SlideShare una empresa de Scribd logo
1 de 8
Monetizing The Enterprise:
                   Borderless Networks

Michael Geller – Architect, SP Chief Technology Office

4 October, 2011

© 2010 Cisco and/or its affiliates. All rights reserved.   1
CONSUMERIZATION          CLOUD & VIRTUALIZATION                 RICH COLLABORATION
Bring Your Own Device   Access to Anything, Anywhere           Rich Video & Social Media


                                       Person To Wait For Page To Load
                                           Before Navigating Away
                                            8 secs
                                                     5 secs
                                                              3 secs


                                            2000       2005   2009




                           User Experience                        Networks Drive
                           Drives Business                        User Experience
                           Impact
PUBLIC
                                                      CLOUD
                  THE NETWORK
Customers                                  Service
                                           Provider

                                                      PRIVATE
                                                      CLOUD

  Uncontrolled         Public &     Diverse, Rich,
     Device        +    Private +   Collaborative
  Proliferation         Cloud       Applications

            We are at an Inflection Point
1   Context & Application Aware

                 2   Security Built-In
                                                   PUBLIC
                                                   CLOUD
         THE NETWORK
               3 Performance Optimized
BRANCH                              HEADEND
                 4   Services On-Demand

                 5   Simplified Management         PRIVATE
                                                   CLOUD
Abstract
• The impact of the consumerization of IT and mobility
  cannot be understated. The impact that these two key
  business elements have on the evolution of Enterprise
  Architecture and for Service Provider’s ability to offer
  services to Enterprises, Governments, and Consumers is
  addressed in this webinar. The importance of the shift
  and movement of the secure network edge leads to a
  very close examination of the changing threat vectors
  and vulnerabilities impacting our businesses
  today. Service delivery and consumption on the three
  “service horizons,” (Mobile Endpoint and CPE, Virtualized
  Network Edge/Data Center Edge, and the Cloud) is
  detailed.
Visibility and Control
   Building a Secure Infrastructure for Profitable Services


Total Visibility
in all aspects of
your network.




                                               Complete Control
Guaranteed Availability                        over all traffic in
of all services.                               the network &
                                               cloud.
Visibility & Posture
Endpt / CPE            ACCESS/AGGREGATION    CORE         DC/CLOUD
                                                                            Public, Private
                                                                             & Hybrid
                         PE(s)                                               Clouds
                                   L2 Agg.           P            P

   Mobility
                         PE
                DSL                                                                   Internet &
    Fixed                                      P
                                                                                      Peering Edge
    Wireless

                                               P
              Cable                                  P            P


          Enterprise



                        Multi-Tenant Access and
                        Access and aggregation:
   CPE:
   Full Service Branch    Basic infrastructure Operations andData Center/Cloud
                                                                 Data/Service
   • Firewall
                                    Security
                        • aggregation:                           Services
                        • Session role
                          security Border Controller             Center
   • IDS                • Firewall
                            • Control Plane Security
   • Encryption (IPSEC
     IPSEC & SSL VPN    • IDS/IPS Plane Security
                            •
     Host Security
     & SSL)                & Data
   •Security MonitoringIPSEC VPN
                              Management VA PT Web Assessment & SSO MNAC
                        • Firewall                        Telstra Cloud:
   • Trust & Identity
     Control Plane      • BNG (Subscriber Controls)
                          IDS/IPS                         • Nexus Center:
                                                          Service 1kV (Netflow/VSG)
   • Email Security
     Security           • SSL VPN
                          IPSEC VPN                       • Remediation (quarantine)
                                                          • UCS: Software based Security
   • Web/Content
     Forwarding Plane Securityand Identity
                        • Trust Operations Center
                          DHCP—subscriber                 • Services (FW, VPN,Services
                                                                 One Time …)
                                                             Intrusion Detection/Prevention
     Security           • Web/Content Security
                          SSL VPN                         • Nexus 7k Security Services Mod
                                                          • VM Security & Nexus 1000V
   • NAC Security
     Email              • Email and Identity
                          Trust Security                  • Anomaly
                                                          • vWAAS detection/Scrubbing
   • WAN Optimization
     Web/Content       Security Experts SOC Processes Plane Toolsets
                        • DLP
                          Web/Content Security            • Policy Control SOC
                                                          • Enterprise-Hosted Ironport
     Security           • Email Security                  • Web/Content/Email Security/DLP
                                                             Firewall & XML Firewall
   • NAC                                                  • Scansafe Web Security
                                                          • Web/Content/Email Security
    SIO, Platform Telemetry, 3       rd party rules and systems, Regulatory Policy & Influence
                                                          • Identity/Policy Service Control
www.ciscoknowledgenetwork.com




© © 2010 Cisco and/or its affiliates. All rights reserved.
  2010 Cisco and/or its affiliates. All rights reserved.                              Cisco Confidential   8

Más contenido relacionado

La actualidad más candente

Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionCisco Canada
 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with merakiCisco Canada
 
Cisco connect winnipeg 2018 simplifying cloud adoption with cisco ucs
Cisco connect winnipeg 2018   simplifying cloud adoption with cisco ucsCisco connect winnipeg 2018   simplifying cloud adoption with cisco ucs
Cisco connect winnipeg 2018 simplifying cloud adoption with cisco ucsCisco Canada
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki OverviewSSISG
 
Simplifying Cloud Adoption with Cisco
Simplifying Cloud Adoption with CiscoSimplifying Cloud Adoption with Cisco
Simplifying Cloud Adoption with CiscoCisco Canada
 
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...DATA SECURITY SOLUTIONS
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Cisco Canada
 
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assuranceNur Shiqim Chok
 
Meraki Cloud Wireless Lan
Meraki Cloud Wireless LanMeraki Cloud Wireless Lan
Meraki Cloud Wireless LanChikPea
 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceNetworkCollaborators
 
Purpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White PaperPurpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White Paper Array Networks
 
Cisco connect winnipeg 2018 a look at network assurance in dna center
Cisco connect winnipeg 2018   a look at network assurance in dna centerCisco connect winnipeg 2018   a look at network assurance in dna center
Cisco connect winnipeg 2018 a look at network assurance in dna centerCisco Canada
 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Miriade Spa
 
Meraki overview sales deck inside sales
Meraki overview sales deck inside salesMeraki overview sales deck inside sales
Meraki overview sales deck inside salesHaffizulla Rahman
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanDATA SECURITY SOLUTIONS
 
From SDN to Cloud Networking
From SDN to Cloud NetworkingFrom SDN to Cloud Networking
From SDN to Cloud NetworkingJuniper Networks
 
Why SD-WAN as it Moves to Mainstream Adoption?
Why SD-WAN as it Moves to Mainstream Adoption?Why SD-WAN as it Moves to Mainstream Adoption?
Why SD-WAN as it Moves to Mainstream Adoption?ColloqueRISQ
 

La actualidad más candente (20)

Understanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN SolutionUnderstanding Cisco Next Generation SD-WAN Solution
Understanding Cisco Next Generation SD-WAN Solution
 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with meraki
 
Cisco connect winnipeg 2018 simplifying cloud adoption with cisco ucs
Cisco connect winnipeg 2018   simplifying cloud adoption with cisco ucsCisco connect winnipeg 2018   simplifying cloud adoption with cisco ucs
Cisco connect winnipeg 2018 simplifying cloud adoption with cisco ucs
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
 
Simplifying Cloud Adoption with Cisco
Simplifying Cloud Adoption with CiscoSimplifying Cloud Adoption with Cisco
Simplifying Cloud Adoption with Cisco
 
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...
CloudGen Firewall, SD-WAN, WAF security - Protection and Performance in the C...
 
Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles Ot ics cyberattaques dans les organisations industrielles
Ot ics cyberattaques dans les organisations industrielles
 
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance[Cisco Connect 2018 - Vietnam] Yedu s.   introducing cisco dna assurance
[Cisco Connect 2018 - Vietnam] Yedu s. introducing cisco dna assurance
 
Secure sd wan
Secure sd wanSecure sd wan
Secure sd wan
 
Meraki Cloud Wireless Lan
Meraki Cloud Wireless LanMeraki Cloud Wireless Lan
Meraki Cloud Wireless Lan
 
Cisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assuranceCisco Connect 2018 Philippines - introducing cisco dna assurance
Cisco Connect 2018 Philippines - introducing cisco dna assurance
 
Purpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White PaperPurpose-Built-SSL-VPN White Paper
Purpose-Built-SSL-VPN White Paper
 
Decoding SDN
Decoding SDNDecoding SDN
Decoding SDN
 
NetScaler ADC - Customer Overview
NetScaler ADC - Customer OverviewNetScaler ADC - Customer Overview
NetScaler ADC - Customer Overview
 
Cisco connect winnipeg 2018 a look at network assurance in dna center
Cisco connect winnipeg 2018   a look at network assurance in dna centerCisco connect winnipeg 2018   a look at network assurance in dna center
Cisco connect winnipeg 2018 a look at network assurance in dna center
 
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
Aerohive Networks e ZScaler, le soluzioni tecnologiche per il nuovo ecosistem...
 
Meraki overview sales deck inside sales
Meraki overview sales deck inside salesMeraki overview sales deck inside sales
Meraki overview sales deck inside sales
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 
From SDN to Cloud Networking
From SDN to Cloud NetworkingFrom SDN to Cloud Networking
From SDN to Cloud Networking
 
Why SD-WAN as it Moves to Mainstream Adoption?
Why SD-WAN as it Moves to Mainstream Adoption?Why SD-WAN as it Moves to Mainstream Adoption?
Why SD-WAN as it Moves to Mainstream Adoption?
 

Destacado

3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart ThemIBM Security
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philAPhil Agcaoili
 
The Quick And Dirty Guide To Creating Blog Posts That Your Audience Craves
The Quick And Dirty Guide To Creating Blog Posts That Your Audience CravesThe Quick And Dirty Guide To Creating Blog Posts That Your Audience Craves
The Quick And Dirty Guide To Creating Blog Posts That Your Audience CravesDominique Jackson
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentationRajat Jain
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 

Destacado (6)

3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them3 Enablers of Successful Cyber Attacks and How to Thwart Them
3 Enablers of Successful Cyber Attacks and How to Thwart Them
 
2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA2016 ISSA Conference Threat Intelligence Keynote philA
2016 ISSA Conference Threat Intelligence Keynote philA
 
The Quick And Dirty Guide To Creating Blog Posts That Your Audience Craves
The Quick And Dirty Guide To Creating Blog Posts That Your Audience CravesThe Quick And Dirty Guide To Creating Blog Posts That Your Audience Craves
The Quick And Dirty Guide To Creating Blog Posts That Your Audience Craves
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
SlideShare 101
SlideShare 101SlideShare 101
SlideShare 101
 

Similar a Monetizing the Enterprise: Borderless Networks

Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networkingCisco Public Relations
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1changcai
 
Becloud hybrid cloud
Becloud hybrid cloudBecloud hybrid cloud
Becloud hybrid cloudBecloud
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsetsresponsedatacomms
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsetsresponsedatacomms
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceGen-i
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYODGen-i
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYODGen-i
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pkslucpaquin
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityPiyush Mittal
 
Day 3 p4 - cloud strategy
Day 3   p4 - cloud strategyDay 3   p4 - cloud strategy
Day 3 p4 - cloud strategyLilian Schaffer
 
Day 3 p4 - cloud strategy
Day 3   p4 - cloud strategyDay 3   p4 - cloud strategy
Day 3 p4 - cloud strategyLilian Schaffer
 
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Forecast 2012 Panel: Security POC NAB, Terremark, TrapezoidForecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Forecast 2012 Panel: Security POC NAB, Terremark, TrapezoidOpen Data Center Alliance
 
Cisco open network environment
Cisco open network environmentCisco open network environment
Cisco open network environmentdeepers
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudAmazon Web Services
 
Multicore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data CentersMulticore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data Centersscarisbrick
 

Similar a Monetizing the Enterprise: Borderless Networks (20)

Cisco tec rob soderbery - core enterprise networking
Cisco tec   rob soderbery - core enterprise networkingCisco tec   rob soderbery - core enterprise networking
Cisco tec rob soderbery - core enterprise networking
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1
 
Becloud hybrid cloud
Becloud hybrid cloudBecloud hybrid cloud
Becloud hybrid cloud
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
 
Ixia anue maximum roi from your existing toolsets
Ixia anue   maximum roi from your existing toolsetsIxia anue   maximum roi from your existing toolsets
Ixia anue maximum roi from your existing toolsets
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered service
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
 
S series presentation
S series presentationS series presentation
S series presentation
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pks
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Day 3 p4 - cloud strategy
Day 3   p4 - cloud strategyDay 3   p4 - cloud strategy
Day 3 p4 - cloud strategy
 
Day 3 p4 - cloud strategy
Day 3   p4 - cloud strategyDay 3   p4 - cloud strategy
Day 3 p4 - cloud strategy
 
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Forecast 2012 Panel: Security POC NAB, Terremark, TrapezoidForecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
Forecast 2012 Panel: Security POC NAB, Terremark, Trapezoid
 
Cisco open network environment
Cisco open network environmentCisco open network environment
Cisco open network environment
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
Chris millercloud
Chris millercloudChris millercloud
Chris millercloud
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS Cloud
 
Multicore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data CentersMulticore I/O Processors In Virtual Data Centers
Multicore I/O Processors In Virtual Data Centers
 

Más de Cisco Service Provider Mobility

Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)Cisco Service Provider Mobility
 
Unveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-FiUnveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-FiCisco Service Provider Mobility
 
Wi-Fi–Enabled Value-Added Services: Gain Insights from Cisco Mobile Customer...
Wi-Fi–Enabled Value-Added  Services: Gain Insights from Cisco Mobile Customer...Wi-Fi–Enabled Value-Added  Services: Gain Insights from Cisco Mobile Customer...
Wi-Fi–Enabled Value-Added Services: Gain Insights from Cisco Mobile Customer...Cisco Service Provider Mobility
 
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White PaperSimulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White PaperCisco Service Provider Mobility
 
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)Cisco Service Provider Mobility
 
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)Cisco Service Provider Mobility
 
IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)Cisco Service Provider Mobility
 
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)Cisco Service Provider Mobility
 
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...Cisco Service Provider Mobility
 
El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica Cisco Service Provider Mobility
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Cisco Service Provider Mobility
 
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Cisco Service Provider Mobility
 
Next-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – TranscriptNext-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – TranscriptCisco Service Provider Mobility
 

Más de Cisco Service Provider Mobility (20)

Cisco quantum policy suite
Cisco quantum policy suiteCisco quantum policy suite
Cisco quantum policy suite
 
Cisco Use Case: Location-Based Advertising
Cisco Use Case: Location-Based AdvertisingCisco Use Case: Location-Based Advertising
Cisco Use Case: Location-Based Advertising
 
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)Service Provider Wi-Fi Networks:  Scaling Signaling Transactions (White Paper)
Service Provider Wi-Fi Networks: Scaling Signaling Transactions (White Paper)
 
Unveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-FiUnveiling the Monetization Opportunities for Carrier Wi-Fi
Unveiling the Monetization Opportunities for Carrier Wi-Fi
 
Wi-Fi–Enabled Value-Added Services: Gain Insights from Cisco Mobile Customer...
Wi-Fi–Enabled Value-Added  Services: Gain Insights from Cisco Mobile Customer...Wi-Fi–Enabled Value-Added  Services: Gain Insights from Cisco Mobile Customer...
Wi-Fi–Enabled Value-Added Services: Gain Insights from Cisco Mobile Customer...
 
Defining the Business Case for Carrier-Grade Wi-Fi
Defining the Business Case for Carrier-Grade Wi-FiDefining the Business Case for Carrier-Grade Wi-Fi
Defining the Business Case for Carrier-Grade Wi-Fi
 
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White PaperSimulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
Simulate IP Fast Reroute Loop-Free Alternate (LFA) White Paper
 
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
Planning and Designing Networks with the Cisco MATE Portfolio (White Paper)
 
SP Wi-Fi Monetization Thought Leadership
SP Wi-Fi Monetization Thought LeadershipSP Wi-Fi Monetization Thought Leadership
SP Wi-Fi Monetization Thought Leadership
 
Small Cells in the Enterprise
Small Cells in the EnterpriseSmall Cells in the Enterprise
Small Cells in the Enterprise
 
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
Model Complex Routing with Cisco MATE Design External Endpoints (White Paper)
 
IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)IP Network Control Turning an Art into a Science (Customer Case Study)
IP Network Control Turning an Art into a Science (Customer Case Study)
 
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
Forecasting Traffic Growth and Impact with Cisco MATE Design (White Paper)
 
5G: Your Questions Answered
5G: Your Questions Answered5G: Your Questions Answered
5G: Your Questions Answered
 
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
Data Center Migration and Network Bandwidth Assessments with Cisco MATE Desig...
 
El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica El futuro cinematográfico de la industria inalámbrica
El futuro cinematográfico de la industria inalámbrica
 
MATE Design (Data Sheet)
MATE Design (Data Sheet)MATE Design (Data Sheet)
MATE Design (Data Sheet)
 
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
Architecture for Mobile Data Offload over Wi-Fi Access Networks (White Paper)
 
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)Building Accurate Traffic Matrices with Demand Deduction (White Paper)
Building Accurate Traffic Matrices with Demand Deduction (White Paper)
 
Next-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – TranscriptNext-Generation Knowledge Workers TweetChat – Transcript
Next-Generation Knowledge Workers TweetChat – Transcript
 

Último

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Monetizing the Enterprise: Borderless Networks

  • 1. Monetizing The Enterprise: Borderless Networks Michael Geller – Architect, SP Chief Technology Office 4 October, 2011 © 2010 Cisco and/or its affiliates. All rights reserved. 1
  • 2. CONSUMERIZATION CLOUD & VIRTUALIZATION RICH COLLABORATION Bring Your Own Device Access to Anything, Anywhere Rich Video & Social Media Person To Wait For Page To Load Before Navigating Away 8 secs 5 secs 3 secs 2000 2005 2009 User Experience Networks Drive Drives Business User Experience Impact
  • 3. PUBLIC CLOUD THE NETWORK Customers Service Provider PRIVATE CLOUD Uncontrolled Public & Diverse, Rich, Device + Private + Collaborative Proliferation Cloud Applications We are at an Inflection Point
  • 4. 1 Context & Application Aware 2 Security Built-In PUBLIC CLOUD THE NETWORK 3 Performance Optimized BRANCH HEADEND 4 Services On-Demand 5 Simplified Management PRIVATE CLOUD
  • 5. Abstract • The impact of the consumerization of IT and mobility cannot be understated. The impact that these two key business elements have on the evolution of Enterprise Architecture and for Service Provider’s ability to offer services to Enterprises, Governments, and Consumers is addressed in this webinar. The importance of the shift and movement of the secure network edge leads to a very close examination of the changing threat vectors and vulnerabilities impacting our businesses today. Service delivery and consumption on the three “service horizons,” (Mobile Endpoint and CPE, Virtualized Network Edge/Data Center Edge, and the Cloud) is detailed.
  • 6. Visibility and Control Building a Secure Infrastructure for Profitable Services Total Visibility in all aspects of your network. Complete Control Guaranteed Availability over all traffic in of all services. the network & cloud.
  • 7. Visibility & Posture Endpt / CPE ACCESS/AGGREGATION CORE DC/CLOUD Public, Private & Hybrid PE(s) Clouds L2 Agg. P P Mobility PE DSL Internet & Fixed P Peering Edge Wireless P Cable P P Enterprise Multi-Tenant Access and Access and aggregation: CPE: Full Service Branch Basic infrastructure Operations andData Center/Cloud Data/Service • Firewall Security • aggregation: Services • Session role security Border Controller Center • IDS • Firewall • Control Plane Security • Encryption (IPSEC IPSEC & SSL VPN • IDS/IPS Plane Security • Host Security & SSL) & Data •Security MonitoringIPSEC VPN Management VA PT Web Assessment & SSO MNAC • Firewall Telstra Cloud: • Trust & Identity Control Plane • BNG (Subscriber Controls) IDS/IPS • Nexus Center: Service 1kV (Netflow/VSG) • Email Security Security • SSL VPN IPSEC VPN • Remediation (quarantine) • UCS: Software based Security • Web/Content Forwarding Plane Securityand Identity • Trust Operations Center DHCP—subscriber • Services (FW, VPN,Services One Time …) Intrusion Detection/Prevention Security • Web/Content Security SSL VPN • Nexus 7k Security Services Mod • VM Security & Nexus 1000V • NAC Security Email • Email and Identity Trust Security • Anomaly • vWAAS detection/Scrubbing • WAN Optimization Web/Content Security Experts SOC Processes Plane Toolsets • DLP Web/Content Security • Policy Control SOC • Enterprise-Hosted Ironport Security • Email Security • Web/Content/Email Security/DLP Firewall & XML Firewall • NAC • Scansafe Web Security • Web/Content/Email Security SIO, Platform Telemetry, 3 rd party rules and systems, Regulatory Policy & Influence • Identity/Policy Service Control
  • 8. www.ciscoknowledgenetwork.com © © 2010 Cisco and/or its affiliates. All rights reserved. 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8