Fast IT. Fast Innovation.€¦ · I protect my business data and maintain customer trust?...
Transcript of Fast IT. Fast Innovation.€¦ · I protect my business data and maintain customer trust?...
Dave West
Transform your Business in 4 Steps
Fast IT. Fast Innovation.
MANUFACTURING POINT OF SALE ADVERTISING HOTEL
BOOKSTORES TAXI MEDIA RETAIL
Disruption is the New Normal
Customers
Expect
Personalization
Competitive
Advantages
with Data
Analytics
New Business
Models
Disruption Is Everywhere
Mobility
and Device
Explosion
Businesses Reinvented Challenges for Business
Democratization
of Technology
The Network Connects Everything
Create a Secure, Optimized,
Cloud-Enabled Infrastructure
Cloud
How do I cut costs while enabling my business?
Enable a Secure Mobile Workforce
Mobile
How do I create a more engaged and
productive workforce?
Create One-to-One Connections with
Customers Anytime
Social
How can I create
personalised customer
experiences?
Access Distributed Data and Gain Insight to Speed Decisions
Data
How do I make better decisions…
faster?
Protect Valuable Assets and Reputation in Real
Time
Security
How do I protect my business data
and maintain customer trust?
Challenges for IT
Simplify & Increase Performance
Optimise
WAN
Streamline
Operations
Control & Enforce Security
Campus Data Centre
Cloud
WAN
Branch
Personal
The Network Matters
SIMPLE OPEN AGILE SECURE
Transform your Business in 4 Steps
Step 1
Become a Mobile Enterprise
How Relevant is a Mobility Strategy?
56% of CxOs say
mobile strategy is
very or extremely
important to their
business
objectives. IDC Location Based Services: A Promising
Customer-Centric Solution 2014 2014 Cisco Mobility Landscape Survey
The percentage of enterprise apps adapted for mobile are growing from 31%
in 2014 to 42% in
2015.
66% of
Organizations use mobility to increase Customer Satisfaction and Loyalty.
2014 Cisco Mobility Landscape Survey
Empower Your Employees
NETWORK / USER
CONTEXT
How
What Who Where
When
CONSISTENT POLICY ACROSS
WIRED, WIRELESS and VPN
POLICY MANAGEMENT
AND ENFORCEMENT
Identity Services Engine
TrustSec Security
Group Tags
Secure Mobility
Suncash Tea
Engage Your Customers
ANALYTICS
Network Access Presence and Location
Simple Wi-Fi Guest Access Location-Based
Content and Services Mobile Device
Detection
User Experience
DETECT CONNECT ENGAGE
Connected Mobile Experience
Real-Time Location and Heatmaps
Customer Loyalty
Number of People by Venue or Zone
Peak and Dwell Times
Traffic Patterns
Business Relevant Data
Billy Bosworth, DataStax CEO
“Ten years from now… we will be stunned at how uninformed we used to be when we made decisions”
Everything is Connected
Step 2
Evolve to the Next Generation Workspace
How is the Workspace Changing?
Over 75% of
organisations are
supporting corporate
issued mobile devices
and 50% are
supporting BYOD.
2014 Cisco Mobility Landscape Survey
Wireless devices
will account for 66%
of the network exceeding wired traffic
by 2019.
2015 Cisco Visual Networking Index
Support Employees
80% of employees
and customers are
served in
branch offices.
Tech Target, Branch Office Growth Demands New Devices, 2013
The Workspace is Everywhere
Connected Airports
Connected Cities Connected Hospital
Connected Retail
The Workspace is Anywhere
NEXT GENERATION WORKSPACE
Team Collaboration Focus
Increasing Number of High
Bandwidth Mobile Devices
Role-Based Security
CURRENT WORKSPACE
Individual Worker Focus
PC Connectivity Focus
Device and Port-Based Security
Next Generation Workspace
Step 3
Make your Business Agile and Simple
Dreaming of Simplicity?
of Businesses say They Need Cloud Solutions to Quickly
Respond to Business Needs
CIO Insight: “Embrace your Hybrid Operation”
of Applications are Rolled Out Without IT Engagement
Cisco IT Impact Survey 2013
70% 78%
New Approaches to Enable Digital Business
Cloud-Managed IT
Meraki
• Rapid Pace of Digital Business Change
• Simplicity for Fast Growing Organizations
• Zero-Touch Deployment, Cloud Management
On-Premise Managed IT
Prime and APIC EM
• Tried and Tested, Now with ACI
• Broad and Flexible Capabilities
• Next Generation Workspace Enabler
Choice of Consumption Model
ENTERPRISE
MANAGED
CISCO
MANAGED
In-house Control
Up-front Cost
Enterprise Owned Infrastructure
Automated / Optimized
Subscription Model
Cisco Owned Infrastructure
CAPEX OPEX
SERVICE PROVIDER /
PARTNER MANAGED
Automated / Optimized
Coordinated with Others Xaas Offers
Ent. / Sp. Owned Infrastructure
Get Agile User
• Seamless immersive
experience
IT
• Eliminate manual ACLs,
Class and Policy Maps
updates
• APIC-EM dynamically
enforces traffic policies
based on business
priorities
APIC-EM
Dynamic QoS
APIC-EM for IWAN
Intelligent Path Selection
App Prioritization
APIC-EM
Path Visualization
ACL Troubleshooting
User
• Company store opening in
jeopardy
• Preconfigured Meraki
solution delivered
• Immediately store is fully
connected
IT
• Faster, simplified
administration of remote
sites
• Lowered cost by bundling
software across multiple
technologies
Get Simple
Cloud-Managed Networking
Wi-Fi, Switching, Security
IWAN
Intelligent Path Selection
App Prioritization
CMX
Facebook WiFi
Location Analytics
Step 4
Protect your Business
It’s not a question of if, But when organisations will be breached.
The Costs of Inactivity
Highest-Risk Verticals for Malware Exposure in Asia Pacific
Insurance
6x Real Estate and Land
Management
3.5x
Automotive
3.4x Transportation and
Shipping
3.2x
Manufacturing
2.4x
Cyber Attacks
2x more likely in Asia
Security Everywhere
Embedded Security across Extended
Network
The Network as an Enforcer
The Network as a Sensor
Device
Infected!
Go to Self Help
Portal to Resolve
Your access to
the network is
refused or limited
Anamalous
Traffic
Pattern
Detected
NAC Web Agent NAC Web Agent
Your access has
been restored.
Network
As Enforcer
TrustSec
Network
As Sensor
Netflow
Intelligent WAN
Direct Internet Access
with Cloud Web Security
User
• Mobile device gets infected
outside enterprise
perimeter
• Upon re-connecting to
enterprise, anomalous
traffic pattern is detected
• User is redirected to self-
help portal
Get Secure
Fast IT Fast Innovation Business Transformation
The Foundation of Fast IT for Business Transformation
Automation tools
to SIMPLIFY
IT Operations
Extensible and flexible
for CUSTOMISATION
and
PERSONALISATION
Insights and
ANALYTICS for fast
decision making
Network as a Sensor
and Enforcer,
for THREAT
MITIGATION
SIMPLE OPEN AGILE SECURE
Cisco Enterprise Networks