SlideShare uma empresa Scribd logo
1 de 29
Cisco Confidential 1© 2012 Cisco and/or its affiliates. All rights reserved.
Borderless Networks
Soluções Integradas
Alexandre Lessa
Gerente de Desenvolvimento de Negócios
Abril de 2013
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
Rede
Data
CenterDesktop
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Desktop
Data
Center
Rede
Bring Your
Own Device
Mobilidade
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Data
Center
Rede
Bring Your
Own Device
Mobilidade
SaaS | DC / V
Cloud/
Virtualização
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Colaboração
Imersiva
Pervasive Video
Rede
Bring Your
Own Device
Mobilidade
SaaS | DC / V
Cloud/
Virtualização
SEGURANÇA
EFICIÊNCIA DE TI
CONTROLE DE CUSTOS
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
SaaS | DC / VBring Your
Own Device
SEGURANÇA
EFICIÊNCIA DE TI
CONTROLE DE CUSTOS
Colaboração
Imersiva
Pervasive Video
FRONTEIRAS
UMA REDE SEMMobilidade Cloud/
Virtualização
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
A sua Rede está Pronta ?
Como reduzo os custos operacionais?2
Como ofereço serviços de rede
seguros e confiáveis ?3
1
Como gerencio esta complexidade e
como escalo, como cresço ?
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Enabled and Driven by:
Changing How Networks areArchitected
Proliferação de Dispositivos /
Aplicações
Praticamente tudo
tem mobilidade
Segurança em todo o lugar
CloudData Center
Virtualization
CollaborationVideo
Motivando Inovação nos negócios e Rentabilidade
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Para video…
when 91% of global Internet traffic will be video.
Para segurança integrada…
when 58% let others use their device and there is a 46% increase in malware for mobile devices.
Para mobilidade…
when 60% believe they won’t be in an office to be productive & efficient or when the desktop
becomes virtualized.
Para retorno do investimento …
when saving energy, creating new business models, attracting the next-gen workforce and engaging
with your customers.
Para a continuidade do negócio…
when downtime causes a loss of 3.6% of annual revenue.
Good Enough is Not Good Enough
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Novos requerimentos para a Rede
Going Beyond Good Enough
Video Enabled
Secure
Resilient
Mobile
Business Value
Medianet enabled R&S and Wireless infrastructure and endpoints
SecureX – Policy driven (ISE) Context Aware security from premise
to the cloud
Network Resiliency features supported by 20 years of R&D with
pre-integrated designs enhanced by Smart Services
Advanced wireless infrastructure with VideoStream and
AnyConnect to support the broadest array of endpoint devices
Cisco Webex, Jabber Video, Energywise, Virtual Office deliver
optimal ROI , new business models
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
A Rede “Good Enough”
Aplicação / Dispositivos
A Rede de Nova Geração
Borderless Network
QoS Básico
Suporte / Garantia Básicos
Segurança em UTM
Custo de Aquisição
Baseada em Padrões
Inteligência para a Aplicação/Dispositivo
com Segurança, Otimização e Prioridade
Controle e Suporte para a Media
Integração de Voz e Video
Garantia, Suporte + Serviços
Gerência
Segurança Integrada, do dispositivo para a
cloud
Proteção do Investimento & ROI
Padrões + Inovação = Padrões
Propósito Unico Unificada (Wired/Wireless, Building and
Energy Control)
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Infraestrutura
Borderless End-Point/User Services
Mobility Workplace
Experience
Video
Seguro, Confiavel, Simples: AnyConnect
Borderless Network ServicesPolíticas, Gerência,
Segurança, API’s,
Integração Switching
Wireless
WAAS
Routing
Security
Mobility:
Motion
Security:
TrustSec
Voice/Video:
Medianet
Green:
EnergyWise
App Performance: App
Velocity
Serviços dos nossos parceiros de negócio:
Experimente o valor de Borderless Networks
Arquitetura para entregar o que a rede necessita nestes dias
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
CiscoConcorrente x
Custo de Aquisição
“Switches e Wireless são uma
commodity…”
“Cisco é muito caro…”
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Custo Total considera o OpEx, Não somente
CapEx
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
Melhoria Operacional Cisco
• Simplificado:
 Instalação
 Configuração
 Implementaçãp
 Manutenção
• Monitoramento Superior e Otimização
de Rede
• Alta Disponibilidade
• Segurança
• Redução do Consumo de Energia
CiscoXX CiscoXX
CapEx + OpEx
Investimento Inicial Custo Total
CapEx
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Nexus 7000
ACESSO
DISTRIBUIÇÃO
CORE
Catalyst
2960
Catalyst
3560-X/3750-X
Catalyst
4500-E
Catalyst
4500-X
Catalyst
6500-E
Catalyst
6500-E
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
BASIC LAYER 2
(LAN Lite) PORTFOLIO
ADVANCED LAYER 2
(LAN Base) PORTFOLIO
Fast Ethernet Gigabit Ethernet Fast Ethernet Gigabit Ethernet
Catalyst 2960
1G Uplinks
Partial PoE
Catalyst 2960-S
1G Uplinks
Partial PoE/PoE+
Catalyst 2960
1G Uplinks
Partial PoE
Catalyst 2960-S
10G/1G Uplinks
FlexStack
Full PoE, Partial PoE+
Escalabilidade
C2960S-STACK
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
3560-C IP Base Portfolio 2960-C LAN Base Portfolio
Fast Ethernet Gigabit Ethernet
IP Base
8 and 12 port FE
Data or PoE+
2 x 1G Uplinks
E- LLW
3560-C Portfolio
IP Base
8 port GE
Data or PoE+
2 x 1G Uplinks
E- LLW
Fast Ethernet Gigabit Ethernet
LAN Base
8 and 12 port FE
Data or PoE
2 x 1G Uplinks
E- LLW
2960-C Portfolio
LAN Base
8 port GE
Data Only
2 x 1G Uplinks
E- LLW
Suporte PoE
WS-C3560CPD-8PT-S WS-C2906CPD-8PT-L
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
600 1600 2600 3600
• 2X2 MIMO-2 Spatial
Streams
• Local Ethernet Ports
• 3X3 MIMO-2 Spatial
Streams
• CleanAir Express
• ClientLink 2.0
• 3X4 MIMO-3 Spatial
Streams
• CleanAir
• ClientLink 2.0
• 4X4 MIMO–3 Spatial Streams
• 802.11ac module (planned)
• Security and SI module
• CleanAir
• ClinetLink 2.0
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
O Portfolio da Cisco de Acesso Unificado, Roteadores e
Segurança provê a solução correta para qualquer rede:
Pequena, Média ou Grande
Switches e Wireless entregam Segurança, Video, Alta
Disponibilidade e PoE, bem como eficiência operacional para
melhor atender os desafios do negócio
As inovações da Cisco melhoram o custo operacional,
independente do tamanho da empresa !
Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 23
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
• 5 AP’s 1600 + Controller 2504 com 5 licenças + 1 2960C com desconto diferenciado (Dist)
• Pacote com 5 AP’s + Controller + Switch com 12 portas PoE por FOB de USD 2.150,00 !!
• Licenças e Serviços Adicionais válidos para a promoção.
• Valido até o final do Q4 Cisco (Julho 2013)
Cisco Wireless Lan Controller 2504 + 5 Access Points 1602i + 1 Switch 2960C
AIR-CT2504-5-K9
GPL USD 1.295
AIR-CAP1602I-T-K9
GPL USD 695
WS-C2960C-12PC-L
GPL USD 1.195
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
3X3:2 MIMO
Access Point
CleanAir Express
HW Enabled
ClientLink 2.0
Beamforming
Sealed Ruggedized
Enclosure
Ext Ant Optional
802.11abgn
Max Data Rate per
Radio of 300 Mbps
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Guest Anchor Controller
capable
Supports up to 1,000
clients
Supports FlexConnect, Mesh
and Centralized Deployment
Models
802.11ac Forward
Compatible Up to 1 Gbps of Wireless
Throughput*
Supports Up to 75 Access
Points
Application Visibility and
control
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
• Visibilidade e controle das aplicações utilizadas por visitantes e funcionários através da inspeção do
tráfego (1).
• Portal web interno na WLC customizavel para autenticação de visitantes, e também para a criação e
administração dos usuários (2).
• Administração centralizada e automática dos canais WiFi, com o recurso de troca de canal automática
quando forem detectadas interferencias (3).
• Melhora na experiência dos usuários de smartphones e tablets através da tecnologia de beamforming
que melhora a recepção do sinal do usuário e economiza bateria do dispositivo móvel; e também com o
balanceando transparente dos usuários WiFi nas bandas de 2.4GHz e 5GHz (4).
• Otimização na transmissão e controle de Vídeo multicast sobre WiFi (5).
• Garantia do roaming rápido e seguro dos clientes wireless entre os pontos de acesso, sem interrupção da
aplicação do usuário (6).
• Compatível com Cisco ISE (Identity Services Engine), Cisco PI (Prime Infrastructure), Cisco MSE
(Mobility Services Engine) e com Microsoft Active Directory (AD), IAS ou NPS para autenticação de
usuários.
Diferenciais da solução com WLC Cisco
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
• (1) Tecnologia AVC (application visibility and control).
• (2) Funcionalidade de Lobby Ambassador.
• (3) Gestão dos recursos de rádio (RRM) e se disponível integração com Access Points CleanAir.
AP1600 – CleanAir Hardware Ready.
• (4) Tecnologia de Beamforming e Band Select.
• (5) Tecnologia VideoStream.
• (6) Gerenciamento de roaming e suporte a padrão para roaming rápido e seguro como 802.11r,
OKC/PKC e CCKM.
Descrição da tecnologia utilizada
Muito Obrigado !!

Mais conteúdo relacionado

Mais procurados

Portfolio Completo de Projetos
Portfolio Completo de ProjetosPortfolio Completo de Projetos
Portfolio Completo de ProjetosBit Telecom
 
ApresentaçãO Isacorp N & S Solutions
ApresentaçãO Isacorp N & S SolutionsApresentaçãO Isacorp N & S Solutions
ApresentaçãO Isacorp N & S Solutionswellneo
 
DAQ Infrastructure and SCADA Network Management
DAQ Infrastructure and SCADA Network ManagementDAQ Infrastructure and SCADA Network Management
DAQ Infrastructure and SCADA Network ManagementAdvantech
 
Conceito - Virtualização de Desktop
Conceito - Virtualização de DesktopConceito - Virtualização de Desktop
Conceito - Virtualização de DesktopLuiz Veloso
 
Factory 4.0 - Advantech Smart IoT Solutions
Factory 4.0 - Advantech Smart IoT SolutionsFactory 4.0 - Advantech Smart IoT Solutions
Factory 4.0 - Advantech Smart IoT SolutionsAdvantech
 
Cyber Security for Servers in Environment Aggressive
Cyber Security for Servers in Environment AggressiveCyber Security for Servers in Environment Aggressive
Cyber Security for Servers in Environment AggressiveAdvantech
 
CLASS 2016 - Palestra Nicolau Branco
CLASS 2016 - Palestra Nicolau BrancoCLASS 2016 - Palestra Nicolau Branco
CLASS 2016 - Palestra Nicolau BrancoTI Safe
 
Integrated Control Systems & Advantech Platforms
Integrated Control Systems & Advantech PlatformsIntegrated Control Systems & Advantech Platforms
Integrated Control Systems & Advantech PlatformsAdvantech
 

Mais procurados (10)

Dell Wireless
Dell WirelessDell Wireless
Dell Wireless
 
Portfolio Completo de Projetos
Portfolio Completo de ProjetosPortfolio Completo de Projetos
Portfolio Completo de Projetos
 
ApresentaçãO Isacorp N & S Solutions
ApresentaçãO Isacorp N & S SolutionsApresentaçãO Isacorp N & S Solutions
ApresentaçãO Isacorp N & S Solutions
 
DAQ Infrastructure and SCADA Network Management
DAQ Infrastructure and SCADA Network ManagementDAQ Infrastructure and SCADA Network Management
DAQ Infrastructure and SCADA Network Management
 
Conceito - Virtualização de Desktop
Conceito - Virtualização de DesktopConceito - Virtualização de Desktop
Conceito - Virtualização de Desktop
 
Factory 4.0 - Advantech Smart IoT Solutions
Factory 4.0 - Advantech Smart IoT SolutionsFactory 4.0 - Advantech Smart IoT Solutions
Factory 4.0 - Advantech Smart IoT Solutions
 
Cyber Security for Servers in Environment Aggressive
Cyber Security for Servers in Environment AggressiveCyber Security for Servers in Environment Aggressive
Cyber Security for Servers in Environment Aggressive
 
CLASS 2016 - Palestra Nicolau Branco
CLASS 2016 - Palestra Nicolau BrancoCLASS 2016 - Palestra Nicolau Branco
CLASS 2016 - Palestra Nicolau Branco
 
Integrated Control Systems & Advantech Platforms
Integrated Control Systems & Advantech PlatformsIntegrated Control Systems & Advantech Platforms
Integrated Control Systems & Advantech Platforms
 
Field wireless 2011
Field wireless 2011Field wireless 2011
Field wireless 2011
 

Semelhante a Cisco Soluções Integradas

5 motivos para atualizar sua rede
5 motivos para atualizar sua rede5 motivos para atualizar sua rede
5 motivos para atualizar sua redeCisco do Brasil
 
Guia de Produtos para Pequenas Empresas
Guia de Produtos para Pequenas EmpresasGuia de Produtos para Pequenas Empresas
Guia de Produtos para Pequenas Empresasp2bsimone
 
BR - Fabric Connect Workshop LAB Slides v0 PTBR.pdf
BR - Fabric Connect Workshop LAB Slides v0 PTBR.pdfBR - Fabric Connect Workshop LAB Slides v0 PTBR.pdf
BR - Fabric Connect Workshop LAB Slides v0 PTBR.pdfodairjose23
 
Palestra de Cloud para Universidade de São Caetano do Sul - USCS
Palestra de Cloud para Universidade de São Caetano do Sul - USCSPalestra de Cloud para Universidade de São Caetano do Sul - USCS
Palestra de Cloud para Universidade de São Caetano do Sul - USCSThiago Viola
 
Bem vindo a era da Inovação da TI com Cloud
Bem vindo a era da Inovação da TI com Cloud Bem vindo a era da Inovação da TI com Cloud
Bem vindo a era da Inovação da TI com Cloud Thiago Viola
 
Uma infraestrutura mais moderna (data center) Cisco e Microsoft
Uma infraestrutura mais moderna (data center) Cisco e MicrosoftUma infraestrutura mais moderna (data center) Cisco e Microsoft
Uma infraestrutura mais moderna (data center) Cisco e MicrosoftCisco do Brasil
 
Idirect-sspi-novembro-2016
Idirect-sspi-novembro-2016Idirect-sspi-novembro-2016
Idirect-sspi-novembro-2016SSPI Brasil
 
CV MP (Port.)2 - Daniel Loiola
CV MP (Port.)2 - Daniel LoiolaCV MP (Port.)2 - Daniel Loiola
CV MP (Port.)2 - Daniel LoiolaDaniel Loiola
 
Cloud Publica Com alta performance, flexível e gerenciável.
Cloud Publica Com alta performance, flexível e gerenciável.Cloud Publica Com alta performance, flexível e gerenciável.
Cloud Publica Com alta performance, flexível e gerenciável.Thiago Viola
 
3 Com Novas SoluçOes Para Grandes MéDias E Pequenas Empresas
3 Com   Novas SoluçOes Para Grandes MéDias E Pequenas Empresas3 Com   Novas SoluçOes Para Grandes MéDias E Pequenas Empresas
3 Com Novas SoluçOes Para Grandes MéDias E Pequenas Empresasmarcesil
 
Como identificar e implementar a melhor estratégia de Cloud para sua empresa
Como identificar e implementar a melhor estratégia de Cloud para sua empresaComo identificar e implementar a melhor estratégia de Cloud para sua empresa
Como identificar e implementar a melhor estratégia de Cloud para sua empresaCisco do Brasil
 
Data Center_Domain Ten_e-book
Data Center_Domain Ten_e-bookData Center_Domain Ten_e-book
Data Center_Domain Ten_e-bookCisco do Brasil
 
Trabalho Remoto - Guia de Soluções
Trabalho Remoto - Guia de SoluçõesTrabalho Remoto - Guia de Soluções
Trabalho Remoto - Guia de SoluçõesLuis Figueiredo
 

Semelhante a Cisco Soluções Integradas (20)

Cisco for Small Business
Cisco for Small BusinessCisco for Small Business
Cisco for Small Business
 
5 motivos para atualizar sua rede
5 motivos para atualizar sua rede5 motivos para atualizar sua rede
5 motivos para atualizar sua rede
 
FlavioCorrea
FlavioCorreaFlavioCorrea
FlavioCorrea
 
Guia de Produtos para Pequenas Empresas
Guia de Produtos para Pequenas EmpresasGuia de Produtos para Pequenas Empresas
Guia de Produtos para Pequenas Empresas
 
BR - Fabric Connect Workshop LAB Slides v0 PTBR.pdf
BR - Fabric Connect Workshop LAB Slides v0 PTBR.pdfBR - Fabric Connect Workshop LAB Slides v0 PTBR.pdf
BR - Fabric Connect Workshop LAB Slides v0 PTBR.pdf
 
Palestra de Cloud para Universidade de São Caetano do Sul - USCS
Palestra de Cloud para Universidade de São Caetano do Sul - USCSPalestra de Cloud para Universidade de São Caetano do Sul - USCS
Palestra de Cloud para Universidade de São Caetano do Sul - USCS
 
Cisco UCS Mini - resumo
Cisco UCS Mini - resumoCisco UCS Mini - resumo
Cisco UCS Mini - resumo
 
Bem vindo a era da Inovação da TI com Cloud
Bem vindo a era da Inovação da TI com Cloud Bem vindo a era da Inovação da TI com Cloud
Bem vindo a era da Inovação da TI com Cloud
 
Uma infraestrutura mais moderna (data center) Cisco e Microsoft
Uma infraestrutura mais moderna (data center) Cisco e MicrosoftUma infraestrutura mais moderna (data center) Cisco e Microsoft
Uma infraestrutura mais moderna (data center) Cisco e Microsoft
 
Idirect-sspi-novembro-2016
Idirect-sspi-novembro-2016Idirect-sspi-novembro-2016
Idirect-sspi-novembro-2016
 
CV MP (Port.)2 - Daniel Loiola
CV MP (Port.)2 - Daniel LoiolaCV MP (Port.)2 - Daniel Loiola
CV MP (Port.)2 - Daniel Loiola
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cloud Publica Com alta performance, flexível e gerenciável.
Cloud Publica Com alta performance, flexível e gerenciável.Cloud Publica Com alta performance, flexível e gerenciável.
Cloud Publica Com alta performance, flexível e gerenciável.
 
3 Com Novas SoluçOes Para Grandes MéDias E Pequenas Empresas
3 Com   Novas SoluçOes Para Grandes MéDias E Pequenas Empresas3 Com   Novas SoluçOes Para Grandes MéDias E Pequenas Empresas
3 Com Novas SoluçOes Para Grandes MéDias E Pequenas Empresas
 
Como identificar e implementar a melhor estratégia de Cloud para sua empresa
Como identificar e implementar a melhor estratégia de Cloud para sua empresaComo identificar e implementar a melhor estratégia de Cloud para sua empresa
Como identificar e implementar a melhor estratégia de Cloud para sua empresa
 
Data Center_Domain Ten_e-book
Data Center_Domain Ten_e-bookData Center_Domain Ten_e-book
Data Center_Domain Ten_e-book
 
Profinet manufacturing-automation-automob
Profinet manufacturing-automation-automobProfinet manufacturing-automation-automob
Profinet manufacturing-automation-automob
 
Hosting Inok
Hosting InokHosting Inok
Hosting Inok
 
Trabalho Remoto - Guia de Soluções
Trabalho Remoto - Guia de SoluçõesTrabalho Remoto - Guia de Soluções
Trabalho Remoto - Guia de Soluções
 
VMware Portfolio 2015
VMware Portfolio 2015VMware Portfolio 2015
VMware Portfolio 2015
 

Cisco Soluções Integradas

  • 1. Cisco Confidential 1© 2012 Cisco and/or its affiliates. All rights reserved. Borderless Networks Soluções Integradas Alexandre Lessa Gerente de Desenvolvimento de Negócios Abril de 2013
  • 2. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Rede Data CenterDesktop
  • 3. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 Desktop Data Center Rede Bring Your Own Device Mobilidade
  • 4. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Data Center Rede Bring Your Own Device Mobilidade SaaS | DC / V Cloud/ Virtualização
  • 5. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Colaboração Imersiva Pervasive Video Rede Bring Your Own Device Mobilidade SaaS | DC / V Cloud/ Virtualização SEGURANÇA EFICIÊNCIA DE TI CONTROLE DE CUSTOS
  • 6. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 SaaS | DC / VBring Your Own Device SEGURANÇA EFICIÊNCIA DE TI CONTROLE DE CUSTOS Colaboração Imersiva Pervasive Video FRONTEIRAS UMA REDE SEMMobilidade Cloud/ Virtualização
  • 7. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 A sua Rede está Pronta ? Como reduzo os custos operacionais?2 Como ofereço serviços de rede seguros e confiáveis ?3 1 Como gerencio esta complexidade e como escalo, como cresço ?
  • 8.
  • 9. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Enabled and Driven by: Changing How Networks areArchitected Proliferação de Dispositivos / Aplicações Praticamente tudo tem mobilidade Segurança em todo o lugar CloudData Center Virtualization CollaborationVideo Motivando Inovação nos negócios e Rentabilidade
  • 10. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Para video… when 91% of global Internet traffic will be video. Para segurança integrada… when 58% let others use their device and there is a 46% increase in malware for mobile devices. Para mobilidade… when 60% believe they won’t be in an office to be productive & efficient or when the desktop becomes virtualized. Para retorno do investimento … when saving energy, creating new business models, attracting the next-gen workforce and engaging with your customers. Para a continuidade do negócio… when downtime causes a loss of 3.6% of annual revenue. Good Enough is Not Good Enough
  • 11.
  • 12. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Novos requerimentos para a Rede Going Beyond Good Enough Video Enabled Secure Resilient Mobile Business Value Medianet enabled R&S and Wireless infrastructure and endpoints SecureX – Policy driven (ISE) Context Aware security from premise to the cloud Network Resiliency features supported by 20 years of R&D with pre-integrated designs enhanced by Smart Services Advanced wireless infrastructure with VideoStream and AnyConnect to support the broadest array of endpoint devices Cisco Webex, Jabber Video, Energywise, Virtual Office deliver optimal ROI , new business models
  • 13. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13 A Rede “Good Enough” Aplicação / Dispositivos A Rede de Nova Geração Borderless Network QoS Básico Suporte / Garantia Básicos Segurança em UTM Custo de Aquisição Baseada em Padrões Inteligência para a Aplicação/Dispositivo com Segurança, Otimização e Prioridade Controle e Suporte para a Media Integração de Voz e Video Garantia, Suporte + Serviços Gerência Segurança Integrada, do dispositivo para a cloud Proteção do Investimento & ROI Padrões + Inovação = Padrões Propósito Unico Unificada (Wired/Wireless, Building and Energy Control)
  • 14. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14 Infraestrutura Borderless End-Point/User Services Mobility Workplace Experience Video Seguro, Confiavel, Simples: AnyConnect Borderless Network ServicesPolíticas, Gerência, Segurança, API’s, Integração Switching Wireless WAAS Routing Security Mobility: Motion Security: TrustSec Voice/Video: Medianet Green: EnergyWise App Performance: App Velocity Serviços dos nossos parceiros de negócio: Experimente o valor de Borderless Networks Arquitetura para entregar o que a rede necessita nestes dias
  • 15. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15 CiscoConcorrente x Custo de Aquisição “Switches e Wireless são uma commodity…” “Cisco é muito caro…”
  • 16. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Custo Total considera o OpEx, Não somente CapEx
  • 17. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17 Melhoria Operacional Cisco • Simplificado:  Instalação  Configuração  Implementaçãp  Manutenção • Monitoramento Superior e Otimização de Rede • Alta Disponibilidade • Segurança • Redução do Consumo de Energia CiscoXX CiscoXX CapEx + OpEx Investimento Inicial Custo Total CapEx
  • 18. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18 Nexus 7000 ACESSO DISTRIBUIÇÃO CORE Catalyst 2960 Catalyst 3560-X/3750-X Catalyst 4500-E Catalyst 4500-X Catalyst 6500-E Catalyst 6500-E
  • 19. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19 BASIC LAYER 2 (LAN Lite) PORTFOLIO ADVANCED LAYER 2 (LAN Base) PORTFOLIO Fast Ethernet Gigabit Ethernet Fast Ethernet Gigabit Ethernet Catalyst 2960 1G Uplinks Partial PoE Catalyst 2960-S 1G Uplinks Partial PoE/PoE+ Catalyst 2960 1G Uplinks Partial PoE Catalyst 2960-S 10G/1G Uplinks FlexStack Full PoE, Partial PoE+ Escalabilidade C2960S-STACK
  • 20. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20 3560-C IP Base Portfolio 2960-C LAN Base Portfolio Fast Ethernet Gigabit Ethernet IP Base 8 and 12 port FE Data or PoE+ 2 x 1G Uplinks E- LLW 3560-C Portfolio IP Base 8 port GE Data or PoE+ 2 x 1G Uplinks E- LLW Fast Ethernet Gigabit Ethernet LAN Base 8 and 12 port FE Data or PoE 2 x 1G Uplinks E- LLW 2960-C Portfolio LAN Base 8 port GE Data Only 2 x 1G Uplinks E- LLW Suporte PoE WS-C3560CPD-8PT-S WS-C2906CPD-8PT-L
  • 21. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21 600 1600 2600 3600 • 2X2 MIMO-2 Spatial Streams • Local Ethernet Ports • 3X3 MIMO-2 Spatial Streams • CleanAir Express • ClientLink 2.0 • 3X4 MIMO-3 Spatial Streams • CleanAir • ClientLink 2.0 • 4X4 MIMO–3 Spatial Streams • 802.11ac module (planned) • Security and SI module • CleanAir • ClinetLink 2.0
  • 22. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22 O Portfolio da Cisco de Acesso Unificado, Roteadores e Segurança provê a solução correta para qualquer rede: Pequena, Média ou Grande Switches e Wireless entregam Segurança, Video, Alta Disponibilidade e PoE, bem como eficiência operacional para melhor atender os desafios do negócio As inovações da Cisco melhoram o custo operacional, independente do tamanho da empresa !
  • 23. Cisco Confidential© 2010 Cisco and/or its affiliates. All rights reserved. 23
  • 24. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24 • 5 AP’s 1600 + Controller 2504 com 5 licenças + 1 2960C com desconto diferenciado (Dist) • Pacote com 5 AP’s + Controller + Switch com 12 portas PoE por FOB de USD 2.150,00 !! • Licenças e Serviços Adicionais válidos para a promoção. • Valido até o final do Q4 Cisco (Julho 2013) Cisco Wireless Lan Controller 2504 + 5 Access Points 1602i + 1 Switch 2960C AIR-CT2504-5-K9 GPL USD 1.295 AIR-CAP1602I-T-K9 GPL USD 695 WS-C2960C-12PC-L GPL USD 1.195
  • 25. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25 3X3:2 MIMO Access Point CleanAir Express HW Enabled ClientLink 2.0 Beamforming Sealed Ruggedized Enclosure Ext Ant Optional 802.11abgn Max Data Rate per Radio of 300 Mbps
  • 26. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26 Guest Anchor Controller capable Supports up to 1,000 clients Supports FlexConnect, Mesh and Centralized Deployment Models 802.11ac Forward Compatible Up to 1 Gbps of Wireless Throughput* Supports Up to 75 Access Points Application Visibility and control
  • 27. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27 • Visibilidade e controle das aplicações utilizadas por visitantes e funcionários através da inspeção do tráfego (1). • Portal web interno na WLC customizavel para autenticação de visitantes, e também para a criação e administração dos usuários (2). • Administração centralizada e automática dos canais WiFi, com o recurso de troca de canal automática quando forem detectadas interferencias (3). • Melhora na experiência dos usuários de smartphones e tablets através da tecnologia de beamforming que melhora a recepção do sinal do usuário e economiza bateria do dispositivo móvel; e também com o balanceando transparente dos usuários WiFi nas bandas de 2.4GHz e 5GHz (4). • Otimização na transmissão e controle de Vídeo multicast sobre WiFi (5). • Garantia do roaming rápido e seguro dos clientes wireless entre os pontos de acesso, sem interrupção da aplicação do usuário (6). • Compatível com Cisco ISE (Identity Services Engine), Cisco PI (Prime Infrastructure), Cisco MSE (Mobility Services Engine) e com Microsoft Active Directory (AD), IAS ou NPS para autenticação de usuários. Diferenciais da solução com WLC Cisco
  • 28. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28 • (1) Tecnologia AVC (application visibility and control). • (2) Funcionalidade de Lobby Ambassador. • (3) Gestão dos recursos de rádio (RRM) e se disponível integração com Access Points CleanAir. AP1600 – CleanAir Hardware Ready. • (4) Tecnologia de Beamforming e Band Select. • (5) Tecnologia VideoStream. • (6) Gerenciamento de roaming e suporte a padrão para roaming rápido e seguro como 802.11r, OKC/PKC e CCKM. Descrição da tecnologia utilizada

Notas do Editor

  1. Let’s see how things have shifted over the last few years. Not so long ago, we typically had a desktop computer and a datacenter. Intelligence was built into each. <CLICK>The role of the network was to provide connectivity from that desktop to the server that hosted an application. And back then, we were identified by that singular IP address associated with that computer node. That IP address was our identity.
  2. But with the rise in mobile devices and applications in the last few years, the enterprise scene is changing. Now you are no longer uniquely identified by a specific IP address. You could be on an ipad, an iphone, a cius, and be logging in from anywhere. Who you are and where you are coming in from is not so simple anymore.
  3. Looking at the other side of the equation, cloud and virtualization completely changed the paradigm of where the application could be sitting. It was no longer tied to a specific server. It could move around or be in a public cloud. All of sudden you couldn’t rely on that application being exactly in the location you expected it to be.
  4. Looking at the other side of the equation, cloud and virtualization completely changed the paradigm of where the application could be sitting. It was no longer tied to a specific server. It could move around or be in a public cloud. All of sudden you couldn’t rely on that application being exactly in the location you expected it to be.
  5. Looking at the other side of the equation, cloud and virtualization completely changed the paradigm of where the application could be sitting. It was no longer tied to a specific server. It could move around or be in a public cloud. All of sudden you couldn’t rely on that application being exactly in the location you expected it to be.
  6. How do I manage complexity and scale?
  7. There is a debate raging in the IT industry about the role of the network.In the same week that a gaming company’s network was hacked and the personal information of 60 million customers was leaked [INSERT TIMELY EXAMPLE], there is a debate raging about whether the network matters.In the same moment that the iPad is being adopted by 65% of the Fortune 100 — obliterating conventional wisdom about how corporate networks support consumer devices and mobility —there is a debate raging about whether the network matters.On one side we have newcomers to the networking industry and some industry commentators who believe that the value of a network should be determined only by the cost of its components. They argue that customers should focus squarely on acquisition cost, not the value of their network assets. They argue that customers should focus on capital cost, not network capability and innovation. They believe the network has become a utility; that ‘good’ is good enough.We all understand that negotiating the best price for goods and services always makes good business sense. But this debate is about more than that.The debate is about making a choice between a tactical network where getting the lowest possible price up front is paramount – and a strategic network investment that enables customers to adapt quickly to new business imperatives and to handle the increased demands on their business.
  8.  We are seeing a number of mega trends coming together here:First, the mobile, collaborative workforce. 60% of employees believe they don’t need to be in the office anymore to be productive and efficient. They are working across cities, states and borders – more productively – with less time and expense on travel, and often with their own devices. I’d like to tell youabout what customers need to know about ‘good enough’ networks and their ability to support that type of mobile workforce. Second, data center virtualization. Today, most servers still run a single application but by 2014, 70% will be virtualized and 20% of enterprise workers will use virtual desktops. I’d like to tell about what a ‘good enough’ network will and won’t do to support that type of massive shift in IT and the impact to the user experience.Third, let’s talk about Cloud computing. We’re seeing entirely new business and service models evolve in the Cloud economy. 8 out of 10 IT managers plan to use public or private cloud services over the next 3 years. That has huge implications for the network. But the best example, above all, is video. Video will become our primary means of communication. In less than 2 years, video will become 91% of the global internet traffic. That’s driving an unthinkable volume of data. 1 zettabyte.  Much of that data is coming from mobile devices. The stat’s I’ve seen show that we are approaching 7 devices per person. A good enough network simply is not enough to support that volume of video.The stat’s I’ve seen show that we are approaching 7 devices per person. A good enough network simply is not enough to support that volume of videoAnd we also see growing security concerns that can only be addressed with a next generation network, as well. 20% of employees have left devices unattended; 58% let others use their device, and we’ve seen a 46% increase in malware for mobile devices.
  9. Good isn’t good enough for today’s business critical networks. A good enough network isn’t good enough for...video…when 91 percent of global Internet traffic will be internet video. a mobile workforce… when 60% of employees believe they don’t need to be in the office to be productive & efficient.  downtime…when large businesses lose an average of 3.6 percent in annual revenue due to network downtime each year. security…when20% of employees have left devices unattended; 58% let others use their device, 46% increase in malware for mobile devices. for cloud…when XXX
  10. As those market transitions have unfolded, one foundational technology; one platform has grown in its relevance and its contribution. That’s the network.The network has evolved from offering basic connectivity between mainframes and terminals to enabling the creation of global networks of PCs.The network was the platform first for the transactional Web and the advent of eCommerce, and then the platform for the social Web with its rich media, collaborative and real time capabilities.
  11. Network Requirements ….
  12. This debate has fueled numerous myths and misperceptions in our industry. Here are the seven most important Myths of the Good Enough Network. The Application and Endpoint Ignorant Myth: Good Enough Networks typically operate on the notion that data is data—all just ones and zeroes. More sophisticated next generation networks are built on innovative products that adjust to the application being delivered and the endpoint device on which it appears.Basic QoS Myth: If a company has no plans for video applications or rolling out virtual desktops, basic QoS may suffice. However, if the business wants to take advantage of video conferencing or to reap the benefits of a virtual desktop environment without compromising the end-user experience, they need to invest in a network with advanced QoS capabilities.Single Purpose Myth: Customers investing in networks for a single purpose are missing opportunities to use the power of the network to improve carbon footprint, save energy costs, and provide unified management for wired and wireless networks.Basic Warranty Myth: Service contracts and warranties are not created equal. You usually get what you pay for. Unfortunately, you never realize how good a service contract is until you need it. Be prepared and look at the fine print.Security as a Bolt-On Myth: Network security has to keep pace with an ever-changing threat profile and the increased use of mobile devices. When different security elements don’t share information, it magnifies the challenge of creating consistent security across the entire IT environment and can leave the customer exposed to costly security incidents. Acquisition Cost Myth: When building an IT network, about 20 percent of the budget is for acquiring the hardware and 80 percent is for operating costs. If customers don’t assess the complete financial impact, building a tactical network can quickly become the more expensive network. Just Look for Standards Myth: While industry standards are extremely important, relying only on existing standards as you plan for future needs is misguided. When companies lock themselves into standards-based, good-enough networks, they miss out on higher-level service innovation. 
  13. The diagram you see here outlines the main components of the borderless network architecture – it links applications, users, and end-point devices with operational processes and the network.It serves as both a framework for our system and architecture roadmap, as well as the deployment blueprint for Borderless Organizations. Let me briefly walk through its main elements. There are key pillars of functionality that Cisco Borderless Networks delivers on – primarily video, green, security, mobility, and application performance—on an end-to-end basis. For innovative organizations, these are key areas of investment and differentiation. The critical network services and proof-points of these pillars include Medianet, TrustSec and EnergyWise; they are delivered by the core infrastructure including routing, switching, mobility, security and WAN Optimization components. Equally important to the Borderless Network architecture is how the user experience is impacted by these network services—when mobile, when engaging with video, and in the workplace—however it’s defined. Network services integrate with endpoint technologies like AnyConnect, to deliver always-on, seamless, reliable, secure connectivity regardless of location or device.Meanwhile, Borderless Management and Policy are built into Network and User Services, offering a flexible and dynamic framework for policy definition and enforcement that spans across video, green, security, mobility, and application performance. The focus here is to connect the right user, the right device, the right application at the right place, at the right time, to the right network. It enables organizations to offer different levels of access privileges or performance characteristics to users, devices and applications.In this framework, policy definition and administration are centralized while control, visibility and enforcement are distributed via the application of dynamic policy assignments.Finally, we have the end-point devices that Cisco extends intelligence and awareness to, including cameras, video terminals, IP Phones, and mobile devices so that the experience is seamless and end to end. It is this blended approach of technologies and new capabilities that will enable new business models and allow your organization to go Borderless. Let’s take a look now at each of those critical network services I mentioned.services including mobile collaboration and secure mobility
  14. Cisco offers a comprehensive campus switching portfolio that extend from the edge of the network to the core. The Catalyst 6500 and Nexus 7000 are ideally suited for the core layer. At the distribution layer the Catalyst 6500 is thelead platform, and in certain smaller deployments, the Catalyst 4500E. We also have Catalyst 4500-X fixed platform for distribution in space constrained environments. The Catalyst 3000 and 4000 are ideal for the access layers. Certain customers who value a single platform for end to end deployments may opt to deploy the 6500 in the access layer And of course the 2000 is an entry level option for the access layer.
  15. Switch with 3D in the middle. Surrounded by 10 key benefits