1 / 27

Cisco Unified Access Roadshow Day 3: Keynote Presentation

Cisco Unified Access Roadshow Day 3: Keynote Presentation. George Stromeyer. VP, Worldwide Security Sales. Agenda for the Day. Industry Trends and Challenges Why Unified Access Is Important to You. Unified Access Architecture: A Reference Design for Success Define Unified Access

tait
Télécharger la présentation

Cisco Unified Access Roadshow Day 3: Keynote Presentation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cisco Unified Access RoadshowDay 3: Keynote Presentation George Stromeyer VP, Worldwide Security Sales

  2. Agenda for the Day Industry Trends and Challenges Why Unified Access Is Important to You Unified Access Architecture: A Reference Design for Success Define Unified Access Define Cisco Differentiators Enabling Unified Access as a System Key Takeaways

  3. MOBILITY BYOD IMMERSIVECOLLABORATION Pervasive Video CLOUD SaaS| DC / V Enterprise Megatrends THE NETWORK SECURITY, Accelerating Cyber-Threats COST CONTROL, TCO, Operational Efficiency IT EFFECTIVENESS, Service and Network Management

  4. IMMERSIVECOLLABORATION Pervasive Video Cisco’s Architectural Approach Collaboration MOBILITY BYOD CLOUD SaaS | DC/V BorderlessNetworks Data Center/Virtualization

  5. Systems Excellence Technology, Innovation Network and Endpoint Services Borderless Networks Framework BYOD Desktop Virtualization Pervasive Video Remote Expert Cloud Computing IT/OT Convergence Key ITInitiatives Focus Moves to Key System Pillars Addressing Customer Pain Points • Unified Access • Cloud Intelligent • Networks • Connected Industries MANAGEMENTPRIME • SecureX • MedianetMultimediaOptimization • EnergyWiseEnergy Management • TrustSecPolicy Enforcement • AppVisibilityand ControlApp Performance • Cloud ConnectorCloud Optimization • Application • Networking/ • Optimization • Security • Appliance • and Firewall • Wireless • Routing • Switching

  6. Systems Excellence Technology, Innovation Network and Endpoint Services Borderless Networks Framework BYOD BYOD Desktop Virtualization Pervasive Video Remote Expert Cloud Computing IT/OT Convergence Key ITInitiatives Focus Moves to Key System Pillars Addressing Customer Pain Points • Unified Access • Cloud Intelligent • Networks • Connected Industries MANAGEMENTPRIME • SecureX • MedianetMultimediaOptimization • EnergyWiseEnergy Management • TrustSecPolicy Enforcement • AppVisibilityand ControlApp Performance • Cloud ConnectorCloud Optimization • Application • Networking/ • Optimization • Security • Appliance • and Firewall • Wireless • Routing • Switching

  7. Consumerization of IT Three trends companies are dealing with Social Media Blurred Boundaries Device Explosion Personal Business Source: IDC

  8. Demand for Mobility Mobility is driving a transformational change in IT Device consumerization is driving a transformational change in user experience Will transform how every business delivers IT to its employees Will change how every business interacts with its customers 56% of information workersspend time workingOUTSIDE THE OFFICE 15 billion new networked mobiledevices by 2015 3/4of employees uses MULTIPLE DEVICES for work 100% of IT staff STRUGGLEtokeep up withmobile needs

  9. “By 2014, 90% of organizations will allow personal devices for work use.” —Gartner

  10. Galen Gruman September 25, 2012 It's war! BYOD exposes IT's deep distrust of users Users: Yes, IT really does think you're stupid and/or naive, and therefore not to be trusted. IT: Yes, users really do think you're clueless about their needs and so have decided to act on their own. That in a nutshell is what Unisys's new survey (conducted by Forrester Research) of IT and users around the topic of consumerization of IT has shown. The survey released today is significant because it's the third annual such survey Unisys has conducted, not only shows the current state, but lets us see what, if anything has changed, over the last several years after the bring-your-own notion's dramatic rise in 2010.

  11. 2012 Consumerization of IT Study “The Mobile Elite bring new innovative ideas from the consumer world, define new rules of customer engagement, and identify creative means to solve business problems.”

  12. Cisco ITAny Device Landscape Today Mobile Device Adoption is growing dramatically IT Support Models are changing from full support to self-support or IT-assisted support Mix of full support devices, self-support devices High growth on the WLAN causing challenges Traditional Corporate Laptops Corporate VXI Endpoints 2,051 3,606 94,205 7,327 16,700 Mobile BYO Devices 9,500 21,905 5,973 10,766 1,531 • Cisco’s mobile device growth rate (CAGR) is42% Other

  13. “100% of IT is struggling to keep up with mobility trends.” —Gartner

  14. BYOD Customer SpectrumFlexible Business Requirements Considerations: Different industries have different compliance requirements User populations have different support level needs Job roles have differing demands for mobility Corporate data have different classifications and confidentiality LIMITED ACCESS BASIC ENHANCED ADVANCED • EnvironmentRequires Tight Controls • Corp Only Device • Manufacturing Environment • Trading Floor • Classified Government Networks • Traditional Enterprise • Focus on Basic Services,Easy Access • Broader Device Types but Internet Only • Educational Environments • Public Institutions • Simple Guest • Enable Differentiated Services, On-Boarding with Security—Onsite/Offsite • Multiple Device Types + Access Methods • Early BYOD Enterprise Adopters • Corp Native Applications, New Services,Full Control • Any Device, Any Ownership • Innovative Enterprises • Retail on Demand • Mobile Sales Services (Video, Collaboration, etc.)

  15. New User Expectations Place New Demands on the Network Wired/Wireless Challenges NEW NETWORK DEMANDS NEW USER BEHAVIORS Accessing Business Applications from Employee Devices Secure Connectivity and Policy Enforcement on Any Wired or Wireless Location Policy Enforcement and Secured Communication Expectation of Access to Resources from Anywhere Pervasive Coverage and Simplified Management Using An Average of Two to Three Mobile Devices Preserving The User Experience on Any Device, from Anywhere Greater Visibility and Increased Network Reliability and Throughput

  16. Application Models Affect Strategy Key Tradeoffs: Portability Security Usability • Native • Local data on device • Maximum performance • Native device experience • Available offline (?) Native Application Native Application Data Center HTML Interface • Browser • Some local data on device • Portable to many devices • Browser experience • Must be online Web Browser Native Application Data Center • Virtual • No local data on device • Maximum security • Translated experience • Must be online Desktop/App Virtualization Client Desktop/App Virtualization Software Native Application Data Center

  17. Cisco’s BYOD Smart SolutionDriving Innovation Through Collaboration BYOD Collaboration Applications WebEx, Jabber Workspace Management MDM Unified Access Secure Mobility ScanSafe, WSA, ASA AnyConnect Policy Management Infrastructure ISE Core Infrastructure Wired and WirelessCisco Prime Infrastructure

  18. Unified Access

  19. Unified Access ArchitectureOne Policy, One Management, One Network Access strategy needs to consider wired, wireless and remote/mobile 3G/4G Single integrated architecture with device visibility and policy enforcement Ability to translate flexible business policies into tangible enforcement Takes a system, not a single product Identity Services Engine and TrustSec Cisco Prime Infrastructure CiscoCatalystSwitches Cisco WLAN Controller Wireless Network Wired Network AnyConnect VPN

  20. Unified Access Value Proposition and Reference DesignDifferentiating Characteristics of One Network Cisco Catalyst 6500 for Campus Core Cisco Catalyst 4500E and 3K-X for Campus Wired Access Cisco Unified Wireless Network Identity Services Engine Cisco Prime Infrastructure TrustSec Secure Group Access to Simplify the Network and Enable Virtualized Data Center Services Cisco Catalyst 6500/VSS WISM2/WLC Application Visibility and Control Application-Aware Networking to Enable Collaboration, Video, and Other Apps Cisco Catalyst 4500E, Cisco Catalyst 3K-X Resiliency WLC Maximized Network Availability with Virtual Switching and Stateful Switch Over AironetAPs Smart Operations Reduce Operating Expenses and Improve Network Application and Service Delivery OS Consistency: IOS 15.0 Cisco Validated Designs for Campus Deployment

  21. BYOD Smart Solution

  22. What Is a Cisco BYOD Smart Solution? Smart Solution Components: Scale from Commercial to Enterprise Tested, Validated, Documented Designs Integrated Cisco + 3rd Party Roadmaps Cisco and Partner Services Technical Training and Support Enablement: Demos, ROI Tools, Financing www.cisco.com/go/partnerbyod

  23. Reference Design Architecture Comprehensive architecture Cisco and 3rd party products integrated to solve business problem Validated and Design Guides provided www.cisco.com/go/designzone

  24. Bringing it All Together Unified Access Top Lessons Learned from many customers and partners BYOD and other challenges require a complete strategy, not point products or technology Don’t forget to involve Legal and HR --- new implications for users and entitlement policies Wireless and wired policy and management Identity-based access control Security/Policy Data loss and threat prevention Context aware access to data Experience Uncompromised video, voice in any deployment mode Consistent, portable across platforms Management Single system for wired / wireless / VPN Provisioning and Mobile Device Management Applications Native or virtual application delivery Collaborative and corporate applications

  25. A Phased Approach to Cisco BYODAddressing Customer BYOD Needs PLAN BUILD MANAGE BYOD Architectural Services Approach BYOD Architectural Deployment (Infrastructure Build Out) Incremental BYOD Architectural Change and Maintenance BYOD Optimization and Technical Support 4 BYOD Partner-Led and Cisco-Led Services BYOD Assessment 3 BYOD Workshop 2 1

  26. Key Takeaways TREND IMPACT PREPARE BYOD Is Experiencing Phenomenal Growth. But IT is Experiencing Challenges to Stay Ahead of the Network Impact. Customers’ networks are being impacted in terms of Security, Policy, Coverage, and Reliability, Visibility and Management. A Unified Access Network combines the network features you have with innovations you need to prepare for BYOD.

More Related