rajesh shetty
TRANSCRIPT
Network of the FutureRajesh Shetty
People, Process,Things, Data
Connectivity Brings
Value for Global Business
The World Is Embracing Digital
Experiences
The Network Is the Means
of Service Delivery
Driving Customer Loyalty
At the Heart of Every User Experience
Open Technologies
Built on IP Foundation
Human-Digital Experience
UbiquitousMedium of
Service Delivery
Hyper-Connected World
RapidlyEnabling New Technologies
Why the Network Matters The Ideal Network Enables Disruption
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Disruption is the New Normal
SEGMENTOF ONE
USEREXPECTATION OF
PERSONALIZATION
MOBILITYAND DEVICE EXPLOSION
IOE
DATAANALYTICS
BUSINESS ADVANTAGE
DEMOCRATIZATION OF TECHNOLOGY
HYPER-PACE, NEW COMPETITION
NEW BUSINESS MODELS
XAAS, SOFTWARE
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Cisco Enterprise Architecture Strategy
EN Architecture in Action Employee Experience
(BYOD and Mobility)
IT Simplicity andProgrammability(Cisco ACI)
Customer Experience (Connected Mobile
Experiences)
Internet of Things(Cisco IoT)
Security & Compliance
(Network Security)
1
2
3
4
5
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
Cisco Unified Access
WirelessAPs
Cisco Catalyst 6000/VSS
Cisco Catalyst 4500E, Cisco Catalyst 3K-X
WISM2/WLC
WLC
Identity Services Engine
Cisco Prime Infrastructure
OS Consistency: IOS 15.0 Cisco Validated Designs for Campus Deployment
Cisco Catalyst 6000 for Campus Core/Dist Cisco Catalyst 4500E and 3K-X for
Campus Wired AccessCisco Unified Wireless Network
TrustSecSecure Group Access to Simplify the Network and Enable Virtualized Data Center Services
Smart OperationsReduce Operating Expenses and Improve Network Application and Service Delivery
ResiliencyMaximized Network Availability with Virtual Switching and Stateful Switch Over
Application Visibility and ControlApplication-Aware Networking to Enable Collaboration, Video, and Other Apps
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
Capture the 802.11ac Transition
Indoor
MR34802.11ac
Outdoor
1570802.11ac | HDX
1700802.11ac
Indoor
Indoor
2700802.11ac | HDX
Indoor
3700802.11ac | HDX | Modular
3600802.11n w/ 802.11ac Module
On-Premise Cloud-Managed
3x3:2 | MDR: 867
3x4:3 | MDR:1.3Gbps.
3x4:3 | MDR: 1.3Gbps.
3x4:3 | MDR: 1.3Gbps.
3x3:3 | MDR: 1.75Gbps.
Same Price as Competitors Entry
802.11ac with Better Coverage
Enterprise & SP Models – Most Power allowed by the FCC
for Range and Coverage
NEWNEW
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
Cisco Meraki Clod Managed Solution
Trusted By Thousandsof Companies Worldwide
Cloud-Managed Network Leader
Complete Cloud-Managed Solution
Recognized as an Innovator
Centrally Managedfrom the Cloud
Among Fast Growing Cisco Portfolio
Tens of Millions of Devices Connected Worldwide
LAN AND WLAN Magic Quadrant
Coolest Technologies
Wireless Switching Security
Wan Optimization
Enterprise Mobility Management
100%Annual Growth
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
Delivering the Intelligent WAN
Delivering the Ultimate Application Experience Over Any Connection
4-10 times faster, at the same price
Deterministic performance with services
Pay as you grow
Virtualized network function
Revolutionary Architecture Service InnovationCisco® Application Centric Infrastructure (ACI) for the
WAN Native Layer 2 – 7 services Converged network, compute,
storage Simple, scalable WAN path control Best-of-breed security:
Sourcefire® IDS
Automation, orchestration,
User/app-based policy
Changes without disruption
NEWISR 4K
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
APIC-EM
Topology Services Policy ManagementThreat Detection
and DDoS ControlIWAN Management
Host/Device based Discovery - integrated with ISE/LDAP
Responsive Flow path trace support
Flexible user views with Tagging support & filtering
Provision Business Aligned Policies centrally - translates to ACL, QoS, Identity...
Application Centric approach for deploying QoS Policies
Troubleshoot ACL’s, application performance
Malware and infected host detection and prevention
Network wide security configurations centrally
DDoS Mitigation
Automated IWAN Branch / HQ provisioning
Hide Policy complexity by providing application oriented work flows
Monitor Application Performance
Enforce Path control
Solving the Most Pressing, Complex and Tedious IT Problems
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Physical Safety & Security
Change Catalysts: Tightening budgets, Increasing terror threats, need for real time detection, assessment and response
LocalDistributed - Local, Data center and Cloud
Manual Automated
Proprietary Legacy systems Open standards based
Separate Infosec & PhysecConverged networks, managed services
Point Products Architectures
Siloed, Separate, PhysicalReal-Time, Virtual, Connected, Interoperable
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
Enterprise Megatrends
Mobility Cloud
THE NETWORK
Collaboration
IT PRODUCTIVITY
SECURITY
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
Mobility Changes Everything
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
Emerging Demands
Applications Are Moving to the Data Center and Cloud
Internet Edge Is Moving to the User
Increasing Pressure on the WAN
More Mobile Data Traffic by 201810x
Mobility
of CIOs Expect to Operate via the Cloud by 2015
%50Cloud
of Mobile Traffic Will Be Video
Rich Media Apps
%80
Small Office
Cloud
Data Centers
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
Intelligent WAN
Internet
MPLS
3G/4G-LTE
Small Office
Cloud
Data Centre
WAASAkamai Connect
PfR
AVC
Intelligent Path Control
Secure Connectivity
Application Optimization
TransportIndependence
CWS
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
Secure Access
NETWORK / USER CONTEXT
How
WhatWho Where
When
CONSISTENT POLICY ACROSS WIRED, WIRELESS and VPN
POLICY MANAGEMENT AND ENFORCEMENT
IdentityServicesEngine
TrustSec
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
Connected Mobile Experience
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
The Network Matters
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Solutions Demonstration Made Easy - Dcloud
World-Class Solutions, Flexible Delivery Options at Your Fingertips
Cross-Functional Partnerships
dCloudThe Cisco Cloud
Collaboration Data Center
Industry Solutions
Enterprise Networking
Mobility/BYoD
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
Sales Acceleration Center – Cisco Partner Helpdesk for APJC
Helpdesk• Planning• Design• Implementation• Technical Support• Partners Community Support on CCO
• Email: [email protected]
• Live Chat: http://tinyurl.com/sacucs
• SAC is open 24 x 7, all countries, all time zones
• English language support
How to Contact SAC?
SAC Live Support Team• Technically Astute - CCNA to CCIE level
• Cisco Commerce Workspace (CCW) Expertise
• Well-versed in Cisco Sales Process
• Partnership with 200+ SME across Cisco
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
Rise to the Challenge
CloudMobility Analytics SDN
Transform your Customers Business
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21