Upload
others
View
4
Download
0
Embed Size (px)
Citation preview
Cisco Customer Education Get Your Head in the Cloud with Cisco
This session was recorded via Cisco WebEx! You can watch the live session recording via the following URL:
https://acecloud.webex.com/acecloud/lsr.php?RCID=783951ad635e4e14beb50d3807f648a1
Thanks for your interest and participation!
Cisco Customer Education Get Your Head in the Cloud with Cisco
Connect using the audio conference box or you can call into the meeting:
1. Toll-Free: (866) 432-9903
2. Enter Meeting ID: 205 136 705 and your attendee ID number.
3. Press “1” to join the conference.
Presentation Agenda
► Who is Cisco?
► In The Beginning…
► Conclusion
► Cloud 101
► Cisco’s Cloud Strategy and Solutions
Priors: Cisco Sales and Channels (10 yrs) President and CEO (6 yrs) - Cisco Premier Partner Director of Sales (2 yrs) - Cisco Silver Partner Financial Analyst (7 yrs) - Sprint Corporation
About Your Host Brian Avery Territory Business Manager Cisco Systems, Inc.
Cisco Confidential 4 © 2013-2014 C isco a nd/or its a ffilia tes. All rights reserved.
Welcome from Cisco
Cisco Confidential 5
C omputer s cientis ts, Len B os ack and S andy Lerner found C is co S ys tems
B osack and Lerner run network cables between two different buildings on the S tanford Univers ity campus
A technology has to be invented to deal with disparate local area protocols ; the multi-protocol router is born
1984
Cisco Confidential 6
Who Is Cisco?
Chuck Robbins, CEO, Cisco
• Dow Jones Industrial Average Fortune 100 Company
• $145B Market Capitalization
• $48B in Revenue
• $8B in Annual Profits
• $33B More Cash than Debt
• $5.9B in Research and Development
http://finance.yahoo.com/q/ks?s=CSCO+Key+Statistics
Cisco Confidential 7 © 2013-2014 C isco a nd/or its a ffilia tes. All rights reserved.
Market Leadership Matters
No. 1
Voice
39%
No. 1
TelePresence
43%
No. 1
Web Conferencing
41%
No. 1
Wireless LAN
50%
No. 2
x86 Blade Servers
27%
No. 1
Routing Edge/Core/
Access 45%
No. 1
Security
33%
No. 1
Switching Modular/Fixed
64%
No. 1
Storage Area Networks
47%
Q1CY14
Cisco Confidential 8 © 2013-2014 C isco a nd/or its a ffilia tes. All rights reserved.
§ C C E is an educational sess ion for current and prospective C isco customers
§ Designed to help you understand the capabilities and bus iness benefits of C isco technologies
§ Allow you to interact directly with C isco subject matter experts and ask questions
§ Offer ass is tance if you need/want more information, demonstrations , etc.
What Is the Cisco Customer Education Series?
Cisco Confidential 9 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
In the Beginning…there was the Byte
Cisco Confidential 10 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
First came the Mainframe …
1960 2014 2000 1970 1980 1990
Mainframe
Minicomputer
Centralized Computing
Bytes Kilobytes 1 1,000
Cisco Confidential 11 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Then, Came Decentralization …
1960 2014 2000 1970 1980 1990
Mainframe
Minicomputer
Client Server
Web Centralized Computing
Decentralization
Bytes Kilobytes Megabytes Gigabytes 1 1,000 1,000,000 1,000,000,000
Cisco Confidential 12 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Then Came Virtualization …
1960 2015 2000 1970 1980 1990
Mainframe
Minicomputer
Client Server
Web
Virtualization
Centralized Computing
Decentralization
Bytes Kilobytes Megabytes Gigabytes Terabytes 1 1,000 1,000,000 1,000,000,000 1,000,000,000,000
Cisco Confidential 13 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
The Next Step … Cloud Computing
1960 2015 2000 1970 1980 1990
Mainframe
Minicomputer
Client Server
Web
Virtualization Cloud
Centralized Computing
Decentralization
Bytes Kilobytes Megabytes Gigabytes Terabytes Petabytes 1 1,000 1,000,000 1,000,000,000 1,000,000,000,000 1,000,000,000,000,000
Cisco Confidential 14 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved. Petabyte, Exabyte, Zettabyte, then Yottabyte
Cisco Confidential 15 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
The world’s largest taxi company owns
no vehicles.
Cisco Confidential
The world’s most popular media
company creates no content.
The world’s most valuable retailer has
no inventory.
The world’s largest accommodation
provider owns no real estate.
Explosion of Digital Businesses
78% Workloads processed
in Cloud DCs by 2018
5TB+ of data per person
by 2020
180B Mobile apps downloaded
in 2015
30M New devices connected every week
277X Data created by IoE devices
v. end-user
Data Center and Cloud Power Digital Disruption
4.2B Web filtering blocks per
day
The Mighty Will Fall Disruption to Shake Up all Industries, and Shake Out 4 of 10 Market Leaders
Source: Global Center for Digital Business Transformation, 2015
4 out of 10 Displaced Existential Threat
*Disruption = Substantial change in market share among incumbents
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Cisco Confidential © 2012 Cisco and/or its affiliates. All rights reserved. 18
Cisco Cloud Strategy
What Characterizes the Cloud?
Traditional Computing
Dedicated
Traditional hardware procurement
New services added manually
Months
Incremental CAPEX purchases
Shared, Multi-tenant, Private, Hybrid
Self service
Scale on-demand
Minutes
Pay per use, OPEX
Consumption
Ease of Use
Scalability
Provisioning
Cost
Cloud Computing
Cisco Cloud Deployment Models Delivered by Cisco and Cisco Partners
Private Cloud
On P remise
P ublic C loud
Multi-Tenant Deployments
Hybrid C loud
On and Off P remise
ü C ustomer owned ü C ustomer or P artner builds cloud
ü C ustomer owns private cloud ü S ervice P rovider owns and rents
the public cloud
ü S ervice P rovider owns and rents the public cloud
v C isco products and architectures v C isco E nablement S ervices v C isco and/or 3rd party applications
Cisco Confidential 21 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Need To Prepare for Both Traditional and Cloud Native Application Deployment
Cisco Confidential
Many Applications
Traditional
Server Single Server
SCM ERP/Financial Client/Server CRM Email
Hypervisor
New Model for Application Development
Many Servers
Single Application
Cloud Native
Online Content Gaming Mobile IoT E-Commerce
APP
Cisco Confidential 22 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Exponential Growth of Shadow Cloud
2H 2014 1H 2015
17% Growth
Based on Cisco Cloud Consumption Service engagements with large enterprise customers
Cloud Use In Enterprise Shadow Cloud Challenge
575
675
Customers use 675 cloud services on average
15-22X more cloud services purchased
without IT involvement
Cisco Confidential
Cisco Confidential 23 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Choice, Compliance, Control
Leads to New Customer Business Problems
Global Presence
Data & Analytics
Infinite Scale
Backup and Availability
Development and Testing
Cisco Confidential
Cisco Confidential 24 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
SaaS
PaaS IaaS
A Broader Perspective Is Required…
Cisco Confidential
Data Center Cloud Edge / IoT
Cisco Confidential
Security Everywhere
Cisco Confidential 25 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
…to Balance New and Existing Requirements
SaaS
PaaS IaaS
Cisco Confidential
Data Center Cloud Edge/IoT
Cisco Confidential
Cisco Confidential 26 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
…to Balance New and Existing Requirements
SaaS
PaaS IaaS
Traditional Applications
ERP, Financial, Client/Server,
CRM, Email
Cisco Confidential
Data Center Cloud Edge/IoT
Cisco Confidential
Cisco Confidential 27 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
…to Balance New and Existing Requirements
SaaS
PaaS IaaS
Traditional Applications
ERP, Financial, Client/Server,
CRM, Email
Cloud Native Applications
IoT, Big Data, Analytics,
Gaming
Cisco Confidential
Data Center Cloud Edge/IoT
Cisco Confidential
Cisco Confidential 28 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Intercloud Is Our Hybrid Cloud Strategy To Harness the World of Many Clouds and Digitization
Cisco Intercloud Marketplace
Intercloud
Alliance
Public Clouds
Intercloud Services
Intercloud Providers
Enterprise Private Cloud
Cisco Confidential
Public Cloud
Cisco ONE Enterprise Cloud Suite
Cisco UCSO®
Cisco Metapod™ Platform
Private Clouds
Same Code Base
Same Applications
Same Operational Model
Seamless Connectivity
Unified Experience
Intercloud
Cisco Confidential 29 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Efficiency
+ Disruption
+ Speed
SaaS
PaaS IaaS Cisco UCS
Cisco Nexus
Cisco ONE
ACI Programmable
Fabric Programmable
Network
Programmable Fabric
Programmable Network
Data Center Cloud Edge / IoT
Connected Mobile Experiences EnergyManagement
Spark
Cisco and Partner Intercloud Services
Cisco Metapod
Cisco ONE Enterprise Cloud Suite
Policy-Driven Infrastructure
Private and Hybrid Cloud
Software
Cloud Offers SaaS
FirePOWER on ACI
TrustSec + ACI
ASA with FirePOWER Services
Cloud Web Security (CWS)
Advanced Malware Protection (AMP)
Everywhere
AnyConnect
Ruggedized Cisco ASA
with FirePOWER
Services
Security Everywhere Cisco Confidential
Industry’s Best Hybrid Cloud Portfolio
Data Virtua liza tion
P roprietary + C us tom = Lock In
Cisco InterCloud
Cisco’s Hybrid Cloud Differentiation
Customer
Cloud Providers
Choice Open
vCloud Hybrid Services™
No Vendor Lock-In
Any Hypervisor to Any P rovider
Heterogeneous Infrastructure
E nd-to-E nd S ecurity
Unified Workload Management and G overnance
Workload Mobility Across C louds marketplace.cisco.com/cloud
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31 Cisco Confidential © 2012 Cisco and/or its affiliates. All rights reserved. 31
Cisco Cloud Solutions
Cisco Confidential 32 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Infrastructure as a Service Solutions
Hosted Collaboration Solutions
Unified Communications
Customer Collaboration
TelePresence
DaaS Solutions
• Compute (IaaS) • Disaster Recovery
As A Service (DRaaS) • Hosted
Security (HSS)
• Desktop As A Service
• VXI As A Service
Cisco’s Solutions for Enabling the Cloud Pre-Integrated and Tested Solutions
Cisco Confidential 33 © 2013-2014 C isco a nd/or its a ffilia tes. All rights reserved.
Infrastructure-as-a-Service (IaaS) Summary
What Is It?
• A service that allows
customer to leverage Compute, Network, Storage and related services for a Monthly Recurring Charge (MRC)
• Leverages Integrated Compute, Storage, Network, and Software technologies
• Offered in either a managed/hosted private Cloud, Public Cloud or Virtual Private Cloud (VPC)
What Services?
• Virtual Machines of Various
types, Bare Metal Servers • Storage Services • Network (Virtual Data
Center (VDC), Load Balancer
• Security - FW, IDS/IPS • Assurance, Performance
and SLA
Why IaaS?
For Businesses • Business Security and
Resiliency • Business Agility • Predictable Operating
Expenses • Control and management of
Shadow IT activities • Development and Testing
Cisco Confidential 34 © 2013-2014 C isco a nd/or its a ffilia tes. All rights reserved.
Disaster-Recovery-as-a-Service (DRaaS) Summary
What Is It?
• Allows Customers to
leverage a Cloud Service Provider for DR in the cloud for assets at customer site
• Provides immediately bootable shadow VMs
• Recovery Time Objective of 1 to 4 hours typical
• Typically leverages existing IaaS platform for scale and CapEx efficiency
What Services?
• Shadow VMs, recovery
resource pools • Recovery network/ VDC • Storage Services
Shadow VM datastores NAS/ SAN vaulting
Why DRaaS?
For Businesses • Better DR at less cost via
oversubscription, scale and specialization
• Focus on core business vs. infrastructure
• Provide unparalleled business resiliency and disaster recovery to protect against business continuity risks
Cisco Confidential 35 © 2013-2014 C isco a nd/or its a ffilia tes. All rights reserved.
Desktop-as-a-Service (DaaS) Summary
What Is It?
• A service to allows a
customer to deploy and manage user desktop environments for a fee per desktop in the cloud
• Leverages Virtual Desktop Interface (VDI) and Associated Technologies
• Typically includes OS and Hypervisor but can bundle apps
How Is It Deployed?
Can be on-premise (managed), hosted or cloud based • Hosted Shared Desktops • Hosted Server VDI
(Server OS) • Hosted VDI (Client OS) • Application Virtualization
Delivery
Why DaaS?
For Businesses • Flexible, Secure and Agile
Desktop Operations • Predictable OpEx Model • Enable BYOD and Mobile /
Remote user productivity
Cisco Confidential 36 © 2013-2014 C isco a nd/or its a ffilia tes. All rights reserved.
Hosted Security as a Service (HSS) – Summary
What Is It?
• A service which allows
a customer to leverage a cloud-managed security platform from a Cloud Services Provider for a Monthly Recurring Charge (MRC)
• Leverages Cisco’s virtual security appliances and IaaS architecture
What Services?
• Firewall as a Service • VPN as a Service • Email Security as a Service • Web Security as a Service • Security dashboard,
reporting, customer self service portal
Why HSS?
For Businesses • Evergreen services:
Always up-to-date security protection
• Predictable IT cost
Cisco Confidential 37 © 2013-2014 C isco a nd/or its a ffilia tes. All rights reserved.
Cisco Hosted Collaboration Solution (HCS)
HCS Management Platform
UC Applications
UCS Server Platform
Data Center and Security Architecture
Customer #1
Customer #2
Customer #3
HCS Web Portal
Cisco Confidential 38 © 2013-2014 C isco a nd/or its a ffilia tes. All rights reserved.
Services Product
Voice & Video Unified Communications Manager, Unified IP Phones, Jabber
Voice Mail & Integrated Messaging Unity Connection
Instant Messaging & Presence Unified Presence, Jabber
Mobility Services Rich Mobile Device Support
Meetings WebEx Meeting Center
C ustomer C ollaboration Cisco Unified Contact Center
TelePresence Internal, B2B, B2C, CMR, Desktop and Immersive
Cisco HCS Collaboration Applications Supported
Cisco Confidential 39 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Industry-Leading XaaS Solutions from Cisco
Cloud Networking
Cloud Web Security
WebEx Conferencing IM
and Presence
Cisco Confidential 40 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Cloud Collaboration and Conferencing
http://www.webex.com/products/web-conferencing.html
Cisco Confidential 41 © 2013-2014 C isco a nd/or its a ffilia tes. All rights reserved.
Meeting Complexity
How do I connect everyone together? In one meeting? Let’s Meet What devices
will be used? How many people
in my meeting? Where is everyone
joining from?
Cisco Confidential 42 © 2013-2014 C isco a nd/or its a ffilia tes. All rights reserved.
Audio Conferencing
Video Conferencing
Web Conferencing
Conferencing Conundrum
P roductivity Value C us tomer Adoption
Cisco Confidential 43 © 2013-2014 C isco a nd/or its a ffilia tes. All rights reserved.
Web Conferencing
Video Conferencing
Audio Conferencing Conferencing
WebEx for Structured Meetings
§ Industry-leading web conferencing ̵ Audio, web, and high-definition video ̵ WebEx® Meetings, Training, Events, and
Support versions
§ Document, application, desktop sharing § One-time and scheduled meetings,
including scheduling with Outlook and Lotus Notes
WebEx Market Share Leader for Global SaaS Web Conferencing
Cisco WebEx 51% 51% Market Share
Cisco WebEx® Leads the Market
Source: Synergy Research 2014 InterCall 4%
Adobe 5%
Others 7%
Citrix Online 22%
Microsoft 11%
Hub
Cisco WebEx Cloud
Cisco WebEx Cloud Secure, global meetings delivered by Cisco
Global Scale
Optimized for Collaboration and Content Distribution
Highly Availability, Performance/Speed
Multi-layer Security
WebEx Personal Meeting Rooms
Simplicity = Adoption
Record the meeting
Lock the Room See and Control the Roster
WebEx Conferencing in your Pocket No compromise mobile Experience
@WebEx experience
Seamless Collaboration Before, During and After meeting
Before
After
Cisco Confidential 50 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
CMR Cloud – Connect Your Way WebEx Personal Rooms with Cloud-based WebEx Video Bridge
Cisco® WebEx Cloud
Desktop Collaboration
WebEx Mobile Jabber Mobile
Cisco TelePresence Endpoints
3rd Party Standards Based Telepresence
Endpoints WebEx Desktop,
Jabber Lync
Cisco Confidential 51 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Cisco Web Security
http://www.cisco.com/c/en/us/products/security/cloud-web-security/index.html
Cisco Confidential 52 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Web Security Is More Important Than Ever Before
The web is a popular attack vector for criminals
Without proper control, your own users can put your business at risk
Increased cloud adoption creates greater vulnerabilities
Cisco Confidential 53 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Superior Flexibility Advanced Threat Protection
Cisco Web Security Delivers…
Comprehensive Defense
Deploy, manage, and scale easily to fit your business
Protect against advanced threats with adaptive web
security
Defend and control with best-in-class, cloud-delivered web
security
Cisco Confidential 54 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
It Starts with Usage Controls and an Active Defense
Comprehensive Defense
Web Usage Control
Web Usage Control
Web Filtering
Block over 50 million known malicious sites
Web Reputation
Restrict access to sites based on assigned reputation score
Dynamic Content Analysis
Categorize webpage content and block sites automatically
Web Usage Reporting
Gain greater visibility into how web resources are used
Roaming Laptop-User Protection
Extend security beyond the network to include mobile users
Application Visibility and Control
Regulate access to individual website components and apps
Outbreak Intelligence
Identify unknown malware and zero-hour outbreaks in real time
Centralized Cloud Management
Enforce policies from a single, centralized location
Cisco Confidential 55 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
And Combats Evolving Threats and Advanced Malware
Advanced Threat Protection
Cisco® Advanced Malware Protection (AMP)
File Reputation Increase the accuracy of threat detection by examining every aspect of a file
File Sandboxing Determine the malicious intent of a file before it enters the network
File Retrospection Identify a breach faster by tracking a file’s disposition over time
Cisco Confidential 56 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
The Solution Works with Your Evolving Business Model
Superior Flexibility
Multiple Traffic Redirection Methods Connect Cisco® CWS to your current infrastructure
ASA / ASAv
Standalone WSA / WSAv
ISR G2
AnyConnect®
$ $ $
True Security as a Service Manage CapEx and OpEx as your business grows
Cisco Confidential 57 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
1.6 million global sensors
100 TB of data received per day
150 million+ deployed endpoints
600+ engineers, technicians, and researchers
35% w orldw ide email traff ic
13 billion w eb requests
24-hour daily operations
40+ languages
Cisco Web Security with AMP Built on Talos: Superior Security Intelligence
10I000 0II0 00 0III000 II1010011 101 1100001 110 110000III000III0 I00I II0I III0011 0110011 101000 0110 00
I00I III0I III00II 0II00II I0I000 0110 00
180,000+ file samples per day
FireAMP™ community
Advanced Microsoft and industry disclosures
Snort and ClamAV open source communities
Honeypots
Sourcefire AEGIS™ program
Private and public threat feeds
Dynamic analysis
101000 0II0 00 0III000 III0I00II II II0000I II0 1100001110001III0 I00I II0I III00II 0II00II 101000 0110 00
100I II0I III00II 0II00II I0I000 0II0 00
Cisco® SIO Sourcefire®
Vulnerability Research Team
(VRT)
Email Endpoints Web Networks IPS Devices
WWW
Cisco Talos
WSA or CWS
Cisco Confidential 58 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Reputation Analysis The Power of Real-Time Context
Suspicious Domain Owner
Server in High Risk Location
Dynamic IP Address
Domain Registered
< 1 Min 192.1.0.68 example.com Example.org 17.0.2.12 Beijing London San Jose Kiev HTTP SSL HTTPS
Domain Registered
> 2 Year
Domain Registered < 1 Month
Web Server < 1 Month
Who How Where When
0101 1100110 1100 111010000 110 0001110 00111 010011101 11000 0111 0001110 1001 1101 1110011 0110011 101000 0110 00 0111000 111010011 101 1100001 1 0010 010 10010111001 10 100111 010 00010 0101 110011 011 001 110100001100001 1100 0111010011101 1100001110001110 1001 1101 1110011 0110011 101000 011
010 10010111001 10 100111 010 000100101 110011 01100111010000110000111000111010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00 011
-10 -9 -8 -7 -6 -5 -4 -3 -2 -1 0 1 2 3 4 5 6 7 8 9 10 IP Reputation Score
Cisco Confidential 59 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Loss of Productivity Is a Threat How Much Bandwidth and Time Is Being Wasted?
Facebook time: 2,110,516 minutes or 35,175 hours, 1465 days, 4.1 years # of Facebook likes: 3,925,407 at 1 second per like. That’s almost 1100 hours per day, or 45 days just liking things
Bytes on YouTube video playback: 11,344,463,363,245 or 10 TB
Pandora: 713,884,303,727 or 0.6 TB
Total browsing time per day: 2,270,690,423 or 4,320 years Total bytes per day: 70,702,617,989,737 or 64 TB; over 15% from YouTube
Source: Cloud Web Security Report
Cisco Confidential 60 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Time and Volume Quotas Intelligent Controls of Bandwidth Usage
► Control web usage to meet administrative policies, such as: - Total bandwidth used during work hours - Total bandwidth per day used for social media categories
► Configure polices to restrict access based on the amount of data (in bytes) and time
► Quotas are applicable to HTTP, HTTPS, and FTP traffic
► Configured under access policies and decryption policies
► Create custom end-user notifications of warnings when a quota is close, as well as when exceeded
Cisco Confidential 61 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Acceptable Use Controls Beyond URL Filtering
URL Filtering
► Constantly updated URL database covering over 50 million sites worldwide
► Real-time dynamic categorization for unknown URLs
HTTP://
Application Visibility and Control (AVC)
Hundreds of Apps
Application Behavior
150,000+ Micro-Apps
► Control over mobile, collaborative, and web 2.0 applications
► Assured policy control over which apps can be used by which users and devices
► Granular enforcement of behaviors within applications
► Visibility of activity across the network
Introducing Cisco Meraki Cloud-Managed Networking http://meraki.cisco.com/
Cisco Confidential 63 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Meraki MS Ethernet Switches
Meraki SME Enterprise Mobility
Management
Meraki MR Wireless LAN
Meraki MX Security
Appliances
Cisco Confidential 64 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Management data (1 kb/s)
WAN
Scalable – Unlimited throughput: no centralized controller bottlenecks – Add devices or sites in minutes
Reliable
– Cloud service provides high availability, configuration backups
– Network functions even if management traffic is interrupted
Secure – No user traffic passes through cloud – Fully HIPAA / PCI compliant
Cisco Confidential 65 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
65
Outdoor APs
3 Stream Triple-Radio 802.11ac 1.75 Gbit/s
MR18 MR26 2 Stream Triple-Radio 802.11a/b/g/n 600 Mbit/s
3 Stream Triple-Radio 802.11a/b/g/n 900 Mbit/s
MR34 2 Stream Triple-Radio 802.11ac 1.2 Gbit/s
MR32
2 Stream Triple-Radio 802.11ac 1.2 Gbit/s
MR72
NEW
NEW
Indoor APs
MR66 Dual-Radio 802.11a/b/g/n 600 Mbit/s
MR62 Single-Radio 802.11b/g/n 300 Mbit/s
Cisco Confidential 66 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Presence Analytics: Understand engagement
API: Real time analytics data directly to customer
Facebook Login: Increase Social Media footprint
Application Finger Printing: Layer 7 and QoS
BLE and Beacons: Asset tracking and app integration
Cisco Confidential 67 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
MX Next Generation Security Appliances
Application Control intelligent WAN Optimization, Traffic Shaping, Content Filtering
Ironclad Security NGFW, Sourcefire, Auto Site-to-Site VPN, Client VPN, IDS
Networking NAT/DHCP, Routing, Link Balancing
Cisco Confidential 68 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
§ Gigabit edge switches in 24 and 48 port configurations with available PoE/PoE+
§ Layer 2 and 3 options
§ Primary Differentiators: Virtual Stacking, visibility and live tools
MS Access Switches
Voice and video QoS
Layer 7 app visibility
Virtual stacking
PoE / PoE + on all ports
Remote packet capture, cable testing
Fastest Growing Meraki Product in % Bookings
Switch highlights
Cisco Confidential 69 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Meraki Systems Manager Cloud Managed Mobility Management Provision, monitor, and secure mobile devices
Flexible, easy provisioning
Centrally scale 100,000s devices worldwide
Auto-tagging, dynamic security compliance
Integrate seamlessly with the rest of your Cisco
network
The Cisco Spark Service
One Offer
One Experience
Message Meeting Call 1:1 and team messaging in virtual rooms
Persistent Chat, Content Sharing, Iteration
Voice and video calling via a cloud based PBX1
Make calls within or outside organization via the PSTN
Audio, video, and web meetings
Before/during/after-meeting messaging and content
Cisco Spark
1 The Cisco Spark service doesn’t include PSTN services. Customers need to purchase PSTN services from a 3rd party provider. For the complete Spark service, Cisco preferred media provider ecosystem partners can provide PSTN local, long-distance, and direct-inward-dial services. Existing Cisco UC customers will use Spark Hybrid Services to connect on-premises call capabilities to Cisco Spark capabilities in the cloud.
The Cisco Spark App / Client
Message Meeting Call
One Experience
Provides users the ability to access, consume, and control
the Cisco Spark service
Spark Phone OS &
Spark Room OS
Spark Service Endpoints
Cisco Hybrid
Cisco Collaboration
Cloud
Cisco On-Premises &
Partner Hosted HCS
Cisco Phone
Cisco Room System
One Offer
Open Platform
Common Management
Application Integration APIs
Spark Hybrid Services Cloud + Prem
Partner Services Interconnect
Message Meeting Call
Communications Manager
Business Edition Series
HCS Delivered Services
Spark Hybrid Services
Message Meeting Call
Connect existing Cisco calling capabilities to Cisco Spark capabilities in the cloud
Hybrid Services
Cloud Collaboration Management Portal
• Automated provisioning • License management (user/group) • Device management • Usage reports and analytics • Service monitoring and support § Security & policy management
Simply Communicate Better One Service, One Experience, for Every Employee
HD Audio and Video Conferencing File
Sharing 1:1 and Team Messaging in Virtual Rooms
Mobile App / Client
Desk and Room Devices
Cisco Confidential 78 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved. Cisco Confidential 78 © 2012 Cisco and/or its affiliates. All rights reserved.
Conclusion
78
Cisco Confidential 79 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Start Your Cloud Journey…. CxO, CIO, and Technical Decision Maker
CxO and CIO Business Focus
Reduce CapEx and OpEx
Gain Business Agility and Simplicity
Increase Employee Productivity
Manage Risk Effectively
Maintain Regulatory Compliance
Accelerate Deployments Maintain Security
Integrate Network Services Simplify Management On-Demand Scalable
Apps/Services
Cisco Meets Your Needs
Technical Buyer IT Considerations
Cisco Confidential 80 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
Thank You and Next Steps
Brian Avery [email protected]
Contact Your Cisco Partner https://marketplace.cisco.com/cloud www.
Learn more about Cisco Cloud Solutions: www.cisco.com/go/cloud/
Cisco Confidential 81 C97-731719-02 © 2014 Cisco and/or its affi l iates. All rights reserved.
§ CCE sessions are held weekly on a variety of topics
§ CCE sessions can help you understand the capabilities and business benefits of Cisco technologies
§ Watch replays of past events and register for upcoming events!
Visit http://cs.co/cisco101 for details
Join us again for a future Cisco Customer Education Event
Thank you.