Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Intent-based NetworkingPowered by Cisco Digital Network Architecture
Dave West
Vice President, Worldwide Enterprise Networking Sales
19 September 2017
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Retail Healthcare Education
Transportation Finance Government
The Network is the Cornerstone of Digital Success or Failure
Scale Complexity Security
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Intent-based Networking with Cisco
Digital Business
Intent Context
Security
Learning
Network
Powered By Intent. Informed by Context.
SecurityMobile IoT MultiCloud
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco’s Intent Based Networking
Shift IT Time to Business Focus
Network Provisioning Time Savings
67%
Improve Issue Resolution
80%
Reduced Security Breach Impact
48%
Reduced Operating Expense
61%
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Business Imperatives
How do you defendagainst threats?
How do you scale for the mobility & IoT
explosion?
How deliver a great user experience?
How do you manage across a multi-cloud
world?
Security Scale Assurance Cloud
Ransomware IoT Mobility SaaS
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Security
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Data
Ava
ilabili
tyEvolution of Security Threats
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Secure Segmentation and Onboarding:Software Defined Access
Completely Automated | Policy follows Identity | Minimize Lateral Threat Movement
Guest Virtual Network
Group 5 Group 6
IoT Virtual Network
Group 3 Group 4
Employee Virtual Network
Group 1 Group 2
Users
Devices
Apps
Drag policy to apply
IT Simplicity
• No VLAN, ACLs or IP Address management required
• Single network fabric
• Define one consistent policy
Security
• Simplified Micro-Segmentation
• Policy enforcement
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Seeing and Acting on ALL Threats
How Do You Provide Security While Maintaining Privacy?
Encrypted Traffic
Non-Encrypted Traffic
of organizations are victims of malicious activity*
80%
of attacks used encrypted traffic to evade detection*
41%
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Machine Learning Identifies Malware Infrastructure view of the data
Google Search
Firefox self-repair
Bestafera Malware
Encrypted Traffic Analytics
Malware in Encrypted Traffic
Security AND Privacy
Detection: 99.99% Accuracy
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IoT
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
‘Shadow’ Internet of Things Coming to Every Business
63M network connections per second by 2020
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Automate IoT Deployments at ScaleSoftware Defined Access
Box by BoxManual | Error Prone
AutomationScalable | Simple
Mass Scalability | Users, Device & IoT Segmentation | Policy-based Automation
2from hours
to 15 minutes4from hours
to 5 minutes5from hours
to 5 minutesProvisionDesign Policy
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Comparison of Total Workflow Time
The Old Method The New Method
Total Workflow for One DeviceFifty Devices
25minutes50days11hours
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Assurance
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Where is IT Spending There Time?
Finding the Source of an issue, is a complex, end-to-end problem
WAN
Office Site Network Services DC
Client Density
Client Firmware
AP Coverage
RF Noise/Interf.
WLC Capacity
WAN QoS, Routing, ...
WAN Uplink Usage
Authentication
End-User Services
Configuration
Addressing
Impacts Join/Roam
Impacts Join/Roam
Impacts Quality/Throughput
Impacts Both*
Impacts Both*
Impacts Both*
Impacts Both*
Impacts Both*
Impacts Quality/Throughput
Impacts Quality/Throughput
Impacts Join/Roam
APs
Local WLCs
ISE
DHCP
Mobile Clients
CUCM
Prime
43%Of IT time spent troubleshooting;
#1 consumer of time
Source: Cisco DNA Customer Survey, June 2016
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Office Site Network Services DC
WAN
Local WLCs
APsMobile Clients
DHCP
CUCM
NMS
The Best Data: End-to-End Assurance
SFCDC
SNOW
BOX
Cloud Apps
On-boarding & connectivity
Configuration compliance
Visibility & performance
Network health
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
IT Services Leader Case Study
Challenge• Invest in digital to improve experience
• Deliver to services faster to open revenue streams
• Simplify through hyper automation
Business Outcomes• Time-to-Market: move resources faster,
from 1 week to minutes
• Workforce Mobility: policy follows users
• Client security & data privacy maintained through segmentation
• SaaS Simplicity: higher 0ffice 365 uptime New Resource Deployment
One week to minutes
Solution: Cisco DNA Center, ISE and Catalyst 9K
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Global PharmaceuticalCase Study
Challenge• Enable researchers across 5 companies
to collaborate
• Maintain security policy
Business Outcomes• Cost Savings: consolidate 5 companies
in new site to 1 network
• Simplified Segmentation: Easy to maintain groups and policy
• Employee Productivity: Increased collaboration across researchers over high performing WiFI
Secure Collaboration
Five companies & one network
Solution: Cisco DNA Center, ISE and Catalyst 9K
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cloud
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Innovations Overwhelming the WAN
Data Center | IaaS
SaaS | vDC
Expensive Bandwidth
Up to 30%Infra spend in WAN
Device Proliferation Apps Moving to Cloud
Millions of connections every second40% 20x 4x
WAN OpExSavings
Improved ApplicationExperience
MoreBandwidth
Viptela Advantage
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco SD-WAN
DC
IaaS
SaaS
vDC
Need Simplicity, Lower Cost, Application Experience
Users
Devices
Things
Applications
AnalyticsCloud Delivered
Top Use Cases: • SD-WAN• Cloud Onramp
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Viptela Integration Plan
Support and Scale the current sales motion
Viptela SD-WAN on strategic ISR platform
Deliver end-to-end experience with full DNA integration
Deplo
yment
Scenarios
Benefits
vEdge ISR4K + vEdge SW
DNA Center
+ SD-WAN
ISR4K + vEdge SW
vManage
vEdge
vManage
vEdge
Platform IntegrationNo Integration Management Integration
Phase 2Phase 1 Phase 3
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Global RetailerCustomer Story
Challenge• Reduce OpEx and CapEx costs across
1600 stores
• Re-energize customer in-store experience
• Improve mobile application performance
• Securely manage 7 segments
Business Outcomes• 26x Bandwidth improvement
• 5x Improvement store conversions
• $20M Saved over 3-years
Reduction in WAN Costs40%
Solution: Cisco SD-WAN (Viptela)
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Intent Based-Networking Solutions
Users Devices Apps
Connecting Trusted Users to Trusted Devices with an Uncompromised Experience
© 2017 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
THE SECURE, INTELLIGENT PLATFORM FOR DIGITAL BUSINESS