Upload
others
View
5
Download
0
Embed Size (px)
Citation preview
Cisco Customer Education What's Your Cloud Strategy? New Cloud Options from Cisco
This session was recorded via Cisco WebEx! You can watch the live session recording via the following URL:
https://acecloud.webex.com/acecloud/lsr.php?RCID=b27c6b83d54b4c6b956a1e451cca02d4
Thanks for your interest and participation!
Cisco Customer Education What's Your Cloud Strategy? New Cloud Options from Cisco
Connect using the audio conference box or you can call into the meeting:
1. Toll-Free: (866) 432-9903
2. Enter Meeting ID: 201 378 022 and your attendee ID number.
3. Press “1” to join the conference.
Presentation Agenda
► Who is Cisco?
► In The Beginning…
► Conclusion
► Cloud 101
► Cisco’s Cloud Strategy and Solutions
Priors: Cisco Sales and Channels (10 yrs) President and CEO (6 yrs) - Cisco Premier Partner Director of Sales (2 yrs) - Cisco Silver Partner Financial Analyst (7 yrs) - Sprint Corporation
About Your Host Brian Avery Territory Business Manager Cisco Systems, Inc.
Cisco Confidential 4 © 2014 C is co and/or its affiliates . All rights res erved.
Who Is Cisco?
Cisco Confidential 5 © 2014 C is co and/or its affiliates . All rights res erved.
C omputer s cientis ts , Len B os ack and S andy Lerner found C is co S ys tems
B os ack and Lerner run network cables between two different buildings on the S tanford Univers ity campus
A technology has to be invented to deal with dis parate local area protocols ; the multi-protocol router is born
1984
Cisco Confidential 6 © 2014 C is co and/or its affiliates . All rights res erved.
Who Is Cisco?
Chuck Robbins, CEO, Cisco
• Dow Jones Industrial Average Fortune 100 Company
• $145B Market Capitalization
• $48B in Revenue
• $8B in Annual Profits
• $33B More Cash than Debt
• $5.9B in Research and Development
http://finance.yahoo.com/q/ks?s=CSCO+Key+Statistics
Cisco Confidential 7 © 2014 C is co and/or its affiliates . All rights res erved.
Market Leadership Matters
No. 1
Voice
39%
No. 1
TelePresence
43%
No. 1
Web Conferencing
41%
No. 1
Wireless LAN
50%
No. 2
x86 Blade Servers
27%
No. 1
Routing Edge/Core/
Access 45%
No. 1
Security
33%
No. 1
Switching Modular/Fixed
64%
No. 1
Storage Area Networks
47%
Q1CY14
Cisco Confidential 8 © 2014 C is co and/or its affiliates . All rights res erved.
§ C C E is an educational sess ion for current and prospective C isco cus tomers
§ Designed to help you understand the capabilities and bus iness benefits of C is co technologies
§ Allow you to interact directly with C is co subject matter experts and ask ques tions
§ Offer ass is tance if you need/want more information, demonstrations , etc.
What Is the Cisco Customer Education Series?
Cisco Confidential 9 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
In the Beginning…there was the Byte
Cisco Confidential 10 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
First came the Mainframe …
1960 2014 2000 1970 1980 1990
Mainframe
Minicomputer
Centralized Computing
Bytes Kilobytes 1 1,000
Cisco Confidential 11 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Then, Came Decentralization …
1960 2014 2000 1970 1980 1990
Mainframe
Minicomputer
Client Server
Web Centralized Computing
Decentralization
Bytes Kilobytes Megabytes Gigabytes 1 1,000 1,000,000 1,000,000,000
Cisco Confidential 12 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Then Came Virtualization …
1960 2015 2000 1970 1980 1990
Mainframe
Minicomputer
Client Server
Web
Virtualization
Centralized Computing
Decentralization
Bytes Kilobytes Megabytes Gigabytes Terabytes 1 1,000 1,000,000 1,000,000,000 1,000,000,000,000
Cisco Confidential 13 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
The Next Step … Cloud Computing
1960 2015 2000 1970 1980 1990
Mainframe
Minicomputer
Client Server
Web
Virtualization Cloud
Centralized Computing
Decentralization
Bytes Kilobytes Megabytes Gigabytes Terabytes Petabytes 1 1,000 1,000,000 1,000,000,000 1,000,000,000,000 1,000,000,000,000,000
Cisco Confidential 14 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential 15 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
The world’s largest taxi company owns
no vehicles.
Cisco Confidential
The world’s most popular media
company creates no content.
The world’s most valuable retailer has
no inventory.
The world’s largest accommodation provider owns no
real estate.
Explosion of Digital Businesses
78% Workloads processed
in Cloud DCs by 2018
5TB+ of data per person
by 2020
180B Mobile apps downloaded
in 2015
30M New devices connected every week
277X Data created by IoE devices
v. end-user
Data Center and Cloud Power Digital Disruption
4.2B Web filtering blocks per
day
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Cisco Confidential © 2012 Cisco and/or its affiliates. All rights reserved. 17
Cisco Cloud Strategy
What Characterizes the Cloud?
Traditional Computing
Dedicated
Traditional hardware procurement
New services added manually
Months
Incremental CAPEX purchases
Shared, Multi-tenant, Private, Hybrid
Self service
Scale on-demand
Minutes
Pay per use, OPEX
Consumption
Ease of Use
Scalability
Provisioning
Cost
Cloud Computing
Cisco Cloud Deployment Models Delivered by Cisco and Cisco Partners
Private Cloud
On P remise
P ublic C loud
Multi-Tenant Deployments
Hybrid C loud
On and Off P remise
ü C us tomer owned ü C us tomer or P artner builds cloud
ü C us tomer owns private cloud ü S ervice P rovider owns and rents
the public cloud
ü S ervice P rovider owns and rents the public cloud
v C is co products and architectures v C is co E nablement S ervices v C is co and/or 3rd party applications
Cisco Confidential 20 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Need To Prepare for Both Traditional and Cloud Native Application Deployment
Cisco Confidential
Many Applications
Traditional
Server Single Server
SCM ERP/Financial Client/Server CRM Email
Hypervisor
New Model for Application Development
Many Servers
Single Application
Cloud Native
Online Content Gaming Mobile IoT E-Commerce
APP
Cisco Confidential 21 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Exponential Growth of Shadow Cloud
2H 2014 1H 2015
17% Growth
Based on Cisco Cloud Consumption Service engagements with large enterprise customers
Cloud Use In Enterprise Shadow Cloud Challenge
575
675
Customers use 675 cloud services on average
15-22X more cloud services purchased
without IT involvement
Cisco Confidential
Cisco Confidential 22 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Choice, Compliance, Control
Leads to New Customer Business Problems
Global Presence
Data & Analytics
Infinite Scale
Backup and Availability
Development and Testing
Cisco Confidential
Cisco Confidential 23 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
SaaS
PaaS IaaS
A Broader Perspective Is Required…
Cisco Confidential
Data Center Cloud Edge / IoT
Cisco Confidential
Security Everywhere
Cisco Confidential 24 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
…to Balance New and Existing Requirements
SaaS
PaaS IaaS
Cisco Confidential
Data Center Cloud Edge/IoT
Cisco Confidential
Cisco Confidential 25 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
…to Balance New and Existing Requirements
SaaS
PaaS IaaS
Traditional Applications
ERP, Financial, Client/Server,
CRM, Email
Cisco Confidential
Data Center Cloud Edge/IoT
Cisco Confidential
Cisco Confidential 26 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
…to Balance New and Existing Requirements
SaaS
PaaS IaaS
Traditional Applications
ERP, Financial, Client/Server,
CRM, Email
Cloud Native Applications
IoT, Big Data, Analytics,
Gaming
Cisco Confidential
Data Center Cloud Edge/IoT
Cisco Confidential
Cisco Confidential 27 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Intercloud Is Our Hybrid Cloud Strategy To Harness the World of Many Clouds and Digitization
Cisco Intercloud Marketplace
Intercloud
Alliance
Public Clouds
Intercloud Services
Intercloud Providers
Enterprise Private Cloud
Cisco Confidential
Public Cloud
Cisco ONE Enterprise Cloud Suite
Cisco UCSO®
Cisco Metapod™ Platform
Private Clouds
Same Code Base
Same Applications
Same Operational Model
Seamless Connectivity
Unified Experience
Intercloud
Cisco Confidential 28 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Efficiency
+ Disruption
+ Speed
SaaS
PaaS IaaS Cisco UCS
Cisco Nexus
Cisco ONE
ACI Programmable
Fabric Programmable
Network
Programmable Fabric
Programmable Network
Data Center Cloud Edge / IoT
Connected Mobile Experiences EnergyManagement
Spark
Cisco and Partner Intercloud Services
Cisco Metapod
Cisco ONE Enterprise
Cloud Suite
Policy-Driven Infrastructure
Private and Hybrid Cloud
Software
Cloud Offers SaaS
FirePOWER on ACI
TrustSec + ACI
ASA with FirePOWER Services
Cloud Web Security (CWS)
Advanced Malware Protection (AMP)
Everywhere
AnyConnect
Ruggedized Cisco ASA
with FirePOWER
Services
Security Everywhere Cisco Confidential
Industry’s Best Hybrid Cloud Portfolio
Data Virtualization
P roprietary + C us tom = Lock In
Cisco InterCloud
Cisco’s Hybrid Cloud Differentiation
Customer
Cloud Providers
Choice Open
vCloud Hybrid Services™
No Vendor Lock-In
Any Hypervis or to Any P rovider
Heterogeneous Infras tructure
E nd-to-E nd S ecurity
Unified Workload Management and G overnance
Workload Mobility Acros s C louds marketplace.cis co.com/cloud
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30 Cisco Confidential © 2012 Cisco and/or its affiliates. All rights reserved. 30
Cisco Cloud Solutions
Cisco Confidential 31 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Infrastructure as a Service Solutions
Hosted Collaboration Solutions
Unified Communications
Customer Collaboration
TelePresence
DaaS Solutions
• Compute (IaaS) • Disaster Recovery
As A Service (DRaaS) • Hosted
Security (HSS)
• Desktop As A Service
• VXI As A Service
Cisco’s Solutions for Enabling the Cloud Pre-Integrated and Tested Solutions
Cisco Confidential 32 © 2013-2014 C is co and/or its affiliates . All rights res erved.
Infrastructure-as-a-Service (IaaS) Summary
What Is It?
• A service that allows
customer to leverage Compute, Network, Storage and related services for a Monthly Recurring Charge (MRC)
• Leverages Integrated Compute, Storage, Network, and Software technologies
• Offered in either a managed/hosted private Cloud, Public Cloud or Virtual Private Cloud (VPC)
What Services?
• Virtual Machines of Various
types, Bare Metal Servers • Storage Services • Network (Virtual Data
Center (VDC), Load Balancer
• Security - FW, IDS/IPS • Assurance, Performance
and SLA
Why IaaS?
For Businesses • Business Security and
Resiliency • Business Agility • Predictable Operating
Expenses • Control and management of
Shadow IT activities • Development and Testing
Cisco Confidential 33 © 2013-2014 C is co and/or its affiliates . All rights res erved.
Disaster-Recovery-as-a-Service (DRaaS) Summary
What Is It?
• Allows Customers to
leverage a Cloud Service Provider for DR in the cloud for assets at customer site
• Provides immediately bootable shadow VMs
• Recovery Time Objective of 1 to 4 hours typical
• Typically leverages existing IaaS platform for scale and CapEx efficiency
What Services?
• Shadow VMs, recovery
resource pools • Recovery network/ VDC • Storage Services
Shadow VM datastores NAS/ SAN vaulting
Why DRaaS?
For Businesses • Better DR at less cost via
oversubscription, scale and specialization
• Focus on core business vs. infrastructure
• Provide unparalleled business resiliency and disaster recovery to protect against business continuity risks
Cisco Confidential 34 © 2013-2014 C is co and/or its affiliates . All rights res erved.
Desktop-as-a-Service (DaaS) Summary
What Is It?
• A service to allows a
customer to deploy and manage user desktop environments for a fee per desktop in the cloud
• Leverages Virtual Desktop Interface (VDI) and Associated Technologies
• Typically includes OS and Hypervisor but can bundle apps
How Is It Deployed?
Can be on-premise (managed), hosted or cloud based • Hosted Shared Desktops • Hosted Server VDI
(Server OS) • Hosted VDI (Client OS) • Application Virtualization
Delivery
Why DaaS?
For Businesses • Flexible, Secure and Agile
Desktop Operations • Predictable OpEx Model • Enable BYOD and Mobile /
Remote user productivity
Cisco Confidential 35 © 2013-2014 C is co and/or its affiliates . All rights res erved.
Hosted Security as a Service (HSS) – Summary
What Is It?
• A service which allows
a customer to leverage a cloud-managed security platform from a Cloud Services Provider for a Monthly Recurring Charge (MRC)
• Leverages Cisco’s virtual security appliances and IaaS architecture
What Services?
• Firewall as a Service • VPN as a Service • Email Security as a Service • Web Security as a Service • Security dashboard,
reporting, customer self service portal
Why HSS?
For Businesses • Evergreen services:
Always up-to-date security protection
• Predictable IT cost
Cisco Confidential 36 © 2013-2014 C is co and/or its affiliates . All rights res erved.
Cisco Hosted Collaboration Solution (HCS)
HCS Management Platform
UC Applications
UCS Server Platform
Data Center and Security Architecture
Customer #1
Customer #2
Customer #3
HCS Web Portal
Cisco Confidential 37 © 2013-2014 C is co and/or its affiliates . All rights res erved.
Services Product
Voice & Video Unified Communications Manager, Unified IP Phones, Jabber
Voice Mail & Integrated Messaging Unity Connection
Instant Messaging & Presence Unified Presence, Jabber
Mobility Services Rich Mobile Device Support
Meetings WebEx Meeting Center
C ustomer C ollaboration Cisco Unified Contact Center
TelePresence Internal, B2B, B2C, CMR, Desktop and Immersive
Cisco HCS Collaboration Applications Supported
Cisco Confidential 38 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Industry-Leading XaaS Solutions from Cisco
Cloud Networking
Cloud Web Security
WebEx Conferencing IM
and Presence
Cisco Confidential 39 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Cloud Collaboration and Conferencing
http://www.webex.com/products/web-conferencing.html
Cisco Confidential 40 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Complexity
How do I connect everyone together? In one meeting? Let’s Meet What devices
will be used? How many people
in my meeting? Where is everyone
joining from?
Cisco Confidential 41 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Audio Conferencing
Video Conferencing
Web Conferencing
Conferencing Conundrum
Productivity Value Customer Adoption
Cisco Confidential 42 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Web Conferencing
Video Conferencing
Audio Conferencing Conferencing
Cisco Confidential 43 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
The New WebEx
§ Industry-leading web conferencing ̵ Audio, web, and high-definition video ̵ WebEx® Meetings, Training, Events, and
Support versions
§ Document, application, desktop sharing § One-time and scheduled meetings,
including scheduling with Outlook and Lotus Notes
WebEx Market Share Leader for Global SaaS Web Conferencing
Cisco WebEx 51% 51% Market Share
Cisco WebEx® Leads the Market
Source: Synergy Research 2014 InterCall 4%
Adobe 5%
Others 7%
Citrix Online 22%
Microsoft 11%
Hub
Cisco WebEx Cloud
Cisco WebEx Cloud Secure, global meetings delivered by Cisco
Global Scale
Optimized for Collaboration and Content Distribution
Highly Availability, Performance/Speed
Multi-layer Security
Cisco Confidential 46 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Cisco WebEx Meeting Center Share Ideas with Anyone, Anywhere on Any Device
§ Dynamic meeting experience with integrated audio, video, and content sharing
§ High-definition video
§ Document, application, and desktop sharing
§ Supported on mobile devices: Android, iPhone, iPad, Blackberry and Windows Phone 8
§ Meeting recordings and playback
§ Supported on multiple platforms and available in 13 languages
§ Use for general team meetings, sales presentations and demos, project management, and more
Cisco Confidential 47 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
High-Definition Video Meet just like you are face-to-face
FEATURE HIGHLIGHTS • High-definition resolution: 720p • Full-screen video option • View Active Speaker • Self view video with picture-in-picture • View up to 7 video feeds • Lock-in on presenter • Self adjusting video quality • Webcam or video cam
Cisco Confidential 48 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Attend WebEx meetings on mobile devices Keep engaged on any device
FEATURE HIGHLIGHTS • Supported on Android, iPhone, iPad,
Blackberry and Windows Phone 8 • Schedule, host and attend meetings • View content, chat and see who is in
the meeting • Share two-way video • Record meetings • *Share your screen or content
*Features may vary between devices
Cisco Confidential 49 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
All-in-One UC Application § Presence and IM § Voice, video, voice messaging § Desktop sharing, conferencing
Rich, Real-time Collaboration with Cisco Jabber® Any Device, Any Location
Collaborate from Any Workspace § PC, Mac, tablet, smart phone § On-premises and Cloud § Integration with Microsoft Office
Cisco Confidential 50 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
CMR Cloud – Connect Your Way WebEx Personal Rooms with Cloud-based WebEx Video Bridge
Cisco® WebEx Cloud
Desktop Collaboration
WebEx Mobile Jabber Mobile
Cisco TelePresence Endpoints
3rd Party Standards Based Telepresence
Endpoints WebEx Desktop,
Jabber Lync
Cisco Confidential 51 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Cisco Jabber and WebEx
• Escalate to a WebEx meeting instantly from Jabber
• View WebEx meetings in Jabber Client
• Launch WebEx sessions from calendar view
• Reminder pop-ups for meetings
•
WebEx Escalation
Cisco Confidential 52 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Unlimited virtual rooms
Cisco Spark
An app that instantly creates a place for teams to work
together, where their work can live, and a way to stay
connected to it all
Persistent and secure messaging
and file sharing
Face-to-face meetings with screen sharing
Superior business class experience
http://web.ciscospark.com
Cisco Confidential 53 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Cisco Spark and WebEx • Automatically create a Spark room after any WebEx meeting to easily keep
the teamwork going
• The Spark room will be pre-populated with the meeting attendees/invitees and meeting title
Cisco Confidential 54 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Cisco Web Security
http://www.cisco.com/c/en/us/products/security/cloud-web-security/index.html
Cisco Confidential 55 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Web Security Is More Important Than Ever Before
The web is a popular attack vector for criminals
Without proper control, your own users can put your business at risk
Increased cloud adoption creates greater vulnerabilities
Cisco Confidential 56 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Superior Flexibility Advanced Threat Protection
Cisco Web Security Delivers…
Comprehensive Defense
Deploy, manage, and scale easily to fit your business
Protect against advanced threats with adaptive web
security
Defend and control with best-in-class, cloud-delivered web
security
Cisco Confidential 57 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
It Starts with Usage Controls and an Active Defense
Comprehensive Defense
Web Usage Control
Web Usage Control
Web Filtering
Block over 50 million known malicious sites
Web Reputation
Restrict access to sites based on assigned reputation score
Dynamic Content Analysis
Categorize webpage content and block sites automatically
Web Usage Reporting
Gain greater visibility into how web resources are used
Roaming Laptop-User Protection
Extend security beyond the network to include mobile users
Application Visibility and Control
Regulate access to individual website components and apps
Outbreak Intelligence
Identify unknown malware and zero-hour outbreaks in real time
Centralized Cloud Management
Enforce policies from a single, centralized location
Cisco Confidential 58 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
And Combats Evolving Threats and Advanced Malware
Advanced Threat Protection
Cisco® Advanced Malware Protection (AMP)
File Reputation Increase the accuracy of threat detection by examining every aspect of a file
File Sandboxing Determine the malicious intent of a file before it enters the network
File Retrospection Identify a breach faster by tracking a file’s disposition over time
Cisco Confidential 59 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
The Solution Works with Your Evolving Business Model
Superior Flexibility
Multiple Traffic Redirection Methods Connect Cisco® CWS to your current infrastructure
ASA / ASAv
Standalone WSA / WSAv
ISR G2
AnyConnect®
$ $ $
True Security as a Service Manage CapEx and OpEx as your business grows
Cisco Confidential 60 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
1.6 million global sensors
100 TB of data received per day
150 million+ deployed endpoints
600+ engineers, technicians, and researchers
35% worldwide email traffic
13 billion web requests
24-hour daily operations
40+ languages
Cisco Web Security with AMP Built on Talos: Superior Security Intelligence
10I000 0II0 00 0III000 II1010011 101 1100001 110 110000III000III0 I00I II0I III0011 0110011 101000 0110 00
I00I III0I III00II 0II00II I0I000 0110 00
180,000+ file samples per day
FireAMP™ community
Advanced Microsoft and industry disclosures
Snort and ClamAV open source communities
Honeypots
Sourcefire AEGIS™ program
Private and public threat feeds
Dynamic analysis
101000 0II0 00 0III000 III0I00II II II0000I II0 1100001110001III0 I00I II0I III00II 0II00II 101000 0110 00
100I II0I III00II 0II00II I0I000 0II0 00
Cisco® SIO Sourcefire®
Vulnerability Research Team
(VRT)
Email Endpoints Web Networks IPS Devices
WWW
Cisco Talos
WSA or CWS
Cisco Confidential 61 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Reputation Analysis The Power of Real-Time Context
Suspicious Domain Owner
Server in High Risk Location
Dynamic IP Address
Domain Registered
< 1 Min 192.1.0.68 example.com Example.org 17.0.2.12 Beijing London San Jose Kiev HTTP SSL HTTPS
Domain Registered > 2 Year
Domain Registered < 1 Month
Web Server < 1 Month
Who How Where When
0101 1100110 1100 111010000 110 0001110 00111 010011101 11000 0111 0001110 1001 1101 1110011 0110011 101000 0110 00 0111000 111010011 101 1100001 1 0010 010 10010111001 10 100111 010 00010 0101 110011 011 001 110100001100001 1100 0111010011101 1100001110001110 1001 1101 1110011 0110011 101000 011
010 10010111001 10 100111 010 000100101 110011 01100111010000110000111000111010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00 011
-10 -9 -8 -7 -6 -5 -4 -3 -2 -1 0 1 2 3 4 5 6 7 8 9 10 IP Reputation Score
Cisco Confidential 62 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Loss of Productivity Is a Threat How Much Bandwidth and Time Is Being Wasted?
Facebook time: 2,110,516 minutes or 35,175 hours, 1465 days, 4.1 years # of Facebook likes: 3,925,407 at 1 second per like. That’s almost 1100 hours per day, or 45 days just liking things
Bytes on YouTube video playback: 11,344,463,363,245 or 10 TB
Pandora: 713,884,303,727 or 0.6 TB
Total browsing time per day: 2,270,690,423 or 4,320 years Total bytes per day: 70,702,617,989,737 or 64 TB; over 15% from YouTube
Source: Cloud Web Security Report
Cisco Confidential 63 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Time and Volume Quotas Intelligent Controls of Bandwidth Usage
► Control web usage to meet administrative policies, such as: - Total bandwidth used during work hours - Total bandwidth per day used for social media categories
► Configure polices to restrict access based on the amount of data (in bytes) and time
► Quotas are applicable to HTTP, HTTPS, and FTP traffic
► Configured under access policies and decryption policies
► Create custom end-user notifications of warnings when a quota is close, as well as when exceeded
Cisco Confidential 64 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Acceptable Use Controls Beyond URL Filtering
URL Filtering
► Constantly updated URL database covering over 50 million sites worldwide
► Real-time dynamic categorization for unknown URLs
HTTP://
Application Visibility and Control (AVC)
Hundreds of Apps
Application Behavior
150,000+ Micro-Apps
► Control over mobile, collaborative, and web 2.0 applications
► Assured policy control over which apps can be used by which users and devices
► Granular enforcement of behaviors within applications
► Visibility of activity across the network
Introducing Cisco Meraki Cloud-Managed Networking http://meraki.cisco.com/
Cisco Confidential 66 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Meraki MS Ethernet Switches
Meraki SME Enterprise Mobility
Management
Meraki MR Wireless LAN
Meraki MX Security
Appliances
Cisco Confidential 67 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Management data (1 kb/s)
WAN
Scalable – Unlimited throughput: no centralized controller bottlenecks – Add devices or sites in minutes
Reliable
– Cloud service provides high availability, configuration backups
– Network functions even if management traffic is interrupted
Secure – No user traffic passes through cloud – Fully HIPAA / PCI compliant
Cisco Confidential 68 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
68
Outdoor APs
3 Stream Triple-Radio 802.11ac 1.75 Gbit/s
MR18 MR26 2 Stream Triple-Radio 802.11a/b/g/n 600 Mbit/s
3 Stream Triple-Radio 802.11a/b/g/n 900 Mbit/s
MR34 2 Stream Triple-Radio 802.11ac 1.2 Gbit/s
MR32
2 Stream Triple-Radio 802.11ac 1.2 Gbit/s
MR72
NEW
NEW
Indoor APs
MR66 Dual-Radio 802.11a/b/g/n 600 Mbit/s
MR62 Single-Radio 802.11b/g/n 300 Mbit/s
Cisco Confidential 69 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Presence Analytics: Understand engagement
API: Real time analytics data directly to customer
Facebook Login: Increase Social Media footprint
Application Finger Printing: Layer 7 and QoS
BLE and Beacons: Asset tracking and app integration
Cisco Confidential 70 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
MX Next Generation Security Appliances
Application Control intelligent WAN Optimization, Traffic Shaping, Content Filtering
Ironclad Security NGFW, Sourcefire, Auto Site-to-Site VPN, Client VPN, IDS
Networking NAT/DHCP, Routing, Link Balancing
Cisco Confidential 71 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
§ Gigabit edge switches in 24 and 48 port configurations with available PoE/PoE+
§ Layer 2 and 3 options
§ Primary Differentiators: Virtual Stacking, visibility and live tools
MS Access Switches
Voice and video QoS
Layer 7 app visibility
Virtual stacking
PoE / PoE + on all ports
Remote packet capture, cable testing
Fastest Growing Meraki Product in % Bookings
Switch highlights
Cisco Confidential 72 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Meraki Systems Manager Cloud Managed Mobility Management Provision, monitor, and secure mobile devices
Flexible, easy provisioning
Centrally scale 100,000s devices worldwide
Auto-tagging, dynamic security compliance
Integrate seamlessly with the rest of your Cisco
network
Cisco Confidential 73 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73 © 2012 Cisco and/or its affiliates. All rights reserved.
Conclusion
73
Cisco Confidential 74 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Start Your Cloud Journey…. CxO, CIO, and Technical Decision Maker
CxO and CIO Business Focus
Reduce CapEx and OpEx
Gain Business Agility and Simplicity
Increase Employee Productivity
Manage Risk Effectively
Maintain Regulatory Compliance
Accelerate Deployments Maintain Security
Integrate Network Services Simplify Management On-Demand Scalable
Apps/Services
Cisco Meets Your Needs
Technical Buyer IT Considerations
Cisco Confidential 75 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
Thank You and Next Steps
Brian Avery [email protected]
Contact Your Cisco Partner https://marketplace.cisco.com/cloud www.
Learn more about Cisco Cloud Solutions: www.cisco.com/go/cloud/
Cisco Confidential 76 C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved.
§ CCE sessions are held weekly on a variety of topics
§ CCE sessions can help you understand the capabilities and business benefits of Cisco technologies
§ Watch replays of past events and register for upcoming events!
Visit http://cs.co/cisco101 for details
Join us again for a future Cisco Customer Education Event
Thank you.