480 likes | 1.28k Views
Cisco’s Borderless Network Architecture Vision and Strategy. July 2012. Why Architectures?. Agenda. Why Borderless Network Architecture?. What can a Borderless Network Architecture do for you?. Closing. What Do Enterprises Want to Achieve?. Drive Business Transformation.
E N D
Cisco’sBorderless Network Architecture Vision and Strategy July 2012
Why Architectures? Agenda Why Borderless Network Architecture? What can a Borderless Network Architecture do for you? Closing
What Do Enterprises Want to Achieve? Drive BusinessTransformation Enable ITEffectiveness Empowerthe User Total Cost of Ownership, Risk Mitigation, E2E Security, Investment Protection New Business Models, Revenue Streams & Market Opportunities User Experience, Innovation, Productivity, Efficiency
MOBILITY BYOD IMMERSIVECOLLABORATION Pervasive Video CLOUD SaaS| DC / V Enterprise Megatrends THE NETWORK SECURITY, Accelerating Cyber-Threats IT EFFECTIVENESS, Service and Network Management $ COST CONTROL, TCO, Operational Efficiency
Cisco’s Architectural Approach MOBILITY BYOD IMMERSIVECOLLABORATION Pervasive Video CLOUD SaaS| DC / V Collaboration Borderless Networks Data Center/ Virtualization
Location Border Device Border Application Border Network Implications: Shifting Borders Mobile Worker IT Consumerization Internal Applications External-FacingApplications Borderless Networks Video/Cloud IaaS,SaaS
Same Challenges: Increasing Complexity Before: Linear Now: Multidimensional • ScalabilityAvailability Performance Security and Manageability • Across Non-IT-ControlledEnvironments Scalability Location Availability Performance Device Security Manageability Cost of Ownership Application
Connected Industries • Cloud Intelligent • Networks • Cloud Intelligent • Networks • Connected Industries • Unified Access • Unified Access Borderless Networks • SecureX • SecureX 2.0 Key ITInitiatives Focus Moves to Key System Pillars Addressing Customer Pain Points Systems Excellence P R I M E IT/OT Convergence Cloud Computing BYOD Pervasive Video Remote Expert Desktop Virtualization Management • EnergyWise • Energy Management Network and End-Point Services • TrustSec • Policy Enforcement • AppVelocity • AppPerformance • Medianet • MultimediaOptimization Technology Innovation • Application • Networking/ • Optimization • Security • Appliance • and Firewall • Wireless • Routing • Switching
Cloud Intelligent • Networks • Connected Industries • Unified Access Borderless Networks 2.0 • SecureX Key ITInitiatives Cloud Computing Desktop Virtualization Pervasive Video Remote Expert IT/OT Convergence BYOD Focus Moves to Key System Pillars Addressing Customer Pain Points Systems Excellence P R I M E Management • EnergyWise • Energy Management Network and End-Point Services • TrustSec • Policy Enforcement • AppVelocity • AppPerformance • Medianet • MultimediaOptimization Technology Innovation • Security • Appliance • and Firewall • Application • Networking/ • Optimization • Wireless • Routing • Switching
Which Workspace Will Your Customer Deliver? Traditional Workspace Next-Generation Workspace Mobile AnyDevice ImmersiveCollaboration VirtualDesktop Data Voice Enabled by: ‘Good Enough’ Network Enabled by: Borderless Network Architecture Multi-purpose: Energy Management, Building Control, Physical Security, Asset Tracking, etc. Single Purpose • Integrated Security from Premise to the Cloud Security as a Bolt-On Application and Endpoint Intelligence with Policy, Optimization, and location-awareness Application and Endpoint Ignorant Media Aware Control to Support Voice/Video Integration Basic QoS Standards + Innovations Driving Standards Standards-Based
The Post PC Era Is Here B e n e f i t s Cost Control Improved Productivity Any Place, Any Time Today 56% of US workers are located outside of an office (Forrester) From 2010to 2011 there was a 30% increase in # of Consumer devices accessing business applications (IDC) By 2015, 90% of businesses will allow personal devices for work use (Gartner) By 2015, 802.11n and 802.11ac Wi-Fi technology will dominate the wireless market (ABI Research) Wi-Fi is may become the primary means by which wireless data is consumed on smart phones (The Guardian) TIME
The Post PC Era Is Here …but, BYOD Brings Great Risk Business Risk • Intellectual Property vulnerability • Data loss from stolen or lost devices • Privacy rights (Personal vs Corporate Owned) • Frequently Traded in and traded up • Challenges tracking compliance Technical Risk • Difficult to secure and control • How do you know user devices haven’t been compromised already? • Malware • Access control breach • Oversubscribed Infrastructure Source: 2011 ISACA IT Risk/Reward Barometer, US Edition (www.isaca.org/risk-reward-barometer)
BYOD Starts with a Business Decision:Who Should Have Access? The BYOD Access Spectrum Limited Access Basic Enhanced Advanced • Classified Networks • Compliance Issues • Critical information • Internet Access • Guest Networks • Education • User needs workspace access to application plus confidential information based on location • User needs full workspace regardless of location • IT needs to control and manage data
Unified Access UNIFIED MANAGEMENT UNIFIED POLICY WIRED VPN WIRELESS
Unified AccessIntegrates Wired+Wireless+VPN together simply and securely with scale Good CiscoCatalystSwitches Identity Services Engine MDMManager PrimeNCS Cisco WLAN Controller Wired Network Devices AnyConnect VPN
Unified AccessPolicy Management - A System to Implement Technical Policy I want to allow the “right” users and devices on my network Authentication Services Cisco ISE Identity Services Engine I want user and devices to receive appropriate network services Authorization Services Guest Lifecycle Management I want to allow guests into the network I need to allow/deny iPADs in my network (BYOD) Profiling Services Simplified Policy Management I want to allow the “right” users and devices on my network ProvisioningServices I need a scalable way of authorizing users or devices in the network Security Group Access Management
Unified Access – Policy EnforcementExceptional Control Through the Network – TrustSec Unrestricted for Employees/Partners Source Group Access Employee Partner Internet Guest Deployment Scenario with Security Group Access (SGA) Group users independent of IP address and location Packets are “tagged” based on user role and context Scalable and simplified management with a single policy per group The Solution Scalable Enforcement independent of network topology
Unified Access – Securing Client MobilityNext-Generation Security – AnyConnect Unmanaged Devices, Risk ofData Loss, and Lack of Access Secure Mobile Connectivity AcceptableUse MOBILEEXECUTIVE Access Control Data Loss Prevention Can Mobile Devices Access My Network Securely, Reliably and Seamlessly?
Unified Access – Simplified Management Single Pane of Glass View and Management Converged Access Management for Wired and Wireless Networks Wireless | Wired | Security Policy | Network Services • Converged Security and Policy Monitoring • Contextual status and monitoring dashboards across wired and wireless networks • Improves IT efficiency • Provides single view of all user access data • Advanced troubleshooting - Less time and resources consumed • Integration with Cisco NCS Prime Improved Network Visibility Faster Troubleshooting Eliminate Configuration Errors
Unified AccessEnsuring Ubiquitous and High Quality Wireless CleanAir Interference Protection Detect, Classify, Locate and Mitigate Interference Improving Network Reliability and Performance Air Quality Performance ClientLink Improved Client Performance Beam Forming = More Bars Everywhere and a Superior User Quality of Experience VideoStream • Multicast to Unicast Conversion at the AP • Selectable Stream Prioritization • Resource Reservation Prevents Oversubscription Superior Video Quality Improves predictability and performance to deliver Wired-like video experience over Wireless
Cloud Intelligent • Networks • Connected Industries • Unified Access Borderless Networks 2.0 • SecureX Key ITInitiatives Cloud Computing Desktop Virtualization Pervasive Video Remote Expert IT/OT Convergence BYOD Focus Moves to Key System Pillars Addressing Customer Pain Points Systems Excellence P R I M E Management • EnergyWise • Energy Management Network and End-Point Services • TrustSec • Policy Enforcement • AppVelocity • AppPerformance • Medianet • MultimediaOptimization Technology Innovation • Application • Networking/ • Optimization • Security • Appliance • and Firewall • Wireless • Routing • Switching
Cisco IT Experience The Big Issue in NetworkingDramatic Increase in Network demand Bandwidth (Core CapNet) 58 Gbps 420% GROWTH 11 Gbps 2006 2011 Video End Points Cisco Virtual Offfice Users/Routers 22,000 7,000 1,366% 1,300% GROWTH GROWTH ~1,500 ~500 2006 2011 2006 2011
Causes….Service Level Requirements Video Cloud VDI Video will Quadruple all IP traffic by 2014 Latency and Jitter become critical factors in deployment High Definition Video drives large bandwidth increases Cloud Technology will be used by 70% of Enterprises in 2012 More than 90% route public cloud traffic through the central site Cloud applications are bandwidth and delay sensitive Security and Availability become critical 56% of organizations want to virtualize the desktop Availability requirements increase dramatically The new workspace will increase WAN BW significantly, including voice and video Visibility and Control are greatly reduced Source: Cisco Visual Networking Index 2011, The Strategic Network - Cisco, Forrester, 2010
Cisco Cloud Intelligent NetworkNext Generation Enterprise WAN Transform Enterprise WAN and Campus Core to support evolving Business Environments and Applications Secure & Scalable Architecture Rich Network Services Simplified Operation & Implementation • Modularity to support continued growth • Pervasive Security, including Cloud access • Scale from regional to global networks • High Availability to 6 9’s • Medianet for Pervasive Video • Application Performance enhanced user experience • IPv6 for emerging markets and solutions • PfR for availability and Application performance • Simplified deployment with validated designs • Prime Management for ease of operations
Cloud Intelligent • Networks • Connected Industries • Unified Access Borderless Networks 2.0 • SecureX Key ITInitiatives Cloud Computing Desktop Virtualization Pervasive Video Remote Expert IT/OT Convergence BYOD Focus Moves to Key System Pillars Addressing Customer Pain Points Systems Excellence P R I M E Management • EnergyWise • Energy Management Network and End-Point Services • TrustSec • Policy Enforcement • AppVelocity • AppPerformance • Medianet • MultimediaOptimization Technology Innovation • Application • Networking/ • Optimization • Security • Appliance • and Firewall • Wireless • Routing • Switching
MARKETSEGMENTFOCUS CAPABILITIES Industrial Switches Industrial Security Hardened Mobile M2M Gateway Industrial Professional Services Ruggedized Wireless Access Points Machine to Machine Process Mfg. Oil & Gas Transportation Discrete Manufacturing
Today: Disparate, Unconnected Legacy Networks IP-Rich IT CORE BUSINESS OPERATIONS
But Operational Technology Networks Are Moving Leveraging Core Cisco IT Capabilities to Assist theIndustrial World on Its Path to Convergence From proprietary operating systemsand protocols From segmented and siloed data flow From disparate wired and wireless networks …to open systems and standard protocols …to integrated and connected information flow …to converged, secure and collaborative operations Cisco - positioned to assist companies transform their business thanks to its holistic IT and OT focus
Tomorrow: A Converged Network withConnectedDevices IT and OT converge The Network IP-Rich IT + CORE BUSINESS OPERATIONS
End-To-End SecurityNew Networks Require A New Approach FROM TO Piecemeal Designs Coordinated Systems # ! % Point Enforcement Unified Enforcement Limited Foresight 360° Visibility & Control Customer Tested Validated Designs THE THE THE
SecureXAn integrated and holistic network-based security strategy Distributed Workers & BYOD Threat Defense Application Visibility & Control Virtualization & Cloud Secure Unified Access Protecting Network Edges Authorizing Content Usage SecuringCloud Transition Threat Intelligence (Visibility) Contextual Policy (Control) Network (Enforcement) Services (TS, AS, Partner) Compliance (GRC)
Embedding Security within the InfrastructureOffers Comprehensive Visibility and Scalable Enforcement Visibility Enforcement ESA ASA WSA ScanSafe IPS AnyConnect Encryption Routes All Requests Access Control Handles All Devices Sources All Data Identity Awareness NETWORK Threat Intelligence Contextual Policy Touches All Users Policy Enforcement Device Visibility Shapes All Streams Controls All Flows Threat Defense Behavioral Analysis Sees All Traffic Comprehensive Visibility Lower TCO Enhances Security Greater Scalability
In Closing… Borderless Network ArchitecturalFramework Benefits Drive Business Transformation New Business models, Revenue streams & Market opportunities Enable IT Total Cost of ownership, Risk Mitigation, Investment Protection Empower the User User Experience, Innovation, Productivity, Efficiency
Innovation with Lower Costs TCO Comparison Upto-15% Refresh Cycle Energy Savings Administration & Staffing CAPEX Architecture Good Enough
The Evolution of the Network…the journey continues… Trillions Internet of ThingsIT/OT Convergence Consumer Billions Business Millions IPv6 1985 2020+
Network Trends Affect Security MOBILITY CLOUD THREATS • BYOD - Anywhere • 3rd Party Applications • Policy Management • Mobile Data • Expanding Attack Surface • Increasing Sophistication • Everything Is A Target • Inverted Network Design • Physical to Virtual • Virtual to Cloud • Cloud Applications • Changes Everything
Cloud Intelligent • Networks • Connected Industries • Unified Access Borderless Networks 2.0 • SecureX Key ITInitiatives Cloud Computing Desktop Virtualization Pervasive Video Remote Expert IT/OT Convergence BYOD Focus Moves to Key System Pillars Addressing Customer Pain Points Systems Excellence P R I M E Management • EnergyWise • Energy Management Network and End-Point Services • TrustSec • Policy Enforcement • AppVelocity • AppPerformance • Medianet • MultimediaOptimization Technology Innovation • Application • Networking/ • Optimization • Security • Appliance • and Firewall • Wireless • Routing • Switching