Cовременное предприятие. Надежные технологии для...

54
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 The Agile Enterprise Connect, Collaborate, Innovate and Transform – Securely! Den Sullivan Head of Architecture & Enterprise Emerging Markets

Transcript of Cовременное предприятие. Надежные технологии для...

Page 1: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1

The Agile Enterprise Connect, Collaborate, Innovate and Transform – Securely! Den Sullivan Head of Architecture & Enterprise Emerging Markets

Page 2: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 2

Shaping The Business Environment

Demographics •  Small ageing v. large younger

population •  Gen Y workforce & customers

Technology •  More and faster disruption •  Mobility, post PC era •  Network-centric organisations

Rapid Globalisation •  Connected economy - flows of

information, capital, goods, people

Business Volatility •  Less predictable

environment •  More resiliency (24/7)

Ecological Footprint •  Safeguard vital resources

to remain competitive

Personalisation •  Consumerisation of IT •  Rising expectations

Page 3: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3

Rapid Globalisation Connected economy – flows of information, capital, goods, people

Technology More and faster disruption Mobility, post PC era Network-centric organisations

Business Volatility Less predictable environment More resiliency (24/7)

Ecological Footprint Safeguard vital resources for competitiveness

Personalisation Consumerisation of IT Rising expectations

Demographics Small ageing v. large younger population Gen Y workforce & customers

Mega Challenges Opportunity for Transformation

Improve innovation to provide your company with differentiation and a competitive edge in the eyes of customers

Improve productivity through cross-functional collaboration and creating a productivty borderless

organisation

Socioeconomic development supported by ICT, driving job growth, prosperity

and competitiveness of Emerging countries

Increase Revenue

New Revenue

Faster Product

to Market

More Recurring Revenue

Reduce Operating Expenses

Cost Reduction

Faster Decision Making

Smart Use Vital

Resources

Build National Infrastructure

Skills Education

Safety Healthcare

Broadband Rollout

Page 4: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Source: Buckminster Fuller’s Law

Page 5: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5

During the 21st Century … we may experience 20,000 years of progress

Page 6: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6

My Mobile Phone The Internet A Car My Current Partner

14 - 29 year old population

‘I Cannot Imagine A Life Without…’

Page 7: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7

Page 8: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.
Page 9: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9

Slide to Change Channel

Page 10: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10

Information Explosion

apps downloaded every second

of video uploaded every minute

1/4 million full-length Hollywood releases every week (3 billion views per day)

Home to photos

billion email messages per day

By 2015, video minutes (equivalent of 674 days) will traverse the Internet every second

of the world’s mobile data traffic will be video by 2015

We store of this new information

Sources: Cisco IBSG, 2006–2011; Cisco VNI, June 2011; Technorati; Radicati Group; IDC; The Economist; Apple; InformationWeek

Last year’s mobile data traffic was 3x the size of the entire global internet in 2000

Page 11: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 11

Source: Cisco Visual Networking Index (VNI), June 2011

One zettabyte =

stack of books from Earth to Pluto

20 times (72 billion miles)

Increase of 540,000 times from 2003;

more than 90% from video

If an 11 oz. cup of coffee equals

1 gigabyte - then 1 zettabyte

would have the same volume of the Great Wall of China

Page 12: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

More data was created during any 48 hour period

last year than by ALL of humanity during the past

30,000 years

Page 13: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

OPPORTUNITY TO REDEFINE RELATIONSHIPS Between Citizens and Governments, Consumers and Enterprises …

Page 14: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

OPPORTUNITY TO LEAD CHANGE the Global Landscape and Hyperconnectivity …

Page 15: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 Building Out World Class Infrastructures

LET’S THRIVE NOT JUST SURVIVE in an Environment of Change

Page 16: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 16

IPv4 addresses: 4,294,967,296 IPv6 addresses: 340,282,366,920,938,463,463,374,607,431,768,211,456

Sources: Cisco IBSG, 2006–2011; Steve Leibson, Computer History Museum; CNN

52,000 trillion trillion addresses per person

100 addresses for every atom

on the earth’s surface

4.8 trillion addresses for every star in the known

universe

Page 17: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 17

Page 18: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 18

Sources: Cisco IBSG, 2011; Sparked, 2010; Nike, 2010; David Van Sickle, 2011; Proteus, 2011

transmit data from your stomach

cross referenced with environmental / weather data

Cow transmits 200 MB per year

This tree has 3,000 followers…do you? Connected shoe

Page 19: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19

“The best way to predict the future

is to create it” Peter Drucker

Page 20: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.
Page 21: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.
Page 22: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22

Changing People: Changing the Way They Work

Page 23: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23

ANY CONTENT ANYWHERE ANY DEVICE

IP NGN Video, Mobile, Cloud Services Anywhere, Anytime, Any Device

Converged Infrastructure to Deliver New & Future Services

Consistent Reliability & Availability

Ability to Change SP Business Models

Multiple Technologies for Optimal Flexibility

All IP Mobile Network

DATA CENTRE VIRTUALIZATION

One System for Computing, Networking & Storage

Optimised for Virtualization & Cloud – Reduced Capex/Opex

Any Service, Any Form Factor, Any Platform

Comprehensive Orchestration of Automated Provisioning

BORDERLESS NETWORKS

Secure, Reliable & Seamless Access for Mobile Devices

Optimised Application Delivery Anytime, Anywhere

Consistent Access Policy Across Network

Future-Proofed for Regulatory Requirements

Energy Control whilst Energy Efficient

COLLABORATION Video handled as Easily as Voice, Data

Flexible Access from All Clients

Richest Experience in Any Location

Secure Intra- & Inter-Company Communications

Page 24: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24

Any-to-Any Collaboration

Seamless Mobility

End-to-End Security

Agile Infrastructure

Visual Networking On-Premise Cloud

Interoperable Open Architecture

Page 25: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25

NETWORK Data

Center Desktop

Page 26: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26

Desktop Data

Center

NETWORK Bring Your

Own Devices

Mobility

Page 27: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27

Data Center

NETWORK Bring Your

Own Devices

Mobility

SaaS | DC / V

Cloud/ Virtualization

Page 28: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28

Immersive Collaboration Pervasive Video

NETWORK Bring Your

Own Devices

Mobility

SaaS | DC / V

Cloud/ Virtualization

SECURITY

IT PRODUCTIVITY

ENERGY EFFICIENCY

Page 29: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29

SaaS | DC / V Bring Your Own Devices

SECURITY

IT PRODUCTIVITY

ENERGY EFFICIENCY

Immersive Collaboration Pervasive Video

NETWORK A “BORDERLESS” Mobility Cloud/ Virtualization

Page 30: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30

Page 31: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31

2008 b.c

Page 32: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32

Drive Business Objectives Innovate with Operational Excellence

Your Data Center Strategy Enabled You To:

Server virtualization: higher performance

LAN and storage convergence

VM-Level awareness

Workload provisioning

Applications experience

Drive for green—power, cooling,

and space

Need to reduce costs and increase profits

IT as enabling partner of the business

New services to market

Reduced business risk

AND

Page 33: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33

? How Long Does it Take to Provision a Server in Your Organisation?

Page 34: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 34 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID

Trusted WiFi

 Authenticate User  Fingerprint Device  Apply Corporate Config  Enterprise Apps  Automatic Policies

Page 35: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 35 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID

Unified Policy   Self provisioning   MDM integration

Uncompromised Experience

Simplified Operations

WiFi Trusted

Apply defined policy profiles based on:  Device Type  User   Location  Application

Page 36: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 36 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID

Page 37: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37 37 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID

Trusted WiFi

Yes No

Access: FULL

Customer Database

Mobile TelePresence Email Instant Messenger

Page 38: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 38 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID

Unified Policy   Identity based

access control

Uncompromised Experience

  Interference protection   Client acceleration   802.11u, 11r   Jabber, WebEx

Simplified Operations

Trusted WiFi

Are the clients here yet?

Not yet but i will let you know the moment they arrive.

Page 39: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 39 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID

Page 40: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40 40 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID

Untrusted WiFi

Access: Limited Customer Database

Mobile TelePresence

Email

Instant Messenger

Page 41: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 41 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID

Unified Policy   Identity based access

control   VPN client   Email scanning

Uncompromised Experience

  Interference protection   Client acceleration   802.11u,   Jabber, WebEx

Simplified Operations

Page 42: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 42 © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID

Page 43: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43

Application Development IT Infrastructure/Ops IT Management Call or Email IT

Operations

Architecture Reviews

Approval Process

Track Down Status

One-Off Custom Server

Builds

Incomplete Requirements

Add Security, Back-up, etc.

Exception Management

No Standard Process

No Visibility into Future Demand

Are SLA’s Being Met?

No Data to Track Cost

“Why does it take weeks to get a server?” “Why does it cost so much?”

“Every application hosting request has their own unique requirements” “We can’t enforce standards” “Not enough resource to meet demand”

Page 44: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44

Service Orchestration End User Self-Service Governance

Service Requests

Compare Service Tiers and Options

Guided Shopping ‘Wizard’

Policy-Based Controls

Rich Interactive Forms

Ordering and Approvals

Status Updates

Enterprise Orchestration

Element Managers

Service Catalogue Global

Orchestration

UCS Manager

VMWare vCenter

EMC/ NetApp Storage

Provisioning

Server Provisioner

Page 45: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45

10 Mins How Long Does it Take to Provision a Server in Your Organisation?

Page 46: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46 © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 46

Progressing the Private Cloud

Source: Cisco IT NDCS, RCDN9 build-out cost tracking (state-of-art Tier-III DC facility), Dec 2009

Delivery Time

6 - 8 weeks (on demand ) 2 - 3 weeks

(manual ) 15 minutes (self - service) 15 mins VM

2 - 9 days E2E 15 minutes (self - service)

Com

pute

TC

O (

$/Q

tr/O

S in

stan

ce)

TCO for Virtual $0

$500 $1,000 $1,500 $2,000 $2,500 $3,000 $3,500 $4,000

TCO for Physical Average TCO

Legacy, all physical Legacy, medium virtualization (60%) Current state UCS/Cloud, medium

virtualization (65%) UCS/Cloud, high virtualization (80%)

‘Medium Aggressive’ Virtualization

Unified Computing and Automation

‘Highly Aggressive’ Virtualization

-14% -25%

-18%

Page 47: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47

“YOU CAN POSTPONE A ROCKET LAUNCH BUT WE HAVE NEVER POSTPONED AN OLYMPICS, BECAUSE THE I.T. IS NOT WORKING”

Jean-Benoit Gauthier, Director of Technology,

International Olympic Committee

Page 48: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48

National Olympic Committees

5,000 27,000

70,000

205

media

volunteers

Olympic family members

6,000 21,800

10.8M

live sites

locations

2,220

1,000

14,000

16,500

80,000

people connecting to www.mylondon2012.com

broadcast audience

LOCOG employees athletes & team officials

10M

tickets to spectators

4B

19

94

switches

wireless access points

cable TV sockets

telephones

pc connections

Page 49: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. 49 CISCO CONFIDENTIAL INTERNAL USE ONLY

Technology Innovation Switching Routing

Collaboration Security Virtualization

Raise Customer Satisfaction

Scale your Services

Increase Productivity

Operational Efficiency

Compute

Technology Innovation Benefit

Wireless

Business Imperatives Change Interactions

New Network Use Cases

Work Anyplace

Reduce TCO

Page 50: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. 50 CISCO CONFIDENTIAL INTERNAL USE ONLY

Architectural Framework Benefits

Empower the User User Experience, Innovation,

Productivity, Efficiency

Drive Business Transformation

Scale Business processes, Service creation & optimisation

Enable IT Total Cost of ownership, Risk

Mitigation, Investment Protection

Page 51: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.
Page 52: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.
Page 53: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

Nearly 9 Billion Emails Sent

Over 8 Million Tweets

Almost 6 Million Facebook Status Updates

Almost 8,000 Professionals Joined LinkedIn

2880 Hours of Video Uploaded on YouTube

What Else Happened in 60 Minutes…

720,000 apps downloaded

Page 54: Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54

Thank you for your 60 mins

twitter.com/@densullivan