powered by · days saved per year traceroute instantaneous 6 minutes 6 minutes 25 2.5 hours 15...
TRANSCRIPT
powered by
www.clujconnectingday.ro
www.clujconnectingday.ro
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Today’s reality
Workers connecting everywhere
Loss of control
More interconnected than ever
Expanded attack surface Multi-cloud reality
A software-defined world
Automated and sophisticated threats
High likelihood of a breach
Continuous operations
Must keep business running
www.clujconnectingday.ro
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Phishing
DDoS
Advanced Persistent Threats
Ransomware
Botnets
Wiper Attacks
Data/IP Theft
Spyware/Malware
Man in the Middle
Drive by Downloads
Malvertising
Unpatched Software
Rogue Software
Credential compromiseCryptomining
Attack landscape constantly evolving Supply chain attacks
3200 security decision makers surveyed around the world
79% of respondents said it was somewhat or very challengingto orchestrate alerts from multiple vendor products, (increase from 74% in 2018.)
Vendor proliferation remains a problem
In 2018 there were 54% of respondents with 10 or fewer vendors in their environment; in 2019 this number has risen to 63%. More respondents have fewer vendors; vendor consolidation, for a variety of possible reasons, is real and measurable.
And so CISOs are trying to consolidate
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Impossibly complex
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
problem solution
SIMPLIFICATION
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Power aMulticloud World
Reinventthe Network
Unlock the Power of Data
Security is Foundational
Create Meaningful Experiences
Increased Pace of Innovation
Secure, Intelligent Platform for Digital Business
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
I N T E N T C O N T E X T
S E C U R I T Y
L E A R N I N G
WANOptimize and secure application performance over any connection
AccessSegment network; secure user access from edge to cloud
Data CenterRun traditional or cloud native applications across any environment
Cloud EdgeSecurely connect and protect cloud workloads
Reinvent Networking
Multicloud
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Reinvent the Network
Intent-Based Network for Agility and Assurance
C97-740844-00 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential
Cisco DNA CenterDelivering real outcomes today…
* Source: Internal TCO analysis with large enterprise customer (actual results may vary)
61%Lower operating
expense
48%Reduced impact
of security breaches
80%Improved issue
resolution
67%Network
provisioningtime savings
Cisco DNA AssuranceFrom network data to business insights
Metadata extraction
Complex correlation
Steam Processing
Clients Baseline
Application NetworkIPAM
CMXAppD
IPSLA
SNMP
OID
Telnet
DNS
MIB
Ping
CLI
DHCP
Wireless
AAA
Syslog
Router
NetFlow
Traceroute
Network telemetrycontextual data
Complex event processing
Correlated insights
Suggestedremediation
Over 150 actionable insightsClients | Applications | Wireless | Switching | Routing
Everything as a sensor
The cost of troubleshooting
Typical troubleshooting issues for an enterprise network with 800 users (wired and wireless)
Issue/task Cisco DNA Center Traditional CLI SavingsOccurrences
per weekHours saved
per weekDays saved
per year
Traceroute Instantaneous 6 minutes 6 minutes 25 2.5 hours 15
Slow onboarding 2 minutes 17 minutes 15 minutes 20 5 hours 30
Device RPA failure Instantaneous 20 minutes 20 minutes 6 2 hours 12
Radio channel analysis 5 minutes 25 minutes 20 minutes 6 2 hours 12
Issue replication 5 minutes 65 minutes 60 minutes 2 2 hours 12
Site visit Not required 180 minutes 180 minutes 0.5 1.5 hours 9
Total: 15 hours 90
What would you do with 90 extra productive days per year?90
© 2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
UTM
Network Analytics
Advanced Malware
Secure Internet Gateway
WebW W W
Policy and Access
Cloud Access Security
Threat Protection Visibility Segmentation
Firewall
21
Security is Foundational
Security Across the Platform
C97-740844-00 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential
The Network. Intuitive.Powered by intent. Informed by context.
Journey to intent-based networking
We are here
Digital—ready infrastructure
Secure foundation
Programmability
Virtualization
Analytics and assurance
Everything as a sensor
Telemetry Historical and real time
Policy-based automation
Business policy
Translation Segmentation
Machine learning and AI
Policy validation
Predictive Self-healing
Intent-based networking
Constantly learning
Constantly adapting
Constantly protecting
Scaling (via cloud)
A way of life…Culture
www.clujconnectingday.ro
74,200 individual parts make the bridge to possible, possible.
2
5
Presentation ID
“The illiterate of the 21st century
— Alvin Toffler
Continuous Learning
www.clujconnectingday.ro
The bridge for the world