CISCO BORDERLESS NETWORKS · Presentation_ID © 2010 Cisco Systems, Inc. All rights reserved. CISCO...
Transcript of CISCO BORDERLESS NETWORKS · Presentation_ID © 2010 Cisco Systems, Inc. All rights reserved. CISCO...
© 2010 Cisco Systems, Inc. All rights reserved.Presentation_ID
CISCOBORDERLESS
NETWORKS
Adam PhilpottAdam Philpott
GMGM
Borderless NetworksBorderless Networks
© 2010 Cisco Systems, Inc. All rights reserved.Presentation_ID
Borderless
Experience
Anyone Anything
AnytimeAnywhere
Employee, Partner,Customer Communities
Always Works,Instant Access,
Instant Response
The Borderless Enterprise
Work, Home, On the Go…
Person to Person, Person to Device,Device to Device
Securely, Reliably and Seamlessly
© 2010 Cisco Systems, Inc. All rights reserved.Presentation_ID
Major Trends Are Reshaping the Industry…
XaaS &
Cloud
Video
IT Consumerization
Mobility
Green
© 2009 Cisco Systems, Inc. All rights reserved. 4
Changing Environment; Shifting Borders
IT Consumerization
Device Border
Mobile Worker
Location Border
Video/Cloud
IaaS,SaaS
Application Border
External-FacingApps Internal
Apps
© 2010 Cisco Systems, Inc. All rights reserved.Presentation_ID 5
New InnovationsArchitecture for Agile Delivery of the Borderless ExperienceBorderless Networks
Infrastructure
Borderless End-Point/User Services
Mobility WorkplaceExperience
Video
Securely, Reliably, Seamlessly: AnyConnect
Borderless Network ServicesBorderless
Management and Policy SwitchingSwitching
WirelessWireless
WAASWAAS
RoutingRouting
SecuritySecurity
Mobility: Motion
Green:EnergyWise
Security:TrustSec
Video: Medianet
Performance
© 2010 Cisco Systems, Inc. All rights reserved.Presentation_ID 6
The Borderless Network Security Architecture
BorderlessData Center
Virtual Data Center SecurityService Chaining
Borderless End Zones
Cisco Connection ManagerBusiness and Personal End Zones Physical Security
Cisco Security Enforcement Array (SEA)
Infrastructureas a Service
Softwareas a Service
Xas a Service
AttackersPartners Customers
Airport
Mobile User
Home Office
Coffee Shop
Borderless Internet
Application, Identity, ProxyFlexible Delivery
Corporate Border
Branch Office
Corporate Office
Applications and Data
Platfirmas a Service
2
3
1
PolicyAccess Control Acceptable Use,
Malware, Data Security
© 2010 Cisco Systems, Inc. All rights reserved.Presentation_ID 7
Cisco CleanAir : ensuring access anywhere
Mobility
User Services
Motion Network
Services
Borderless Access
802.11n
Intelligent Switching
Remote Access/VPN
CleanAir Technology
ClientLink
Context/Location
Client Troubleshooting
Mobile Collaboration
AnyConnect
© 2010 Cisco Systems, Inc. All rights reserved.Presentation_ID 8
IT Electricity
Use Outside the
Data Center
55%
Data Center
Electricity Use
45%
Energywise
� A typical commercial building’s IT assets consume 25% of total power usage
� The majority of IT’s power consumption occurs outside of the data center
IT Equipment
25%
Heating, Coolingand Ventilation
58%
Lighting
11% Other
6%
Source: UK Energy Efficiency Best Practice Program; Energy Consumption Guide 19: Energy Use in Offices
Source: Forrester, Enterprise And SMB Hardware Survey, North America And Europe, Q3 2008
© 2009 Cisco Systems, Inc. All rights reserved.Presentation_ID 9
What is an Architectural Approach to Transforming Your Business?
Understanding where you want to go with your business1
An Architectural Approach Is About:
Identifying the business solutions that will help you get there2
Making sure the architecture is in place to support the solutions, and can scale to future opportunities
3
Scaling business solutions to meet the needs of your business4
Improving operational efficiency and reducing complexity through a common management platform and multisystem integration
5
© 2009 Cisco Systems, Inc. All rights reserved.Presentation_ID 10
One CiscoMore IT flexibility
Work more efficiently
Work moreeffectively
SecuritSecurity PolicyPolicy
Borderless
Networks
CollaborationDC /
Virtualization
Cisco Architectures
© 2009 Cisco Systems, Inc. All rights reserved.Presentation_ID 11
Critical Questions Customers Consider
Do I Have a Consistent Access Policy Architecture Across MyNetwork for all Users and Devices?1
Can Mobile Devices Access My Network Transparently and Securely?2
Can My Network Deliver Real Time Collaboration Experiences? 3
Can My Network Deliver Protection From the Premise to the Cloud?4
Can My Network Optimize Performance of ApplicationsAnytime, Anywhere?5
Am I Using My Network to Reduce My Energy Costs?6
Is My Network Ready for Current and FutureRegulatory Requirements?7
Where am I now? Where do I start?8
© 2006 Cisco Systems, Inc. All rights reserved.Presentation_ID 12
© 2010 Cisco Systems, Inc. All rights reserved.Presentation_ID
Borderless Networks Architecture
Architecture innovation
Delivers the New Workplace Experience
Next-Generation IT Architecture
• Connects anyone, anywhere, using any device, to any resource -- securely, reliably, seamlessly
• Enables you to increase customer intimacy, productivity, and agility across Many Business Models
• Delivers a workspace experience beyond conventional device, application, and performance borders
• Opens up new business models by bringing interactions closer to their customers
• Optimizes resource use and increases productivity with any device, anywhere, any time
• Reduces costs and improves operational efficiency