Monetizing the Enterprise: Borderless Networks

8
© 2010 Cisco and/or its affiliates. All rights reserved. 1 Monetizing The Enterprise: Borderless Networks Michael Geller – Architect, SP Chief Technology Office 4 October, 2011

Transcript of Monetizing the Enterprise: Borderless Networks

Page 1: Monetizing the Enterprise: Borderless Networks

© 2010 Cisco and/or its affiliates. All rights reserved. 1

Monetizing The Enterprise:Borderless Networks

Michael Geller – Architect, SP Chief Technology Office

4 October, 2011

Page 2: Monetizing the Enterprise: Borderless Networks

CONSUMERIZATIONBring Your Own Device

CLOUD & VIRTUALIZATION

Access to Anything, AnywhereRICH COLLABORATION

Person To Wait For Page To Load Before Navigating Away

2000 2005 2009

8 secs

5 secs

3 secs

User Experience Drives Business Impact

User Experience Drives Business Impact

Networks Drive User Experience

Rich Video & Social Media

Our business environment is changingThe rise of the individual

Page 3: Monetizing the Enterprise: Borderless Networks

Customers Service Provider

PRIVATECLOUD

PUBLICCLOUDTHE NETWORK

Uncontrolled Device

Proliferation

Public & Private Cloud

Diverse, Rich, Collaborative Applications

+ +

We are at an Inflection Point

The result – our traditional networks become the Weakest Link

Page 4: Monetizing the Enterprise: Borderless Networks

PRIVATECLOUD

PUBLICCLOUD

BRANCH HEADEND

Security Built-In

Performance Optimized

Services On-Demand

Simplified Management

Context & Application Aware1

2

3

4

5

THE NETWORK

The Services Provider

Page 5: Monetizing the Enterprise: Borderless Networks

Abstract• The impact of the consumerization of IT and mobility

cannot be understated. The impact that these two key business elements have on the evolution of Enterprise Architecture and for Service Provider’s ability to offer services to Enterprises, Governments, and Consumers is addressed in this webinar. The importance of the shift and movement of the secure network edge leads to a very close examination of the changing threat vectors and vulnerabilities impacting our businesses today. Service delivery and consumption on the three “service horizons,” (Mobile Endpoint and CPE, Virtualized Network Edge/Data Center Edge, and the Cloud) is detailed.

Page 6: Monetizing the Enterprise: Borderless Networks

Visibility and Control

Total Visibility in all aspects of your network.

Complete Control over all traffic in the network & cloud.

Building a Secure Infrastructure for Profitable Services

Guaranteed Availability of all services.

Page 7: Monetizing the Enterprise: Borderless Networks

Visibility & Posture

Telstra Cloud:• Nexus 1kV (Netflow/VSG)• UCS: Software based Security

Services (FW, VPN, …)• Nexus 7k Security Services Mod• vWAAS• Enterprise-Hosted Ironport

Web/Content/Email Security/DLP• Scansafe Web Security• Identity/Policy Service Control

Full Service Branch • Firewall• IDS• Encryption (IPSEC

& SSL)• Trust & Identity• Email Security• Web/Content

Security• NAC• WAN Optimization

Multi-Tenant Access and aggregation:

• Session Border Controller• Firewall• IDS/IPS• IPSEC VPN• BNG (Subscriber Controls)• SSL VPN• Trust and Identity• Web/Content Security• Email Security• DLP

P

P

P

P

PE

P

P

PE(s)L2 Agg.

P P

Data Center/Cloud

ACCESS/AGGREGATION COREEndpt / CPE DC/CLOUD

Internet &Peering Edge

Public, Private & Hybrid Clouds

Service Center:• Remediation (quarantine)• Intrusion Detection/Prevention• VM Security & Nexus 1000V• Anomaly detection/Scrubbing• Policy Control Plane• Firewall & XML Firewall• Web/Content/Email Security

CPE:• Firewall• IDS• IPSEC & SSL VPN• Host Security• Control Plane

Security• Forwarding Plane

Security• Email Security• Web/Content

Security• NAC

Access and aggregation:• Basic infrastructure

security role•Control Plane Security•Data Plane Security

• Firewall• IDS/IPS• IPSEC VPN• DHCP—subscriber• SSL VPN• Trust and Identity• Web/Content Security• Email Security

Data/Service Center

Security Operations and Services

Security Experts SOC Processes SOC Toolsets

Security Operations Center One Time Services

Security Monitoring & Management VA PT Web Assessment & SSO MNAC

Mobility

Cable

Fixed Wireless

DSL

Enterprise

SIO, Platform Telemetry, 3rd party rules and systems, Regulatory Policy & Influence

Page 8: Monetizing the Enterprise: Borderless Networks

© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8Cisco Confidential 8© 2010 Cisco and/or its affiliates. All rights reserved.

Cisco Knowledge Network

To see our live webcast schedule, view past sessions on VoD and download the complete presentation, please

visit the Cisco Knowledge Network website at www.ciscoknowledgenetwork.com.

If you would like to get in touch with our technical experts or provide your feedback, please email us at

[email protected].

Thank you.