement • AppVelocity • AppPerformance • Medianet • MultimediaOptimization Technology Innovation • Application • Networking/ • Optimization • Security • Appliance • and Firewall • Wireless • Routing • Switching

  26. MARKETSEGMENTFOCUS CAPABILITIES Industrial Switches Industrial Security Hardened Mobile M2M Gateway Industrial Professional Services Ruggedized Wireless Access Points Machine to Machine Process Mfg. Oil & Gas Transportation Discrete Manufacturing

  27. Today: Disparate, Unconnected Legacy Networks IP-Rich IT CORE BUSINESS OPERATIONS

  28. But Operational Technology Networks Are Moving Leveraging Core Cisco IT Capabilities to Assist theIndustrial World on Its Path to Convergence From proprietary operating systemsand protocols From segmented and siloed data flow From disparate wired and wireless networks …to open systems and standard protocols …to integrated and connected information flow …to converged, secure and collaborative operations Cisco - positioned to assist companies transform their business thanks to its holistic IT and OT focus

  29. Tomorrow: A Converged Network withConnectedDevices IT and OT converge The Network IP-Rich IT + CORE BUSINESS OPERATIONS

  30. End-To-End SecurityNew Networks Require A New Approach FROM TO Piecemeal Designs Coordinated Systems # ! % Point Enforcement Unified Enforcement Limited Foresight 360° Visibility & Control Customer Tested Validated Designs THE THE THE

  31. SecureXAn integrated and holistic network-based security strategy Distributed Workers & BYOD Threat Defense Application Visibility & Control Virtualization & Cloud Secure Unified Access Protecting Network Edges Authorizing Content Usage SecuringCloud Transition Threat Intelligence (Visibility) Contextual Policy (Control) Network (Enforcement) Services (TS, AS, Partner) Compliance (GRC)

  32. Embedding Security within the InfrastructureOffers Comprehensive Visibility and Scalable Enforcement Visibility Enforcement ESA ASA WSA ScanSafe IPS AnyConnect Encryption Routes All Requests Access Control Handles All Devices Sources All Data Identity Awareness NETWORK Threat Intelligence Contextual Policy Touches All Users Policy Enforcement Device Visibility Shapes All Streams Controls All Flows Threat Defense Behavioral Analysis Sees All Traffic Comprehensive Visibility Lower TCO Enhances Security Greater Scalability

  33. In Closing… Borderless Network ArchitecturalFramework Benefits Drive Business Transformation New Business models, Revenue streams & Market opportunities Enable IT Total Cost of ownership, Risk Mitigation, Investment Protection Empower the User User Experience, Innovation, Productivity, Efficiency

  34. Innovation with Lower Costs TCO Comparison Upto-15% Refresh Cycle Energy Savings Administration & Staffing CAPEX Architecture Good Enough

  35. The Evolution of the Network…the journey continues… Trillions Internet of ThingsIT/OT Convergence Consumer Billions Business Millions IPv6 1985 2020+

  36. Network Trends Affect Security MOBILITY CLOUD THREATS • BYOD - Anywhere • 3rd Party Applications • Policy Management • Mobile Data • Expanding Attack Surface • Increasing Sophistication • Everything Is A Target • Inverted Network Design • Physical to Virtual • Virtual to Cloud • Cloud Applications • Changes Everything

  37. Cloud Intelligent • Networks • Connected Industries • Unified Access Borderless Networks 2.0 • SecureX Key ITInitiatives Cloud Computing Desktop Virtualization Pervasive Video Remote Expert IT/OT Convergence BYOD Focus Moves to Key System Pillars Addressing Customer Pain Points Systems Excellence P R I M E Management • EnergyWise • Energy Management Network and End-Point Services • TrustSec • Policy Enforcement • AppVelocity • AppPerformance • Medianet • MultimediaOptimization Technology Innovation • Application • Networking/ • Optimization • Security • Appliance • and Firewall • Wireless • Routing • Switching

More Related